Skip to main content

Articles

Page 1 of 11

  1. Opinion mining, or sentiment analysis, is a field in Natural Language Processing (NLP). It extracts people’s thoughts, including assessments, attitudes, and emotions toward individuals, topics, and events. The...

    Authors: Noor Afiza Mat Razali, Nur Atiqah Malizan, Nor Asiakin Hasbullah, Muslihah Wook, Norulzahrah Mohd Zainuddin, Khairul Khalil Ishak, Suzaimah Ramli and Sazali Sukardi

    Citation: Journal of Big Data 2021 8:150

    Content type: Survey Paper

    Published on:

  2. Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, stat...

    Authors: FatimaEzzahra Laghrissi, Samira Douzi, Khadija Douzi and Badr Hssina

    Citation: Journal of Big Data 2021 8:149

    Content type: Research

    Published on:

  3. In the next decade, machine vision technology will have an enormous impact on industrial works because of the latest technological advances in this field. These advances are so significant that the use of this...

    Authors: Majid Amirfakhrian and Mahboub Parhizkar

    Citation: Journal of Big Data 2021 8:147

    Content type: Research

    Published on:

  4. Distinguishing sequences are widely used in finite state machine-based conformance testing to solve the state identification problem. In this paper, we address the scalability issue encountered while deriving ...

    Authors: Bilal Elghadyry, Faissal Ouardi, Zineb Lotfi and Sébastien Verel

    Citation: Journal of Big Data 2021 8:145

    Content type: Research

    Published on:

  5. Machine learning has been the corner stone in analysing and extracting information from data and often a problem of missing values is encountered. Missing values occur because of various factors like missing c...

    Authors: Tlamelo Emmanuel, Thabiso Maupong, Dimane Mpoeleng, Thabo Semong, Banyatsang Mphago and Oteng Tabona

    Citation: Journal of Big Data 2021 8:140

    Content type: Survey Paper

    Published on:

  6. Twitter and social media as a whole have great potential as a source of disease surveillance data however the general messiness of tweets presents several challenges for standard information extraction methods...

    Authors: Mark Abraham Magumba and Peter Nabende

    Citation: Journal of Big Data 2021 8:139

    Content type: Research

    Published on:

  7. Near-duplicate video content has taken the large storage space in the age of big data. Without respecting the copyright ethic, social media users mirror, resize, and/or hide certain online video content and re...

    Authors: Abderrahmane Adoui El Ouadrhiri, Said Jai-Andaloussi and Ouail Ouchetto

    Citation: Journal of Big Data 2021 8:138

    Content type: Research

    Published on:

  8. In the past decade we have witnessed the failure of traditional polls in predicting presidential election outcomes across the world. To understand the reasons behind these failures we analyze the raw data of a...

    Authors: Zhenkun Zhou, Matteo Serafino, Luciano Cohan, Guido Caldarelli and Hernán A. Makse

    Citation: Journal of Big Data 2021 8:137

    Content type: Research

    Published on:

  9. Currently, expressing feelings through social media requires great consideration as an essential part of our lives; besides sharing ideas and thoughts, we share moments and good memories. Social media such as ...

    Authors: Enas A. Hakim Khalil, Enas M. F. El Houby and Hoda Korashy Mohamed

    Citation: Journal of Big Data 2021 8:136

    Content type: Research

    Published on:

  10. Dissimilarity representation plays a very important role in pattern recognition due to its ability to capture structural and relational information between samples. Dissimilarity space embedding is an approach...

    Authors: Azadeh Rezazadeh Hamedani, Mohammad Hossein Moattar and Yahya Forghani

    Citation: Journal of Big Data 2021 8:135

    Content type: Research

    Published on:

  11. Data security is being one of the most crucial aspects to be focused on system development. However, using such a feature to enhance the security of data might affect the system's performance. This study aims ...

    Authors: Evaristus Didik Madyatmadja, Aditya Nur Hakim and David Jumpa Malem Sembiring

    Citation: Journal of Big Data 2021 8:134

    Content type: Research

    Published on:

  12. Network security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of co...

    Authors: Abhijit Dnyaneshwar Jadhav and Vidyullatha Pellakuri

    Citation: Journal of Big Data 2021 8:131

    Content type: Research

    Published on:

  13. A missing value is one of the factors that often cause incomplete data in almost all studies, even those that are well-designed and controlled. It can also decrease a study’s statistical power or result in ina...

    Authors: Heru Nugroho, Nugraha Priya Utama and Kridanto Surendro

    Citation: Journal of Big Data 2021 8:129

    Content type: Research

    Published on:

  14. Sensitivity analysis is a popular feature selection approach employed to identify the important features in a dataset. In sensitivity analysis, each input feature is perturbed one-at-a-time and the response of...

    Authors: Dayakar L. Naik and Ravi kiran

    Citation: Journal of Big Data 2021 8:128

    Content type: Research

    Published on:

  15. Big Data in the area of Remote Sensing has been growing rapidly. Remote sensors are used in surveillance, security, traffic, environmental monitoring, and autonomous sensing. Real-time detection of small movin...

    Authors: Tian J. Ma

    Citation: Journal of Big Data 2021 8:127

    Content type: Methodology

    Published on:

  16. In this research various concepts from network theory and topic modelling are combined, to provision a temporal network of associated topics. This solution is presented as a step-by-step process to facilitate ...

    Authors: Edwin Camilleri and Shah Jahan Miah

    Citation: Journal of Big Data 2021 8:124

    Content type: Methodology

    Published on:

  17. Sleep loss has been linked to heart disease, diabetes, cancer, and an increase in accidents, all of which are among the leading causes of death in the United States. Population-scale sleep studies have the pot...

    Authors: Kelsey Linnell, Michael Arnold, Thayer Alshaabi, Thomas McAndrew, Jeanie Lim, Peter Sheridan Dodds and Christopher M. Danforth

    Citation: Journal of Big Data 2021 8:121

    Content type: Research

    Published on:

  18. Many researchers have recently considered patients’ health and provided an optimal and appropriate solution. With the advent of technologies such as cloud computing, Internet of Things and 5G, information can ...

    Authors: Somayeh Iranpak, Asadollah Shahbahrami and Hassan Shakeri

    Citation: Journal of Big Data 2021 8:120

    Content type: Research

    Published on:

  19. In this paper, we propose a novel deep learning-based feature learning architecture for object classification. Conventionally, deep learning methods are trained with supervised learning for object classificati...

    Authors: Endang Suryawati, Hilman F. Pardede, Vicky Zilvan, Ade Ramdan, Dikdik Krisnandi, Ana Heryana, R. Sandra Yuwana, R. Budiarianto Suryo Kusumo, Andria Arisal and Ahmad Afif Supianto

    Citation: Journal of Big Data 2021 8:118

    Content type: Research

    Published on:

  20. The diversity and sheer increase in the number of connected Internet of Things (IoT) devices have brought significant concerns associated with storing and protecting a large volume of IoT data. Storage volume ...

    Authors: Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam and Serge Demidenko

    Citation: Journal of Big Data 2021 8:114

    Content type: Research

    Published on:

  21. Process discovery helps companies automatically discover their existing business processes based on the vast, stored event log. The process discovery algorithms have been developed rapidly to discover several ...

    Authors: Riyanarto Sarno, Kelly Rossa Sungkono, Muhammad Taufiqulsa’di, Hendra Darmawan, Achmad Fahmi and Kuwat Triyana

    Citation: Journal of Big Data 2021 8:113

    Content type: Research

    Published on:

  22. The design used to create labelled data for training prediction models from observational healthcare databases (e.g., case-control and cohort) may impact the clinical usefulness. We aim to investigate hypothet...

    Authors: Jenna M. Reps, Patrick B. Ryan, Peter R. Rijnbeek and Martijn J. Schuemie

    Citation: Journal of Big Data 2021 8:108

    Content type: Research

    Published on:

  23. This article proposes a new parallel performance model for different workloads of Spark Big Data applications running on Hadoop clusters. The proposed model can predict the runtime for generic workloads as a f...

    Authors: N. Ahmed, Andre L. C. Barczak, Mohammad A. Rashid and Teo Susnjak

    Citation: Journal of Big Data 2021 8:107

    Content type: Research

    Published on:

  24. Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network traffic data are large-scale and imbalanced. Additionally, ...

    Authors: Nouar AlDahoul, Hezerul Abdul Karim and Abdulaziz Saleh Ba Wazir

    Citation: Journal of Big Data 2021 8:106

    Content type: Research

    Published on:

  25. As one of the most popular financial market instruments, the stock has formed one of the most massive and complex financial markets in the world. It could handle millions of transactions within a short period ...

    Authors: Seng Hansun and Julio Christian Young

    Citation: Journal of Big Data 2021 8:104

    Content type: Research

    Published on:

Annual Journal Metrics

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline