The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the neural networks in initial stage of enthusiasm, the field survived a period of frustration and disrepute. The reason for this is previous neuron doesn't do anything that conventional computers don't do already. Moreover they are observed to be too complex when noticed by humans as well as computers. Moreover we are furiously rising in fourth generation to increase the neural network standard...
Network vulnerabilities are present in every system. Network technology advances so rapidly that it can be very difficult to eradicate vulnerabilities altogether; the best one can hope for, in many cases, is simply to minimize them. ACO is a member of ant colony algorithms family, in swarm intelligence methods, and it constitutes some meta-heuristic optimizations. By applying the concept of ACO in...
In this paper, we outline observations made during projects in the field of innovative e-commerce information systems. Our first group of observations concentrates on the exploration of an innovative e-commerce idea. As it turns out, in the first phase of e-commerce information system development, an e-commerce idea should be developed into an e-commerce model, in which both business- and technical...
Web mining techniques are used to analyze the web information resources. Web content mining and structure mining methods are used to analyze the web page contents. The user access information is maintained under the web logs. The usage mining technique is used to analyze the web logs. The web logs are maintained under the web server environment. User access patterns are extracted from the web logs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.