March 2024
A practical guideline for implementing an extra security layer on an intra-cloud private MongoDB Database using encryption
Cloud computing offers different deployment and distribution models for the outsourcing of the company’s Information Technology (IT) infrastructure (applications and data). The wide adoption of this concept does not exclude permanent and unforeseen dangers. The company loses its guarantee of the confidentiality of its most sensitive information, and many legal and security questions remain unanswered. A large...
March 2024
Lessons learned and perspectives on constrained data collection and preparation for a predictive machine learning model applied to transportation industry in a non-digitalised environment
Machine learning algorithms are based on qualitative and quantitative historical data, to create predictive models for shape recognition, autonomous systems, etc., using classifiers like K-Nearest Neighbors (KNN), neural-network, etc. So, treatment of data is the undisputed fuel that powers any machine learning endeavour. A standard data collection methodology would comprise a few steps as data collection, cleaning,...
Advertisement
Advertisement