Skip to main content

Efficient Retrieval Method of Malicious Information in Multimedia Big Data Network Based on Human-Computer Interaction

  • Conference paper
  • First Online:
Advanced Hybrid Information Processing (ADHIP 2020)

Abstract

In order to solve the phenomenon that the malicious information retrieval in the traditional method is not comprehensive and the precision is not high, an efficient retrieval method of malicious information in multimedia big data network based on human-computer interaction is proposed and designed. On the basis of analyzing the principle of information retrieval, the human-computer interaction form is used to divide the metrics of malicious information. On this basis, the human-computer interaction retrieval logic is established, and the malicious information clustering method is used to realize the multimedia big data network. Efficient retrieval of malicious information. Through the method of experimental argumentation analysis, the validity of the human-computer interaction retrieval method is determined. The results show that the method has a high recall rate of 28.31% compared with the traditional method, and the retrieval accuracy is extremely high. In this paper, the method of network malicious information retrieval is effective and suitable for popularization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xu, L., Weiqun, W., Zengguang, H., et al.: Human-machine interactive control method for rehabilitation robots. Chin. Sci. Inf. Sci. 25(1), 101–103 (2018)

    Google Scholar 

  2. Juanjuan, Q.: Simulation of implicit feedback information retrieval for users of big data network. Comput. Simul. 36(9), 430–433+468 (2019)

    Google Scholar 

  3. Wei, Z., Hongxu, H., Jing, W.: Application of Bayesian network for information retrieval. Inf. Sci. 36(6), 136–141 (2018)

    Google Scholar 

  4. Yao, Z., Bo, L., Xiansheng, H., et al.: Introduction to the special topic of multimedia data processing and analysis. J. Softw. 74(4), 59–63 (2018)

    Google Scholar 

  5. Qi, Z.: Research situation analysis of multimedia classrooms in china based on big Data. Econ. Res. Guide 26(18), 165–166 (2017)

    Google Scholar 

  6. Agosti, M., Crestani, F., Gradenigo, G.: Towards data modelling in information retrieval. Compr. Remote Sens. 15(6), 143–162 (2018)

    Google Scholar 

  7. Berit, E.A., Janne, B.C., Lars, T.: Hospital nurses’ information retrieval behaviours in relation to evidence based nursing: a literature review. Health Inf. Libr. J. 5(1), 3–23 (2018)

    Google Scholar 

  8. He, J., Liming, N., Zeyi, S., Zhilei, R., Weiqiang, K., Tao, Z., Xiapu, L.: ROSF: leveraging information retrieval and supervised learning for recommending code snippets. IEEE Trans. Serv. Comput. 12(1), 34–46 (2019)

    Article  Google Scholar 

  9. Lu, Mengye, Liu, Shuai: Nucleosome positioning based on generalized relative entropy. Soft. Comput. 23(19), 9175–9188 (2018). https://doi.org/10.1007/s00500-018-3602-2

    Article  Google Scholar 

  10. Jihong, L., Weiguang, Z.: Study on the innovation of network information retrieval for university library in big data era. Agric. Network Inf. 1(4), 30–32 (2017)

    Google Scholar 

  11. Liu, S., Liu, D., Srivastava, G., et al.: Overview and methods of correlation filter algorithms in object tracking. Complex Intell. Syst. (2020). https://doi.org/10.1007/s40747-020-00161-4

  12. Li, J., Li, N., Afsari, K., et al.: Integration of Building Information Modeling and Web Service Application Programming Interface for assessing building surroundings in early design stages. Build. Environ. 153(1), 91–100 (2019)

    Article  Google Scholar 

  13. Stanton, L.: Eighth Circuit Says VoIP Is Information Service, Preempts Minnesota PUC. Telecommun. Rep. 84(17), 1,35–36 (2018)

    Google Scholar 

  14. Tang, Z., Srivastava, G., Liu, S.: Swarm intelligence and ant colony optimization in accounting model choices. J. Intell. Fuzzy Syst. 38(2),1–9 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing-hua Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gong, Jj., Xie, Wd., Wang, Jh. (2021). Efficient Retrieval Method of Malicious Information in Multimedia Big Data Network Based on Human-Computer Interaction. In: Liu, S., Xia, L. (eds) Advanced Hybrid Information Processing. ADHIP 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 347. Springer, Cham. https://doi.org/10.1007/978-3-030-67871-5_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-67871-5_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-67870-8

  • Online ISBN: 978-3-030-67871-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics