The systematic review of K-means clustering algorithm

A Ashabi, SB Sahibuddin… - Proceedings of the 2020 …, 2020 - dl.acm.org
Recently, the world is experiencing generating the huge amount of data in different domains.
Data mining and Data analytics and are the practices used for analyzing data and extracting …

Cleaning Big Data Streams: A Systematic Literature Review

O Alotaibi, E Pardede, S Tomy - Technologies, 2023 - mdpi.com
In today's big data era, cleaning big data streams has become a challenging task because of
the different formats of big data and the massive amount of big data which is being …

Unsupervised deep learning for landslide detection from multispectral sentinel-2 imagery

H Shahabi, M Rahimzad, S Tavakkoli Piralilou… - Remote Sensing, 2021 - mdpi.com
This paper proposes a new approach based on an unsupervised deep learning (DL) model
for landslide detection. Recently, supervised DL models using convolutional neural …

A large-scale group decision-making method based on group-oriented rough dominance relation in scenic spot service improvement

B Yu, Z Zheng, Z Xiao, Y Fu, Z Xu - Expert Systems with Applications, 2023 - Elsevier
In today's age of big data and information, large-scale group decision-making has become
an essential aspect of modern economy, science, and technology. This paper proposes a …

Outlier detection for monitoring data using stacked autoencoder

F Wan, G Guo, C Zhang, Q Guo, J Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Monitoring data contain the important status information of the monitored object, and are the
basis for following data mining and analysis. However, the monitoring data usually suffer the …

A health data led approach for assessing potential health benefits of green and blue spaces: Lessons from an Irish case study

O Arodudu, R Foley, F Taghikhah, M Brennan… - Journal of …, 2023 - Elsevier
Research producing evidence-based information on the health benefits of green and blue
spaces often has within its design, the potential for inherent or implicit bias which can …

Android malware identification based on traffic analysis

R Chen, Y Li, W Fang - … conference on artificial intelligence and security, 2019 - Springer
As numerous new techniques for Android malware attacks have growingly emerged and
evolved, Android malware identification is extremely crucial to prevent mobile applications …

Recency, Frequency, Monetary Value, Clustering, and Internal and External Indices for Customer Segmentation from Retail Data

HJ Wilbert, AF Hoppe, A Sartori, SF Stefenon, LA Silva - Algorithms, 2023 - mdpi.com
While there are several ways to identify customer behaviors, few extract this value from
information already in a database, much less extract relevant characteristics. This paper …

Designing an AI purchasing requisition bundling generator

JM Spreitzenbarth, C Bode, H Stuckenschmidt - Computers in Industry, 2024 - Elsevier
Following the design science methodology, a recommender system has been created with
the research objective of finding a novel approach to the bundling problem in order to …

Enhanced ground segmentation method for Lidar point clouds in human-centric autonomous robot systems

PM Chu, S Cho, J Park, S Fong, K Cho - Human-centric Computing and …, 2019 - Springer
Ground segmentation is an important step for any autonomous and remote-controlled
systems. After separating ground and nonground parts, many works such as object tracking …