Skip to main content

Articles

Page 3 of 13

  1. With data becoming a salient asset worldwide, dependence amongst data kept on growing. Hence the real-world datasets that one works upon in today’s time are highly correlated. Since the past few years, researc...

    Authors: Sreemoyee Biswas, Nilay Khare, Pragati Agrawal and Priyank Jain
    Citation: Journal of Big Data 2021 8:157
  2. Markov models are extensively used for categorical sequence clustering and classification due to their inherent ability to capture complex chronological dependencies hidden in sequential data. Existing Markov ...

    Authors: Rongbo Chen, Haojun Sun, Lifei Chen, Jianfei Zhang and Shengrui Wang
    Citation: Journal of Big Data 2021 8:154
  3. Predicting the amount of daily rainfall improves agricultural productivity and secures food and water supply to keep citizens healthy. To predict rainfall, several types of research have been conducted using d...

    Authors: Chalachew Muluken Liyew and Haileyesus Amsaya Melese
    Citation: Journal of Big Data 2021 8:153
  4. The development of the Internet of Things (IoT) has produced new innovative solutions, such as smart cities, which enable humans to have a more efficient, convenient and smarter way of life. The Intelligent Tr...

    Authors: Noor Afiza Mat Razali, Nuraini Shamsaimon, Khairul Khalil Ishak, Suzaimah Ramli, Mohd Fahmi Mohamad Amran and Sazali Sukardi
    Citation: Journal of Big Data 2021 8:152
  5. Opinion mining, or sentiment analysis, is a field in Natural Language Processing (NLP). It extracts people’s thoughts, including assessments, attitudes, and emotions toward individuals, topics, and events. The...

    Authors: Noor Afiza Mat Razali, Nur Atiqah Malizan, Nor Asiakin Hasbullah, Muslihah Wook, Norulzahrah Mohd Zainuddin, Khairul Khalil Ishak, Suzaimah Ramli and Sazali Sukardi
    Citation: Journal of Big Data 2021 8:150
  6. Network attacks are illegal activities on digital resources within an organizational network with the express intention of compromising systems. A cyber attack can be directed by individuals, communities, stat...

    Authors: FatimaEzzahra Laghrissi, Samira Douzi, Khadija Douzi and Badr Hssina
    Citation: Journal of Big Data 2021 8:149
  7. In the next decade, machine vision technology will have an enormous impact on industrial works because of the latest technological advances in this field. These advances are so significant that the use of this...

    Authors: Majid Amirfakhrian and Mahboub Parhizkar
    Citation: Journal of Big Data 2021 8:147
  8. Distinguishing sequences are widely used in finite state machine-based conformance testing to solve the state identification problem. In this paper, we address the scalability issue encountered while deriving ...

    Authors: Bilal Elghadyry, Faissal Ouardi, Zineb Lotfi and Sébastien Verel
    Citation: Journal of Big Data 2021 8:145
  9. Machine learning has been the corner stone in analysing and extracting information from data and often a problem of missing values is encountered. Missing values occur because of various factors like missing c...

    Authors: Tlamelo Emmanuel, Thabiso Maupong, Dimane Mpoeleng, Thabo Semong, Banyatsang Mphago and Oteng Tabona
    Citation: Journal of Big Data 2021 8:140
  10. Twitter and social media as a whole have great potential as a source of disease surveillance data however the general messiness of tweets presents several challenges for standard information extraction methods...

    Authors: Mark Abraham Magumba and Peter Nabende
    Citation: Journal of Big Data 2021 8:139
  11. Near-duplicate video content has taken the large storage space in the age of big data. Without respecting the copyright ethic, social media users mirror, resize, and/or hide certain online video content and re...

    Authors: Abderrahmane Adoui El Ouadrhiri, Said Jai-Andaloussi and Ouail Ouchetto
    Citation: Journal of Big Data 2021 8:138
  12. In the past decade we have witnessed the failure of traditional polls in predicting presidential election outcomes across the world. To understand the reasons behind these failures we analyze the raw data of a...

    Authors: Zhenkun Zhou, Matteo Serafino, Luciano Cohan, Guido Caldarelli and Hernán A. Makse
    Citation: Journal of Big Data 2021 8:137
  13. Currently, expressing feelings through social media requires great consideration as an essential part of our lives; besides sharing ideas and thoughts, we share moments and good memories. Social media such as ...

    Authors: Enas A. Hakim Khalil, Enas M. F. El Houby and Hoda Korashy Mohamed
    Citation: Journal of Big Data 2021 8:136
  14. Dissimilarity representation plays a very important role in pattern recognition due to its ability to capture structural and relational information between samples. Dissimilarity space embedding is an approach...

    Authors: Azadeh Rezazadeh Hamedani, Mohammad Hossein Moattar and Yahya Forghani
    Citation: Journal of Big Data 2021 8:135
  15. Data security is being one of the most crucial aspects to be focused on system development. However, using such a feature to enhance the security of data might affect the system's performance. This study aims ...

    Authors: Evaristus Didik Madyatmadja, Aditya Nur Hakim and David Jumpa Malem Sembiring
    Citation: Journal of Big Data 2021 8:134
  16. Network security and data security are the biggest concerns now a days. Every organization decides their future business process based on the past and day to day transactional data. This data may consist of co...

    Authors: Abhijit Dnyaneshwar Jadhav and Vidyullatha Pellakuri
    Citation: Journal of Big Data 2021 8:131
  17. A missing value is one of the factors that often cause incomplete data in almost all studies, even those that are well-designed and controlled. It can also decrease a study’s statistical power or result in ina...

    Authors: Heru Nugroho, Nugraha Priya Utama and Kridanto Surendro
    Citation: Journal of Big Data 2021 8:129
  18. Sensitivity analysis is a popular feature selection approach employed to identify the important features in a dataset. In sensitivity analysis, each input feature is perturbed one-at-a-time and the response of...

    Authors: Dayakar L. Naik and Ravi kiran
    Citation: Journal of Big Data 2021 8:128
  19. Big Data in the area of Remote Sensing has been growing rapidly. Remote sensors are used in surveillance, security, traffic, environmental monitoring, and autonomous sensing. Real-time detection of small movin...

    Authors: Tian J. Ma
    Citation: Journal of Big Data 2021 8:127
  20. In this research various concepts from network theory and topic modelling are combined, to provision a temporal network of associated topics. This solution is presented as a step-by-step process to facilitate ...

    Authors: Edwin Camilleri and Shah Jahan Miah
    Citation: Journal of Big Data 2021 8:124
  21. Sleep loss has been linked to heart disease, diabetes, cancer, and an increase in accidents, all of which are among the leading causes of death in the United States. Population-scale sleep studies have the pot...

    Authors: Kelsey Linnell, Michael Arnold, Thayer Alshaabi, Thomas McAndrew, Jeanie Lim, Peter Sheridan Dodds and Christopher M. Danforth
    Citation: Journal of Big Data 2021 8:121
  22. Many researchers have recently considered patients’ health and provided an optimal and appropriate solution. With the advent of technologies such as cloud computing, Internet of Things and 5G, information can ...

    Authors: Somayeh Iranpak, Asadollah Shahbahrami and Hassan Shakeri
    Citation: Journal of Big Data 2021 8:120
  23. In this paper, we propose a novel deep learning-based feature learning architecture for object classification. Conventionally, deep learning methods are trained with supervised learning for object classificati...

    Authors: Endang Suryawati, Hilman F. Pardede, Vicky Zilvan, Ade Ramdan, Dikdik Krisnandi, Ana Heryana, R. Sandra Yuwana, R. Budiarianto Suryo Kusumo, Andria Arisal and Ahmad Afif Supianto
    Citation: Journal of Big Data 2021 8:118
  24. The diversity and sheer increase in the number of connected Internet of Things (IoT) devices have brought significant concerns associated with storing and protecting a large volume of IoT data. Storage volume ...

    Authors: Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam and Serge Demidenko
    Citation: Journal of Big Data 2021 8:114
  25. Process discovery helps companies automatically discover their existing business processes based on the vast, stored event log. The process discovery algorithms have been developed rapidly to discover several ...

    Authors: Riyanarto Sarno, Kelly Rossa Sungkono, Muhammad Taufiqulsa’di, Hendra Darmawan, Achmad Fahmi and Kuwat Triyana
    Citation: Journal of Big Data 2021 8:113

Annual Journal Metrics

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline