2020
DOI: 10.11591/ijece.v10i2.pp2031-2036
|View full text |Cite
|
Sign up to set email alerts
|

Impact of big data congestion in IT: an adaptive knowledge-based bayesian network

Abstract: Recent progress on real-time systems are growing high in information technology which is showing importance in every single innovative field. Different applications in IT simultaneously produce the enormous measure of information that should be taken care of. In this paper, a novel algorithm of adaptive knowledge-based Bayesian network is proposed to deal with the impact of big data congestion in decision processing. A Bayesian system show is utilized to oversee learning arrangement toward all path for the bas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 25 publications
(25 reference statements)
0
1
0
Order By: Relevance
“…Every surveillance method generates appreciable results when found actively engaged in communication, like the sting ray used for detecting the geolocation of a user. So, to track the location based on replicating human approaches continually by self-updating modeling approach, even though communication is not made, a modern intelligent framework modeling DL, ML, and CV algorithms for conducting surveillance [41]- [45]. Table 2 contains the key components and processes of the proposed system.…”
Section: Proposed Concept and Design For Cybercrime Prediction With C...mentioning
confidence: 99%
“…Every surveillance method generates appreciable results when found actively engaged in communication, like the sting ray used for detecting the geolocation of a user. So, to track the location based on replicating human approaches continually by self-updating modeling approach, even though communication is not made, a modern intelligent framework modeling DL, ML, and CV algorithms for conducting surveillance [41]- [45]. Table 2 contains the key components and processes of the proposed system.…”
Section: Proposed Concept and Design For Cybercrime Prediction With C...mentioning
confidence: 99%