Skip to Content

Big Data and Cognitive Computing, Volume 2, Issue 4

2018 December - 10 articles

Cover Story: Despite applications of Topological Data Analysis (TDA) in data mining, it has not been widely applied to text analytics. On the other hand, in many text processing algorithms, the order in which different entities appear or co-appear is being lost. Assuming these lost orders are informative features, TDA may play a role in filling this gap. Our new approach analyzes the topology of multi-dimensional time series of the same-type entities in long documents. Using topological signatures, we examined 75 novels by six novelists of the Romantic era and tried to predict the author only based on the graph of the main characters (persons) in each novel. We achieved 77% accuracy, thereby proving the value of homological persistence and time series analysis for text classification. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
11 Citations
5,075 Views
19 Pages

Unscented Kalman Filter Based on Spectrum Sensing in a Cognitive Radio Network Using an Adaptive Fuzzy System

  • Md Ruhul Amin,
  • Md Mahbubur Rahman,
  • Mohammad Amazad Hossain,
  • Md Khairul Islam,
  • Kazi Mowdud Ahmed,
  • Bikash Chandra Singh and
  • Md Sipon Miah

In this paper, we proposed the unscented Kalman filter (UKF) based on cooperative spectrum sensing (CSS) scheme in a cognitive radio network (CRN) using an adaptive fuzzy system—in this proposed scheme, firstly, the UKF to apply the nonlinear s...

  • Article
  • Open Access
4,200 Views
13 Pages

Visually impaired people (VIP) feel a lack of aid for their facilitated urban mobility, mainly due to obstacles encountered on their routes. This paper describes the design of AudioMaps, a prototype of cartographic technology for mobile devices. Audi...

  • Article
  • Open Access
39 Citations
8,013 Views
16 Pages

The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber crimin...

  • Article
  • Open Access
38 Citations
7,629 Views
17 Pages

The Next Generation Cognitive Security Operations Center: Network Flow Forensics Using Cybersecurity Intelligence

  • Konstantinos Demertzis,
  • Panayiotis Kikiras,
  • Nikos Tziritas,
  • Salvador Llopis Sanchez and
  • Lazaros Iliadis

A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effectiv...

  • Article
  • Open Access
17 Citations
5,034 Views
15 Pages

A Model Free Control Based on Machine Learning for Energy Converters in an Array

  • Simon Thomas,
  • Marianna Giassi,
  • Mikael Eriksson,
  • Malin Göteman,
  • Jan Isberg,
  • Edward Ransley,
  • Martyn Hann and
  • Jens Engström

This paper introduces a machine learning based control strategy for energy converter arrays designed to work under realistic conditions where the optimal control parameter can not be obtained analytically. The control strategy neither relies on a mat...

  • Article
  • Open Access
81 Citations
24,192 Views
15 Pages

Big-Crypto: Big Data, Blockchain and Cryptocurrency

  • Hossein Hassani,
  • Xu Huang and
  • Emmanuel Silva

Cryptocurrency has been a trending topic over the past decade, pooling tremendous technological power and attracting investments valued over trillions of dollars on a global scale. The cryptocurrency technology and its network have been endowed with...

  • Article
  • Open Access
15 Citations
6,667 Views
10 Pages

Topological Signature of 19th Century Novelists: Persistent Homology in Text Mining

  • Shafie Gholizadeh,
  • Armin Seyeditabari and
  • Wlodek Zadrozny

Topological Data Analysis (TDA) refers to a collection of methods that find the structure of shapes in data. Although recently, TDA methods have been used in many areas of data mining, it has not been widely applied to text mining tasks. In most text...

  • Review
  • Open Access
48 Citations
10,468 Views
30 Pages

Data Stream Clustering Techniques, Applications, and Models: Comparative Analysis and Discussion

  • Umesh Kokate,
  • Arvind Deshpande,
  • Parikshit Mahalle and
  • Pramod Patil

Data growth in today’s world is exponential, many applications generate huge amount of data streams at very high speed such as smart grids, sensor networks, video surveillance, financial systems, medical science data, web click streams, network...

  • Article
  • Open Access
7 Citations
4,808 Views
16 Pages

The Internet-of-Things (IoT) is a paradigm shift from slow and manual approaches to fast and automated systems. It has been deployed for various use-cases and applications in recent times. There are many aspects of IoT that can be used for the assist...

  • Article
  • Open Access
27 Citations
7,782 Views
20 Pages

The SECOM dataset contains information about a semiconductor production line, entailing the products that failed the in-house test line and their attributes. This dataset, similar to most semiconductor manufacturing data, contains missing values, imb...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Big Data Cogn. Comput. - ISSN 2504-2289