派博傳思國際中心

標題: Titlebook: Big Data, Cloud and Applications; Third International Youness Tabii,Mohamed Lazaar,Nourddine Enneya Conference proceedings 2018 Springer N [打印本頁]

作者: 使固定    時間: 2025-3-21 20:03
書目名稱Big Data, Cloud and Applications影響因子(影響力)




書目名稱Big Data, Cloud and Applications影響因子(影響力)學科排名




書目名稱Big Data, Cloud and Applications網(wǎng)絡公開度




書目名稱Big Data, Cloud and Applications網(wǎng)絡公開度學科排名




書目名稱Big Data, Cloud and Applications被引頻次




書目名稱Big Data, Cloud and Applications被引頻次學科排名




書目名稱Big Data, Cloud and Applications年度引用




書目名稱Big Data, Cloud and Applications年度引用學科排名




書目名稱Big Data, Cloud and Applications讀者反饋




書目名稱Big Data, Cloud and Applications讀者反饋學科排名





作者: 用樹皮    時間: 2025-3-21 21:54
A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipherher method and the simplicity of the Caesar cipher method. The security analysis shows that the system is secure enough to resist brute-force attack, and statistical attack. Therefore, this robustness is proven and justified.
作者: 邪惡的你    時間: 2025-3-22 00:41
Comparative Study of Feature Engineering Techniques for Disease Predictionm focused here is predicting diseases based on symptoms descriptions collected from online free text. A good number of well known machine learning models are also applied in various setup along with the feature engineering techniques to build predictive model for the disease prediction. The experiments show promising results.
作者: Accolade    時間: 2025-3-22 04:58

作者: INERT    時間: 2025-3-22 12:24
Automatic Classification of Air Pollution and Human Healthve and complex data sets for human interaction in environmental social systems. New proposed approach is based on PCA (Principle Component Analysis) and K-SVM (Kernel Support Vector Machine). The system tests result is accomplished, an accuracy of 93% in testing data taken from daily values during 3 years.
作者: 挑剔為人    時間: 2025-3-22 16:20

作者: gastritis    時間: 2025-3-22 21:04
Introduction to Mathematical Biologyin order to protect our system and client information. This paper describes a scheme that strength the authentication system of data storage, using multi-factor authentication such as OTP, smart card and try to bring an alternative system that manage authentication Error issues.
作者: 共棲    時間: 2025-3-23 01:06
QoS in the Cloud Computing: A Load Balancing Approach Using Simulated Annealing Algorithmhes became outdated. In this axis of research, we are proposing a new approach based on the Simulated Annealing and different parameters that affect the distribution of the tasks between the virtual machines. A simulation is also done to compare our approach with other existing algorithms using Cloudsim.
作者: 騙子    時間: 2025-3-23 02:23
A Multi-factor Authentication Scheme to Strength Data-Storage Accessin order to protect our system and client information. This paper describes a scheme that strength the authentication system of data storage, using multi-factor authentication such as OTP, smart card and try to bring an alternative system that manage authentication Error issues.
作者: Diatribe    時間: 2025-3-23 06:38

作者: 召集    時間: 2025-3-23 12:07
Introduction to Mathematical Analysise highlight the implementation of the framework Apache Spark. Thereafter, we conduct experimental simulations to show the weakness of Apache Spark. Finally, to further enforce our contribution, we propose to persist RDDs (Resilient Distributed Dataset) in order to improve performances for computing data.
作者: 不持續(xù)就爆    時間: 2025-3-23 14:17
Markov Chains and Hidden Markov Modelsext similarity, namely, string-based, knowledge-based and corpus-based. Then we define our new basis and experiment on a large dataset of scientific papers. The final results demonstrate that deep learning based approach can enhance the effectiveness of citation similarity.
作者: freight    時間: 2025-3-23 18:01

作者: 不開心    時間: 2025-3-24 00:33

作者: 爵士樂    時間: 2025-3-24 05:52

作者: integral    時間: 2025-3-24 10:10
Conference proceedings 2018-blind review process. They focus on the following topics: big data, cloud computing, machine learning, deep learning, data analysis, neural networks, information system and social media, image processing and applications, and natural language processing..
作者: 得意人    時間: 2025-3-24 12:11

作者: parallelism    時間: 2025-3-24 15:53

作者: Circumscribe    時間: 2025-3-24 19:10

作者: 口味    時間: 2025-3-25 02:12

作者: amnesia    時間: 2025-3-25 04:16
Introduction to Mathematical Logicp the input data, by starting with the graphical modeling of the data and going through the matrix representation of the similarity graph, then the spectral analysis of the Laplacian matrices, the process will finish with the results interpretation.
作者: BARB    時間: 2025-3-25 08:02

作者: 事物的方面    時間: 2025-3-25 15:44
Big Data, Cloud and Applications978-3-319-96292-4Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 爵士樂    時間: 2025-3-25 19:39

作者: SCORE    時間: 2025-3-25 23:33
https://doi.org/10.1007/978-3-319-96292-4artificial intelligence; classification; cloud computing; clustering; computational linguistics; data sec
作者: Thyroxine    時間: 2025-3-26 01:22

作者: 揮舞    時間: 2025-3-26 04:59
A Proposed Approach to Reduce the Vulnerability in a Cloud Systeme will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aims to secure the virtual environment.
作者: 無關緊要    時間: 2025-3-26 11:12

作者: 蔑視    時間: 2025-3-26 14:57
https://doi.org/10.1007/978-3-319-98002-7s and user engagement in collaboration and information sharing. In nutshell the web has been transformed from static media to the preferred communication media where the user is a key player in the creation of his experiences. The increase in the popularity of social networks on the Web has shaken u
作者: RAG    時間: 2025-3-26 18:44

作者: 噱頭    時間: 2025-3-27 00:58

作者: Heresy    時間: 2025-3-27 03:53

作者: 圣人    時間: 2025-3-27 09:18
Complex Analysis II: Further Topicse will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aim
作者: Perceive    時間: 2025-3-27 09:33
Introduction to Mathematical Biologyts, such as high performance infrastructure, scalability, cost efficiency etc..However Security remains one of the biggest problems that make this technology less trustful. With the big success of the Cloud, many Hackers started focusing on it, and many attacks that use to be exclusively targeting t
作者: HALO    時間: 2025-3-27 16:52

作者: 前奏曲    時間: 2025-3-27 19:41
,Neoclassical Economies—Dynamics,tract the attention of many entities. Indeed, by analyzing sentiments expressed in such content, government, businesses and particulars can extract valuable knowledge in order to enhance their strategies. Many approaches have been proposed to classify the posted content. Most of them are based on a
作者: FIG    時間: 2025-3-28 01:55
Introduction to Mathematical Logicture extraction and selection is need to be done rightfuly. This paper presents a comparative study of a number of feature extraction and feature selection techniques useful for text analysis and also presents a feature selection technique inspired from the existing methods. In particular the proble
作者: 形狀    時間: 2025-3-28 02:24

作者: 帶傷害    時間: 2025-3-28 08:13
Introduction to Mathematical Logic to topic or theme. Hashtags have been progressed into a multifaceted instrument to tag and track content, emphasise a standpoint or galvanise communal support across published posts on social networks. Although, by dint of the free hashtag creation strategy, users are having a broad toughness to ch
作者: 吹牛需要藝術    時間: 2025-3-28 13:11
Introduction to Mathematical Logicix representation of the graphs. We will focus on the use of Laplacian matrices afterwards. The spectral analysis of those matrices can give us interesting details about the processed graph. The input of the process is a set of data and the output will be a set of communities or clusters that regrou
作者: arrhythmic    時間: 2025-3-28 18:28
Introduction to Mathematical Logicore especially in the term of air pollution and its relationship with human health, especially in the city of Mohammedia (Northern part of Morocco). Authors build a tool in the form of data mining scheme, to couple the data with machine learning, in order to automatically align the features of massi
作者: Halfhearted    時間: 2025-3-28 22:26
Introduction: Biological Sequences researchers have turned to Deep Learning (DL) techniques based on Big Data Analytics. On the other hand, the ever-increasing size of unlabelled data combined with the difficulty of obtaining class labels has made semi-supervised learning an interesting alternative of significant practical importanc
作者: Malcontent    時間: 2025-3-28 22:57
Markov Chains and Hidden Markov Modelsn Natural Language Processing applications, especially in academic plagiarism detection. Yet, computing citation similarity is not a trivial task, due to the incomplete and ambiguous information presented in academic papers, which makes necessity to leverage extra knowledge to understand it, as well
作者: 禁止,切斷    時間: 2025-3-29 05:13
Informal Learning in Twitter: Architecture of Data Analysis Workflow and Extraction of Top Group of s and user engagement in collaboration and information sharing. In nutshell the web has been transformed from static media to the preferred communication media where the user is a key player in the creation of his experiences. The increase in the popularity of social networks on the Web has shaken u
作者: ASTER    時間: 2025-3-29 07:57
A MapReduce-Based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Valueedicting the Levenson Self Report Psychopathy factors would help investigator and even psychologist to spot offenders. In this paper, a statistical model is performed with the aim of predicting the Levenson Self Report Psychopathy scale value. For this purpose, the multiple regression statistical me
作者: 糾纏,纏繞    時間: 2025-3-29 13:19
Big Data Optimisation Among RDDs Persistence in Apache Sparkjects, e-commerce, and radars. Several technologies are implemented to generate all this data which is incremented quickly. In order to exploit this data efficiently and durably, it is important to respect the dynamics of their chronological evolution. For fast and reliable processing, powerful tech
作者: amputation    時間: 2025-3-29 17:54

作者: 嘮叨    時間: 2025-3-29 23:01
A Proposed Approach to Reduce the Vulnerability in a Cloud Systeme will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aim
作者: PALMY    時間: 2025-3-30 00:34

作者: 情感脆弱    時間: 2025-3-30 06:39
A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipherlability of data, also known as the CIA Triad. In this work, we introduce a new hybrid system based on two different encryption techniques: two square cipher and Caesar cipher with multiples keys. This homogeneity between the two systems allows us to provide the good properties of the two square cip
作者: 武器    時間: 2025-3-30 10:39

作者: 背書    時間: 2025-3-30 12:51

作者: Phonophobia    時間: 2025-3-30 19:40

作者: 酷熱    時間: 2025-3-30 22:31
Hashtag Recommendation Using Word Sequences’ Embeddings to topic or theme. Hashtags have been progressed into a multifaceted instrument to tag and track content, emphasise a standpoint or galvanise communal support across published posts on social networks. Although, by dint of the free hashtag creation strategy, users are having a broad toughness to ch
作者: manifestation    時間: 2025-3-31 03:50
Towards for Using Spectral Clustering in Graph Miningix representation of the graphs. We will focus on the use of Laplacian matrices afterwards. The spectral analysis of those matrices can give us interesting details about the processed graph. The input of the process is a set of data and the output will be a set of communities or clusters that regrou
作者: 危機    時間: 2025-3-31 07:50
Automatic Classification of Air Pollution and Human Healthore especially in the term of air pollution and its relationship with human health, especially in the city of Mohammedia (Northern part of Morocco). Authors build a tool in the form of data mining scheme, to couple the data with machine learning, in order to automatically align the features of massi
作者: 連鎖    時間: 2025-3-31 11:32
Deep Semi-supervised Learning for Virtual Screening Based on Big Data Analytics researchers have turned to Deep Learning (DL) techniques based on Big Data Analytics. On the other hand, the ever-increasing size of unlabelled data combined with the difficulty of obtaining class labels has made semi-supervised learning an interesting alternative of significant practical importanc




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
通化县| 云南省| 鄂托克旗| 北碚区| 庆安县| 额济纳旗| 西充县| 诸暨市| 南丹县| 曲周县| 宁津县| 西平县| 韶关市| 巴中市| 南江县| 丁青县| 濉溪县| 三亚市| 泾阳县| 洪洞县| 红安县| 柘城县| 广饶县| 高唐县| 亳州市| 台安县| 鱼台县| 安陆市| 宣汉县| 家居| 右玉县| 区。| 林西县| 武山县| 瑞丽市| 香港 | 剑河县| 忻州市| 关岭| 营山县| 大宁县|