Novel data mining paradigms based on soft computing and machine learning in the current and upcoming information society revolution
Corresponding Author
Chang Choi
Department of Computer Engineering, Gachon University, Seongnam-Daero, Republic of Korea
Correspondence
Chang Choi, Department of Computer Engineering, Gachon University, 1342 Seongnam-Daero, 13120 Gyeonggi, Republic of Korea.
Email: [email protected]
Search for more papers by this authorFlorin Pop
University Politehnica of Bucharest, Bucharest, Romania
Search for more papers by this authorJun Huang
Chongqing University of Posts and Telecommunications, Chongqing, China
Search for more papers by this authorCorresponding Author
Chang Choi
Department of Computer Engineering, Gachon University, Seongnam-Daero, Republic of Korea
Correspondence
Chang Choi, Department of Computer Engineering, Gachon University, 1342 Seongnam-Daero, 13120 Gyeonggi, Republic of Korea.
Email: [email protected]
Search for more papers by this authorFlorin Pop
University Politehnica of Bucharest, Bucharest, Romania
Search for more papers by this authorJun Huang
Chongqing University of Posts and Telecommunications, Chongqing, China
Search for more papers by this author
REFERENCES
- 1Esposito C, Pop F, Huang J. Application of soft computing and machine learning in the big data analytics for smart cities and factories. J Inf Manag. 2019; 49: ii. https://doi.org/10.1016/S0268-4012(19)31246-0.
- 2Bok K, Ko G, Lim J, Yoo J. Personalized content recommendation scheme based on trust in online social networks. Concurr Comput Pract Exp. 2020; 32:e5572. https://doi.org/10.1002/cpe.5572.
- 3Li G et al. Deep learning for EEG data analytics: a survey. Concurr Comput Pract Exp. 2020; 32:e5199. https://doi.org/10.1002/cpe.5199.
- 4Li G, Lee CH, Jung JJ, Youn YC, Camacho D. Extraction of abstracted sensory data to reduce the execution time of context-aware services in wearable computing environments. Concurr Comput Pract Exp. 2019;e5286. https://doi.org/10.1002/cpe.5286.
- 5Li D, Zhao L, Cheng Q, Lu N, Shi W. Opcode sequence analysis of android malware by a convolutional neural network. Concurr Comput Pract Exp. 2020; 32:e5308. https://doi.org/10.1002/cpe.5308.
- 6Wu W, Zhu J, Su X, Zhang X. DHGAN: generative adversarial network with dark channel prior for single-image dehazing. Concurr Comput Pract Exp. 2020; 32:e5263. https://doi.org/10.1002/cpe.5263.
- 7Ju Y, Kim M, Shin J. Detection of malicious code using the direct hashing and pruning and support vector machine. Concurr Comput Pract Exp. 2020; 32:e5483. https://doi.org/10.1002/cpe.5483.
- 8Gupta BB. An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud. Concurr Comput Pract Exp. 2020; 32:e5291. https://doi.org/10.1002/cpe.5291.
- 9Bhat KV, Das AK, Lee JH. Design of a blind quantization-based audio watermarking scheme using singular value decomposition. Concurr Comput Pract Exp. 2020; 32:e5253. https://doi.org/10.1002/cpe.5253.
- 10Choi H-S. Drowsy driving detection using neural network with backpropagation algorithm implemented by FPGA. Concurr Comput Pract Exp. 2020; 32:e5471. https://doi.org/10.1002/cpe.5471.
- 11Bae SI, Lee GB, Im EG. Ransomware detection using machine learning algorithms. Concurr Comput Pract Exp. 2020; 32:e5422. https://doi.org/10.1002/cpe.5422.
- 12Choi Y, Kim D, Lee JH. Neural attention model with keyword memory for abstractive document summarization. Concurr Comput Pract Exp. 2020; 32:e5433. https://doi.org/10.1002/cpe.5433.
- 13Chae DK, Kim BK, Kim SH, Kim SW. Incremental feature selection for efficient classification of dynamic graph bags. Concurr Comput Pract Exp. 2020; 32:e5502. https://doi.org/10.1002/cpe.5502.
- 14Liu X, Liu P, Hu L, Zou C, Cheng Z. Energy-aware task scheduling with time constraint for heterogeneous cloud datacenters. Concurr Comput Pract Exp. 2020; 32:e5437. https://doi.org/10.1002/cpe.5437.
- 15Lee KM, Park KS, Hwang KS, Kim KI. Deep neural network model construction with interactive code reuse and automatic code transformation. Concurr Comput Pract Exp. 2020; 32:e5480. https://doi.org/10.1002/cpe.5480.
- 16Choi C, Ogiela MR, Chen H-C. Intelligent approaches for security technologies. Concurr Comput Pract Exp. 2018; 30(3):e4408.
September 25, 2020
e5937