computer data
Recently Published Documents


TOTAL DOCUMENTS

593
(FIVE YEARS 127)

H-INDEX

22
(FIVE YEARS 1)

2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Jiwei Fang ◽  
Jianfeng Li

This study is based on the analysis of the status quo of the research on liver cancer syndromes, starting with the clinical objective and true four-diagnosis information of TCM inpatients with primary liver cancer, using computer data mining technology to analyze and summarize the syndrome rules from the bottom to the top. Let the data itself show the essence of liver cancer syndrome. First, with the help of hierarchical cluster analysis, we can understand the general characteristics through the rough preliminary classification of the four-diagnosis information of liver cancer patients. Then, with the help of the emerging and mature hidden structure model analysis in recent years, through data modeling, the classification of common syndromes of liver cancer and the corresponding relationship with the four-diagnosis information are comprehensively analyzed. Finally, considering the inherent shortcomings of implicit structure and hierarchical clustering based on the assumption that there is a unique one-to-one correspondence between the four diagnostic information factors and the class (or hidden class) when classifying, we plan to use factor analysis and joint cluster analysis, as supplementary means to further explore the classification of liver cancer syndromes and the corresponding relationship with the four-diagnosis information.


Author(s):  
Yu. S. Kharin

This article is devoted to constructing neural network-based models for discrete-valued time series and their use in computer data analysis. A new family of binomial time series based on neural networks is presented, which makes it possible to approximate the arbitrary-type stochastic dependence in time series. Ergodicity conditions and an equivalence relation for these models are determined. Consistent statistical estimators for model parameters and algorithms for computer data analysis (including forecasting and pattern recognition) are developed.


2021 ◽  
Author(s):  
Evgeniy Russkevich

The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian Federation (Article 2741 of the Criminal Code of the Russian Federation), developed proposals for the differentiation of criminal liability for attacks on the security of computer data and systems, developed scientifically sound recommendations for qualification. In the second edition, the issues of differentiation of criminal liability for digital crimes by means of the General and Special Parts of the Criminal Code of the Russian Federation are separately worked out. The analysis of the problems of qualification of crimes in the field of computer information, as well as other crimes committed using information and communication technologies, outside of Chapter 28 of the Criminal Code of the Russian Federation. Taking into account the results obtained, a draft resolution of the Plenum of the Supreme Court of the Russian Federation "On judicial practice in cases of crimes in the field of computer information" is presented. It is intended for researchers, teachers, practicing lawyers, students and postgraduates of law schools and faculties.


2021 ◽  
Vol 66 ◽  
pp. 276-283
Author(s):  
V.V. Popko ◽  
E.V. Popko

The article considers the international legal regulation of combating cybercrime, which is considered as a transnational phenomenon. In the group of transnational crimes, along with drug trafficking, terrorist acts, money laundering, illegal import of migrants, human trafficking, firearms trafficking, counterfeiting, etc., cybercrimes play an important role in terms of public harm, unprecedented and rapid growth. The mechanisms and directions of the fight against cybercrime developed by international criminal law are studied, among which the international legal regulation is of fundamental importance, and difficulties in defining the concepts of "cybercrime" and "computer crimes" are noted. The classification of types of cybercrimes is given and their most characteristic features are revealed. The author analyzes the international normative documents that form the legal basis for regulating relations in the field of international cybercrime, among which the most prominent are conventions, including the UN Convention against Transnational Organized Crime of November 15, 2000, the Council of Europe Convention on Cybercrime of November 23, 2001 and Additional Protocol to it of January 28, 2003. The obligations of states to criminalize cybercrime in national legislation are analyzed, the types of illegal actions related to cybercrime are considered, in particular the main four groups of crimes classified in the 2001 Cybercrime Convention by Gender object and on specific grounds of the object of encroachment: 1) crimes against confidentiality, integrity and availability of computer data and systems; 2) offenses related to the use of computer tools; 3) offenses related to the content of data; 4) offenses related to infringement of copyright and compatible rights, as well as additional types of liability and sanctions (attempt, complicity). The Protocol to the 2003 Cybercrime Convention expands this range of crimes and contains obligations to criminalize the following acts: distribution of racist and xenophobic material through computer systems. The limitation of the 2001 Convention on Cybercrime, adopted by the Council of Europe, and the need to adopt a universal instrument that would significantly increase the fight against cybercrime are noted.


2021 ◽  
Vol 5 (S4) ◽  
Author(s):  
Hanna Komarnytska ◽  
Natalya Malyuga ◽  
Olena Androsova ◽  
Liudmyla Vovk ◽  
Nataliya Smolinska ◽  
...  

As practice shows, one of the modern, effective methods for analyzing various data is visualization. It is currently widely used in solving problems of analyzing initial data in multiple fields of human activity ? scientific research, design work, financial monitoring, etc. However, the human brain is designed so that the graphical display allows one to perceive and understand some features of quantitative data, and some quantitative tasks can be best performed. The article reveals a set of tasks for managing financial projects and the resulting visual methods of analytics. The application of a systematic approach to the management of financial projects and the solution to the visualization of complex data analytics problems is considered. A diagram of the implementation of the stages of data visualization for analysis by specialists and project management is presented. It is proposed to use modern tools for computer data processing and visualization using cross-sectional data, detailing and structuring large amounts of data. The importance of modern analytical software is noted, which allows visualizing financial analytics using various models or combining them in the shortest possible time.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012022
Author(s):  
Cheng Luo

Abstract Due to the continuous development of information technology, data has increasingly become the core of the daily operation of enterprises and institutions, the main basis for decision-making development. At the same time, due to the development of network, the storage and management of computer data has attracted more and more attention. Aiming at the common problems of computer data storage and management in practical work, this paper analyzes the object and content of data management, investigates the situation of computer data storage and management in China in recent two years, and interviews and tests the data of programming in this design platform. At the same time, in view of the related problems, the research results are applied to practice. On the basis of big data, the storage and management platform is designed. The research and design adopts a special B+ tree node linear structure of CIRC tree, and the linear node structure is changed into a ring structure, which greatly reduces the number of data persistence instructions and the performance overhead. The results show that compared with the most advanced B+ tree design for nonvolatile memory, crab tree has 3.1 times and 2.5 times performance improvement in reading and writing, respectively. Compared with the previous NV tree designed for nonvolatile memory, it has a performance improvement of 1.5 times, and a performance improvement of 8.4 times compared with the latest fast-fair. In the later stage, the expansion of the platform functions is conducive to the analysis and construction of data related storage and management functions, and further improve the ability of data management.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042081
Author(s):  
Zhe Fu

Abstract With the rapid development of computer technology, computer data mining technology has been widely used in various fields, and it has also promoted tremendous progress in society as a whole. As the economic and social development will inevitably promote the continuous skyrocketing of data in various fields, how to find useful information in the infinite data will inevitably require computer data mining technology. The article will analyze the development and application of computer data mining technology.


Sign in / Sign up

Export Citation Format

Share Document