2015
DOI: 10.7236/jiibc.2015.15.6.17
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Smart Application using Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…In addition, various infrastructures should become a central platform for value creation, as creative convergence shows various results to local communities and industries through the promotion of meta-structures. Metaverse (Matthew, 2021) (Lee et al, 2021;Wang, & Wu, 2022) is implemented through the organic linkage of various ICT technologies such as Extended Reality (XR), Artificial Intelligence (AI) (Minsky, 1961) (McCarthy & Hayes, 1981), Bigdata (Sagiroglu & Sinanc, 2013) (George et al, 2014) (Oh, 2015) (Jeong et al, 2020) (Kang & Jung, 2016) (Lee & Han, 2019) (Lee, 2020), 5 Generation (5G) Network, Cloud, Digital Twin and Blockchain. The decline in the school-age population is approaching a major crisis for local universities.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, various infrastructures should become a central platform for value creation, as creative convergence shows various results to local communities and industries through the promotion of meta-structures. Metaverse (Matthew, 2021) (Lee et al, 2021;Wang, & Wu, 2022) is implemented through the organic linkage of various ICT technologies such as Extended Reality (XR), Artificial Intelligence (AI) (Minsky, 1961) (McCarthy & Hayes, 1981), Bigdata (Sagiroglu & Sinanc, 2013) (George et al, 2014) (Oh, 2015) (Jeong et al, 2020) (Kang & Jung, 2016) (Lee & Han, 2019) (Lee, 2020), 5 Generation (5G) Network, Cloud, Digital Twin and Blockchain. The decline in the school-age population is approaching a major crisis for local universities.…”
Section: Introductionmentioning
confidence: 99%
“…However, due to the recent development of hacking technology, traffic with encrypted payload is increasing, making it difficult to utilize existing traffic analysis methods [3] [4]. To solve this problem, a traffic analysis method applying various analysis techniques based on Big Data is being studied.…”
Section: Introductionmentioning
confidence: 99%