{"title":"Application of Big Data Mining Technology in Blockchain Computing","authors":"Zejian Dong","doi":"10.47738/ijiis.v6i2.164","DOIUrl":"https://doi.org/10.47738/ijiis.v6i2.164","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"107 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Three Time Series Forecasting Methods on Linear Regression, Exponential Smoothing and Weighted Moving Average","authors":"Ajiono Ajiono","doi":"10.47738/ijiis.v6i2.165","DOIUrl":"https://doi.org/10.47738/ijiis.v6i2.165","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Network Data Algorithm Based on Association Rules","authors":"Rui Wang","doi":"10.47738/ijiis.v6i2.159","DOIUrl":"https://doi.org/10.47738/ijiis.v6i2.159","url":null,"abstract":"The network data algorithm on account of association can effectively describe the development process of historical data and predict the development trend of data. Draw support from the corresponding data algorithm to ameliorate the mining efficiency and execution efficiency of association, more users pay more attention to the rules, so it has important research and utilization value. On account of this, this paper first analyzes the concept and mining process of data association, then studies the mining algorithm of data association, and finally gives the structure and utilization effect of cyber data algorithm on account of association. This research focuses on developing network data algorithms based on association rules. Association rules are widely used in data mining to identify patterns and relationships between variables. In the context of network data, association rules can be used to identify relationships between nodes or entities in a network. The proposed algorithms leverage association rules to identify important nodes in a network and to uncover hidden patterns and relationships between nodes. The research also explores the performance of the algorithms in different network structures and data scenarios. The results of this research have the potential to improve the understanding and analysis of network data, which can be applied in various fields, including social network analysis, transportation network analysis, and bioinformatics.","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122273504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Effectiveness of Web Crawlers in Detecting Security Vulnerabilities in Computer Software Applications","authors":"B. Wan","doi":"10.47738/ijiis.v6i2.158","DOIUrl":"https://doi.org/10.47738/ijiis.v6i2.158","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing Internet Analysis Technology to Conduct Data Analysis of Student Attitude Survey","authors":"Yongcheng Cao","doi":"10.47738/ijiis.v6i2.146","DOIUrl":"https://doi.org/10.47738/ijiis.v6i2.146","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research and Application of Adjustable Drive Improve Oil Recovery Technology in Ansai Low Permeable Fracture Reservoir","authors":"Yong-Tao Li","doi":"10.47738/ijiis.v6i1.152","DOIUrl":"https://doi.org/10.47738/ijiis.v6i1.152","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121982664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishment and Application of Spatial Distribution Model of Roof Greening Based on GIS Technology","authors":"L. Pi","doi":"10.47738/ijiis.v6i1.147","DOIUrl":"https://doi.org/10.47738/ijiis.v6i1.147","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124052649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application and Analysis of Computer Vision Algorithms in Graphics and Image Processing","authors":"Xiangming Zhou","doi":"10.47738/ijiis.v6i1.149","DOIUrl":"https://doi.org/10.47738/ijiis.v6i1.149","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the Ideological and Political Practice Teaching of College Students Based on the Internet + Technology","authors":"Jinyan Zeng","doi":"10.47738/ijiis.v6i1.148","DOIUrl":"https://doi.org/10.47738/ijiis.v6i1.148","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116185554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Center Based on Cloud Computing Technology","authors":"Zhixin Xie","doi":"10.47738/ijiis.v6i1.128","DOIUrl":"https://doi.org/10.47738/ijiis.v6i1.128","url":null,"abstract":"","PeriodicalId":229613,"journal":{"name":"IJIIS: International Journal of Informatics and Information Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}