Security and privacy in big data life cycle: a survey and open challenges
The use of big data in various fields has led to a rapid increase in a wide variety of data
resources, and various data analysis technologies such as standardized data mining and …
resources, and various data analysis technologies such as standardized data mining and …
Artificial intelligence for satellite communication and non-terrestrial networks: A survey
This paper surveys the application and development of Artificial Intelligence (AI) in Satellite
Communication (SatCom) and Non-Terrestrial Networks (NTN). We first present a …
Communication (SatCom) and Non-Terrestrial Networks (NTN). We first present a …
Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques
Microservice is considered a distributed cloud native approach where a standalone
application is composed of multiple loosely coupled and free-spirited deployable …
application is composed of multiple loosely coupled and free-spirited deployable …
Addressing the effectiveness of DDoS-attack detection methods based on the clustering method using an ensemble method
A Zeinalpour, HA Ahmed - Electronics, 2022 - mdpi.com
The curse of dimensionality, due to lots of network-traffic attributes, has a negative impact on
machine learning algorithms in detecting distributed denial of service (DDoS) attacks. This …
machine learning algorithms in detecting distributed denial of service (DDoS) attacks. This …
[PDF][PDF] Diagnosis of Alzheimer disease using machine learning approaches
AR Vidushi, AK Shrivastava - Int. J. Adv. Sci. Technol, 2019 - researchgate.net
This article applies the machine learning paramount techniques for the early detection and
effective diagnosis of severe Alzheimer's disease (AD). AD is neurodegenerative chronic …
effective diagnosis of severe Alzheimer's disease (AD). AD is neurodegenerative chronic …
Data mining based dimensionality reduction techniques
A Soni, A Rasool, A Dubey… - … for Advancement in …, 2022 - ieeexplore.ieee.org
With the rapid advancement in the science domain, the explosion of available data is seen
in recent years. Laboratory instruments are becoming more advanced day by day and are …
in recent years. Laboratory instruments are becoming more advanced day by day and are …
Towards Big Data modeling and management systems: From DBMS to BDMS
To succeed in a Big Data strategy, you have to arm yourself with a wide range of data skills
and best practices. This strategy can result in an impressive asset that can streamline …
and best practices. This strategy can result in an impressive asset that can streamline …
Open Research Issues and Tools for Visualization and Big Data Analytics
The new age of digital growth has marked all fields. This technological evolution has
impacted data flows which have witnessed a rapid expansion over the last decade that …
impacted data flows which have witnessed a rapid expansion over the last decade that …
Addressing High False Positive Rates of DDoS Attack Detection Methods
A Zeinalpour - 2021 - search.proquest.com
Distributed denial of service (DDoS) attack detection methods based on the clustering
method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS …
method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS …
[PDF][PDF] Optimized auto encoder on high dimensional big data reduction: an analytical approach
A Shikalgar, S Sonavane - Turkish Journal of Computer and …, 2021 - turcomat.org
Optimized Auto Encoder on High Dimensional Big Data Reduction: an Analytical Approach
Page 1 Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 526-537 …
Page 1 Turkish Journal of Computer and Mathematics Education Vol.12 No.14 (2021), 526-537 …