標(biāo)題: Titlebook: Data Science Analytics and Applications; First International Shriram R,Mak Sharma Conference proceedings 2018 Springer Nature Singapore Pt [打印本頁] 作者: Levelheaded 時(shí)間: 2025-3-21 16:55
書目名稱Data Science Analytics and Applications影響因子(影響力)
書目名稱Data Science Analytics and Applications影響因子(影響力)學(xué)科排名
書目名稱Data Science Analytics and Applications網(wǎng)絡(luò)公開度
書目名稱Data Science Analytics and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Science Analytics and Applications被引頻次
書目名稱Data Science Analytics and Applications被引頻次學(xué)科排名
書目名稱Data Science Analytics and Applications年度引用
書目名稱Data Science Analytics and Applications年度引用學(xué)科排名
書目名稱Data Science Analytics and Applications讀者反饋
書目名稱Data Science Analytics and Applications讀者反饋學(xué)科排名
作者: 領(lǐng)巾 時(shí)間: 2025-3-21 22:50
A Frequent and Rare Itemset Mining Approach to Transaction Clustering, and inter cluster similarity is minimized in the clustering technique. Distance based similarity measures are employed in .-means, .-mediods, etc. which are some of the clustering algorithms. This project explores the scope of guided clustering, wherein frequent and rare patterns shall be employed 作者: 聚集 時(shí)間: 2025-3-22 00:24
A Systematic Review on Biomedical Named Entity Recognition,ers are interested in considering the size of documents in the biomedical literatures and databases. It is nearly impossible for human to process all these data and it is even difficult for computers to extract the information since it is not stored in structured format. Identifying the named entiti作者: IRS 時(shí)間: 2025-3-22 06:30 作者: 食物 時(shí)間: 2025-3-22 11:57 作者: 禁止 時(shí)間: 2025-3-22 13:24 作者: 禁止 時(shí)間: 2025-3-22 18:43 作者: 使隔離 時(shí)間: 2025-3-23 00:21 作者: FANG 時(shí)間: 2025-3-23 04:47
Performance Analysis of Virtual Machines and Docker Containers,oud providers possessing multiples of Virtual Machines (VM) to perform the full functionality demanded by the users. Meanwhile, Docker based containers emerged with upgraded performance than VMs. Cloud provider scales up the economic benefits during peak demands for its infrastructure. At the same t作者: ALLEY 時(shí)間: 2025-3-23 08:50
Content Based Image Retrieval with Enhanced Privacy in Cloud Using Apache Spark,al problem. CBIR usually contains high volume of personal and authenticated information which makes image privacy as a major concern. The proposed scheme for privacy allows the data owner to outsource the image database and the CBIR service to the cloud, without revealing the actual content of the d作者: Cardiac 時(shí)間: 2025-3-23 10:48
Remote Continuous Health Monitoring System for Patients,re monitoring though there are several applications for healthcare and monitoring it does not fully address the ability to satisfy the patient’s needs, doctor convenience and the automation of system to act according to the status of the patient. In this paper, we implemented an algorithm for (a) th作者: Insubordinate 時(shí)間: 2025-3-23 17:10
Secure Data Archiving Using Enhanced Data Retention Policies,sues due to the high volume of data involved. The inability to effectively organize the information for decision making can have a serious impact on business decision making. The use of a cloud’s storage facilities for data backup and archiving provides flexibility and data preservation features at 作者: 不出名 時(shí)間: 2025-3-23 18:04 作者: enumaerate 時(shí)間: 2025-3-24 01:40 作者: 和平 時(shí)間: 2025-3-24 05:48
Trust Management Model Based on Malicious Filtered Feedback in Cloud,use the cost loss and dissatisfaction to the Cloud User (CU). Moreover, the Service Level Agreement (SLA) has not been found consistent among the communicating entities in the cloud environment. The selection of best provider is a challenging task in an untrusted environment like cloud. Therefore, w作者: COLIC 時(shí)間: 2025-3-24 10:23
Using Online Metadata to Enhance Religious Video Search,domains as well as on YouTube, as a communication media for establishing public relations. Searching these online religious videos, however, tends to be challenging due to their inadequate retrieval and ranking strategies and the lack of textual description toward videos. These shortcomings apply to作者: COWER 時(shí)間: 2025-3-24 11:31 作者: 蚊帳 時(shí)間: 2025-3-24 15:26
1865-0929 77 submissions. The papers address issues such as data analytics, data mining, cloud computing, machine learning, text classification and analysis, information retrieval, DSS, security, image and video processing..978-981-10-8602-1978-981-10-8603-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 怪物 時(shí)間: 2025-3-24 21:22 作者: arsenal 時(shí)間: 2025-3-24 23:28 作者: 徹底檢查 時(shí)間: 2025-3-25 05:19
Supriyo Mandal,Abyayananda Maitist methods. The performance of classifiers was evaluated using the True Positive Rate (TPR) obtained at various thresholds from the ROC curve and the area under ROC curve. For the said application, Random Forest method is found to provide a stable TPR with the augmented dataset compared to the raw dataset.作者: stress-response 時(shí)間: 2025-3-25 08:21
A Simple Model of?Knowledge Scaffolding DNA based cryptosystem comprising key generation, encoding, and encryption, decryption methodologies. The detailed performance and security analysis with their results are shown to support the strength of our algorithm towards reducing the computational complexity as well as the storage complexity and thereby achieving an enhanced security.作者: ascend 時(shí)間: 2025-3-25 13:33
Data Augmentation Techniques for Classifying Vertebral Bodies from MR Images,st methods. The performance of classifiers was evaluated using the True Positive Rate (TPR) obtained at various thresholds from the ROC curve and the area under ROC curve. For the said application, Random Forest method is found to provide a stable TPR with the augmented dataset compared to the raw dataset.作者: HARP 時(shí)間: 2025-3-25 16:28
Towards Secure DNA Based Cryptosystem, DNA based cryptosystem comprising key generation, encoding, and encryption, decryption methodologies. The detailed performance and security analysis with their results are shown to support the strength of our algorithm towards reducing the computational complexity as well as the storage complexity and thereby achieving an enhanced security.作者: Carcinoma 時(shí)間: 2025-3-25 21:37
Conference proceedings 2018Chennai, India, in January 2017..?The 16 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 77 submissions. The papers address issues such as data analytics, data mining, cloud computing, machine learning, text classification and analysis, information 作者: Paradox 時(shí)間: 2025-3-26 00:40 作者: 步履蹣跚 時(shí)間: 2025-3-26 07:55 作者: STYX 時(shí)間: 2025-3-26 10:29
A Comparative Study of Task and Fault Tolerance Clustering Techniques for Scientific Workflow Appling mechanisms that are suitable for the scientific workflow along with the fault tolerance mechanisms that help to make the system robust. The analysis of the performance of various clustering algorithms is also discussed in this paper.作者: 變形 時(shí)間: 2025-3-26 12:38
Frequent Pattern Mining Guided Tabu Search,on employing SPM and hence result in improved convergence, in relation to conventional Tabu Search. The proposed algorithm has been tested for the N-Queens problem and empirical results indicate approximately 21% improved convergence.作者: 收集 時(shí)間: 2025-3-26 20:11
1865-0929 , held in Chennai, India, in January 2017..?The 16 revised full papers and 4 revised short papers presented were carefully reviewed and selected from 77 submissions. The papers address issues such as data analytics, data mining, cloud computing, machine learning, text classification and analysis, in作者: ALT 時(shí)間: 2025-3-26 21:10 作者: 無情 時(shí)間: 2025-3-27 04:36 作者: 機(jī)構(gòu) 時(shí)間: 2025-3-27 05:27 作者: antidepressant 時(shí)間: 2025-3-27 13:29 作者: constitute 時(shí)間: 2025-3-27 15:52 作者: 構(gòu)成 時(shí)間: 2025-3-27 19:13 作者: HPA533 時(shí)間: 2025-3-28 00:17 作者: CAJ 時(shí)間: 2025-3-28 05:11 作者: 確定無疑 時(shí)間: 2025-3-28 06:28
Silhouette Based Human Action Recognition Using an Efficient Transformation Technique,crowding problem is eliminated but variation in the obtained low dimensional space is high. The proposed algorithm rv-tSNE reduces the variation and eliminates the Data discrimination problem. The proposed system also identifies the actions of two actors performing different existing actions. Finall作者: Engaged 時(shí)間: 2025-3-28 13:07 作者: 鉤針織物 時(shí)間: 2025-3-28 17:01 作者: 擦掉 時(shí)間: 2025-3-28 19:01
Complex Networks and Their Applications VIIas been tested over benchmark datasets and compared with centroid based hierarchical clustering and large items based transaction clustering algorithms and the results indicate improvement in terms of cluster quality.作者: 神經(jīng) 時(shí)間: 2025-3-29 00:01 作者: 館長(zhǎng) 時(shí)間: 2025-3-29 06:51 作者: 有惡意 時(shí)間: 2025-3-29 09:40
Centrality in Dynamic Competition Networksurces periodically such as daily, weekly, monthly, quarterly, half yearly for analytics and reporting. During this load unpremeditated duplicate data feed insertion occurs due to lack of expertise, lack of history, missing integrity constraints which impact the intelligence reporting error ratio & t作者: Arthropathy 時(shí)間: 2025-3-29 14:12
https://doi.org/10.1007/978-3-030-36687-2on Web Service (AWS). To compare the performance of VM and Docker container, a cloud monitoring service called Datadog Agent is integrated with both remote servers to monitor the functionality of resources and an open source testing software tool namely Apache JMeter is employed to perform a load te作者: CRAB 時(shí)間: 2025-3-29 16:22
Nicolò Ruggeri,Caterina De Baccoch is considered to 100x faster than MapReduce in certain applications. Result shown Apache Spark is in-memory computations which helps a lot in the retrieval of similar images. Apache Spark framework has been used when the images are newly inserted into the Cloud storage at the point of which featu作者: 配置 時(shí)間: 2025-3-29 22:55 作者: 易怒 時(shí)間: 2025-3-30 02:00
Complex Networks and Their Applications XIhic encryption is applied to provide a level of security to the data to be archived. This data is archived into the cloud to provide a data storage environment as a service that is optimized for long term data retention, security and that is compliant with the data retention policy. This framework e作者: conscribe 時(shí)間: 2025-3-30 04:24 作者: 額外的事 時(shí)間: 2025-3-30 11:44
Milo? Savi?,Mirjana Ivanovi?,Lakhmi C. Jaint, CB can select the best CP only based on true feedback which provides valid service to the requested CU. Our proposed framework improves job success rate and reduces cost loss to the user in a cloud environment.作者: 極肥胖 時(shí)間: 2025-3-30 14:08 作者: COLON 時(shí)間: 2025-3-30 20:20
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263061.jpg作者: 歡樂東方 時(shí)間: 2025-3-30 21:30 作者: 不愿 時(shí)間: 2025-3-31 02:07
978-981-10-8602-1Springer Nature Singapore Pte Ltd. 2018作者: Anthrp 時(shí)間: 2025-3-31 05:57 作者: 怒目而視 時(shí)間: 2025-3-31 11:10
Complex Networks and Their Applications VII and inter cluster similarity is minimized in the clustering technique. Distance based similarity measures are employed in .-means, .-mediods, etc. which are some of the clustering algorithms. This project explores the scope of guided clustering, wherein frequent and rare patterns shall be employed 作者: FLASK 時(shí)間: 2025-3-31 14:42 作者: Deceit 時(shí)間: 2025-3-31 21:28 作者: 陪審團(tuán)每個(gè)人 時(shí)間: 2025-4-1 00:20
Studies in Computational Intelligencef Forward-Backward Mean-Shift (FBMS) has the problem in face tracking when the target moves fast and during long term occlusions of the target. Hence, this paper proposes Modified Forward-Backward Mean-Shift algorithm (MFBMS) method for face tracking. The tracker is initialized by Viola-Jones based 作者: confide 時(shí)間: 2025-4-1 04:07
Complex Networks and Their Applications VIIerature. As a part of this work, we relate Data mining in the context of Tabu Search to perform search for global optimum in a guided fashion. Sequence Pattern Mining (SPM) in generic and a variant of it, namely Maximal Sequence Pattern (MSP) is incorporated as a part of Tabu Search. The limitation