Journals / CMC / Vol.,
Table of Content

Research Article


Big Data Security Using Artificial Intelligence-based Approaches

Submission Deadline: 28 February 2022


This article has no abstract.


Big data, Artificial Intelligence; Deep learning; Machine learning, CNN, LSTM, Big data processing framework
  • Research Article

    BEST PAPER 2021

    Pseudo NLP Joint Spam Classification Technique for Big Data Cluster

    WooHyun Park1, Nawab Muhammad Faseeh Qureshi2,*, Dong Ryeol Shin1 CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 517-535, 2022, DOI:10.32604/cmc.2022.021421
    Abstract Spam mail classification considered complex and error-prone task in the distributed computing environment. There are various available spam mail classification approaches such as the naive Bayesian classifier, logistic regression and support vector machine and decision tree, recursive neural network, and long short-term memory algorithms. However, they do not consider the document when analyzing spam mail content. These approaches use the bag-of-words method, which analyzes a large amount of text data and classifies features with the help of term frequency-inverse document frequency. Because there are many words in a document, these approaches consume a massive amount of resources and become infeasible… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique

    Asif Irshad Khan1,*, Abdullah Saad Al-Malaise ALGhamdi2, Fawaz Jaber Alsolami1, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Abdullah Marish Ali1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3 CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2835-2860, 2022, DOI:10.32604/cmc.2022.020342
    Abstract The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the available management strategies. To test and understand this goal of security management in… More >

    Graphic Abstract

Share Link

WeChat scan