arrhythmic 发表于 2025-3-28 18:28:53

Introduction to Mathematical Logicore especially in the term of air pollution and its relationship with human health, especially in the city of Mohammedia (Northern part of Morocco). Authors build a tool in the form of data mining scheme, to couple the data with machine learning, in order to automatically align the features of massi

Halfhearted 发表于 2025-3-28 22:26:53

Introduction: Biological Sequences researchers have turned to Deep Learning (DL) techniques based on Big Data Analytics. On the other hand, the ever-increasing size of unlabelled data combined with the difficulty of obtaining class labels has made semi-supervised learning an interesting alternative of significant practical importanc

Malcontent 发表于 2025-3-28 22:57:28

Markov Chains and Hidden Markov Modelsn Natural Language Processing applications, especially in academic plagiarism detection. Yet, computing citation similarity is not a trivial task, due to the incomplete and ambiguous information presented in academic papers, which makes necessity to leverage extra knowledge to understand it, as well

禁止,切断 发表于 2025-3-29 05:13:03

Informal Learning in Twitter: Architecture of Data Analysis Workflow and Extraction of Top Group of s and user engagement in collaboration and information sharing. In nutshell the web has been transformed from static media to the preferred communication media where the user is a key player in the creation of his experiences. The increase in the popularity of social networks on the Web has shaken u

ASTER 发表于 2025-3-29 07:57:55

A MapReduce-Based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Valueedicting the Levenson Self Report Psychopathy factors would help investigator and even psychologist to spot offenders. In this paper, a statistical model is performed with the aim of predicting the Levenson Self Report Psychopathy scale value. For this purpose, the multiple regression statistical me

纠缠,缠绕 发表于 2025-3-29 13:19:24

Big Data Optimisation Among RDDs Persistence in Apache Sparkjects, e-commerce, and radars. Several technologies are implemented to generate all this data which is incremented quickly. In order to exploit this data efficiently and durably, it is important to respect the dynamics of their chronological evolution. For fast and reliable processing, powerful tech

amputation 发表于 2025-3-29 17:54:07

http://reply.papertrans.cn/19/1858/185729/185729_47.png

唠叨 发表于 2025-3-29 23:01:08

A Proposed Approach to Reduce the Vulnerability in a Cloud Systeme will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aim

PALMY 发表于 2025-3-30 00:34:09

http://reply.papertrans.cn/19/1858/185729/185729_49.png

情感脆弱 发表于 2025-3-30 06:39:26

A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipherlability of data, also known as the CIA Triad. In this work, we introduce a new hybrid system based on two different encryption techniques: two square cipher and Caesar cipher with multiples keys. This homogeneity between the two systems allows us to provide the good properties of the two square cip
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Big Data, Cloud and Applications; Third International Youness Tabii,Mohamed Lazaar,Nourddine Enneya Conference proceedings 2018 Springer N