jbdOpen Access

Journal on Big Data

ISSN:2579-0048(print)
ISSN:2579-0056(online)
Publication Frequency:Quarterly

  • Online
    Articles

  • on board
    editors


About Journal

Journal on Big Data is launched in a new area when the engineering features of big data are setting off upsurges of explorations in algorithms, raising challenges on big data, and industrial development integration; and novel paradigms in this cross–disciplinary field need to be constructed by translating complex innovative ideas from various fields. Read More

  • ARTICLE

    Application of Quicksort Algorithm in Information Retrieval

    Journal on Big Data, Vol.3, No.4, pp. 135-145, 2021, DOI:10.32604/jbd.2021.017017
    Abstract With the development and progress of today’s network information technology, a variety of large-scale network databases have emerged with the situation, such as Baidu Library and Weipu Database, the number of documents in the inventory has reached nearly one million. So how do you quickly and effectively retrieve the information you want in such a huge database? This requires finding efficient algorithms to reduce the computational complexity of the computer during Information Retrieval, improve retrieval efficiency, and adapt to the rapid expansion of document data. The Quicksort Algorithm gives different weights to each position of the document, and multiplies the… More >

  • ARTICLE

    Design of Cybersecurity Threat Warning Model Based on Ant Colony Algorithm

    Journal on Big Data, Vol.3, No.4, pp. 147-153, 2021, DOI:10.32604/jbd.2021.017299
    Abstract In this paper, a cybersecurity threat warning model based on ant colony algorithm is designed to strengthen the accuracy of the cybersecurity threat warning model in the warning process and optimize its algorithm structure. Through the ant colony algorithm structure, the local global optimal solution is obtained; and the cybersecurity threat warning index system is established. Next, the above two steps are integrated to build the cybersecurity threat warning model based on ant colony algorithm, and comparative experiment is also designed. The experimental results show that, compared with the traditional qualitative differential game-based cybersecurity threat warning model, the cybersecurity threat… More >

  • ARTICLE

    Can Twitter Sentiment Gives the Weather of the Financial Markets?

    Journal on Big Data, Vol.3, No.4, pp. 155-173, 2021, DOI:10.32604/jbd.2021.018703
    Abstract Finance 3.0 is still in its infancy. Yet big data represents an unprecedented opportunity for finance. The massive increase in the volume of data generated by individuals every day on the Internet offers researchers the opportunity to approach the question of financial market predictability from a new perspective. In this article, we study the relationship between a well-known Twitter micro-blogging platform and the Tunisian financial market. In particular, we consider, over a 12-month period, Twitter volume and sentiment across the 22 stock companies that make up the Tunindex index. We find a relatively weak Pearson correlation and Granger causality between… More >

  • ARTICLE

    Research on the Application of Big Data Technology in the Integration of Enterprise Business and Finance

    Journal on Big Data, Vol.3, No.4, pp. 175-182, 2021, DOI:10.32604/jbd.2021.024074
    Abstract With the advent of the era of big data, traditional financial management has been unable to meet the needs of modern enterprise business. Enterprises hope that financial management has the function of improving the accuracy of corporate financial data, assisting corporate management to make decisions that are more in line with the actual development of the company, and optimizing corporate management systems, thereby comprehensively improving the overall level of the company and ensuring that the company can be in business with the assistance of financial integration, can better improve and develop themselves. Based on the investigation of enterprises and universities,… More >

  • ARTICLE

    A Lightning Disaster Risk Assessment Model Based on SVM

    Journal on Big Data, Vol.3, No.4, pp. 183-190, 2021, DOI:10.32604/jbd.2021.024892
    Abstract Lightning disaster risk assessment, as an intuitive method to reflect the risk of regional lightning disasters, has aroused the research interest of many researchers. Nowadays, there are many schemes for lightning disaster risk assessment, but there are also some shortcomings, such as the resolution of the assessment is not clear enough, the accuracy rate cannot be verified, and the weight distribution has a strong subjective trend. This paper is guided by lightning disaster data and combines lightning data, population data and GDP data. Through support vector machine (SVM), it explores a way to combine artificial intelligence algorithms with lightning disaster… More >

  • ARTICLE

    Research on Key Technologies of Electronic Shelf Labels Based on LoRa

    Journal on Big Data, Vol.3, No.2, pp. 49-63, 2021, DOI:10.32604/jbd.2021.016213
    Abstract The demand for Electronic Shelf Labels (ESL), according to the Internet of Things (IoT) paradigm, is expected to grow considerably in the immediate future. Various wireless communication standards are currently contending to gain an edge over the competition and provide the massive connectivity that will be required by a world in which everyday objects are expected to communicate with each other. Low-Power Wide-Area Networks (LPWANs) are continuously gaining momentum among these standards, mainly thanks to their ability to provide long-range coverage to devices, exploiting license-free frequency bands. The main theme of this work is one of the most prominent LPWAN… More >

  • ARTICLE

    Visualization Research and Application of Water Quality Monitoring Data Based on ECharts

    Journal on Big Data, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jbd.2020.01001
    Abstract Water resources are one of the basic resources for human survival, and water protection has been becoming a major problem for countries around the world. However, most of the traditional water quality monitoring research work is still concerned with the collection of water quality indicators, and ignored the analysis of water quality monitoring data and its value. In this paper, by adopting Laravel and AdminTE framework, we introduced how to design and implement a water quality data visualization platform based on Baidu ECharts. Through the deployed water quality sensor, the collected water quality indicator data is transmitted to the big… More >

  • ARTICLE

    Big Data Audit of Banks Based on Fuzzy Set Theory to Evaluate Risk Level

    Journal on Big Data, Vol.2, No.1, pp. 9-18, 2020, DOI:10.32604/jbd.2020.01002
    Abstract The arrival of big data era has brought new opportunities and challenges to the development of various industries in China. The explosive growth of commercial bank data has brought great pressure on internal audit. The key audit of key products limited to key business areas can no longer meet the needs. It is difficult to find abnormal and exceptional risks only by sampling analysis and static analysis. Exploring the organic integration and business processing methods between big data and bank internal audit, Internal audit work can protect the stable and sustainable development of banks under the new situation. Therefore, based… More >

  • ARTICLE

    A Survey on Adversarial Examples in Deep Learning

    Journal on Big Data, Vol.2, No.2, pp. 71-84, 2020, DOI:10.32604/jbd.2020.012294
    Abstract Adversarial examples are hot topics in the field of security in deep learning. The feature, generation methods, attack and defense methods of the adversarial examples are focuses of the current research on adversarial examples. This article explains the key technologies and theories of adversarial examples from the concept of adversarial examples, the occurrences of the adversarial examples, the attacking methods of adversarial examples. This article lists the possible reasons for the adversarial examples. This article also analyzes several typical generation methods of adversarial examples in detail: Limited-memory BFGS (L-BFGS), Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Iterative Least-likely… More >

  • ARTICLE

    Design and Implementation of Open Source Online Evaluation System Based on Cloud Platform

    Journal on Big Data, Vol.2, No.3, pp. 117-123, 2020, DOI:10.32604/jbd.2020.011420
    Abstract In order to provide a good practice platform for the program design contestants and algorithm enthusiasts, this paper designs and implements a programming online evaluation system based on cloud platform, which is a web system that can return the test results of the program source codes submitted by users in real time. It realizes the automatic evaluation of the program design training questions. The system is implemented by the way of front-end and backend separation and modular programming. The front-end of the web is implemented by Vue framework, the back-end is implemented by Django framework. The judgment core is written… More >

  • ARTICLE

    Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking

    Journal on Big Data, Vol.2, No.2, pp. 53-62, 2020, DOI:10.32604/jbd.2020.010590
    Abstract In order to effectively solve the problem of copyright protection of materials genome engineering data, this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology. First, the important attribute values are selected from the materials genome engineering database; then, use the method of remainder to group the selected attribute values and extract eigenvalues; then, the eigenvalues sequence is obtained by the majority election method; finally, XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center. When a copyright dispute requires copyright authentication… More >

Share Link

WeChat scan