Detecting Outliers in Non-IID Data: A Systematic Literature Review

S Siddiqi, F Qureshi, S Lindstaedt, R Kern - IEEE Access, 2023 - ieeexplore.ieee.org
Outlier detection (outlier and anomaly are used interchangeably in this review) in non-
independent and identically distributed (non-IID) data refers to identifying unusual or …

Real-time advanced computational intelligence for deep fake video detection

N Bansal, T Aljrees, DP Yadav, KU Singh, A Kumar… - Applied Sciences, 2023 - mdpi.com
As digitization is increasing, threats to our data are also increasing at a faster pace.
Generating fake videos does not require any particular type of knowledge, hardware …

Hidden dangerous object recognition in terahertz images using deep learning methods

SA Danso, L Shang, D Hu, J Odoom, Q Liu… - Applied Sciences, 2022 - mdpi.com
As a harmless detection method, terahertz has become a new trend in security detection.
However, there are inherent problems such as the low quality of the images collected by …

Replication-Based Query Management for Resource Allocation Using Hadoop and MapReduce over Big Data

A Kumar, N Varshney, S Bhatiya… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
We live in an age where everything around us is being created. Data generation rates are so
scary, creating pressure to implement costly and straightforward data storage and recovery …

End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)

A Kumar, N Sharma, A Kumar - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
Wireless channels are used to link vehicles in a VANET. In these networks, there is no fixed
or static base station or any other kind of infrastructure support. An ad hoc network for mobile …

Semantic and context understanding for sentiment analysis in Hindi handwritten character recognition using a multiresolution technique

A Kumar, S Bhatia, MR Khosravi, A Mashat… - ACM Transactions on …, 2024 - dl.acm.org
The rapid growth of Web 2.0, which enables people to generate, communicate, and share
information, has resulted in an increase in the total number of users. In developing countries …

Deeper linguistic analysis of prediction engines analysing users profiles for opinion mining and sentiment analysis

JK Nithyanandam, B Chelliah… - AIP Conference …, 2023 - pubs.aip.org
The sentiment analysis can be divided into the following two categories: one is based on the
complex network of virtual community knowledge network, which found the structure directly …

[PDF][PDF] Large dataset partitioning using ensemble partition-based clustering with majority voting technique

VD Babu, K Malathi - … Journal of Electrical Engineering and Computer …, 2023 - academia.edu
Large datasets have become useful in data mining for processing, storing, and handling vast
amounts of data. However, handling and processing large datasets is time-consuming and …

Review of data encryption technology and protection approach in cloud computing

R Sampath, MT Andavan, H Pattabiraman… - AIP Conference …, 2023 - pubs.aip.org
Information is currently a more important resource than ever for any firm we can imagine.
Sensor frameworks, IoT, distributed computing, and information investigations are only a …

Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part 1

LJ Cwei, N Sahoo, G Srivastava, W Ding - ACM Transactions on …, 2021 - dl.acm.org
Data Mining is an analytic process to explore data in search of consistent patterns and/or
systematic relationships between variables, and then to validate the findings by applying the …