Machine learning algorithms in Bigdata analysis and its applications: A Review

F Khoshaba, S Kareem, H Awla… - … Congress on Human …, 2022 - ieeexplore.ieee.org
A wide range of disparate variety of heterogeneous and even disparate data sources has
been integrated into the computer science research principles through the assistance of …

Metaheuristic algorithms in optimization and its application: A review

SW Kareem, KWH Ali, S Askar, FS Xoshaba… - JAREE (Journal on …, 2022 - jaree.its.ac.id
Metaheuristic algorithms are computational intelligence paradigms especially used for
solving different optimization issues. Metaheuristics examine a collection of solutions …

Minor Surface Cracks Detection using SCD11 Convolutional Neural Network

A Hussain, KN Qureshi, F Zaman… - 2024 4th International …, 2024 - ieeexplore.ieee.org
The manual detection of road cracks is a time-consuming process. On the other hand,
solutions that are based on deep learning are both speedy and accurate. Recently, several …

Software Informatization Security Platform in Big Data Environment

C Zhao - … International Conference on Computer Simulation and …, 2023 - ieeexplore.ieee.org
With the rapid development and mutual penetration of information technology and
communication technology, people's daily life has undergone tremendous changes, and the …

Exploring MSMEs Cybersecurity Awareness and Risk Management: Information Security Awareness

YA Singgalen, HD Purnomo… - … (Indonesian Journal of …, 2021 - journal.ugm.ac.id
The use of information technology in the management of Micro, Small, and Medium
Enterprises (MSMEs) is not limited to business performance and productivity but also …

[PDF][PDF] Enhancing Cloud Security Based On The Kyber Key Encapsulation Mechanism

LL Scientific - Journal Of Theoretical And Applied Information …, 2024 - researchgate.net
Due to its ability to provide flexible data processing and storage, cloud computing has
become a crucial component of today's technological infrastructure. However, there is still …

Comparative Evaluation of Machine Learning Algorithms in Breast Cancer

BF Abdulrahman, RS Hawezi, SMN MR… - Qalaai Zanist …, 2022 - journal.lfu.edu.krd
Breast cancer is one of the world's leading causes of mortality in women and is due to
uncontrollable breast cell growth. Early detection and proper care are the only means of …

A New Efficient Method for Information Security in Hadoop

SMJ Abdalwahid, BF Ibrahim, SH Ismael… - Qalaai Zanist …, 2022 - journal.lfu.edu.krd
A significant difficulty in developing a specialized Hadoop for cloud computing, and to tackle
this problem, an anticipated safe cloud computing system has been built. Hadoop was …

A strong combination of cryptographic techniques to secure cloud-hosted data

K Altarawneh - Journal of Namibian Studies: History Politics …, 2023 - namibian-studies.com
In Hybrid Cloud Security, we combine symmetric encryption with key management to ensure
anonymity. Our method provides a flexible and scalable deployment solution for cloud …

[PDF][PDF] A HYBRID MODEL OF RSA AND NTRU FOR SECURING OF CLOUD COMPUTING

K ALTARAWNEH, I ALTARAWNI… - Journal of Theoretical …, 2024 - researchgate.net
Cryptographic techniques are essential in guaranteeing the security and confidentiality of
data in cloud computing, which is a critical concern. In order to provide a strong and secure …