Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one ..
We here introduce a novel classification approach
adopted from the nonlinear model identification f..
The kernelized fuzzy c-means algorithm uses kernel methods to improve the clustering performance of ..
Temporal data contain time-stamping information
that affects the results of data mining. Traditiona..
There are a number of research challenges
associated with Internet of Things (IoT) security, and on..
With the growing amount of data, the demand of big data storage significantly increases. Through the..
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are a..
We report on the successful application of feature selection methods to a classification problem in ..
Active learning is a process whereby students engage in activities, such as reading, writing, discus..
Duty cycling (DC) is a popular technique for energy
conservation in wireless sensor networks that a..
This paper presents a hybrid intelligent system
(HIS) for risk assessment based on unstructured inf..
How to control the access of the huge amount of
big data becomes a very challenging issue, especial..
How to control the access of the huge amount of big
data becomes a very challenging issue, especia..
Online shopping is becoming more and more common in our daily lives. Understanding users’ interests ..
In healthcare management, a large volume of multi-structured patient data is generated from the clin..