Design of University Archives Business Data Push System Based on Big Data Mining Technology

被引:0
作者
Wang, Zhongke [1 ]
Li, Jun [1 ]
机构
[1] Chengdu Technol Univ, Chengdu 611730, Sichuan, Peoples R China
关键词
Big data mining technology; system design; business data pus; hidden markov model; similarity; ALGORITHM;
D O I
10.14569/IJACSA.2023.0141105
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Aiming at the problems of low accuracy, recall, coverage and push efficiency of university archives business data, a university archives business data push system based on big data mining technology is designed. Firstly, the overall architecture and topological structure of the university archives business data push system are designed, and then the functional modules of the system are designed. Using big data mining technology to mine user behavior, modeling according to user behavior sequence, and designing a model to predict user behavior sequence based on hidden Markov model theory. Finally, the user behavior sequence is analyzed, and the factors such as user collaboration, similarity of user behavior sequence and data timeliness are comprehensively considered to push university archives business data for users. The experimental results show that the proposed method has high data push accuracy, recall, coverage and push efficiency, and can effectively push the required business data for users.
引用
收藏
页码:42 / 53
页数:12
相关论文
共 31 条
[1]  
Abdelhak E, 2022, ECS transactions, V107, P19495
[2]  
[Anonymous], 2020, Computer simulation
[3]   Cloud security based attack detection using transductive learning integrated with Hidden Markov Model [J].
Aoudni, Yassine ;
Donald, Cecil ;
Farouk, Ahmed ;
Sahay, Kishan Bhushan ;
Babu, D. Vijendra ;
Tripathi, Vikas ;
Dhabliya, Dharmesh .
PATTERN RECOGNITION LETTERS, 2022, 157 :16-26
[4]  
Chaisoong Umaporn, 2021, ICIC Express Letters, V15, P915, DOI 10.24507/icicel.15.09.915
[5]   Differentially private user-based collaborative filtering recommendation based on κ-means clustering [J].
Chen, Zhili ;
Wang, Yu ;
Zhang, Shun ;
Zhong, Hong ;
Chen, Lin .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 168
[6]  
D Deva Hema, 2022, ECS Transactions, V107, P4913, DOI [10.1149/10701.4913ecst, 10.1149/10701.4913ecst]
[7]   An HSS-based robust and lightweight multiple group authentication for ITS towards 5G [J].
Hsu, Chingfang ;
Harn, Lein ;
Xia, Zhe .
IET INTELLIGENT TRANSPORT SYSTEMS, 2021, 15 (11) :1454-1460
[8]  
Il Kwak B., 2021, Expert Syst Appl, V166
[9]   A Secure and LoRaWAN Compatible User Authentication Protocol for Critical Applications in the IoT Environment [J].
Jabbari, Abdollah ;
Mohasefi, Jamshid Bagherzadeh .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) :56-65
[10]   Prediction of solar energy guided by pearson correlation using machine learning [J].
Jebli, Imane ;
Belouadha, Fatima-Zahra ;
Kabbaj, Mohammed Issam ;
Tilioua, Amine .
ENERGY, 2021, 224