The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multimedia data generated and stored online is growing at a huge rate. In order to access the desired multimedia data in real time, this needs to be analyzed and stored in categorical manner. This paper presents the data mining base approach for categorization of musical data. Experiments are performed using various data mining classifiers and preprocessing methods. This paper also compares the performance...
With rapid growth in user of Social Media in recent years, the researcher get attracted towords the use of social media data for sentiments analysis of people or particular product or person or event. Twitter is one of the widely used social media platform to express the thoughts. This Paper presents approch for analysing the sentiments of users using data mining classifiers. It also compares the...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, exhausts the resources of server/service and makes it unavailable for legitimate users. With increasing use of online services and attacks on these services, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also grown. Detection accuracy & CPU utilization of Data mining based IDS is...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, exhausts the resources of server/service and makes it unavailable for legitimate users. With increasing use of online services and attacks on these services, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also grown. Different techniques such as data mining, neural network, genetic algorithms,...
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can result in huge loss of data and make resources unavailable for legitimate users. With continuous growth of Internet users and traffic, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS network attacks has also grown. Different techniques such as data mining and pattern recognition are being used...
Big Data has become one of the most commonly used terms in the Information Technology circles. The sheer volume of data to be processed and analyzed has grown exponentially with the increasing popularity of Internet and World Wide Web. This presents challenges while storing, manipulating and mining the data. Every day researchers are working on different solutions to handle the volume of data being...
Malicious users of the internet can launch Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks with the intent of making the throughput of a network next to none. As the types and number of users of the internet increases, the requirement of an effective Intrusion Detection System(IDS) to detect these attacks also increases. Different techniques such as data mining and pattern...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.