Usages of spark framework with different machine learning algorithms

M Ali Mohamed, IM El-Henawy… - Computational …, 2021 - Wiley Online Library
Sensors, satellites, mobile devices, social media, e‐commerce, and the Internet, among
others, saturate us with data. The Internet of Things, in particular, enables massive amounts …

[PDF][PDF] The Use of Cluster Computing and Random Forest Algoritm for Flight Delay Prediction

C Paramita, C Supriyanto, LA Syarifuddin… - International Journal of …, 2022 - academia.edu
Research in High Performance Computing (HPC) is becoming more and more popular
recently. Cluster computing is one type of HPC that can be easily deployed. In the meantime …

[PDF][PDF] Clustered Logistic Regression Algorithm for Flight Delay Prediction

C Supriyanto, FA Rafrastara, YP Astuti… - International Journal of …, 2021 - academia.edu
Computing (HPC) which become more and more popular and necessary in the recent years.
Meanwhile, data mining is a technology that have been growing where its huge benefits are …

Computer Security Algorithm Based on Convolutional Neural Network

J Yin, B He, J Zhang - … Conference on Big Data, Information and …, 2023 - ieeexplore.ieee.org
Computer security is a global issue, and it has always been the focus of attention of all
countries on a global scale. Neural network is a new subject, which is widely used in the …

A novel data cluster algorithm based on linear regression and residual analysis for human resource management

H Wang - International Journal of Applied Decision …, 2022 - inderscienceonline.com
Human resource management has become an important part of enterprise management.
How to select high-quality talent and how to allocate corresponding talent to appropriate …

[PDF][PDF] AN ENHANCED LOUVAIN CLUSTERING TECHNIQUE FOR THE IMPROVEMENT OF COOKIE POISONING ATTACK IN CYBER SECURITY

MZNH Alsiyabi, AIM Oman, M Sudiksa - 2021 - researchgate.net
Recently researchers are very much interested to concentrate the obstacle of cyber security
attackers. There are numerous directions and procedures available to attack any …