Use of open data in Ukraine: some important aspects

Viktoriya Shevchenko, Anzhelika Dosenko, Gaiana Iuksel, Aleksandra Synowiec, Dibrova Valentyna

Resumen

The article explores the open data phenomenon, data-driven analytics and special attention is given to the media industry where they act as raw materials for creating text, image or video content. The aim of scientific intelligence is to identify the principle of working with data in the public domain in Ukraine. Direct opportunities for analytics, access to public information are considered, classification features of data are revealed, social indicators are singled out and interpreted for society.

Palabras clave

big data, open data, content, communication, information, data analytics.

Texto completo:

PDF (English)

Referencias

Aashirwad Kumar, G., & Ravikumar, A. (2020). A Study on Consumer Perception Towards Online Ticketing Systems. A, A Study on Consumer Perception Towards Online Ticketing Systems, 110-115.

Bathla, R. K., Suseendran, G., & Shallu (2018). Research analysis of big data and cloud computing with emerging impact of testing. International Journal of Engineering and Technology(UAE), 7, 239–243.

Berezhna, T. (2015). Data Journalism: the New Journalism of Big Numbers.

Denis, G., Kumar, D. T. K., Sasipriya, D. S., & Karthikeyan, M. (2020). LinkedIn Talent Insights for Social Hiring in Hr Recruitment Using Data Mining Techniques Using Social, Mobility, Analytics, Cloud (SMAC) Architecture. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(1), 80-89.

Denis, L., Kumar, D. T. K., Karthikeyan, D., & Sasipriya, D. S. (2020). Offline Mobile Based Otp Technology for Enterprise IoT Enabled Architecture in Banking Cash Logistics & ATM Operations. International Journal of Advanced Research in Engineering and Technology (IJARET), 11(1), 61-69.

Gurin, J. (2017). Open Data Now: The Secret to Hot Startups. Smart Investing, Savvy Marketing, and Fast Innovation–January, 7, 2014.

Hahnel, M. (2015). Global funders who require data archiving as a condition of grants.

Hassan, G., & Hassanien, A. E. (2017). A Review of Vessel Segmentation Methodologies and Algorithms: Comprehensive Review. In Handbook of Research on Machine Learning Innovations and Trends (pp. 187-203). IGI Global.

Jing, X., Bi, Y., & Deng, H. (2016). An Innovative Two-Stage Fuzzy kNN-DST Classifier for Unknown Intrusion Detection. International Arab Journal of Information Technology (IAJIT), 13(4), 359–366.

Kotu, V., & Deshpande, B. (2018). Data science: concepts and practice. Morgan Kaufmann.

Kubicek, H., & Jarke, J. (2020). Offene Daten (Open Data). Wiesbaden: Springer VS, 1-15.

Kumar, U. (2018). Significant Enhancement of Segmentation Efficiency of Retinal Images Using Texture-Based Gabor Filter Approach Followed by Optimization Algorithm. In Ophthalmology: Breakthroughs in Research and Practice (pp. 53-68). IGI Global.

Kumar, А., & Survey, A. (2015). On Intrusion Detection Systems for Cloud Computing Environment. International Journal of Computer Applications, 109, 6–15.

Lal, N., Kumar, S., Saxena, A., & Chaurasiya, V. K. (2015). Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, 264-273.

Mahalakshmi, B., & Suseendran, G. (2016). Effectuation of secure authorized deduplication in hybrid cloud. Indian Journal of Science and Technology, 9(25), 1-7.

Markarova, O. (2018). Our movement to openness is irreversible.

Nadiammai, G. V., & Hemalatha, M. J. E. I. J. (2014). Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal, 15(1), 37-50.

Nadiammai, G. V., & Hemalatha, M. J. E. I. J. (2014). Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal, 15(1), 37-50.

Nakamura, A. (2014). Graph drawing of knowledge structure of mathematics. The SIJ Transactions on Computer Science Engineering & its Applications (CSEA), 2(4), 161-165.

Nakamura, A., Kudo, T., & Nishioka, K. (2018). Development of the visualizing system of knowledge structure based on STEM e-learning website. In Proceedings of the 9th International Conference on Language, Innovation, Culture & Education (pp. 24-25).

Nakamura, A., Kudo, T., & Nishioka, K. (2018). Development of the visualizing system of knowledge structure based on STEM e-learning website. In Proceedings of the 9th International Conference on Language, Innovation, Culture & Education (pp. 24-25).

Nathiya, T. (2017). Reducing DDOS Attack Techniques in Cloud Computing Network Technology. International Journal of Innovative Research in Applied Sciences and Engineering (IJIRASE), 1(1), 23-29.

Nathiya, T., & Suseendran, G. (2018). An effective way of cloud intrusion detection system using decision tree, support vector machine and Naïve bayes algorithm. International Journal of Recent Technology and Engineering, 7, 38-42.

Orlowski, C. (2020). Management of IOT Open Data Projects in Smart Cities. Academic Press.

Ren, Y., Zadorozhny, V. I., Oleshchuk, V. A., & Li, F. Y. (2013). A novel approach to trust management in unattended wireless sensor networks. IEEE Transactions on Mobile Computing, 13(7), 1409-1423.

Sathyavathy, V., & Shanmuga, D. (2020). Priyaa Software Testing Techniques with Artificial Intelligence in Iot Applications, 291-293.

Shchelokov, O. (2018). Is there an open data market in Ukraine?

Shevchenko, V. (2017). Multimedia Content: Tutorial manual. Kiev University.

Subhashini, G., & Neelambary, V. (2018). Securing and Transmitting Quantum Data on Wireless Sensor Network. International journal of recent technology and engineering, 7, 324 328.

Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221-1234.

Wu, Y., Moylan, E., Inman, H., & Graf, C. (2019). Paving the way to open data. Data Intelligence.

Enlaces refback

  • No hay ningún enlace refback.

Comentarios sobre este artículo

Ver todos los comentarios