Skip to main content
main-content

Big Data

weitere Zeitschriftenartikel

01-12-2019 | Research | Issue 1/2019 Open Access

Anchor-based routing protocol with dynamic clustering for Internet of Things WSNs

Wireless sensor networks (WSNs) have many applications in climate monitoring, fire detection, smart homes, and smart cities, as well as detecting and monitoring dynamic, spatio-temporal events such as storms, traffic, and animal movement. WSNs are …

Authors:
Catalina Aranzazu-Suescun, Mihaela Cardei

01-12-2019 | Original Article | Issue 1/2019

Detecting intrinsic communities in evolving networks

Community finding in large networks (or graphs) helps in understanding natural collaboration within a set of members in the network. An intrinsic community is a form of organization where a subset of members is highly connected with each other …

Authors:
Keshab Nath, Swarup Roy

01-12-2019 | Research | Issue 1/2019 Open Access

Pseudonymization risk analysis in distributed systems

In an era of big data, online services are becoming increasingly data-centric; they collect, process, analyze and anonymously disclose growing amounts of personal data in the form of pseudonymized data sets. It is crucial that such systems are …

Authors:
Geoffrey K. Neumann, Paul Grace, Daniel Burns, Mike Surridge

01-12-2019 | Research | Issue 1/2019 Open Access

Investigation of the evaluation system of SMEs’ industrial cluster management performance based on wireless network development

Today, with the rapid development of mobile Internet technology, the operation of enterprises is basically based on the mobile network platform. Therefore, the study of the evaluation system of SMEs’ industrial cluster management performance based …

Authors:
Jiang Lan, Wang Chengjun, Zhang Wei

01-12-2019 | Research | Issue 1/2019 Open Access

A low redundancy data collection scheme to maximize lifetime using matrix completion technique

Sensor nodes equipped with various sensory devices can sense a wide range of information regarding human or things, thereby providing a foundation for Internet of Thing (IoT). Fast and energy-efficient data collection to the control center (CC) is …

Authors:
Jiawei Tan, Wei Liu, Mande Xie, Houbing Song, Anfeng Liu, Ming Zhao, Guoping Zhang

01-12-2019 | Research | Issue 1/2019 Open Access

Internet and the structure of public revenue: resource revenue versus non-resource revenue

This paper examines whether the Internet has led to a shift from reliance on resource revenue towards progressive reliance on non-resource revenue, which is ultimately a sustainable source of public revenue. The analysis has been carried out using …

Authors:
Sèna Kimm Gnangnon, Jean-François Brun

01-12-2019 | Original Article | Issue 1/2019

Spark’s GraphX-based link prediction for social communication using triangle counting

Link prediction in a given instance of a network topology is a crucial task for extracting and inspecting the evolution of social networks. It predicts missing links in existing community networks and new or terminating links in future systems. It …

Authors:
Ramesh Dharavath, Navaljeet Singh Arora

01-12-2019 | Original Article | Issue 1/2019

Topic modeling and sentiment analysis of global climate change tweets

Social media websites can be used as a data source for mining public opinion on a variety of subjects including climate change. Twitter, in particular, allows for the evaluation of public opinion across both time and space because geotagged tweets …

Authors:
Biraj Dahal, Sathish A. P. Kumar, Zhenlong Li

01-12-2019 | Research | Issue 1/2019 Open Access

Joint rate control and power allocation for low-latency reliable D2D-based relay network

Emerging 5G applications impose stringent requirements on network latency and reliability. In this work, we propose a low-latency reliable device-to-device (D2D) relay network framework to improve the cell coverage and user satisfaction.

Authors:
Yahui Wang, Yanhua He, Chen Xu, Zhenyu Zhou, Shahid Mumtaz, Jonathan Rodriguez, Haris Pervaiz

01-12-2019 | Original Article | Issue 1/2019

FCMiner: mining functional communities in social networks

Community discovery is a popular topic in social network analysis which facilitates several real-world applications. Most commonly, communities are discovered according to their structural similarities resulting in tightly connected user …

Authors:
T. M. G. Tennakoon, Richi Nayak

01-12-2019 | Research | Issue 1/2019 Open Access

Research on perception bias of implementation benefits of urban intelligent transportation system based on big data

Providing convenient and comfortable transportation services for residents is an important part of urban construction, in which the intelligent transportation system (ITS) plays an important role. This study used the big data of urban public …

Authors:
Xiao Hu, Zhenghua Deng

01-12-2019 | Regular article | Issue 1/2019 Open Access

Inside 50,000 living rooms: an assessment of global residential ornamentation using transfer learning

The global community decorates their homes based on personal decisions and contextual influences of their larger cultural and economic surroundings. The extent to which spatial patterns emerge in residential decoration practices has been …

Authors:
Xi Liu, Clio Andris, Zixuan Huang, Sohrab Rahimi

01-12-2019 | Research | Issue 1/2019 Open Access

A big data placement method using NSGA-III in meteorological cloud platform

Meteorological cloud platforms (MCP) are gradually replacing the traditional meteorological information systems to provide information analysis services such as weather forecasting, disaster warning, and scientific research. However, the explosive …

Authors:
Feng Ruan, Renhao Gu, Tao Huang, Shengjun Xue

01-12-2019 | Research | Issue 1/2019 Open Access

Improved LSH for privacy-aware and robust recommender system with sparse data in edge environment

Recommender systems have become a popular and effective way to quickly discover new service items that are probably preferred by prospective users. Through analyzing the historical service usage data produced in the past, a recommender system can …

Authors:
Xuening Chen, Hanwen Liu, Dan Yang

01-12-2019 | Research | Issue 1/2019 Open Access

An IoT sensor and scenario survey for data researchers

This work surveys Internet of Things (IoT) experimental research published since 2015. We summarize the IoT state of the art during the last 2 years and extract important data that we apply to enhance the analysis of IoT solutions. The IoT …

Authors:
Cleber M. de Morais, Djamel Sadok, Judith Kelner

01-12-2019 | Research | Issue 1/2019 Open Access

Efficient resource provisioning for elastic Cloud services based on machine learning techniques

Automated resource provisioning techniques enable the implementation of elastic services, by adapting the available resources to the service demand. This is essential for reducing power consumption and guaranteeing QoS and SLA fulfillment …

Authors:
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo, Ignacio M. Llorente

01-12-2019 | Research | Issue 1/2019 Open Access

Privacy-aware cross-cloud service recommendations based on Boolean historical invocation records

In the age of big data, service recommendation has provided an effective manner to filter valuable information from massive data. Generally, by observing the past service invocation records (Boolean values) distributed across different cloud …

Authors:
Qiang Wei, Wenxue Wang, Gongxuan Zhang, Tingting Shao

01-12-2019 | Research | Issue 1/2019 Open Access

Research on trust mechanism of cooperation innovation with big data processing based on blockchain

In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Blockchain technology is considered as …

Authors:
Qi Liu, Xiao Zou

01-12-2019 | Original Paper | Issue 1/2019 Open Access

Key factors for the implementation and integration of innovative ICT solutions in SMEs and large companies involved in the multimodal transport of dangerous goods

The increased number of transports with dangerous goods (TDG) increases the risk of both accidents and terrorist attacks. Digitalisation is crucial in order to avoid human errors and to increase safety, security and efficiency, however there are …

Authors:
Gemma Dolores Molero, Francisco Enrique Santarremigia, Sara Poveda-Reyes, Melanie Mayrhofer, Samir Awad-Núñez, Abdullah Kassabji

01-12-2019 | Research | Issue 1/2019 Open Access

A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems

Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by …

Authors:
Zhaoe Min, Geng Yang, Arun Kumar Sangaiah, Shuangjie Bai, Guoxiu Liu

01-12-2019 | Research | Issue 1/2019 Open Access

CIoT-Net: a scalable cognitive IoT based smart city network architecture

In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing is represented as a next-generation application AI-based …

Authors:
Jin-ho Park, Mikail Mohammed Salim, Jeong Hoon Jo, Jose Costa Sapalo Sicato, Shailendra Rathore, Jong Hyuk Park

01-12-2019 | Original article | Issue 1/2019 Open Access

Evaluation of e-commerce location and entry to China – implications on shipping and trade

E-commerce is experiencing strong global growth, and leading market is nowadays that of China, whether it is evaluated from the perspective of domestic market size or cross-border volumes. In this research work further understanding and knowledge …

Authors:
Yulia Panova, Albert Tan, Olli-Pekka Hilmola, M. H. Puvindran, Xu Hongsheng, Weidong Li

01-12-2019 | Research | Issue 1/2019 Open Access

Examining characteristics of predictive models with imbalanced big data

High class imbalance between majority and minority classes in datasets can skew the performance of Machine Learning algorithms and bias predictions in favor of the majority (negative) class. This bias, for cases where the minority (positive) class …

Authors:
Tawfiq Hasanin, Taghi M. Khoshgoftaar, Joffrey L. Leevy, Naeem Seliya

01-12-2019 | Research article | Issue 1/2019 Open Access

MOOC-based flipped learning in higher education: students’ participation, experience and learning performance

Relying on advanced network technologies, Massive Open Online Courses (MOOCs) can support the transformation and deep construction of high-quality open courses. However, with the use of MOOCs in many universities and colleges, new issues have …

Authors:
Kai Wang, Chang Zhu

01-12-2019 | Research | Issue 1/2019 Open Access

Research paper classification systems based on TF-IDF and LDA schemes

With the increasing advance of computer and information technologies, numerous research papers have been published online as well as offline, and as new research fields have been continuingly created, users have a lot of trouble in finding and …

Authors:
Sang-Woon Kim, Joon-Min Gil

01-12-2019 | Research | Issue 1/2019 Open Access

Leveraging resource management for efficient performance of Apache Spark

Apache Spark is one of the most widely used open source processing framework for big data, it allows to process large datasets in parallel using a large number of nodes. Often, applications of this framework use resource management systems like …

Authors:
Khadija Aziz, Dounia Zaidouni, Mostafa Bellafkih

01-12-2019 | Research | Issue 1/2019 Open Access

Detection of multiple change points for linear processes under negatively super-additive dependence

This paper focuses on the issue of detecting the multiple change points for linear processes under negatively super-additive dependence (NSD). We propose a CUSUM-type method in the multiple variance change model and establish the weak convergence …

Authors:
Yuncai Yu, Xinsheng Liu, Ling Liu, Piao Zhao

01-12-2019 | Research | Issue 1/2019 Open Access

An energy- and cost-aware computation offloading method for workflow applications in mobile edge computing

Mobile edge computing is becoming a promising computing architecture to overcome the resource limitation of mobile devices and bandwidth bottleneck of the core networks in mobile cloud computing. Although offloading applications to the cloud can …

Authors:
Kai Peng, Maosheng Zhu, Yiwen Zhang, Lingxia Liu, Jie Zhang, Victor C.M. Leung, Lixin Zheng

01-12-2019 | Research | Issue 1/2019 Open Access

Efficient adaptive framework for securing the Internet of Things devices

The research on the Internet of Things (IoT) has made huge strides forward in the past couple of years. IoT has its applications in almost every walk of life, and it is being regarded as the next big thing that can change the way humans perceive …

Authors:
Umer Farooq, Najam Ul Hasan, Imran Baig, Naeem Shehzad

01-12-2019 | Research | Issue 1/2019 Open Access

An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier

Image retrieval is the process of retrieving images from a database. Certain algorithms have been used for traditional image retrieval. However, such retrieval involves certain limitations, such as manual image annotation, ineffective feature …

Authors:
Mudhafar Jalil Jassim Ghrabat, Guangzhi Ma, Ismail Yaqub Maolood, Shayem Saleh Alresheedi, Zaid Ameen Abduljabbar

01-12-2019 | Research | Issue 1/2019 Open Access

VADA: an architecture for end user informed data preparation

As a result of emerging technological advances that allow capturing, sharing and storing of data at scale, the number and diversity of data sets available to organisations are growing rapidly. This is reflected, for example, in the adoption of …

Authors:
Nikolaos Konstantinou, Edward Abel, Luigi Bellomarini, Alex Bogatu, Cristina Civili, Endri Irfanie, Martin Koehler, Lacramioara Mazilu, Emanuel Sallinger, Alvaro A. A. Fernandes, Georg Gottlob, John A. Keane, Norman W. Paton

01-12-2019 | Research | Issue 1/2019 Open Access

Modeling and implement of mobile phone user location discrimination based on heuristic strategy

With the all-pervading mobile devices and continuing advancement of big data technologies, mobile phone data research has been gaining widespread popularity in the past few years. Dealing with the implausible location caused by cell handover …

Authors:
Qingchao Shan, Honghui Dong, Limin Jia, Hua Yuan, Hui Zhang

01-12-2019 | Software | Issue 1/2019 Open Access

OpenStreetMap history for intrinsic quality assessment: Is OSM up-to-date?

OpenStreetMap (OSM) is a well-known crowdsourcing project which aims to create a geospatial database of the whole world. Intrinsic approaches based on the analysis of the history of data, i.e. its evolution over time, have become an established …

Authors:
Marco Minghini, Francesco Frassinelli

01-12-2019 | Research | Issue 1/2019 Open Access

Advancing community detection using Keyword Attribute Search

As social network structures evolve constantly, it is necessary to design an efficient mechanism to track the influential nodes and accurate communities in the networks. The attributed graph represents the information about properties of the nodes …

Authors:
Sanket Chobe, Justin Zhan

01-12-2019 | Research | Issue 1/2019 Open Access

Adaptive deduplication of virtual machine images using AKKA stream to accelerate live migration process in cloud environment

Cloud Computing is a paradigm which provides resources to users from its pool based on demand to satisfy their requirements. During this process, many servers are overloaded and underloaded in the cloud environment. Thus, power consumption and …

Authors:
Naga Malleswari TYJ, Vadivu G

01-12-2019 | Original Article | Issue 1/2019

ParSoDA: high-level parallel programming for social data mining

Software systems for social data mining provide algorithms and tools for extracting useful knowledge from user-generated social media data. ParSoDA (Parallel Social Data Analytics) is a high-level library for developing parallel data mining …

Authors:
Loris Belcastro, Fabrizio Marozzo, Domenico Talia, Paolo Trunfio

01-12-2019 | Research | Issue 1/2019 Open Access

Design of Micro-strip Symmetrical Dual-band Filter Based on Wireless Sensor Network Nodes

The micro-strip antenna filter design of wireless sensor network nodes is usually used to improve the out-of-band suppression and frequency selectivity by increasing the order of the filters, but the filters are usually single band, not only the …

Authors:
Wenbo Cheng, Kai Deng, Wei Cheng

01-12-2019 | Research | Issue 1/2019 Open Access

A view of programming scalable data analysis: from clouds to exascale

Scalability is a key feature for big data analysis and machine learning frameworks and for applications that need to analyze very large and real-time data available from data repositories, social media, sensor networks, smartphones, and the Web.

Author:
Domenico Talia

01-12-2019 | Research | Issue 1/2019 Open Access

Data offloading in IoT environments: modeling, analysis, and verification

Recent years have seen a significant growth in Internet of Things (IoT) technology consisting of a large number of devices embedded with sensors and deployed to perform monitoring and actuation tasks. The IoT devices collect large volumes of data …

Authors:
Ankan Ghosh, Osman Khalid, Rao N. B. Rais, Amjad Rehman, Saif U. R. Malik, Imran A. Khan

01-12-2019 | Research | Issue 1/2019 Open Access

An algorithm to optimize deployment of charging base stations for WRSN

Optimizing deployment of charging base stations in wireless rechargeable sensor networks can considerably reduce the cost. Previously, the charging base stations are simply installed at some fixed special points (e.g., the grid points) after …

Authors:
Peng Wan, Yuhua Cheng, Baoyu Wu, Gaofeng Wang

01-12-2019 | Research | Issue 1/2019 Open Access

An agile and effective network function virtualization infrastructure for the Internet of Things

The processing and power-consumption constraints of the Internet of Things devices hinder them to offer more complex network services than the simple data transmission in smart city scenarios. The lack of complex services, such as security and …

Authors:
Diogo Menezes Ferrazani Mattos, Pedro Braconnot Velloso, Otto Carlos Muniz Bandeira Duarte

01-12-2019 | Research | Issue 1/2019 Open Access

A new method for traffic forecasting in urban wireless communication network

With the development of wireless devices and the increase of mobile users, the operator’s focus has shifted from the construction of the communication network to the operation and maintenance of the network. Operators are eager to know the …

Authors:
Kaisa Zhang, Gang Chuai, Weidong Gao, Xuewen Liu, Saidiwaerdi Maimaiti, Zhiwei Si

01-12-2019 | Research | Issue 1/2019 Open Access

Software mediators as first-class entities of systems-of-systems software architectures

Software systems have grown in complexity and size and, therefore, require paradigms for their engineering, specifically for their architecting. Modern systems are conceived to execute composed functionalities that depend on interactions among …

Authors:
Lina Garcés, Flavio Oquendo, Elisa Yumi Nakagawa

01-12-2019 | Research | Issue 1/2019 Open Access

Big data clustering with varied density based on MapReduce

The DBSCAN algorithm is a prevalent method of density-based clustering algorithms, the most important feature of which is the ability to detect arbitrary shapes and varied clusters and noise data. Nevertheless, this algorithm faces a number of …

Authors:
Safanaz Heidari, Mahmood Alborzi, Reza Radfar, Mohammad Ali Afsharkazemi, Ali Rajabzadeh Ghatari

01-12-2019 | Research | Issue 1/2019 Open Access

Positive and negative association rule mining in Hadoop’s MapReduce environment

In this paper, we present a Hadoop implementation of the Apriori algorithm. Using Hadoop’s distributed and parallel MapReduce environment, we present an architecture to mine positive as well as negative association rules in big data using frequent …

Authors:
Sikha Bagui, Probal Chandra Dhar

01-12-2019 | Research | Issue 1/2019 Open Access

Managing to release early, often and on time in the OpenStack software ecosystem

The dictum of “Release early, release often.” by Eric Raymond as the Linux modus operandi highlights the importance of release management in open source software development. However, there are very few empirical studies addressing release …

Authors:
José Apolinário Teixeira, Helena Karsten

01-12-2019 | Research | Issue 1/2019 Open Access

Internet usage, innovation and human development nexus in Africa: the case of ECOWAS

Internet usage and the sporadic rise in the level of innovations have been major drivers of human progress in the last decades. These leaps in human intelligence have affected almost every area of human endeavour including education, health …

Authors:
Jeremiah O. Ejemeyovwi, Evans S. Osabuohien, Olawale D. Johnson, Ebenezer I. K. Bowale

01-12-2019 | Original Article | Issue 1/2019

Melanoma risk modeling from limited positive samples

The key to effective cancer treatment is early detection. Risk models built from routinely collected clinical data have the opportunity to improve early detection by identifying high-risk patients. In this study, we explored various machine …

Authors:
Aaron N. Richter, Taghi M. Khoshgoftaar

01-12-2019 | Research | Issue 1/2019 Open Access

Recommendation algorithm based on user score probability and project type

The interaction and sharing of data based on network users make network information overexpanded, and “information overload” has become a difficult problem for everyone. The information filtering technology based on recommendation could dig out …

Authors:
Chunxue Wu, Jing Wu, Chong Luo, Qunhui Wu, Cong Liu, Yan Wu, Fan Yang

01-12-2019 | Research | Issue 1/2019 Open Access

Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications

This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system …

Authors:
Ronghe Wang, Bo Zhang, Manqing Wu, Jun Zhang, Xiaolei Guo, Xinhai Zhang, Huibo Li, Dong Jiao, Shilong Ma

01-12-2019 | Regular article | Issue 1/2019 Open Access

Gender-specific preference in online dating

In this paper, to reveal the differences of gender-specific preference and the factors affecting potential mate choice in online dating, we analyze the users’ behavioral data of a large online dating site in China. We find that for women, network …

Authors:
Xixian Su, Haibo Hu

01-12-2019 | Research | Issue 1/2019 Open Access

LSH-based private data protection for service quality with big range in distributed educational service recommendations

Service recommendation has become a promising way to extract useful or valuable information from big educational data collected by various sensors and distributed in different platforms. How to protect the private user data in each cluster during …

Authors:
Chao Yan, Xuening Chen, Qinglei Kong

01-12-2019 | Research | Issue 1/2019 Open Access

Online architecture for predicting live video transcoding resources

End users stream video increasingly from live broadcasters (via YouTube Live, Twitch etc.). Adaptive live video streaming is realised by transcoding different representations of the original video content. Management of transcoding resources …

Authors:
Pekka Pääkkönen, Antti Heikkinen, Tommi Aihkisalo

01-12-2019 | Issue 6/2019

Learning To Recognize Driving Patterns For Collectively Characterizing Electric Vehicle Driving Behaviors

As electric vehicle (EV) emerges, it is important to understand how driver's driving behavior is influencing power consumption in an electric vehicle. Driver's personal driving behavior is usually quite distinctive and can be recognized by means …

Authors:
Chung-Hong Lee, Chih-Hung Wu

01-12-2019 | Research | Issue 1/2019 Open Access

Personalized adaptive learning: an emerging pedagogical approach enabled by a smart learning environment

Smart devices and intelligent technologies are enabling a smart learning environment to effectively promote the development of personalized learning and adaptive learning, in line with the trend of accelerating the integration of both. In this …

Authors:
Hongchao Peng, Shanshan Ma, Jonathan Michael Spector

01-12-2019 | Original Article | Issue 1/2019

Community detection in large-scale social networks: state-of-the-art and future directions

Community detection is an important research area in social networks analysis where we are concerned with discovering the structure of the social network. Detecting communities is of great importance in sociology, biology and computer science …

Authors:
Mehdi Azaouzi, Delel Rhouma, Lotfi Ben Romdhane

01-12-2019 | Research | Issue 1/2019 Open Access

Outdoor location tracking of mobile devices in cellular networks

This paper presents a technique and experimental validation for anonymous outdoor location tracking of all users residing on a mobile cellular network. The proposed technique does not require any intervention or cooperation on the mobile side but …

Authors:
Jens Trogh, David Plets, Erik Surewaard, Mathias Spiessens, Mathias Versichele, Luc Martens, Wout Joseph

01-12-2019 | Research | Issue 1/2019 Open Access

Research on financial network big data processing technology based on fireworks algorithm

Big data is a hot issue in both theoretical and practical circles. Although many scholars have analyzed the risk of internal control of venture capital information system from different angles, there is still a lack of research on the risk of …

Author:
Tao Luo

01-12-2019 | Research | Issue 1/2019 Open Access

A placement architecture for a container as a service (CaaS) in a cloud environment

Unlike a traditional virtual machine (VM), a container is an emerging lightweight virtualization technology that operates at the operating system level to encapsulate a task and its library dependencies for execution. The Container as a Service …

Authors:
Mohamed K. Hussein, Mohamed H. Mousa, Mohamed A. Alqarni

01-12-2019 | Research | Issue 1/2019 Open Access

Research on real-time network data mining technology for big data

The data distribution in big data environment is very different, and it is difficult to mine the data because of the strong interference of redundant data and frequent items. The traditional data mining algorithm uses closed frequent item feature …

Authors:
Jing Hu, Xianbin Xu

01-12-2019 | Research | Issue 1/2019 Open Access

An intelligent wireless channel allocation in HAPS 5G communication system based on reinforcement learning

Channel allocation is the prerequisite for the HAPS (high-altitude platform station) 5G communication network to transmit information. An intelligent wireless channel allocation algorithm for HAPS 5G massive MIMO (multiple-input multiple-output) …

Authors:
Mingxiang Guan, Zhou Wu, Yingjie Cui, Xuemei Cao, Le Wang, Jianfeng Ye, Bao Peng

01-12-2019 | Research | Issue 1/2019 Open Access

Analysis and classification of heart diseases using heartbeat features and machine learning algorithms

This study proposed an ECG (Electrocardiogram) classification approach using machine learning based on several ECG features. An electrocardiogram (ECG) is a signal that measures the electric activity of the heart. The proposed approach is …

Authors:
Fajr Ibrahem Alarsan, Mamoon Younes

01-12-2019 | Case Study | Issue 1/2019 Open Access

Using electronic transaction data to add geographic granularity to official estimates of retail sales

The U.S. Census Bureau produces high-quality official economic statistics using traditional sample surveys and censuses. Data collection for each survey and census program is designed to produce reliable statistics of economic output for a …

Authors:
Brian Dumbacher, Darcy Steeg Morris, Carma Hogue

01-12-2019 | Original Article | Issue 1/2019 Open Access

Characterizing the Twitter network of prominent politicians and SPLC-defined hate groups in the 2016 US presidential election

We characterize the Twitter networks of the major presidential candidates, Donald J. Trump and Hillary R. Clinton, with various American hate groups defined by the US Southern Poverty Law Center (SPLC). We further examined the Twitter networks for …

Authors:
Raazesh Sainudiin, Kumar Yogeeswaran, Kyle Nash, Rania Sahioun

01-12-2019 | Original Article | Issue 1/2019

A new approach (EDIZ) for big data variant prioritization

Whole exome sequencing (WES), workflow consists of the following steps: raw data quality assessment, pre-processing, alignment, post-processing, variant calling, annotation, and prioritization. WES of human samples was reported to detect …

Authors:
Mehmet Ali Ergun, Sezen Guntekin Ergun, E. Ferda Percin

01-12-2019 | Research | Issue 1/2019 Open Access

Experts reviews of a cloud forensic readiness framework for organizations

Cloud computing has drastically altered the ways in which it is possible to deliver information technologies (ITs) to consumers as a service. In addition, the concept has given rise to multiple benefits for consumers and organizations. However …

Authors:
Ahmed Alenezi, Hany F. Atlam, Gary B. Wills

01-12-2019 | Research | Issue 1/2019 Open Access

Evaluating the performance of sentence level features and domain sensitive features of product reviews on supervised sentiment analysis tasks

With the popularity of e-commerce, posting online product reviews expressing customer’s sentiment or opinion towards products has grown exponentially. Sentiment analysis is a computational method that plays an essential role in automating the …

Authors:
Bagus Setya Rintyarna, Riyanarto Sarno, Chastine Fatichah

01-12-2019 | Methodology | Issue 1/2019 Open Access

Random forest implementation and optimization for Big Data analytics on LexisNexis’s high performance computing cluster platform

In this paper, we comprehensively explain how we built a novel implementation of the Random Forest algorithm on the High Performance Computing Cluster (HPCC) Systems Platform from LexisNexis. The algorithm was previously unavailable on that …

Authors:
Victor M. Herrera, Taghi M. Khoshgoftaar, Flavio Villanustre, Borko Furht

01-12-2019 | Research | Issue 1/2019 Open Access

Impact of class distribution on the detection of slow HTTP DoS attacks using Big Data

The integrity of modern network communications is constantly being challenged by more sophisticated intrusion techniques. Attackers are consistently shifting to stealthier and more complex forms of attacks in an attempt to bypass known mitigation …

Authors:
Chad L. Calvert, Taghi M. Khoshgoftaar

01-12-2019 | Theoretical article | Issue 1/2019 Open Access

The quality management ecosystem for predictive maintenance in the Industry 4.0 era

The Industry 4.0 era requires new quality management systems due to the ever increasing complexity of the global business environment and the advent of advanced digital technologies. This study presents new ideas for predictive quality management …

Authors:
Sang M. Lee, DonHee Lee, Youn Sung Kim

01-12-2019 | Software | Issue 1/2019 Open Access

OSHDB: a framework for spatio-temporal analysis of OpenStreetMap history data

OpenStreetMap (OSM) is a collaborative project collecting geographical data of the entire world. The level of detail of OSM data and its data quality vary much across different regions and domains. In order to analyse such variations it is often …

Authors:
Martin Raifer, Rafael Troilo, Fabian Kowatsch, Michael Auer, Lukas Loos, Sabrina Marx, Katharina Przybill, Sascha Fendrich, Franz-Benjamin Mocnik, Alexander Zipf

01-12-2019 | Original article | Issue 1/2019 Open Access

INSPIRE coverages: an analysis and some suggestions

In its quest for a common European Spatial Data Infrastructure INSPIRE has also addressed the category of spatio-temporally extended coverages, in particular: raster data. The INSPIRE definition of coverages is similar to the OGC and ISO …

Authors:
Peter Baumann, Jordi Escriu

01-12-2019 | Theoretical article | Issue 1/2019 Open Access

Managing the innovation legitimacy of the sharing economy

Sharing economy has become widespread globally as an innovative service business model. However, some of sharing economy’s socially irresponsible practices have led critics to challenge their legitimacy. Drawing upon legitimacy theory, this …

Author:
Jiyoung Hwang

01-12-2019 | Research | Issue 1/2019 Open Access

Performance prediction of data streams on high-performance architecture

Worldwide sensor streams are expanding continuously with unbounded velocity in volume, and for this acceleration, there is an adaptation of large stream data processing system from the homogeneous to rack-scale architecture which makes serious …

Authors:
Bhaskar Gautam, Annappa Basava

01-12-2019 | Research | Issue 1/2019 Open Access

Enhancing network cluster synchronization capability based on artificial immune algorithm

With the deeper study on complex networks, more and more attention has been paid to the research on the cluster synchronization phenomena based on complex networks. In the real world, synchronization phenomena or cluster synchronous behaviors …

Authors:
Tinggui Chen, Jiawen Shi, Jianjun Yang, Gongfa Li

01-12-2019 | Research | Issue 1/2019 Open Access

Trust-based recommendation systems in Internet of Things: a systematic literature review

Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security …

Authors:
Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi

01-12-2019 | Research | Issue 1/2019 Open Access

Mobile marketing recommendation method based on user location feedback

Location-based mobile marketing recommendation has become one of the hot spots in e-commerce. The current mobile marketing recommendation system only treats location information as a recommended attribute, which weakens the role of users and …

Authors:
Chunyong Yin, Shilei Ding, Jin Wang

01-12-2019 | Research | Issue 1/2019 Open Access

Comparing the speed and accuracy of approaches to betweenness centrality approximation

Many centrality measures exist, utilizing both local and global information for quantifying the importance of a node in a network. Local measures such as degree and closeness centrality can be computed in linear time [ 1 ], but are limited in their …

Authors:
John Matta, Gunes Ercal, Koushik Sinha

01-12-2019 | Research | Issue 1/2019 Open Access

TACRM: trust access control and resource management mechanism in fog computing

Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog based fifth generation mobile communication (5G) system is …

Authors:
Wided Ben Daoud, Mohammad S. Obaidat, Amel Meddeb-Makhlouf, Faouzi Zarai, Kuei-Fang Hsiao

01-12-2019 | Research | Issue 1/2019 Open Access

Toward a telepresence robot empowered smart lab

In the context of distance education, lab and field work are a considerable challenge for students, professors, and institutions. This paper presents a Telepresence Robot Empowered Smart Lab (TRESL) system as a new and emerging technology with a …

Authors:
Qing Tan, Marc Denojean-Mairet, Hongxue Wang, Xiaokun Zhang, Frédérique C. Pivot, Roland Treu

01-12-2019 | Point of View | Issue 1/2019 Open Access

How corporate headquarters add value in the digital age

How will digitalization influence the role of corporate headquarters (CHQs) and their relationships with their operating units? We recently asked 67 senior CHQ managers this question. The results suggest that CHQs expect to become more powerful …

Authors:
Jan Schmitt, Benoit Decreton, Phillip C. Nell

01-12-2019 | Research article | Issue 1/2019 Open Access

Learning analytics and higher education: a proposed model for establishing informed consent mechanisms to promote student privacy and autonomy

By tracking, aggregating, and analyzing student profiles along with students’ digital and analog behaviors captured in information systems, universities are beginning to open the black box of education using learning analytics technologies.

Author:
Kyle M. L. Jones

01-12-2019 | Research | Issue 1/2019 Open Access

A machine learning approach to analyze customer satisfaction from airline tweets

Customer’s experience is one of the important concern for airline industries. Twitter is one of the popular social media platform where flight travelers share their feedbacks in the form of tweets. This study presents a machine learning approach …

Authors:
Sachin Kumar, Mikhail Zymbler

01-12-2019 | Methodology | Issue 1/2019 Open Access

A parallel and distributed stochastic gradient descent implementation using commodity clusters

Deep Learning is an increasingly important subdomain of artificial intelligence, which benefits from training on Big Data. The size and complexity of the model combined with the size of the training dataset makes the training process very …

Authors:
Robert K. L. Kennedy, Taghi M. Khoshgoftaar, Flavio Villanustre, Timothy Humphrey

01-12-2019 | Research | Issue 1/2019 Open Access

A quadri-dimensional approach for poor performance prioritization in mobile networks using Big Data

The Management of mobile networks has become so complex due to a huge number of devices, technologies and services involved. Network optimization and incidents management in mobile networks determine the level of the quality of service provided by …

Authors:
Maluambanzila Minerve Mampaka, Mbuyu Sumbwanyambe

01-12-2019 | Methodology | Issue 1/2019 Open Access

Bayesian mixture models and their Big Data implementations with application to invasive species presence-only data

Due to their conceptual simplicity and flexibility, non-parametric mixture models are widely used to identify latent clusters in data. However, when it comes to Big Data, such as Landsat imagery, such model fitting is computationally prohibitive.

Authors:
Insha Ullah, Kerrie Mengersen

01-12-2019 | Survey paper | Issue 1/2019 Open Access

A survey on data storage and placement methodologies for Cloud-Big Data ecosystem

Currently, the data to be explored and exploited by computing systems increases at an exponential rate. The massive amount of data or so-called “Big Data” put pressure on existing technologies for providing scalable, fast and efficient support.

Authors:
Somnath Mazumdar, Daniel Seybold, Kyriakos Kritikos, Yiannis Verginadis

01-12-2019 | Methodology | Issue 1/2019 Open Access

Detecting high indoor crowd density with Wi-Fi localization: a statistical mechanics approach

We address the problem of detecting highly raised crowd density in situations such as indoor dance events. We propose a new method for estimating crowd density by anonymous, non-participatory, indoor Wi-Fi localization of smart phones. Using a …

Authors:
Sonja Georgievska, Philip Rutten, Jan Amoraal, Elena Ranguelova, Rena Bakhshi, Ben L. de Vries, Michael Lees, Sander Klous

01-12-2019 | Research | Issue 1/2019 Open Access

Big Data and discrimination: perils, promises and solutions. A systematic review

Big Data has been described as a “one-size-fits-all (so long as it’s triple XL) answer” [ 24 ] to solve some of the most challenging problems in the fields of climate change, healthcare, education and criminology. This may explain why it has become …

Authors:
Maddalena Favaretto, Eva De Clercq, Bernice Simone Elger

01-12-2019 | Research | Issue 1/2019 Open Access

Gapprox: using Gallup approach for approximation in Big Data processing

As Big Data processing often takes a long time and needs a lot of resources, sampling and approximate computing techniques may be used to generate a desired Quality of Result. On the other hand, due to not considering data variety, available …

Authors:
Hossein Ahmadvand, Maziar Goudarzi, Fouzhan Foroutan

01-12-2019 | Research | Issue 1/2019 Open Access

Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change

Big data analytics is gaining substantial attention due to its innovative contribution to decision making and strategic development across the healthcare field. Therefore, this study explored the adoption mechanism of big data analytics in …

Authors:
Muhammad Shahbaz, Changyuan Gao, LiLi Zhai, Fakhar Shahzad, Yanling Hu

01-12-2019 | Methodology | Issue 1/2019 Open Access

How to (better) find a perpetrator in a haystack

In many real-world contexts, there is a pressing need to automatically screen for potential perpetrators, such as school shooters, whose prevalence in the population is extremely low. We first explain one possible obstacle in addressing this …

Authors:
Yair Neuman, Yochai Cohen, Yiftach Neuman

01-12-2019 | Research | Issue 1/2019 Open Access

HPCC based framework for COPD readmission risk analysis

Prevention of hospital readmissions has the potential of providing better quality of care to the patients and deliver significant cost savings. A review of existing readmission analysis frameworks based on data type, data size, disease conditions …

Authors:
Piyush Jain, Ankur Agarwal, Ravi Behara, Christopher Baechle

01-12-2019 | Research | Issue 1/2019 Open Access

Arabia Felix 2.0: a cross-linguistic Twitter analysis of happiness patterns in the United Arab Emirates

The global popularity of social media platforms has given rise to unprecedented amounts of data, much of which reflects the thoughts, opinions and affective states of individual users. Systematic explorations of these large datasets can yield …

Authors:
Aamna Al Shehhi, Justin Thomas, Roy Welsch, Ian Grey, Zeyar Aung

01-12-2019 | Research | Issue 1/2019 Open Access

Tree stream mining algorithm with Chernoff-bound and standard deviation approach for big data stream

We propose a Chernoff-bound approach and examine standard deviation value to enhance the accuracy of the existing fast incremental model tree with the drift detection (FIMT-DD) algorithm. It is a data stream mining algorithm that can observe and …

Authors:
Ari Wibisono, Devvi Sarwinda, Petrus Mursanto

01-12-2019 | Research | Issue 1/2019 Open Access

Hierarchical data fusion for Smart Healthcare

The Internet of Things (IoT) facilitates creation of smart spaces by converting existing environments into sensor-rich data-centric cyber-physical systems with an increasing degree of automation, giving rise to Industry 4.0. When adopted in …

Authors:
Rustem Dautov, Salvatore Distefano, Rajkumaar Buyya

01-12-2019 | Short report | Issue 1/2019 Open Access

The intrinsically linked future for human and Artificial Intelligence interaction

No sleep! No sick days! No Holidays! alongside 24/7 around the clock tireless work, welcome to the world of Artificial Intelligence, how can humans match the phenomena of AI. Humanity is in the grip of an unstoppable, and exciting future with the …

Author:
Anthony Miller

01-12-2019 | Research | Issue 1/2019 Open Access

Enhanced Secured Map Reduce layer for Big Data privacy and security

The publication and dissemination of raw data are crucial elements in commercial, academic, and medical applications. With an increasing number of open platforms, such as social networks and mobile devices from which data may be collected, the …

Authors:
Priyank Jain, Manasi Gyanchandani, Nilay Khare

01-12-2019 | Case Study | Issue 1/2019 Open Access

Data mining combined to the multicriteria decision analysis for the improvement of road safety: case of France

Data mining “DM”, as a part of the general KDD “Knowledge Discovery in Databases” process [ 1 ] (see Fig. 2 ), is an attractive set of methods and techniques that has known a big popularity in recent years in various fields such as the fields of …

Authors:
Fatima Zahra El Mazouri, Mohammed Chaouki Abounaima, Khalid Zenkouar

01-12-2019 | Survey Paper | Issue 1/2019 Open Access

Knowledge discovery from a more than a decade studies on healthcare Big Data systems: a scientometrics study

Annually, lots of research papers are published in scientific journals around the world. The knowledge of the status of research is a prerequisite for research planning and policy making. This type of knowledge could be gained through a …

Authors:
Fatemeh Soleimani-Roozbahani, Ali Rajabzadeh Ghatari, Reza Radfar

01-12-2019 | Research | Issue 1/2019 Open Access

Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities

The widespread growth of Big Data and the evolution of Internet of Things (IoT) technologies enable cities to obtain valuable intelligence from a large amount of real-time produced data. In a Smart City, various IoT devices generate streams of …

Authors:
Hamid Nasiri, Saeed Nasehi, Maziar Goudarzi

01-12-2019 | Research | Issue 1/2019 Open Access

Exploring and cleaning big data with random sample data blocks

Data scientists need scalable methods to explore and clean big data before applying advanced data analysis and mining algorithms. In this paper, we propose the RSP-Explore method to enable data scientists to iteratively explore big data on small …

Authors:
Salman Salloum, Joshua Zhexue Huang, Yulin He

01-12-2019 | Methodology | Issue 1/2019 Open Access

Application of variable selection and dimension reduction on predictors of MSE’s development

Nature create variables using its character component, and variables are sharing characters from a vary small to relatively large scale. This results, variables to have from a vary different to a more similar character, and leads to have a …

Author:
Habtamu Tilaye Wubetie

01-12-2019 | Research | Issue 1/2019 Open Access

The effects of class rarity on the evaluation of supervised healthcare fraud detection models

The United States healthcare system produces an enormous volume of data with a vast number of financial transactions generated by physicians administering healthcare services. This makes healthcare fraud difficult to detect, especially when there …

Authors:
Matthew Herland, Richard A. Bauder, Taghi M. Khoshgoftaar

01-12-2019 | Survey paper | Issue 1/2019 Open Access

Survey on deep learning with class imbalance

The purpose of this study is to examine existing deep learning techniques for addressing class imbalanced data. Effective classification with imbalanced data is an important area of research, as high class imbalance is naturally inherent in many …

Authors:
Justin M. Johnson, Taghi M. Khoshgoftaar

01-12-2019 | Research | Issue 1/2019 Open Access

Oscillation of tweet sentiments in the election of João Doria Jr. for Mayor

The purpose of this work is to identify and analyze the oscillation of sentiments expressed by users of the Twitter social media through their direct replies to posts by user @jdoriajr that took place before, during and after the elections for …

Author:
Rubens Mussi Cury

01-12-2019 | Survey paper | Issue 1/2019 Open Access

Big data in healthcare: management, analysis and future prospects

‘Big data’ is massive amounts of information that can work wonders. It has become a topic of special interest for the past two decades because of a great potential that is hidden in it. Various public and private sector industries generate, store …

Authors:
Sabyasachi Dash, Sushil Kumar Shakyawar, Mohit Sharma, Sandeep Kaushik

01-12-2019 | Research | Issue 1/2019 Open Access

Scalable architecture for Big Data financial analytics: user-defined functions vs. SQL

Large financial organizations have hundreds of millions of financial contracts on their balance sheets. Moreover, highly volatile financial markets and heterogeneous data sets within and across banks world-wide make near real-time financial …

Authors:
Kurt Stockinger, Nils Bundi, Jonas Heitz, Wolfgang Breymann

01-12-2019 | Survey paper | Issue 1/2019 Open Access

A survey on Image Data Augmentation for Deep Learning

Deep convolutional neural networks have performed remarkably well on many Computer Vision tasks. However, these networks are heavily reliant on big data to avoid overfitting. Overfitting refers to the phenomenon when a network learns a function …

Authors:
Connor Shorten, Taghi M. Khoshgoftaar

01-12-2019 | Research | Issue 1/2019 Open Access

Library adoption in public software repositories

We study the the spread and adoption of libraries within Python projects hosted in public software repositories on GitHub. By modelling the use of Git pull, merge, commit, and other actions as deliberate cognitive activities, we are able to better …

Authors:
Rachel Krohn, Tim Weninger

01-12-2019 | Research | Issue 1/2019 Open Access

An intelligent Alzheimer’s disease diagnosis method using unsupervised feature learning

Today, the diagnosis of Alzheimer’s disease (AD) or mild cognitive impairment (MCI) has attracted the attention of researchers in this field owing to the increase in the occurrence of the diseases and the need for early diagnosis. Unfortunately …

Authors:
Firouzeh Razavi, Mohammad Jafar Tarokh, Mahmood Alborzi

01-12-2019 | Survey paper | Issue 1/2019 Open Access

Uncertainty in big data analytics: survey, opportunities, and challenges

Big data analytics has gained wide attention from both academia and industry as the demand for understanding trends in massive datasets increases. Recent developments in sensor networks, cyber-physical systems, and the ubiquity of the Internet of …

Authors:
Reihaneh H. Hariri, Erik M. Fredericks, Kate M. Bowers

01-12-2019 | Research | Issue 1/2019 Open Access

On combining Big Data and machine learning to support eco-driving behaviours

A conscious use of the battery is one of the key elements to consider while driving an electric vehicle. Hence, supporting the drivers, with information about it, can be strategic in letting them drive in a better way, with the purpose of …

Authors:
Giovanni Delnevo, Pietro Di Lena, Silvia Mirri, Catia Prandi, Paola Salomoni

01-12-2019 | Case study | Issue 1/2019 Open Access

Exploring crime patterns in Mexico City

With its more than 20 million citizens Mexico City is considered one of the largest cities in the world in terms of population and density. This city is divided in 16 boroughs which enjoy a certain degree of political autonomy from the city …

Authors:
C. A. Piña-García, Leticia Ramírez-Ramírez

01-12-2019 | Research | Issue 1/2019 Open Access

Cyber risk prediction through social media big data analytics and statistical machine learning

As a natural outcome of achieving equilibrium, digital economic progress will most likely be subject to increased cyber risks. Therefore, the purpose of this study is to present an algorithmic model that utilizes social media big data analytics …

Authors:
Athor Subroto, Andri Apriyana

01-12-2019 | Research | Issue 1/2019 Open Access

Customer churn prediction in telecom using machine learning in big data platform

Customer churn is a major problem and one of the most important concerns for large companies. Due to the direct effect on the revenues of the companies, especially in the telecom field, companies are seeking to develop means to predict potential …

Authors:
Abdelrahim Kasem Ahmad, Assef Jafar, Kadan Aljoumaa

01-12-2019 | Research | Issue 1/2019 Open Access

Reality mining and predictive analytics for building smart applications

Big data is poised to cover everything from business and sciences to healthcare, agriculture, education, economics, and government. This explosively big quantity of data generated makes our time the data age. The question is: What is the interest …

Authors:
Hiba Asri, Hajar Mousannif, Hassan Al Moatassime

01-12-2019 | Research | Issue 1/2019 Open Access

The anatomy of the data-driven smart sustainable city: instrumentation, datafication, computerization and related applications

We are moving into an era where instrumentation, datafication, and computerization are routinely pervading the very fabric of cities, coupled with the interlinking, integration, and coordination of their systems and domains. As a result, vast …

Author:
Simon Elias Bibri

01-12-2019 | Research | Issue 1/2019 Open Access

Predicting referendum results in the Big Data Era

In addressing the challenge of Big Data Analytics, what has been of notable significance is the analysis of online search traffic data in order to analyze and predict human behavior. Over the last decade, since the establishment of the most …

Authors:
Amaryllis Mavragani, Konstantinos P. Tsagarakis

01-12-2019 | Methodology | Issue 1/2019 Open Access

Adaptive network diagram constructions for representing big data event streams on monitoring dashboards

Critical systems that produce big data streams can require human operators to monitor these event streams for changes of interest. Automated systems which oversee many tasks can still have a need for the ‘human-in-the-loop’ operator to evaluate …

Authors:
Alexander V. Mantzaris, Thomas G. Walker, Cameron E. Taylor, Dustin Ehling

01-12-2019 | Methodology | Issue 1/2019 Open Access

Verifying big data topologies by-design: a semi-automated approach

Big data architectures have been gaining momentum in recent years. For instance, Twitter uses stream processing frameworks like Apache Storm to analyse billions of tweets per minute and learn the trending topics. However, architectures that …

Authors:
Marcello M. Bersani, Francesco Marconi, Damian A. Tamburri, Andrea Nodari, Pooyan Jamshidi

01-12-2019 | Research | Issue 1/2019 Open Access

GNSS-based navigation systems of autonomous drone for delivering items

This paper presents our research on the development of navigation systems of autonomous drone for delivering items that uses a GNSS (Global Navigation Satellite System) and a compass as the main tools in drone. The grand purpose of our research is …

Authors:
Aurello Patrik, Gaudi Utama, Alexander Agung Santoso Gunawan, Andry Chowanda, Jarot S. Suroso, Rizatus Shofiyanti, Widodo Budiharto

01-12-2019 | Research | Issue 1/2019 Open Access

Medicare fraud detection using neural networks

Access to affordable healthcare is a nationwide concern that impacts a large majority of the United States population. Medicare is a Federal Government healthcare program that provides affordable health insurance to the elderly population and …

Authors:
Justin M. Johnson, Taghi M. Khoshgoftaar

01-12-2019 | Survey paper | Issue 1/2019 Open Access

On the sustainability of smart and smarter cities in the era of big data: an interdisciplinary and transdisciplinary literature review

There has recently been a conscious push for cities across the globe to be smart and even smarter and thus more sustainable by developing and implementing big data technologies and their applications across various urban domains in the hopes of …

Author:
Simon Elias Bibri

01-12-2019 | Survey paper | Issue 1/2019 Open Access

Manufacturing process data analysis pipelines: a requirements analysis and survey

Smart manufacturing is strongly correlated with the digitization of all manufacturing activities. This increases the amount of data available to drive productivity and profit through data-driven decision making programs. The goal of this article …

Authors:
Ahmed Ismail, Hong-Linh Truong, Wolfgang Kastner

01-12-2019 | Research | Issue 1/2019 Open Access

Evaluating partitioning and bucketing strategies for Hive-based Big Data Warehousing systems

Hive has long been one of the industry-leading systems for Data Warehousing in Big Data contexts, mainly organizing data into databases, tables, partitions and buckets, stored on top of an unstructured distributed file system like HDFS. Some …

Authors:
Eduarda Costa, Carlos Costa, Maribel Yasmina Santos

01-12-2019 | Research | Issue 1/2019 Open Access

Analysis of diabetes mellitus for early prediction using optimal features selection

Diabetes is a chronic disease or group of metabolic disease where a person suffers from an extended level of blood glucose in the body, which is either the insulin production is inadequate, or because the body’s cells do not respond properly to …

Authors:
N. Sneha, Tarun Gangil

01-12-2019 | Research | Issue 1/2019 Open Access

Large-scale e-learning recommender system based on Spark and Hadoop

The present work is a part of the ESTenLigne project which is the result of several years of experience for developing e-learning in Sidi Mohamed Ben Abdellah University through the implementation of open, online and adaptive learning environment.

Authors:
Karim Dahdouh, Ahmed Dakkak, Lahcen Oughdir, Abdelali Ibriz

01-12-2019 | Research | Issue 1/2019 Open Access

Predicting customer’s gender and age depending on mobile phone data

In the age of data driven solution, the customer demographic attributes, such as gender and age, play a core role that may enable companies to enhance the offers of their services and target the right customer in the right time and place. In the …

Authors:
Ibrahim Mousa Al-Zuabi, Assef Jafar, Kadan Aljoumaa

01-12-2019 | Methodology | Issue 1/2019 Open Access

Diftong: a tool for validating big data workflows

Data validation is about verifying the correctness of data. When organisations update and refine their data transformations to meet evolving requirements, it is imperative to ensure that the new version of a workflow still produces the correct …

Authors:
Raya Rizk, Steve McKeever, Johan Petrini, Erik Zeitler

01-12-2019 | Research | Issue 1/2019 Open Access

Selecting a representative decision tree from an ensemble of decision-tree models for fast big data classification

The goal of this paper is to reduce the classification (inference) complexity of tree ensembles by choosing a single representative model out of ensemble of multiple decision-tree models. We compute the similarity between different models in the …

Authors:
Abraham Itzhak Weinberg, Mark Last

01-12-2019 | Research | Issue 1/2019 Open Access

Uncovering complex overlapping pattern of communities in large-scale social networks

The conventional notion of community that favors a high ratio of internal edges to outbound edges becomes invalid when each vertex participates in multiple communities. Such a behavior is commonplace in social networks. The significant overlaps …

Authors:
Elvis H.W. Xu, Pak Ming Hui

01-12-2019 | Research | Issue 1/2019 Open Access

Impact of network density on cascade size and community growth

This paper addresses two critical questions related to (1) the co-evolutionary dynamics between information diffusion and network topology and (2) the relationship between viral content and social reinforcement. A recurrence relation model is …

Author:
Kazumasa Oida

01-12-2019 | Research | Issue 1/2019 Open Access

On the perturbation of self-organized urban street networks

We investigate urban street networks as a whole within the frameworks of information physics and statistical physics. Urban street networks are envisaged as evolving social systems subject to a Boltzmann-mesoscopic entropy conservation. For …

Authors:
Jérôme G. M. Benoit, Saif Eddin G. Jabari

01-12-2019 | Research | Issue 1/2019 Open Access

Network-theoretic information extraction quality assessment in the human trafficking domain

Information extraction (IE) is an important problem in Natural Language Processing (NLP) and Web Mining communities. Recently, IE has been applied to online sex advertisements with the goal of powering search and analytics systems that can help …

Authors:
Mayank Kejriwal, Rahul Kapoor

01-12-2019 | Research | Issue 1/2019 Open Access

Small sample-based disease diagnosis model acquisition in medical human-centered computing

With the development of wireless communications and networks, HCC (human-centred computing) has attracted considerable attention in recent years throughout the medical field. HCC can provide an effective integration of various medical auxiliary …

Authors:
Xueqing Jia, Tao Luo, Sheng Ren, Kehua Guo, Fangfang Li

01-12-2019 | Research | Issue 1/2019 Open Access

Big data analysis and distributed deep learning for next-generation intrusion detection system optimization

With the growing use of information technology in all life domains, hacking has become more negatively effective than ever before. Also with developing technologies, attacks numbers are growing exponentially every few months and become more …

Authors:
Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki

01-12-2019 | Research | Issue 1/2019 Open Access

Development of a predictive model for on-time arrival flight of airliner by discovering correlation between flight and weather data

An important business of airlines is to get customer satisfaction. Due to bad weather, a mechanical reason, and the late arrival of the aircraft to the point of departure, flights delay and lead to customer dissatisfaction. A predictive model of …

Author:
Noriko Etani

01-12-2019 | Methodology | Issue 1/2019 Open Access

Traffic flow estimation with data from a video surveillance camera

This study addresses the problem of traffic flow estimation based on the data from a video surveillance camera. Target problem here is formulated as counting and classifying vehicles by their driving direction. This subject area is in early …

Authors:
Aleksandr Fedorov, Kseniia Nikolskaia, Sergey Ivanov, Vladimir Shepelev, Alexey Minbaleev

01-12-2019 | Research | Issue 1/2019 Open Access

Cluster tree topology construction method based on PSO algorithm to prolong the lifetime of ZigBee wireless sensor networks

For wireless sensor networks (WSNs) based on ZigBee technology, the network topology plays an important role for improving the energy efficiency and the network lifetime. An appropriate construction method of network topology should be designed …

Authors:
Yang Yu, Bo Xue, Zhuyang Chen, Zhiwen Qian

01-12-2019 | Research | Issue 1/2019 Open Access

Is bigger always better? A controversial journey to the center of machine learning design, with uses and misuses of big data for predicting water meter failures

In this paper, we describe the design of a machine learning-based classifier, tailored to predict whether a water meter will fail or need a replacement. Our initial attempt to train a recurrent deep neural network (RNN), based on the use of 15 …

Authors:
Marco Roccetti, Giovanni Delnevo, Luca Casini, Giuseppe Cappiello

01-12-2019 | Research | Issue 1/2019 Open Access

Evaluation of maxout activations in deep learning across several big data domains

This study investigates the effectiveness of multiple maxout activation function variants on 18 datasets using Convolutional Neural Networks. A network with maxout activation has a higher number of trainable parameters compared to networks with …

Authors:
Gabriel Castaneda, Paul Morris, Taghi M. Khoshgoftaar

01-12-2019 | Research | Issue 1/2019 Open Access

Big data analytics: a link between knowledge management capabilities and superior cyber protection

As cybersecurity threats increase in frequency and sophistication, organizations are realizing that one of their strongest resources to combat cyberattacks lies in the growing volume of data at their disposal. However, traditional knowledge …

Author:
Peter Oluseyi Obitade

01-12-2019 | Original Article | Issue 1/2019

Building a soft skill taxonomy from job openings

Soft skills are crucial for candidates in the job market, and analyzing these skills listed in job ads can help in identifying the most important soft skills required by recruiters. This analysis can benefit from building a taxonomy to extract …

Authors:
Imane Khaouja, Ghita Mezzour, Kathleen M. Carley, Ismail Kassou

01-12-2019 | Research | Issue 1/2019 Open Access

A data-driven method to detect and localize the single-phase grounding fault in distribution network based on synchronized phasor measurement

The single-phase grounding fault of power systems is influenced by a variety of factors, resulting from the developing sizes and increasing complexity of power systems. In order to take advantage of big data in power systems, we propose a revised …

Authors:
Bo Wang, Hongxia Wang, Liming Zhang, Danlei Zhu, Dongxu Lin, Shaohua Wan

01-12-2019 | Original Article | Issue 1/2019

Can we analyse political discourse using Twitter? Evidence from Spanish 2019 presidential election

Social networking service provider such as Twitter has become very popular communication tools for Internet and Mobile users. Our paper aims at participating into the topical debate if a tweet can shed light on future elections. After listening …

Author:
Didier Grimaldi

01-12-2019 | Research | Issue 1/2019 Open Access

Multi-dimensional geospatial data mining in a distributed environment using MapReduce

Data mining and machine learning techniques for processing raster data consider a single spectral band of data at a time. The individual results are combined to obtain the final output. The essence of related multi-spectral information is lost …

Authors:
Mazin Alkathiri, Abdul Jhummarwala, M. B. Potdar

01-12-2019 | Research | Issue 1/2019 Open Access

Local privacy protection classification based on human-centric computing

Human-centric computing is becoming an important part of data-driven artificial intelligence (AI) and the importance of data mining under Human-centric computing is getting more and more attention. The rapid development of machine learning has …

Authors:
Chunyong Yin, Biao Zhou, Zhichao Yin, Jin Wang

01-12-2019 | Original Article | Issue 1/2019

Influence maximization in graph-based OLAP (GOLAP)

The notion of influence among people or organizations has been the core conceptual basis for making various decisions. With the increasing availability of datasets in various domains such as social networks and digital healthcare, it becomes more …

Authors:
Jenny Jin, Guigang Zhang, Phillip Sheu, Masahiro Hayakawa, Atsushi Kitazawa

01-12-2019 | Survey Paper | Issue 1/2019 Open Access

A survey on driving behavior analysis in usage based insurance using big data

The emergence and growth of connected technologies and the adaptation of big data are changing the face of all industries. In the insurance industry, Usage-Based Insurance (UBI) is the most popular use case of big data adaptation. Initially UBI is …

Authors:
Subramanian Arumugam, R. Bhargavi

01-11-2019 | Schwerpunkt | Issue 11/2019

Die Entwicklung und Umsetzung von IT-Sicherheitsstandards als sozialer Aushandlungsprozess

Angesichts der ständigen Weiterentwicklung technischer Systeme in Unternehmen müssen IT-Sicherheitsmaßnahmen immer wieder angepasst werden. Dabei sind IT-Sicherheitsstandards nützliche Richtlinien, die ausreichende Sicherheit nach dem aktuellen …

Authors:
Alexander Helm, Laura Kocksch, Alexander May, Estrid Sørensen

01-11-2019 | Schwerpunkt | Issue 11/2019

Autorschaftsanalyse

Verstellungsstrategien und Möglichkeiten der automatisierten Erkennung

Der Austausch von Informationen findet zunehmend über soziale Medien und Online-Nachrichtendienste statt. Daraus kann ein hohes Schadenspotential erwachsen, wenn es gelingt, für kriminelle Absichten eine andere Identität vorzutäuschen oder im …

Authors:
Benedikt Bönninghoff, Steffen Hessler, Dorothea Kolossa, Kerstin Kucharczik, Robert M. Nickel, Karin Pittner

15-10-2019 | Original Paper Open Access

Are You on My Wavelength? Interpersonal Coordination in Dyadic Conversations

Conversation between two people involves subtle nonverbal coordination in addition to speech. However, the precise parameters and timing of this coordination remain unclear, which limits our ability to theorize about the neural and cognitive …

Authors:
Joanna Hale, Jamie A. Ward, Francesco Buccheri, Dominic Oliver, Antonia F. de C. Hamilton

15-10-2019 | Original Paper

New visions for future cruise ship vessels

Modern cruise ships are designed to magnifying their hospitality on-board, independently from the route followed. The present knowledge of electronic, demotic and mechatronic, applied to the naval constructive art, will open future scenarios and …

Authors:
Massimo Musio-Sale, Mario Ivan Zignego

14-10-2019

Lessons from three decades of IT productivity research: towards a better understanding of IT-induced productivity effects

New developments in the fields of artificial intelligence or robotics are receiving considerable attention from businesses, as they promise astonishing gains in process efficiency—sparking a surge of corporate investments in new, digital …

Authors:
Stefan Schweikl, Robert Obermaier

14-10-2019 | Special Issue Paper

Even big data is not enough: need for a novel reference modelling for forensic document authentication

With the emergence of big data, deep learning (DL) approaches are becoming quite popular in many branches of science. Forensic science is no longer an exception. However, there are certain problems in forensic science where the solutions would …

Authors:
Utpal Garain, Biswajit Halder

12-10-2019

Texture branch network for chronic kidney disease screening based on ultrasound images

Chronic kidney disease (CKD) is a widespread renal disease throughout the world. Once it develops to the advanced stage, serious complications and high risk of death will follow. Hence, early screening is crucial for the treatment of CKD. Since …

Authors:
Peng-yi Hao, Zhen-yu Xu, Shu-yuan Tian, Fu-li Wu, Wei Chen, Jian Wu, Xiao-nan Luo

12-10-2019 | Conceptual/Theoretical Paper

Emerging technologies and analytics for a new era of value-centered marketing in healthcare

The healthcare system is undergoing a fundamental transformation fueled by regulatory shifts that reward value over volume, coupled with unprecedented advances in technological capabilities. To address the processes involved in defining …

Authors:
Ritu Agarwal, Michelle Dugas, Guodong (Gordon) Gao, P. K. Kannan

12-10-2019

Towards High Fidelity Face Frontalization in the Wild

Face frontalization refers to the process of synthesizing the frontal view of a face from a given profile. Due to self-occlusion and appearance distortion in the wild, it is extremely challenging to recover faithful high-resolution results …

Authors:
Jie Cao, Yibo Hu, Hongwen Zhang, Ran He, Zhenan Sun

12-10-2019

A predictive model for the identification of learning styles in MOOC environments

Massive online open course (MOOC) platform generates a large amount of data, which provides many opportunities for studying the behaviors of learners. In parallel, recent advancements in machine learning techniques and big data analysis have …

Authors:
Brahim Hmedna, Ali El Mezouary, Omar Baz

11-10-2019 | Regular Paper

Parsing gigabytes of JSON per second

JavaScript Object Notation or JSON is a ubiquitous data exchange format on the web. Ingesting JSON documents can become a performance bottleneck due to the sheer volume of data. We are thus motivated to make JSON parsing as fast as possible.

Authors:
Geoff Langdale, Daniel Lemire

11-10-2019 | Open Forum

“Intelligent” finance and treasury management: what we can expect

Artificial intelligence poses a particular challenge in its application to finance/treasury management because most treasury functions are no longer physical processes, but rather virtual processes that are increasingly highly automated. Most …

Authors:
Petr Polak, Christof Nelischer, Haochen Guo, David C. Robertson

11-10-2019 | Commentary Open Access

Ethics of AI and Cybersecurity When Sovereignty is at Stake

Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and …

Author:
Paul Timmers

11-10-2019 | Original Research Paper

Bias regularization in neural network models for general insurance pricing

Generalized linear models have the important property of providing unbiased estimates on a portfolio level. This implies that generalized linear models manage to provide accurate prices on a portfolio level. On the other hand, neural networks may …

Author:
Mario V. Wüthrich

11-10-2019 | Conceptual/Theoretical Paper Open Access

The future of in-store technology

This paper introduces a conceptual framework for understanding new and futuristic in-store technology infusions. First, we develop a 2 × 2 typology of different innovative and futuristic technologies focusing on their level of convenience and …

Authors:
Dhruv Grewal, Stephanie M. Noble, Anne L. Roggeveen, Jens Nordfalt

10-10-2019 | Original Paper

Digitalization, innovative work behavior and extended availability

Digitalization has tremendous positive, but also negative potential for the organization and individual employees. The basic question therefore is how to design a digitalized environment that fosters idea generation and development and ensures …

Authors:
Elisabeth Nöhammer, Stefan Stichlberger

10-10-2019 | Conceptual/Theoretical Paper Open Access

How artificial intelligence will change the future of marketing

In the future, artificial intelligence (AI) is likely to substantially change both marketing strategies and customer behaviors. Building from not only extant research but also extensive interactions with practice, the authors propose a …

Authors:
Thomas Davenport, Abhijit Guha, Dhruv Grewal, Timna Bressgott

10-10-2019 | Technical Article

Data Infrastructure Elements in Support of Accelerated Materials Innovation: ELA, PyMKS, and MATIN

Materials data management, analytics, and e-collaborations have been identified as three of the main technological gaps currently hindering the realization of the accelerated development and deployment of advanced materials targeted by the federal …

Authors:
Surya R. Kalidindi, Ali Khosravani, Berkay Yucel, Apaar Shanker, Aleksandr L. Blekh

09-10-2019 | Originalbeitrag

Wachstumsverhalten der Beifußblättrigen Ambrosie (Ambrosia artemisiifolia L.) auf landwirtschaftlichen Nutzflächen Brandenburgs – Schlussfolgerungen für die Bildverarbeitung kameragestützter Monitoring-Strategien

Eine Voraussetzung für die Verhinderung der weiteren Ausbreitung des invasiven Neophyten Beifußblättrige Ambrosie (Ambrosia artemisiifolia L.) aus Nordamerika ist ein effektives Monitoring zum Auffinden von Nestern und Einzelpflanzen in den …

Authors:
Karl-Heinz Dammer, Joachim Intreß, Michael Schirrmann, Andreas Garz

09-10-2019 | Focus

Adaptive wavelet transform model for time series data prediction

With the development of cloud computing and big data, stock prediction has become a hot topic of research. In the stock market, the daily trading activities of stocks are carried out at different frequencies and cycles, resulting in a …

Authors:
Xin Liu, Hui Liu, Qiang Guo, Caiming Zhang

09-10-2019 | Article Open Access

Application-Oriented Succinct Data Structures for Big Data

A data structure is called succinct if its asymptotical space requirement matches the original data size. The development of succinct data structures is an important factor to deal with the explosively increasing big data. Moreover, wider …

Author:
Tetsuo Shibuya

09-10-2019

Annotation guided collection of context-sensitive parallel execution profiles

Studying the relative behavior of an application’s threads is critical to identifying performance bottlenecks and understanding their root causes. We present context-sensitive parallel (CSP) execution profiles, that capture the relative behavior …

Authors:
Zachary Benavides, Keval Vora, Rajiv Gupta, Xiangyu Zhang

09-10-2019

Recent Developments at the CMA: 2018–2019

We discuss three important cases that the Competition and Markets Authority (CMA) has completed over the past year: The first two cases—the Experian/ClearScore merger and the Hotel Online Booking enforcement case—demonstrate our recent work on …

Authors:
San Sau Fung, Jenny Haydock, Alex Moore, James Rutt, Robert Ryan, Mike Walker, Ian Windle

08-10-2019 | Research Article

An Integrated MCI Detection Framework Based on Spectral-temporal Analysis

Aiming to differentiate between mild cognitive impairment (MCI) patients and elderly control subjects, this study proposes an integrated framework based on spectral-temporal analysis for the automatic analysis of resting-state electroencephalogram …

Authors:
Jiao Yin, Jinli Cao, Siuly Siuly, Hua Wang

08-10-2019

Real-time machining data application and service based on IMT digital twin

With the development of manufacturing, machining data applications are becoming a key technological component of enhancing the intelligence of manufacturing. The new generation of machine tools should be digitalized, highly efficient …

Authors:
Xin Tong, Qiang Liu, Shiwei Pi, Yao Xiao

08-10-2019

A utility based approach for data stream anonymization

Data streams are good models to characterize dynamic, on-line, fast and high-volume data requirements of today’s businesses. However, sensitivity of data is usually an obstacle for deployment of many data streams applications. To address this …

Authors:
Ugur Sopaoglu, Osman Abul

08-10-2019 | Focus

Exploration of social media for sentiment analysis using deep learning

With the rapid growth of web content from social media, such studies as online opinion mining or sentiment analysis of text have started receiving attention from government, industry, and academic sectors. In recent years, sentiment analysis has …

Authors:
Liang-Chu Chen, Chia-Meng Lee, Mu-Yen Chen

07-10-2019 | Interview

“I Break in Order to Reveal”. Fran Morente Interview with Gary T. Marx

This e-mail interview was carried out in late 2018 . Shortly after finishing my doctoral work I reviewed Professor Gary T. Marx’s Windows into the Soul for the Spanish journal RIPS - Revista de Investigaciones Politicas y Sociologicas (Morente …

Authors:
Fran Morente, Gary T. Marx

05-10-2019 | Research Article

What drives the governance of ridesharing? A fuzzy-set QCA of local regulations in China

Ridesharing or ride-hailing services have received substantial attention from scholars and practitioners around the world, and it has become an urgent issue for the government to find solutions to mitigate their negative externalities and to …

Authors:
Yanwei Li, Liang Ma

04-10-2019 | Special Issue

Frequency offset estimation based on a combination of FFT and CZT for DP-QDB coherent receiver

A new frequency-offset-estimation (FOE) method for dual-polarized quadrature duobinary modulation (DP-QDB), which is based on a combination of fast Fourier transform (FFT) and chirp z transform (CZT), is proposed. This method is investigated at …

Authors:
Chun Chang, Maonan Wang, Zhengguang Xu, Tiezhou Wu

04-10-2019 | Construction Management

Analyzing the Key Drivers of Contractors’ Temporary Competitive Advantage in the Competition of International High-speed Rail Projects

After temporary competitive advantage (TCA) being proposed, this concept has received a lot of attention from academia and industry. For international HSR contractors, how to form their TCA and win out over the competition for new projects is …

Authors:
Qianwen Zhou, Xiaopeng Deng, Ruoyu Jin, Tengyuan Chang

03-10-2019

Insights into relevant knowledge extraction techniques: a comprehensive review

More than 50 million journal papers will have been published by the end of 2019 with 2 million more journal papers published every year. The number of conference papers is even higher, and millions of other types of scientific research are added …

Authors:
Abdul Shahid, Muhammad Tanvir Afzal, Moloud Abdar, Mohammad Ehsan Basiri, Xujuan Zhou, Neil Y. Yen, Jia-Wei Chang

03-10-2019 | Special Issue Paper

The network effects of NGOs on social capital and innovation among smallholder farmers: a case study in Peru

The impact of non-government organizations (NGOs) on the local development of rural areas has rarely been explored empirically. Here, we employ methods from network science to evaluate the impact of an NGO’s activities on the social capital and …

Authors:
Dominik Hartmann, Atilio Arata, Mayra Bezerra, Flavio L. Pinheiro

03-10-2019 | Special Issue

Visual topic models for healthcare data clustering

Social media is a great source to search health-related topics for envisages solutions towards healthcare. Topic models originated from Natural Language Processing that is receiving much attention in healthcare areas because of interpretability …

Authors:
K. Rajendra Prasad, Moulana Mohammed, R. M. Noorullah

03-10-2019

Exploring next generation of IOT devices compatible few mode assisting ring core elliptical cladding optical fiber

In this paper, the design method of few mode elliptical ring core fiber (E-RCF) supporting up to 10 spatial linearly polarized (LP) modes is proposed. With the support of central circular hole, the maximum numbers of modes are generated using …

Authors:
D. Vigneswaran, M. S. Mani Rajan, Bipul Biswas, Kawsar Ahmed

03-10-2019 | Issue 10/2019

Improved trajectory similarity-based approach for turbofan engine prognostics

Trajectory similarity-based prediction (TSBP) is an emerging real-time remaining useful life (RUL) prediction method that has drawn considerable attention in the field of data-driven prognostics. TSBP is fast, and the corresponding model is easy …

Authors:
Cheng-Geng Huang, Hong-Zhong Huang, Weiwen Peng, Tudi Huang

02-10-2019 | Computational Models for 'Complex' Materials and Structures, beyond the Finite Elements

Structural damage detection using convolutional neural networks combining strain energy and dynamic response

Based on the classification ability of a convolutional neural network (CNN), this paper proposes a structural damage detection method in which a CNN is used to classify the location and level of damage in a structure. The dynamic responses are …

Authors:
Shuai Teng, Gongfa Chen, Panpan Gong, Gen Liu, Fangsen Cui

02-10-2019

SIEVE: Helping developers sift wheat from chaff via cross-platform analysis

Software developers have benefited from various sources of knowledge such as forums, question-and-answer sites, and social media platforms to help them in various tasks. Extracting software-related knowledge from different platforms involves many …

Authors:
Agus Sulistya, Gede Artha Azriadi Prana, Abhishek Sharma, David Lo, Christoph Treude

01-10-2019 | Wissen - Artificial Intelligence | Issue 4/2019

Wie KI unsere Gesellschaft verändert: Worauf es jetzt ankommt

Social Impacts & the Future
Authors:
Jörg Doebler, Markus Dohm, Igor Ilunin, Michaela Tiedemann

01-10-2019 | Wissen - Artificial Intelligence | Issue 4/2019

Instrumente der Zukunft: Software-Robotergesteuerte Prozessautomatisierung und Künstliche Intelligenz als wichtige Wettbewerbsfaktoren

Use Cases
Authors:
Markus Mayer, Holger Hornik, Britta Hilt, Georg Rätker, Karlheinz Blank, Alexander Eser, Matthias Koeplin, Xavier Guerin

01-10-2019 | Wissen - Artificial Intelligence | Issue 4/2019

Künstliche Intelligenz: Lernen und lernen lassen

AI-Grundlagen einfach erklärt
Authors:
Dr. Thomas Franz, Franz Kögl, Jürgen Wirtgen, Dr. Wolfgang Thronicke

01-10-2019 | Wissen - Artificial Intelligence | Issue 4/2019

Blackbox AI — State Regulation or Corporate Responsibility?

Authors:
Christopher Koska, Alexander Filipović

01-10-2019 | Kurz kommentiert | Issue 10/2019

Klimaschutzgesetz ist nötig

Authors:
Claudia Kemfert, Ulrike Neyer, Britta Kuhn, Stefan Greß

01-10-2019 | Issue 5/2019

Mining Typical Treatment Duration Patterns for Rational Drug Use from Electronic Medical Records

Rational drug use requires that patients receive medications for an adequate period of time. The adequate duration time of medications not only improve the therapeutic effect of medicines, but also reduce the side effects and adverse reactions of …

Authors:
Jingfeng Chen, Chonghui Guo, Leilei Sun, Menglin Lu

01-10-2019 | Betriebspraxis & Führung | Issue 10/2019

Intelligentere Datenanalysen durch KI

Unternehmen verfügen heute über riesige Datenpools, die immer weiter wachsen. Aktualität und Automatisierung sind die wichtigsten Punkte für ein effizientes Datenmanagement. Wie KI den Vertrieb dabei unterstützt.

Author:
Alexander Hiller

01-10-2019 | Schwerpunkt | Issue 7/2019

"Das Idealbild der Controller gibt es tatsächlich - aber selten"

Heimo Losbichler bezeichnet sich selbst als "Pracademic" und versteht sich als Brückenbauer zwischen Theorie und Praxis im Controlling. Das Idealbild des Controllers, das ICV und IGC gezeichnet haben, hat er mitgeprägt. Heute sieht er, dass es bei …

Author:
Utz Schäffer

01-10-2019 | Schwerpunkt | Issue 7/2019

Rollenspezifische Kompetenzprofile für das Controlling der Zukunft

Um den Anforderungen der Digitalisierung gewachsen zu sein, brauchen Controller zusätzliche Kompetenzen. Doch muss ein einzelner Controller wirklich alles abdecken? Hier gibt eine Expertenbefragung der WHU mit neun rollenspezifischen …

Authors:
Utz Schäffer, Lars Brückner

01-10-2019 | Aufsätze | Issue 19/2019

VersicherungsRecht Aufsätze - 19/2019

Authors:
Prof. Dr. Meinrad Dreher, Dr. Martin K. Thelen, VersR Redaktion

01-10-2019

Secure search for encrypted personal health records from big data NoSQL databases in cloud

As the healthcare industry adopts the use of cloud to store personal health record (PHR), there is a need to ensure that we maintain the ability to perform efficient search on encrypted data (stored in the cloud). In this paper, we propose a …

Authors:
Lanxiang Chen, Nan Zhang, Hung-Min Sun, Chin-Chen Chang, Shui Yu, Kim-Kwang Raymond Choo

01-10-2019 | Titel | Issue 10/2019

Die Kunden sind das eigentliche Asset

Bei kaum einem Produkt sind Kunden so preissensibel wie bei der Kfz-Versicherung. Gleichzeitig ist es für Makler ein haftungs- und beratungsintensives Geschäft, weil bei unbedachten Wechseln Leistungseinbußen drohen, die bares Geld kosten können.

Author:
Oliver Mest
Image Credits