Computer Science ›› 2021, Vol. 48 ›› Issue (9): 36-42.doi: 10.11896/jsjkx.210500207
Special Issue: Intelligent Data Governance Technologies and Systems
• Intelligent Data Governance Technologies and Systems • Previous Articles Next Articles
WANG Jun1,2,3, WANG Xiu-lai 1,2, PANG Wei2, ZHAO Hong-fei2
CLC Number:
[1]CHANG Z J,QIAN L,XIE J,et al.Big Data Platform for Sci-Tech Literature Based on Distributed Technology[J].Data Analysis and Knowledge Discovery,2021,5(3):69-77. [2]GRUEBER M,STUDT T.Global R&D funding foreast[J].R&D Magazine,2014,16:1-35. [3]IDEN J,METHLIE L B,CHRISTENSEN G E.The nature of strategic foresight research:A syetematic literature review[J].Technological Forecasting and Social Change,2017,116:87-97. [4]LIU A D,DU X H,WANG N,et al.Blockchain-based access control mechanism for big data[J].Ruan Jian Xue Bao/Journal of Software,2019,30(9):2636-2654. [5]LINSTONE H A,TUROFF M.The Delphi method:Techniques and applications[J].Journal of Marketing Research,1976,18(3):363-364. [6]RAFORD N.Online foresight platforms:Evidence for their impact on scenario planning &strategic forsight[J].Technogical Forecasting and Social Change,2015,97:65-76. [7]TANG Y,SUN H,YAO Q,et al.The selection of key technologies by the silicon photovoltaic industry based on the Delphi method and AHP(analytic hierarchy process):Case study of China[J].Energy,2014,75:474-482. [8]https://www.iarpa.gov/index.php/research-programs/fuse. [9]https://www.iarpa.gov/index.php/research-programs/forest. [10]Research Group on the year 2000.China in the year 2000 [M].Science and Technology Literature Press,1984. [11]ZHOU Y C,LI S Y.The choice of national key technology:a new round of competition for technological advantage[M].Science and Technology Literature Press,1995. [12]MU R P,WANG R X.2004.Development of technology foresight and its application in China[J].Bulletin of Chinese Academy of Sciences,19(4):259-263. [13]LI J Z,WANG H Z,GAO H.State-of-the-Art of research on big data usability[J].Ruan Jian Xue Bao/Journal of Software,2016,27(7):1605-1625. [14]HUANG L S,TIAN M M,HUANG H.Preserving privacy in big data:A survey from the cryptographic perpective[J].Ruan Jian Xue Bao,2015,26(4):945-959. [15]SOARES S.Big data governance:An emerging imperative [M].Beijing:Tsinghua University Press,2014. [16]ZENG W,CHE Y.Research on Information Analysis Technology on Science and Technology Big Data[J].Information Science,2019,37(3):93-96. [17]CHU X,ILYAS I F.Qualitative data cleaning[J].Proceedings of the VLDB Endowment,2016,9(13):1605-1608. [18]WU X D,DONG B B,DU X Z,et al.Data governance technology[J].Ruan Jian Xue Bao,2019,30(9):2830-2856. [19]HAN Y N,LIU J W,LUO X L.A Survey on Probabilistic Topic Model[J].CHINESE JOURNAL OF COMPUTERS,2021,44(6):1095-1139. [20]WANG Y,MA C,WANG W,et al.An Approach of Fast Data Manipulation in HDFS with Supplementary Mechanisms[J].Journal of Supercomputing,2015,71(5):1736-1753. [21]LI W D.The Research and Implementation of Mining Large Data Based on Spark[D].Jinan:Shandong University,2015. [22]GAO J S,LIU H Q.Research on the Linked Data at Domestic and Abroad Based on Knowledge Mapping[J].Information Science,2018,36(3):117-124. [23]GB/T 13745-2009,Subject classification and code [S].Chinese Academy of Standardization,2009. |
[1] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[2] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[3] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[4] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[5] | YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117. |
[6] | WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85. |
[7] | WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211. |
[8] | TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203. |
[9] | ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242. |
[10] | LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264. |
[11] | ZHANG Guang-jun, ZHANG Xiang. Mechanism and Path of Optimizing Institution of Legislative Evaluation by Applying “Big Data+Blockchain” [J]. Computer Science, 2021, 48(10): 324-333. |
[12] | YE Ya-zhen, LIU Guo-hua, ZHU Yang-yong. Two-step Authorization Pattern of Data Product Circulation [J]. Computer Science, 2021, 48(1): 119-124. |
[13] | ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116. |
[14] | MA Meng-yu, WU Ye, CHEN Luo, WU Jiang-jiang, LI Jun, JING Ning. Display-oriented Data Visualization Technique for Large-scale Geographic Vector Data [J]. Computer Science, 2020, 47(9): 117-122. |
[15] | LIU Zhen-peng, SU Nan, QIN Yi-wen, LU Jia-huan, LI Xiao-fei. FS-CRF:Outlier Detection Model Based on Feature Segmentation and Cascaded Random Forest [J]. Computer Science, 2020, 47(8): 185-188. |
|