{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:50:07Z","timestamp":1769885407292,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00360-3","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:20:42Z","timestamp":1751646042000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A trigonometric function-based big data model for network information security control mechanisms"],"prefix":"10.1007","volume":"5","author":[{"given":"Bohan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ruoyu","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"key":"360_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s12665-022-10300-4","author":"Z Mao","year":"2022","unstructured":"Mao Z, Shi S, Li H, et al. Correction to: Landslide susceptibility assessment using triangular fuzzy number-analytic hierarchy processing (TFN-AHP), contributing weight (CW) and random forest weighted frequency ratio (RF weighted FR) at the Pengyang county Northwest China. Environ Earth Sci. 2022. https:\/\/doi.org\/10.1007\/s12665-022-10300-4.","journal-title":"Environ Earth Sci"},{"key":"360_CR2","first-page":"20","volume":"1","author":"Li Weiwei","year":"2021","unstructured":"Weiwei Li, Cheng Z. Virtual network security control mechanism based on multi-level alerting and linkage defense. J Phys: Conf Ser. 2021;1:20\u20131.","journal-title":"J Phys: Conf Ser"},{"key":"360_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2021.02.003","author":"S Ben Taieb","year":"2022","unstructured":"Ben Taieb S, Taylor Kathryn S. Commentary on transparent modelling of influenza incidence on big data models for infectious disease forecasting. Int J Forecast. 2022. https:\/\/doi.org\/10.1016\/j.ijforecast.2021.02.003.","journal-title":"Int J Forecast"},{"issue":"1","key":"360_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ijar.2009.07.003","volume":"51","author":"H Liu","year":"2009","unstructured":"Liu H, Coghill GM, Barnes DP. Fuzzy qualitative trigonometry. Int J Approx Reason. 2009;51(1):71\u201388. https:\/\/doi.org\/10.1016\/j.ijar.2009.07.003.","journal-title":"Int J Approx Reason"},{"issue":"1","key":"360_CR5","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1109\/TITS.2022.3145363","volume":"25","author":"H Wang","year":"2024","unstructured":"Wang H, Xiao P, Li X. Channel parameter estimation of mmWave MIMO system in urban traffic scene: a training channel-based method. IEEE Trans Intell Transp Syst. 2024;25(1):754\u201362.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"360_CR6","doi-asserted-by":"publisher","first-page":"3422","DOI":"10.1109\/TII.2020.2995598","volume":"17","author":"W Han","year":"2021","unstructured":"Han W, Lingwei X, Zhengqiang Y, Aaron T, Gulliver. Low complexity MIMO-FBMC sparse channel parameter estimation for industrial big data communications. IEEE Trans Ind Inf. 2021;17(5):3422\u201330.","journal-title":"IEEE Trans Ind Inf"},{"key":"360_CR7","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol8.issue5.43","author":"S Zhao","year":"2013","unstructured":"Zhao S, Chen Y. The novel model of building network security control system based on RBAC and PMI technology. J Converg Inf Technol. 2013. https:\/\/doi.org\/10.4156\/jcit.vol8.issue5.43.","journal-title":"J Converg Inf Technol"},{"key":"360_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/axioms11030089","author":"D Bo\u017eani\u0107","year":"2022","unstructured":"Bo\u017eani\u0107 D, Pamu\u010dar D, Mili\u0107 A, et al. Modification of the logarithm methodology of additive weights (LMAW) by a triangular fuzzy number and its application in multi-criteria decision-making. Axioms. 2022. https:\/\/doi.org\/10.3390\/axioms11030089.","journal-title":"Axioms"},{"key":"360_CR9","doi-asserted-by":"publisher","DOI":"10.23977\/jeis.2024.090212","author":"M Xu","year":"2024","unstructured":"Xu M. Research on network information security control in the big data era. J Electron Inf Sci. 2024. https:\/\/doi.org\/10.23977\/jeis.2024.090212.","journal-title":"J Electron Inf Sci"},{"key":"360_CR10","first-page":"9","volume":"1","author":"T Miao","year":"2022","unstructured":"Miao T, Hui Z, Kang W. Bayesian water quality evaluation model based on generalized triangular fuzzy number and its application. Environ Process. 2022;1:9\u201311.","journal-title":"Environ Process"},{"key":"360_CR11","unstructured":"Das SK. An approach to optimize the cost of transportation problem based on triangular fuzzy programming problem. Complex Intell Syst, 2021 (2):22\u201324."},{"key":"360_CR12","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-340694\/v1","author":"Y Duan","year":"2021","unstructured":"Duan Y, Xiong J, et al. Flood vulnerability assessment using the triangular fuzzy number-based analytic hierarchy process and support vector machine model for the belt and road region. Nat Hazards. 2021. https:\/\/doi.org\/10.21203\/rs.3.rs-340694\/v1.","journal-title":"Nat Hazards"},{"key":"360_CR13","first-page":"8","volume":"10","author":"S Priyadharsini","year":"2019","unstructured":"Priyadharsini S, Ponnalagu K, GloryBebina E, Aarthi AVR. An acquisition on big data model for quality tracing of iron and steel industries. Int J Innov Technol Explor Eng (IJITEE). 2019;10:8\u201310.","journal-title":"Int J Innov Technol Explor Eng (IJITEE)"},{"key":"360_CR14","first-page":"16","volume":"1","author":"X Jinghua","year":"2021","unstructured":"Jinghua X, Sheng H, Zhang S, et al. Surface accuracy optimization of mechanical parts with multiple circular holes for additive manufacturing based on triangular fuzzy number. Front Mech Eng. 2021;1:16\u20138.","journal-title":"Front Mech Eng"},{"issue":"4","key":"360_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/app12041856","volume":"12","author":"U Masud","year":"2022","unstructured":"Masud U, Amirzada MR, Elahi H, et al. Design of two-mode spectroscopic sensor for biomedical applications: analysis and measurement of relative intensity noise through control mechanism. Appl Sci. 2022;12(4):12\u20135.","journal-title":"Appl Sci"},{"key":"360_CR16","doi-asserted-by":"publisher","unstructured":"Wang Q, Shen S. Digital inheritance strategy of intangible cultural heritage and big data model\u2014taking the Southern Liaoning Province as an Example. Proceedings of the 3rd International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS 2018). 2018; 317\u2013320.https:\/\/doi.org\/10.26914\/c.cnkihy.2018:66-68.","DOI":"10.26914\/c.cnkihy.2018:66-68"},{"key":"360_CR17","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2022.829763","author":"D Ren","year":"2022","unstructured":"Ren D, Ma L, Liu D, Tao J, Liu X, Zhang R. Control mechanism and parameter simulation of oil-water properties on spontaneous imbibition efficiency of tight sandstone reservoir. Front Phys. 2022. https:\/\/doi.org\/10.3389\/fphy.2022.829763.","journal-title":"Front Phys"},{"key":"360_CR18","first-page":"21","volume":"1","author":"S Hankun","year":"2022","unstructured":"Hankun S, Xuelin W, Hongmao Z. Cooperative control mechanism of key objects and key nodes in container terminals. J Phys: Conf Ser. 2022;1:21\u20134.","journal-title":"J Phys: Conf Ser"},{"key":"360_CR19","first-page":"22","volume":"1","author":"L Qiuyuan","year":"2022","unstructured":"Qiuyuan L, Shuquan W, Long Z. Design of pointing control mechanism for spacecraft antenna communication. J Phys Conf Ser. 2022;1:22.","journal-title":"J Phys Conf Ser"},{"key":"360_CR20","first-page":"20","volume":"2022","author":"Z Wei","year":"2022","unstructured":"Wei Z, Hongyong D, Xingmei L, Huan L. Dynamics of the rumor-spreading model with control mechanism in complex network. J Math. 2022;2022:20\u20132.","journal-title":"J Math"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00360-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00360-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00360-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:20:46Z","timestamp":1751646046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00360-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,4]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00360-3","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,4]]},"assertion":[{"value":"1 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"133"}}