|
|
|
Omar Alghushairy, Raed Alsini, Terence Soule and Xiaogang Ma
Outlier detection is a statistical procedure that aims to find suspicious events or items that are different from the normal form of a dataset. It has drawn considerable interest in the field of data mining and machine learning. Outlier detection is impo...
ver más
|
|
|
|
|
|
|
Mashail Shaeel Althabiti,Manal Abdullah
Pág. pp. 90 - 106
Data stream is the huge amount of data generated in various fields, including financial processes, social media activities, Internet of Things applications, and many others. Such data cannot be processed through traditional data mining algorithms due to ...
ver más
|
|
|
|
|
|
|
Umesh Kokate, Arvind Deshpande, Parikshit Mahalle and Pramod Patil
Data growth in today?s world is exponential, many applications generate huge amount of data streams at very high speed such as smart grids, sensor networks, video surveillance, financial systems, medical science data, web click streams, network data, etc...
ver más
|
|
|
|
|
|
|
Yunus Dogan, Feristah Dalkiliç, Alp Kut, Kemal Can Kara and Uygar Takazoglu
Large numbers of job postings with complex content can be found on the Internet at present. Therefore, analysis through natural language processing and machine learning techniques plays an important role in the evaluation of job postings. In this study, ...
ver más
|
|
|
|
|
|
|
Frederic Stahl, Thien Le, Atta Badii and Mohamed Medhat Gaber
This paper introduces a new and expressive algorithm for inducing descriptive rule-sets from streaming data in real-time in order to describe frequent patterns explicitly encoded in the stream. Data Stream Mining (DSM) is concerned with the automatic ana...
ver más
|
|
|
|
|
|
|
Osama A. Mahdi, Eric Pardede, Nawfal Ali and Jinli Cao
The proposed drift detector can be applied in areas such as intrusion detection, fraud detectors or monitoring and forecasting traffic.
|
|
|
|
|
|
|
Federica Ventruto, Marco Pulimeno, Massimo Cafaro and Italo Epicoco
A stream can be thought of as a very large set of data, sometimes even infinite, which arrives sequentially and must be processed without the possibility of being stored. In fact, the memory available to the algorithm is limited and it is not possible to...
ver más
|
|
|
|
|
|
|
Veronica S. Moertini and Mariskha T. Adithia
Directed graphs can be prepared from big data containing peoples? interaction information. In these graphs the vertices represent people, while the directed edges denote the interactions among them. The number of interactions at certain intervals can be ...
ver más
|
|
|
|
|
|
|
Ganji Vivekanand,Prof.Dr.G.Manoj Someswar
Enormous Data investigation has pulled in exceptional premium as of late for its endeavour to remove data, learning and insight from Big Data. In industry, with the advancement of sensor innovation and Information and Communication Technologies (ICT), re...
ver más
|
|
|
|
|
|
|
Bin Wang, Lin Chen, Weimin Li and Jinfang Sheng
The performance bottleneck of transparent computing (TC) is on the server side. Caching is one of the key factors of the server-side performance. The count of disk input/output (I/O) can be reduced if multiple data blocks that are correlated with the dat...
ver más
|
|
|
|
|
|
|
Yufeng Li, Mengxiao Liu, Chenhong Cao and Jiangtao Li
Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However, mi...
ver más
|
|
|
|
|
|
|
Joshua M. Silvis, Brian C. Benson, Michael L. Shema and Mark R. Haibach
Mine subsidence can induce streambed ruptures that pirate surface water from a stream. Current understanding of the effects of longwall mining on streams lacks rigorous analytical approaches to detect hydrologic effects and does not consider the efficacy...
ver más
|
|
|
|
|
|
|
Companies have realized the importance of “big data” in creating a sustainable competitive advantage, and user-generated content (UGC) represents one of big data’s most important sources. From blogs to social media and online reviews, c...
ver más
|
|
|
|
|
|
|
Wendso Awa Agathe Ouédraogo, James Messo Raude and John Mwangi Gathenya
The Mkurumudzi River originates in the Shimba hills and runs through Kwale County on the Kenyan Coast. Study on this river has been informed by the many economic activities that the river supports, which include sugarcane plantations, mining, tourism and...
ver más
|
|
|
|
|
|
|
Riccardo Pecori
In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that eve...
ver más
|
|
|
|
|
|
|
Riccardo Pecori
In recent years, virtual learning environments are gaining more and more momentum, considering both the technologies deployed in their support and the sheer number of terminals directly or indirectly interacting with them. This essentially means that eve...
ver más
|
|
|
|
|
|
|
?????? ?????????? ???????, ??????? ????????????? ??????????
Pág. 42 - 49
The subject matter of the study is data clustering based on the ensemble of neural networks. The goal of the work is to create a new approach to solving the tasks of clustering in data streams when information is fed observation-by-observation in online ...
ver más
|
|
|
|
|
|
|
Yevgeniy Bodyanskiy, Iryna Perova, Polina Zhernova
Pág. 16 - 24
The subject matter of the article is fuzzy clustering of high-dimensional data based on the ensemble approach, provided that a number and shape of clusters are not known. The goal of the work is to create the neuro-fuzzy approach for clustering data when...
ver más
|
|
|
|
|
|
|
Ibrahim Ba?abbad and Omar Batarfi
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim?s machine or encrypts his personal informa...
ver más
|
|
|
|
|
|
|
Maryam Badar and Marco Fisichella
Fairness-aware mining of data streams is a challenging concern in the contemporary domain of machine learning. Many stream learning algorithms are used to replace humans in critical decision-making processes, e.g., hiring staff, assessing credit risk, et...
ver más
|
|
|
|