Knowledge Computing and Its Applications
Citations
65 citations
3 citations
References
12,634 citations
"Knowledge Computing and Its Applica..." refers background in this paper
...Therefore, identification and handling concept drift in ‘Big Data’ streams is a current area of interest [5]....
[...]
...Twitter is one of the most well-known social media platforms, being characterized by providing a micro-blogging service where users can post text-based messages of up to 140 characters, known as tweets, mimicking the SMS (Short Message Service) messages [5, 6]....
[...]
...GL Grunwald–Letnikov GLCM Gray Level Co-occurrence Matrix GRNN General Regression Neural Network GRR Google Rapid Response GUI Graphical User Interface GWS GateWay-based Strategic GWS-CDS GateWay-based Strategic Connected Dominating Set HAS Harmony Search Algorithm HCI Human–Computer Interaction HDFS Hadoop Distributed File System HI Huberts Index HOG Histogram of Oriented Gradients xviii Abbreviations HTTP Hypertext Transfer Protocol IBE Identity-Based Encryption ICA Independent Component Analysis ID Intrusion Detection IDS Intrusion Detection System II Intensity of Interaction IMDB Internet Movie Database IoT Internet of Things IPS Internet Protocol Security ISODATA Interactive Self-Organizing Data Analysis Technique JT/RM Job Trackers/Resource Manager K-ANMI K-means and Mutual Information KB Knowledge Base KNN K-Nearest Neighbor LDA Latent Dirichlet Allocation LDA Linear Discriminant Analysis LET Link Expiration Time LHS Left-Hand Side MAC Mandatory Access Control MAE Mean Absolute Error MANET Mobile Ad hoc Network MaxD Maximum Density MB Measure of Belief MCDA Multicriteria Decision Analysis MCDS Minimum Connected Dominating Set MD Measure of Disbelief MDD Major Depressive Disorder MDL Minimum Description Length MDM Mobile Device Management MDP Missed Detection Rate MGR Mean Gain Ratio MLP Multilayer Perceptron MLR Multinomial Logistic Regression MM Mammographic Mass MMHCI Multimodal Human–Computer Interaction MPANN Memetic Pareto Artificial Neural Network MRI Magnetic Resonance Imaging MTFA Mean Time between False Alarms MTP Mean Time Detection MWMCDS Maximal Weight Minimum Connected Dominating Set NB Naive Bayes NBP Neighbor-based Binary Pattern NECAS National Epidemiological Catchment Area Survey NIDS Network Intrusion Detection System NIMH National Institute of Mental Health Abbreviations xix NLP Natural Language Processing NMI Normalized Mutual Information Matrix...
[...]
...Several open source tools [5] are available in order to counter such threats and to protect our big data stores from risk....
[...]
...An ad hoc wireless network can be symbolized by a unit disk graph [5], where each node is connected with a disk focused at this node with the same communication range (also called radius)....
[...]
2,277 citations
"Knowledge Computing and Its Applica..." refers background or methods in this paper
...Fog Computing and Internet of Things (IoT) are the two evolving highest technological prototypes that to date have a larger influence in the recent world [1]....
[...]
...In this approach, a large training set of labeled tweets is used to train the classifier and achieve sentiment polarity detection [1]....
[...]
...[1] present a big data lifecycle model consisting four phases: data collection, data storage, data processing, and knowledge creation....
[...]
...Here the user can post a single message up to 140 characters only, and these messages are well known as tweets [1]....
[...]
1,712 citations
"Knowledge Computing and Its Applica..." refers methods in this paper
...For detecting both local and global changes in the transactional data streams, Koh [39] presented an algorithm where transactions falling in a given window are represented as a tree....
[...]
...The Wu and Palmer [39] similarity metric is used to measure the depth of the given concepts in the Word Net taxonomy, the least common subsumer (LCS) depth and combines these figures into a similarity score....
[...]
[...]
1,525 citations
1,122 citations
"Knowledge Computing and Its Applica..." refers background in this paper
...But due to the growth in the number of Internet-connected devices, the improved request of low-latency, real-time services is proving to be a challenging task for the outdated cloud computing context [4]....
[...]
...Recently, social networking sites have also been found to be utilized by the government for agenda setting, policy making, and to communicate new initiatives [4]....
[...]
...Researchers experience several restrictions in e-Science work, including genomics [4], meteorology, complex simulations, connectomics, and biological and ecological research [21]....
[...]
...Another major issue with streaming data is that the concepts behind the data evolve with time; therefore, discovering hidden concepts in data streams with time imposes an enormous challenge to cluster analysis [3, 4]....
[...]