Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Barbie Eghan-Yartel"'
Autor:
Charles Roland Haruna, Mengshu Hou, Rui Xi, Moses Jojo Eghan, Michael Y. Kpiebaareh, lawrence Tandoh, Barbie Eghan-Yartel, Maame G. Asante-Mensah
Publikováno v:
IEEE Access, Vol 7, Pp 77426-77435 (2019)
In this paper, we present an extension on a hybrid-based deduplication technique in entity reconciliation (ER), by proposing an algorithm that builds clusters upon receiving a pre-specified K number of clusters, and second developing a crowd-based pr
Externí odkaz:
https://doaj.org/article/192fa2919cd245a0b90f58195758281a
Publikováno v:
International Journal of Computer Applications. 178:1-8
Autor:
Rui Xi, Lawrence Tandoh, Michael Y. Kpiebaareh, Moses J. Eghan, Maame G. Asante-Mensah, Mengshu Hou, Charles Roland Haruna, Barbie Eghan-Yartel
Publikováno v:
IEEE Access, Vol 7, Pp 77426-77435 (2019)
In this paper, we present an extension on a hybrid-based deduplication technique in entity reconciliation (ER), by proposing an algorithm that builds clusters upon receiving a pre-specified K number of clusters, and second developing a crowd-based pr
Publikováno v:
ICCDA
In data warehousing and integration, data error repairs are very important. Some existing techniques tend to fix data errors using machine learning, statistics, integrity constraints, while others use multiple iterations to find data errors and a lon
Autor:
Lawrence Tandoh, MengShu Hou, Barbie Eghan-Yartel, Maame G. Asante-Mensah, Moses J. Eghan, Michael Y. Kpiebaareh, Charles Roland Haruna
Publikováno v:
ICSAI
In real world, databases often have several records representing the same entity and these duplicates have no common key, thus making deduplication difficult. Machine-based and crowdsourcing techniques were disjointly used in improving quality in dat
Autor:
Mengshu Hou, Michael Y. Kpiebaareh, Rui Xi, Charles Roland Haruna, Lawrence Tandoh, Barbie Eghan-Yartel
Publikováno v:
BigCom
Users requesting trusted third parties to publish their sets of data items on transitions to access different services have become very popular in this information technology era. We therefore need to understand the trends or behavior of the users in
This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from