Skip to main content


Page 9 of 19

  1. The development of the Internet of Things (IoT) has produced new innovative solutions, such as smart cities, which enable humans to have a more efficient, convenient and smarter way of life. The Intelligent Tr...

    Authors: Noor Afiza Mat Razali, Nuraini Shamsaimon, Khairul Khalil Ishak, Suzaimah Ramli, Mohd Fahmi Mohamad Amran and Sazali Sukardi
    Citation: Journal of Big Data 2021 8:152
  2. Opinion mining, or sentiment analysis, is a field in Natural Language Processing (NLP). It extracts people’s thoughts, including assessments, attitudes, and emotions toward individuals, topics, and events. The...

    Authors: Noor Afiza Mat Razali, Nur Atiqah Malizan, Nor Asiakin Hasbullah, Muslihah Wook, Norulzahrah Mohd Zainuddin, Khairul Khalil Ishak, Suzaimah Ramli and Sazali Sukardi
    Citation: Journal of Big Data 2021 8:150
  3. Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, stat...

    Authors: FatimaEzzahra Laghrissi, Samira Douzi, Khadija Douzi and Badr Hssina
    Citation: Journal of Big Data 2021 8:149
  4. In the next decade, machine vision technology will have an enormous impact on industrial works because of the latest technological advances in this field. These advances are so significant that the use of this...

    Authors: Majid Amirfakhrian and Mahboub Parhizkar
    Citation: Journal of Big Data 2021 8:147
  5. Distinguishing sequences are widely used in finite state machine-based conformance testing to solve the state identification problem. In this paper, we address the scalability issue encountered while deriving ...

    Authors: Bilal Elghadyry, Faissal Ouardi, Zineb Lotfi and Sébastien Verel
    Citation: Journal of Big Data 2021 8:145
  6. Machine learning has been the corner stone in analysing and extracting information from data and often a problem of missing values is encountered. Missing values occur because of various factors like missing c...

    Authors: Tlamelo Emmanuel, Thabiso Maupong, Dimane Mpoeleng, Thabo Semong, Banyatsang Mphago and Oteng Tabona
    Citation: Journal of Big Data 2021 8:140
  7. Twitter and social media as a whole have great potential as a source of disease surveillance data however the general messiness of tweets presents several challenges for standard information extraction methods...

    Authors: Mark Abraham Magumba and Peter Nabende
    Citation: Journal of Big Data 2021 8:139
  8. Near-duplicate video content has taken the large storage space in the age of big data. Without respecting the copyright ethic, social media users mirror, resize, and/or hide certain online video content and re...

    Authors: Abderrahmane Adoui El Ouadrhiri, Said Jai-Andaloussi and Ouail Ouchetto
    Citation: Journal of Big Data 2021 8:138
  9. In the past decade we have witnessed the failure of traditional polls in predicting presidential election outcomes across the world. To understand the reasons behind these failures we analyze the raw data of a...

    Authors: Zhenkun Zhou, Matteo Serafino, Luciano Cohan, Guido Caldarelli and Hernán A. Makse
    Citation: Journal of Big Data 2021 8:137
  10. Currently, expressing feelings through social media requires great consideration as an essential part of our lives; besides sharing ideas and thoughts, we share moments and good memories. Social media such as ...

    Authors: Enas A. Hakim Khalil, Enas M. F. El Houby and Hoda Korashy Mohamed
    Citation: Journal of Big Data 2021 8:136
  11. Dissimilarity representation plays a very important role in pattern recognition due to its ability to capture structural and relational information between samples. Dissimilarity space embedding is an approach...

    Authors: Azadeh Rezazadeh Hamedani, Mohammad Hossein Moattar and Yahya Forghani
    Citation: Journal of Big Data 2021 8:135
  12. Data security is being one of the most crucial aspects to be focused on system development. However, using such a feature to enhance the security of data might affect the system's performance. This study aims ...

    Authors: Evaristus Didik Madyatmadja, Aditya Nur Hakim and David Jumpa Malem Sembiring
    Citation: Journal of Big Data 2021 8:134
  13. Network security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of co...

    Authors: Abhijit Dnyaneshwar Jadhav and Vidyullatha Pellakuri
    Citation: Journal of Big Data 2021 8:131
  14. A missing value is one of the factors that often cause incomplete data in almost all studies, even those that are well-designed and controlled. It can also decrease a study’s statistical power or result in ina...

    Authors: Heru Nugroho, Nugraha Priya Utama and Kridanto Surendro
    Citation: Journal of Big Data 2021 8:129
  15. Sensitivity analysis is a popular feature selection approach employed to identify the important features in a dataset. In sensitivity analysis, each input feature is perturbed one-at-a-time and the response of...

    Authors: Dayakar L. Naik and Ravi kiran
    Citation: Journal of Big Data 2021 8:128
  16. Big Data in the area of Remote Sensing has been growing rapidly. Remote sensors are used in surveillance, security, traffic, environmental monitoring, and autonomous sensing. Real-time detection of small movin...

    Authors: Tian J. Ma
    Citation: Journal of Big Data 2021 8:127
  17. In this research various concepts from network theory and topic modelling are combined, to provision a temporal network of associated topics. This solution is presented as a step-by-step process to facilitate ...

    Authors: Edwin Camilleri and Shah Jahan Miah
    Citation: Journal of Big Data 2021 8:124
  18. Sleep loss has been linked to heart disease, diabetes, cancer, and an increase in accidents, all of which are among the leading causes of death in the United States. Population-scale sleep studies have the pot...

    Authors: Kelsey Linnell, Michael Arnold, Thayer Alshaabi, Thomas McAndrew, Jeanie Lim, Peter Sheridan Dodds and Christopher M. Danforth
    Citation: Journal of Big Data 2021 8:121
  19. Many researchers have recently considered patients’ health and provided an optimal and appropriate solution. With the advent of technologies such as cloud computing, Internet of Things and 5G, information can ...

    Authors: Somayeh Iranpak, Asadollah Shahbahrami and Hassan Shakeri
    Citation: Journal of Big Data 2021 8:120
  20. In this paper, we propose a novel deep learning-based feature learning architecture for object classification. Conventionally, deep learning methods are trained with supervised learning for object classificati...

    Authors: Endang Suryawati, Hilman F. Pardede, Vicky Zilvan, Ade Ramdan, Dikdik Krisnandi, Ana Heryana, R. Sandra Yuwana, R. Budiarianto Suryo Kusumo, Andria Arisal and Ahmad Afif Supianto
    Citation: Journal of Big Data 2021 8:118
  21. The diversity and sheer increase in the number of connected Internet of Things (IoT) devices have brought significant concerns associated with storing and protecting a large volume of IoT data. Storage volume ...

    Authors: Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam and Serge Demidenko
    Citation: Journal of Big Data 2021 8:114
  22. Process discovery helps companies automatically discover their existing business processes based on the vast, stored event log. The process discovery algorithms have been developed rapidly to discover several ...

    Authors: Riyanarto Sarno, Kelly Rossa Sungkono, Muhammad Taufiqulsa’di, Hendra Darmawan, Achmad Fahmi and Kuwat Triyana
    Citation: Journal of Big Data 2021 8:113
  23. The design used to create labelled data for training prediction models from observational healthcare databases (e.g., case-control and cohort) may impact the clinical usefulness. We aim to investigate hypothet...

    Authors: Jenna M. Reps, Patrick B. Ryan, Peter R. Rijnbeek and Martijn J. Schuemie
    Citation: Journal of Big Data 2021 8:108
  24. This article proposes a new parallel performance model for different workloads of Spark Big Data applications running on Hadoop clusters. The proposed model can predict the runtime for generic workloads as a f...

    Authors: N. Ahmed, Andre L. C. Barczak, Mohammad A. Rashid and Teo Susnjak
    Citation: Journal of Big Data 2021 8:107
  25. Network Anomaly Detection is still an open challenging task that aims to detect anomalous network traffic for security purposes. Usually, the network traffic data are large-scale and imbalanced. Additionally, ...

    Authors: Nouar AlDahoul, Hezerul Abdul Karim and Abdulaziz Saleh Ba Wazir
    Citation: Journal of Big Data 2021 8:106
  26. As one of the most popular financial market instruments, the stock has formed one of the most massive and complex financial markets in the world. It could handle millions of transactions within a short period ...

    Authors: Seng Hansun and Julio Christian Young
    Citation: Journal of Big Data 2021 8:104

Annual Journal Metrics

  • 2022 Citation Impact
    8.1 - 2-year Impact Factor
    5.095 - SNIP (Source Normalized Impact per Paper)
    2.714 - SJR (SCImago Journal Rank)

    2023 Speed
    56 days submission to first editorial decision for all manuscripts (Median)
    205 days submission to accept (Median)

    2023 Usage 
    280 Altmetric mentions