Big Data-Java
A Collaborative DDoS Defence Framework using Network Function Virtualization
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
A Feature Selection Handle Classification Algorithm Based on Randomized Extraction of Model Population
We here introduce a novel classification approach adopted from the nonlinear model identification f..
A new ECG beat clustering method based on kernelized fuzzy c-means and hybrid ant colony optimization for continuous domains
The kernelized fuzzy c-means algorithm uses kernel methods to improve the clustering performance of ..
A New Methodology for Mining Frequent Item sets on Temporal Data
Temporal data contain time-stamping information that affects the results of data mining. Traditiona..
A Novel Internet of Things-centric Framework to Mine Malicious Frequent Patterns
There are a number of research challenges associated with Internet of Things (IoT) security, and on..
A Pre Authentication Approach to Proxy Re encryption in Big Data Context
With the growing amount of data, the demand of big data storage significantly increases. Through the..
A robust reputation management mechanism in the federated cloud
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are a..
A T o p - r Feature Selection Algorithm for Microarray Gene Expression Data
We report on the successful application of feature selection methods to a classification problem in ..
Active Learning for Ranking through Expected Loss Optimization
Active learning is a process whereby students engage in activities, such as reading, writing, discus..
Aggregated Packet Transmission in Duty Cycled WSNs Modeling and Performance Evaluation
Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks that a..
An Efficient analysis of Unstructured Data on Artificial Intelligence with Mining Aspects
This paper presents a hybrid intelligent system (HIS) for risk assessment based on unstructured inf..
An Efficient and Fine Grained Big Data Access Control Scheme with Privacy Preserving Policy
How to control the access of the huge amount of big data becomes a very challenging issue, especial..
An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
How to control the access of the huge amount of big data becomes a very challenging issue, especia..
Analysis of users behaviour in structured e-commerce websites
Online shopping is becoming more and more common in our daily lives. Understanding users’ interests ..
Analyzing Healthcare Big Data with Prediction for Future Health Condition
In healthcare management, a large volume of multi-structured patient data is generated from the clin..