Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (181)
  • Open Access

    ARTICLE

    Skeleton Keypoints Extraction Method Combined with Object Detection

    Jiabao Shi1, Zhao Qiu1,*, Tao Chen1, Jiale Lin1, Hancheng Huang2, Yunlong He3, Yu Yang3

    Journal of New Media, Vol.4, No.2, pp. 97-106, 2022, DOI:10.32604/jnm.2022.027176

    Abstract Big data is a comprehensive result of the development of the Internet of Things and information systems. Computer vision requires a lot of data as the basis for research. Because skeleton data can adapt well to dynamic environment and complex background, it is used in action recognition tasks. In recent years, skeleton-based action recognition has received more and more attention in the field of computer vision. Therefore, the keypoints of human skeletons are essential for describing the pose estimation of human and predicting the action recognition of the human. This paper proposes a skeleton point extraction method combined with object… More >

  • Open Access

    ARTICLE

    Foundation Treatment in Urban Underground Engineering Using Big Data Analysis for Smart City Applications

    Fei Liu1,2, Yunkai Zhang1,2, Jian Zhang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 153-172, 2022, DOI:10.32604/cmes.2022.017967

    Abstract A core element of the sustainable approach to global living quality improvement can now become the intensive and organized usage of underground space. There is a growing interest in underground building and growth worldwide. The reduced consumption of electricity, effective preservation of green land, sustainable wastewater and sewage treatment, efficient reverse degradation of the urban environment, and reliable critical infrastructure management can improve the quality of life. At the same time, technological innovations such as artificial intelligence (AI), cloud computing (CC), the internet of things (IoT), and big data analytics (BDA) play a significant role in improved quality of life.… More >

  • Open Access

    ARTICLE

    Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 859-872, 2023, DOI:10.32604/csse.2023.025796

    Abstract In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key… More >

  • Open Access

    ARTICLE

    Metaheuristic Based Clustering with Deep Learning Model for Big Data Classification

    R. Krishnaswamy1, Kamalraj Subramaniam2, V. Nandini3, K. Vijayalakshmi4, Seifedine Kadry5, Yunyoung Nam6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 391-406, 2023, DOI:10.32604/csse.2023.024901

    Abstract Recently, a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two Exabytes. At the same time, clustering is one of the efficient techniques for mining big data to extract the useful and hidden patterns that exist in it. Density-based clustering techniques have gained significant attention owing to the fact that it helps to effectively recognize complex patterns in spatial dataset. Big data clustering is a trivial process owing to the increasing quantity of data which can be solved by the use of Map… More >

  • Open Access

    ARTICLE

    Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification

    R. S. Latha1, K. Venkatachalam2, Jehad F. Al-Amri3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1803-1818, 2022, DOI:10.32604/iasc.2022.024539

    Abstract Generation of massive data is increasing in big data industries due to the evolution of modern technologies. The big data industries include data source from sensors, Internet of Things, digital and social media. In particular, these big data systems consist of data extraction, preprocessing, integration, analysis, and visualization mechanism. The data encountered from the sources are redundant, incomplete and conflict. Moreover, in real time applications, it is a tedious process for the interpretation of all the data from different sources. In this paper, the gathered data are preprocessed to handle the issues such as redundant, incomplete and conflict. For that,… More >

  • Open Access

    ARTICLE

    An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases

    Norwini Zaidi1, Iskandar Ishak2,*, Fatimah Sidi2, Lilly Suriani Affendey2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1175-1188, 2022, DOI:10.32604/csse.2022.021969

    Abstract Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However, there is no standard guideline for data transformation from relational database to NoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processing time when compared to the relational database query processing time. However, these approaches produced redundant tables in the resulted schema that in turn consume large unnecessary storage size and produce high query processing time due to the generated schema with redundant column families in the transformed column-oriented… More >

  • Open Access

    ARTICLE

    IoT Based Disease Prediction Using Mapreduce and LSQN3 Techniques

    R. Gopi1,*, S. Veena2, S. Balasubramanian3, D. Ramya4, P. Ilanchezhian5, A. Harshavardhan6, Zatin Gupta7

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1215-1230, 2022, DOI:10.32604/iasc.2022.025792

    Abstract In this modern era, the transformation of conventional objects into smart ones via internet vitality, data management, together with many more are the main aim of the Internet of Things (IoT) centered Big Data (BD) analysis. In the past few years, significant augmentation in the IoT-centered Healthcare (HC) monitoring can be seen. Nevertheless, the merging of health-specific parameters along with IoT-centric Health Monitoring (HM) systems with BD handling ability is turned out to be a complicated research scope. With the aid of Map-Reduce and LSQN3 techniques, this paper proposed IoT devices in Wireless Sensors Networks (WSN) centered BD Mining (BDM)… More >

  • Open Access

    ARTICLE

    Comparison of Structural Probabilistic and Non-Probabilistic Reliability Computational Methods under Big Data Condition

    Yongfeng Fang1,3, Kong Fah Tee2,*

    Structural Durability & Health Monitoring, Vol.16, No.2, pp. 129-143, 2022, DOI:10.32604/sdhm.2022.020301

    Abstract In this article, structural probabilistic and non-probabilistic reliability have been evaluated and compared under big data condition. Firstly, the big data is collected via structural monitoring and analysis. Big data is classified into different types according to the regularities of the distribution of data. The different stresses which have been subjected by the structure are used in this paper. Secondly, the structural interval reliability and probabilistic prediction models are established by using the stress-strength interference theory under big data of random loads after the stresses and structural strength are comprehensively considered. Structural reliability is computed by using various stress types,… More >

  • Open Access

    ARTICLE

    Handling Big Data in Relational Database Management Systems

    Kamal ElDahshan1, Eman Selim2, Ahmed Ismail Ebada2, Mohamed Abouhawwash3,4, Yunyoung Nam5,*, Gamal Behery2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5149-5164, 2022, DOI:10.32604/cmc.2022.028326

    Abstract Currently, relational database management systems (RDBMSs) face different challenges in application development due to the massive growth of unstructured and semi-structured data. This introduced new DBMS categories, known as not only structured query language (NoSQL) DBMSs, which do not adhere to the relational model. The migration from relational databases to NoSQL databases is challenging due to the data complexity. This study aims to enhance the storage performance of RDBMSs in handling a variety of data. The paper presents two approaches. The first approach proposes a convenient representation of unstructured data storage. Several extensive experiments were implemented to assess the efficiency… More >

  • Open Access

    ARTICLE

    Enhancing the Prediction of User Satisfaction with Metaverse Service Through Machine Learning

    Seon Hong Lee1, Haein Lee1, Jang Hyun Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4983-4997, 2022, DOI:10.32604/cmc.2022.027943

    Abstract Metaverse is one of the main technologies in the daily lives of several people, such as education, tour systems, and mobile application services. Particularly, the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere. To provide an improved service, it is important to analyze online reviews that contain user satisfaction. Several previous studies have utilized traditional methods, such as the structural equation model (SEM) and technology acceptance method (TAM) for exploring user satisfaction, using limited survey data. These methods may not be appropriate for analyzing the users of mobile applications. To overcome this… More >

Displaying 51-60 on page 6 of 181. Per Page