Skip to Content
You are currently on the new version of our website. Access the old version .

Big Data and Cognitive Computing, Volume 7, Issue 2

2023 June - 64 articles

Cover Story: The authors propose a proactive approach to mitigating malware threats using natural language processing (NLP) techniques. The paper introduces a model called MalBERTv2, which has been trained on publicly available datasets and focuses on the app source code to extract relevant information. The model utilizes pre-tokenization feature generation and a classifier with bidirectional encoder representations from transformers (BERT) to detect malware threats. The model performs well, with a weighted F1 score ranging from 82% to 99% using different datasets. The results demonstrate the effectiveness of the NLP-based approach in proactively detecting malware threats. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (64)

  • Article
  • Open Access
13 Citations
3,751 Views
15 Pages

The aim of this research is to develop an automated pallet inspection architecture with two key objectives: high performance with respect to defect classification and computational efficacy, i.e., lightweight footprint. As automated pallet racking vi...

  • Article
  • Open Access
2 Citations
3,101 Views
24 Pages

Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level

  • Karima Khettabi,
  • Zineddine Kouahla,
  • Brahim Farou,
  • Hamid Seridi and
  • Mohamed Amine Ferrag

Internet of Things (IoT) systems include many smart devices that continuously generate massive spatio-temporal data, which can be difficult to process. These continuous data streams need to be stored smartly so that query searches are efficient. In t...

  • Article
  • Open Access
21 Citations
4,701 Views
18 Pages

Transformational Entrepreneurship and Digital Platforms: A Combination of ISM-MICMAC and Unsupervised Machine Learning Algorithms

  • Pejman Ebrahimi,
  • Hakimeh Dustmohammadloo,
  • Hosna Kabiri,
  • Parisa Bouzari and
  • Mária Fekete-Farkas

For many years, entrepreneurs were considered the change agents of their societies. They use their initiative and innovative minds to solve problems and create value. In the aftermath of the digital transformation era, a new group of entrepreneurs ha...

  • Article
  • Open Access
5 Citations
7,101 Views
27 Pages

Football (also known as Soccer), boasts a staggering fan base of 3.5 billion individuals spread across 200 countries, making it the world’s most beloved sport. The widespread adoption of advanced technology in sports has become increasingly pro...

  • Communication
  • Open Access
38 Citations
8,826 Views
21 Pages

Mining and analysis of the big data of Twitter conversations have been of significant interest to the scientific community in the fields of healthcare, epidemiology, big data, data science, computer science, and their related areas, as can be seen fr...

  • Article
  • Open Access
11 Citations
3,799 Views
21 Pages

Molecular Structure-Based Prediction of Absorption Maxima of Dyes Using ANN Model

  • Neeraj Tomar,
  • Geeta Rani,
  • Vijaypal Singh Dhaka,
  • Praveen K. Surolia,
  • Kalpit Gupta,
  • Eugenio Vocaturo and
  • Ester Zumpano

The exponentially growing energy requirements and, in turn, extensive depletion of non-restorable sources of energy are a major cause of concern. Restorable energy sources such as solar cells can be used as an alternative. However, their low efficien...

  • Review
  • Open Access
75 Citations
20,859 Views
25 Pages

Exploring Machine Learning Models for Soil Nutrient Properties Prediction: A Systematic Review

  • Olusegun Folorunso,
  • Oluwafolake Ojo,
  • Mutiu Busari,
  • Muftau Adebayo,
  • Adejumobi Joshua,
  • Daniel Folorunso,
  • Charles Okechukwu Ugwunna,
  • Olufemi Olabanjo and
  • Olusola Olabanjo

Agriculture is essential to a flourishing economy. Although soil is essential for sustainable food production, its quality can decline as cultivation becomes more intensive and demand increases. The importance of healthy soil cannot be overstated, as...

  • Article
  • Open Access
4 Citations
3,022 Views
25 Pages

Expanding the Horizons of Situated Visualization: The Extended SV Model

  • Nuno Cid Martins,
  • Bernardo Marques,
  • Paulo Dias and
  • Beatriz Sousa Santos

To fully leverage the benefits of augmented and mixed reality (AR/MR) in supporting users, it is crucial to establish a consistent and well-defined situated visualization (SV) model. SV encompasses visualizations that adapt based on context, consider...

  • Article
  • Open Access
4 Citations
2,869 Views
16 Pages

One of the strategies adopted to compress CNN models for image classification tasks is pruning, where some elements, channels or filters of the network are discarded. Typically, pruning methods present results in terms of model performance before and...

  • Article
  • Open Access
9 Citations
4,648 Views
18 Pages

Comparing Reservoir Artificial and Spiking Neural Networks in Machine Fault Detection Tasks

  • Vladislav Kholkin,
  • Olga Druzhina,
  • Valerii Vatnik,
  • Maksim Kulagin,
  • Timur Karimov and
  • Denis Butusov

For the last two decades, artificial neural networks (ANNs) of the third generation, also known as spiking neural networks (SNN), have remained a subject of interest for researchers. A significant difficulty for the practical application of SNNs is t...

  • Article
  • Open Access
8 Citations
3,033 Views
20 Pages

The lack of regulations and oversight on Online Social Networks (OSNs) has resulted in the rise of social spam, which is the dissemination of unsolicited and low-quality content that aims to deceive and manipulate users. Social spam can cause a range...

  • Review
  • Open Access
22 Citations
9,342 Views
36 Pages

The rapid global spread of the coronavirus disease (COVID-19) has severely impacted daily life worldwide. As potential solutions, various digital contact tracing (DCT) strategies have emerged to mitigate the virus’s spread while maintaining eco...

  • Article
  • Open Access
3 Citations
3,009 Views
21 Pages

Huge quantities of audio and video material are available at universities and teaching institutions, but their use can be limited because of the lack of intelligent search tools. This paper describes a possible way to set up an indexing scheme that o...

  • Article
  • Open Access
57 Citations
11,806 Views
13 Pages

Adaptive KNN-Based Extended Collaborative Filtering Recommendation Services

  • Luong Vuong Nguyen,
  • Quoc-Trinh Vo and
  • Tri-Hai Nguyen

In the current era of e-commerce, users are overwhelmed with countless products, making it difficult to find relevant items. Recommendation systems generate suggestions based on user preferences, to avoid information overload. Collaborative filtering...

  • Article
  • Open Access
29 Citations
8,699 Views
17 Pages

Breaking Barriers: Unveiling Factors Influencing the Adoption of Artificial Intelligence by Healthcare Providers

  • BM Zeeshan Hameed,
  • Nithesh Naik,
  • Sufyan Ibrahim,
  • Nisha S. Tatkar,
  • Milap J. Shah,
  • Dharini Prasad,
  • Prithvi Hegde,
  • Piotr Chlosta,
  • Bhavan Prasad Rai and
  • Bhaskar K Somani

Artificial intelligence (AI) is an emerging technological system that provides a platform to manage and analyze data by emulating human cognitive functions with greater accuracy, revolutionizing patient care and introducing a paradigm shift to the he...

  • Editorial
  • Open Access
9 Citations
3,982 Views
4 Pages

Huge amounts of digital data are continuously generated and collected from different sources, such as sensors, cameras, in-vehicle infotainment, smart meters, mobile devices, social media platforms, and web applications and services [...]

  • Article
  • Open Access
15 Citations
7,156 Views
27 Pages

On-Shore Plastic Waste Detection with YOLOv5 and RGB-Near-Infrared Fusion: A State-of-the-Art Solution for Accurate and Efficient Environmental Monitoring

  • Owen Tamin,
  • Ervin Gubin Moung,
  • Jamal Ahmad Dargham,
  • Farashazillah Yahya,
  • Ali Farzamnia,
  • Florence Sia,
  • Nur Faraha Mohd Naim and
  • Lorita Angeline

Plastic waste is a growing environmental concern that poses a significant threat to onshore ecosystems, human health, and wildlife. The accumulation of plastic waste in oceans has reached a staggering estimate of over eight million tons annually, lea...

  • Article
  • Open Access
27 Citations
9,971 Views
14 Pages

Gesture recognition is widely used to express emotions or to communicate with other people or machines. Hand gesture recognition is a problem of great interest to researchers because it is a high-dimensional pattern recognition problem. The high dime...

  • Article
  • Open Access
20 Citations
7,768 Views
23 Pages

Ontologies provide a powerful method for representing, reusing, and sharing domain knowledge. They are extensively used in a wide range of disciplines, including artificial intelligence, knowledge engineering, biomedical informatics, and many more. F...

  • Article
  • Open Access
7 Citations
2,745 Views
23 Pages

Global models have been developed to tackle the challenge of forecasting sets of series that are related or share similarities, but they have not been developed for heterogeneous datasets. Various methods of partitioning by relatedness have been intr...

  • Article
  • Open Access
11 Citations
5,372 Views
23 Pages

Unsupervised Deep Learning for Structural Health Monitoring

  • Roberto Boccagna,
  • Maurizio Bottini,
  • Massimo Petracca,
  • Alessia Amelio and
  • Guido Camata

In the last few decades, structural health monitoring has gained relevance in the context of civil engineering, and much effort has been made to automate the process of data acquisition and analysis through the use of data-driven methods. Currently,...

  • Article
  • Open Access
8 Citations
3,098 Views
13 Pages

Massive Parallel Alignment of RNA-seq Reads in Serverless Computing

  • Pietro Cinaglia,
  • José Luis Vázquez-Poletti and
  • Mario Cannataro

In recent years, the use of Cloud infrastructures for data processing has proven useful, with a computing potential that is not affected by the limitations of a local infrastructure. In this context, Serverless computing is the fastest-growing Cloud...

  • Systematic Review
  • Open Access
83 Citations
52,974 Views
44 Pages

SQL and NoSQL Database Software Architecture Performance Analysis and Assessments—A Systematic Literature Review

  • Wisal Khan,
  • Teerath Kumar,
  • Cheng Zhang,
  • Kislay Raj,
  • Arunabha M. Roy and
  • Bin Luo

The competent software architecture plays a crucial role in the difficult task of big data processing for SQL and NoSQL databases. SQL databases were created to organize data and allow for horizontal expansion. NoSQL databases, on the other hand, sup...

  • Article
  • Open Access
10 Citations
8,767 Views
17 Pages

Accessibility is an increasingly important topic for Ecommerce, especially for individuals with vision problems. To improve their online experience, the design of a voice assistant has been proposed to allow these individuals to browse and shop onlin...

  • Article
  • Open Access
13 Citations
6,881 Views
17 Pages

Digital Twins are digital equivalents of real-life objects. They allow producers to act immediately in case of (expected) deviations and to simulate effects of interventions based on real-life data. Digital Twin and eXtended Reality technologies (inc...

  • Article
  • Open Access
18 Citations
5,861 Views
20 Pages

Recognizing Similar Musical Instruments with YOLO Models

  • Christine Dewi,
  • Abbott Po Shun Chen and
  • Henoch Juli Christanto

Researchers in the fields of machine learning and artificial intelligence have recently begun to focus their attention on object recognition. One of the biggest obstacles in image recognition through computer vision is the detection and identificatio...

  • Article
  • Open Access
58 Citations
14,460 Views
19 Pages

Application of Artificial Intelligence for Fraudulent Banking Operations Recognition

  • Bohdan Mytnyk,
  • Oleksandr Tkachyk,
  • Nataliya Shakhovska,
  • Solomiia Fedushko and
  • Yuriy Syerov

This study considers the task of applying artificial intelligence to recognize bank fraud. In recent years, due to the COVID-19 pandemic, bank fraud has become even more common due to the massive transition of many operations to online platforms and...

  • Article
  • Open Access
5 Citations
2,978 Views
15 Pages

Pattern sequence-based models are a type of forecasting algorithm that utilizes clustering and other techniques to produce easily interpretable predictions faster than traditional machine learning models. This research focuses on their application in...

  • Article
  • Open Access
8 Citations
9,082 Views
21 Pages

Predicting Cell Cleavage Timings from Time-Lapse Videos of Human Embryos

  • Akriti Sharma,
  • Ayaz Z. Ansari,
  • Radhika Kakulavarapu,
  • Mette H. Stensen,
  • Michael A. Riegler and
  • Hugo L. Hammer

Assisted reproductive technology is used for treating infertility, and its success relies on the quality and viability of embryos chosen for uterine transfer. Currently, embryologists manually assess embryo development, including the time duration be...

  • Article
  • Open Access
15 Citations
5,151 Views
18 Pages

A Practical Byzantine Fault Tolerance (PBFT) is a consensus algorithm deployed in a consortium blockchain that connects a group of related participants. This type of blockchain suits the implementation of the Building Information Modeling (BIM) infor...

  • Article
  • Open Access
2,163 Views
15 Pages

The Time-Period-Based Most Frequent Path (TPMFP) problem has been a hot topic in traffic studies for many years. The TPMFP problem involves finding the most frequent path between two locations by observing the travelling behaviors of drivers in a spe...

  • Article
  • Open Access
15 Citations
4,427 Views
20 Pages

With the development of new-generation information technologies, such as big data and artificial intelligence, digital twins have become a key technology in intelligent manufacturing. The introduction of digital twin technology has addressed many pro...

  • Article
  • Open Access
3 Citations
3,725 Views
14 Pages

Attention Mechanism and Support Vector Machine for Image-Based E-Mail Spam Filtering

  • Ghizlane Hnini,
  • Jamal Riffi,
  • Mohamed Adnane Mahraz,
  • Ali Yahyaouy and
  • Hamid Tairi

Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user’s computer system and take a long time to be dele...

  • Systematic Review
  • Open Access
69 Citations
10,143 Views
22 Pages

A Systematic Review of Blockchain Technology Adoption Barriers and Enablers for Smart and Sustainable Agriculture

  • Gopi Krishna Akella,
  • Santoso Wibowo,
  • Srimannarayana Grandhi and
  • Sameera Mubarak

Smart and sustainable agricultural practices are more complex than other industries as the production depends on many pre- and post-harvesting factors which are difficult to predict and control. Previous studies have shown that technologies such as b...

  • Article
  • Open Access
18 Citations
4,455 Views
20 Pages

An Ensemble-Learning-Based Technique for Bimodal Sentiment Analysis

  • Shariq Shah,
  • Hossein Ghomeshi,
  • Edlira Vakaj,
  • Emmett Cooper and
  • Rasheed Mohammad

Human communication is predominantly expressed through speech and writing, which are powerful mediums for conveying thoughts and opinions. Researchers have been studying the analysis of human sentiments for a long time, including the emerging area of...

  • Article
  • Open Access
6 Citations
4,879 Views
20 Pages

A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption

  • Mikhail Babenko,
  • Elena Golimblevskaia,
  • Andrei Tchernykh,
  • Egor Shiriaev,
  • Tatiana Ermakova,
  • Luis Bernardo Pulido-Gaytan,
  • Georgii Valuev,
  • Arutyun Avetisyan and
  • Lana A. Gagloeva

Homomorphic encryption (HE) is a promising solution for handling sensitive data in semi-trusted third-party computing environments, as it enables processing of encrypted data. However, applying sophisticated techniques such as machine learning, stati...

  • Article
  • Open Access
9 Citations
2,826 Views
13 Pages

Two-Stage PNN–SVM Ensemble for Higher Education Admission Prediction

  • Khrystyna Zub,
  • Pavlo Zhezhnych and
  • Christine Strauss

In this paper, we investigate the methods used to evaluate the admission chances of higher education institutions’ (HEI) entrants as a crucial factor that directly influences the admission efficiency, quality of education results, and future st...

  • Article
  • Open Access
3,818 Views
28 Pages

Extensive medical research has revealed evidence of a strong association between hippocampus atrophy and age-related diseases such as Alzheimer’s disease (AD). Therefore; segmentation of the hippocampus is an important task that can help clinic...

  • Article
  • Open Access
9 Citations
7,226 Views
19 Pages

Recent studies have indicated that fake news is always produced to manipulate readers and that it spreads very fast and brings great damage to human society through social media. From the available literature, most studies focused on fake news detect...

  • Article
  • Open Access
5 Citations
2,527 Views
14 Pages

This article presents software for the synthesis of circulant graphs and the dataset obtained. An algorithm and new methods, which increase the speed of finding optimal circulant topologies, are proposed. The results obtained confirm an increase in p...

  • Article
  • Open Access
41 Citations
10,454 Views
20 Pages

The European Blockchain Services Infrastructure (EBSI) is a major policy initiative of the EU and European Blockchain Partnership, to leverage blockchain to create cross-border services for public administrations, businesses, citizens, and their ecos...

  • Article
  • Open Access
1 Citations
3,065 Views
18 Pages

The term “big data” refers to the vast amount of structured and unstructured data generated by businesses, organizations, and individuals on a daily basis. The rapid growth of big data has led to the development of new technologies and te...

  • Article
  • Open Access
3 Citations
3,927 Views
17 Pages

A Multi-Modal Entity Alignment Method with Inter-Modal Enhancement

  • Song Yuan,
  • Zexin Lu,
  • Qiyuan Li and
  • Jinguang Gu

Due to inter-modal effects hidden in multi-modalities and the impact of weak modalities on multi-modal entity alignment, a Multi-modal Entity Alignment Method with Inter-modal Enhancement (MEAIE) is proposed. This method introduces a unique modality...

  • Article
  • Open Access
20 Citations
8,668 Views
28 Pages

National Payment Switches (NPSs) and International Payment Switches (IPSs), including major players such as SWIFT, Mastercard, and CHIPS, have become vital to the financial infrastructure, facilitating secure and efficient transactions among local fi...

  • Article
  • Open Access
30 Citations
5,726 Views
20 Pages

DLBCNet: A Deep Learning Network for Classifying Blood Cells

  • Ziquan Zhu,
  • Zeyu Ren,
  • Siyuan Lu,
  • Shuihua Wang and
  • Yudong Zhang

Background: Blood is responsible for delivering nutrients to various organs, which store important health information about the human body. Therefore, the diagnosis of blood can indirectly help doctors judge a person’s physical state. Recently,...

  • Review
  • Open Access
53 Citations
12,976 Views
26 Pages

Predicting Colorectal Cancer Using Machine and Deep Learning Algorithms: Challenges and Opportunities

  • Dabiah Alboaneen,
  • Razan Alqarni,
  • Sheikah Alqahtani,
  • Maha Alrashidi,
  • Rawan Alhuda,
  • Eyman Alyahyan and
  • Turki Alshammari

One of the three most serious and deadly cancers in the world is colorectal cancer. The most crucial stage, like with any cancer, is early diagnosis. In the medical industry, artificial intelligence (AI) has recently made tremendous strides and showi...

  • Article
  • Open Access
15 Citations
7,143 Views
22 Pages

People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility...

  • Review
  • Open Access
15 Citations
7,379 Views
14 Pages

Infectious diseases take a large toll on the global population, not only through risks of illness but also through economic burdens and lifestyle changes. With both emerging and re-emerging infectious diseases increasing in number, mitigating the con...

  • Article
  • Open Access
1 Citations
2,923 Views
25 Pages

Over the course of seven years during ten events, the author explored real-time interactive audiovisual projections, using ad hoc and portable projections and audio systems. This was done in the specific location of Cockatoo Island in the waters of a...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Big Data Cogn. Comput. - ISSN 2504-2289