The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due increase in the usage of cloud based systems there is an increase in the amount of information on the cloud and as a result there is need for confidentiality. Most common method used for authentication is textual password. But these passwords are susceptible to shoulder surfing, dictionary attack, eavesdropping. Generally the passwords tend to follow patterns that are easier for attackers to guess...
Security-as-a-Service model delivers security as a commodity in form of a cloud service. The security is provided as one of cloud services in place of on-premise security solutions. The initiative proposed here is to provide encryption and decryption as a cloud service in an intelligent and transparent manner. The users can exercise the service by simply using a web browser.
In Security-as-a-service model the objective is to provide security as one of the cloud services. In this model the security is provided from the cloud in place of on-premise implementation. The Intrusion Management comprises of methods for intrusion detection, intrusion prevention and response to intrusions. In physical environments Intrusion management methods have already matured. However, due...
Data Mining is an efficient data analysis process which is used to find the patterns and relationship of a large database. Clustering is a popular technique of data mining for unsupervised learning in which labels are not defined previously. K-Mean is a well known partitioning technique for forming different clusters, but it has the drawback of initial sensitivity and local optima convergence. K-Harmonic...
Mining of association rules is an important research direction of data mining. Extensive use of XML on web makes it an interesting source for data extraction from large data sets. There is a growing demand for modern tools and technologies which can efficiently handle such large data. This paper proposes a collaborative approach to extract association rules from structured XML data with the help of...
Clustering is the process of organising data into meaningful groups, and these groups are called clusters. It is a way of grouping data samples together that is similar in some way, according to some criteria that you pick. Swarm intelligence (SI) is a collective behavior of social systems like insects such as ants (ant colony optimization, ACO), fish schooling, honey bees (bee algorithm, BA) and...
In this paper, we propose a method of genetic algorithm (GA) for information retrieval (IR) based on Singular Value Decomposition and Principal Component Analysis. The main difficulty in GA based IR system is processing of high dimensional input strings, as affects the performance in terms of retrieval time. In proposed work, we tried to reduce the high dimensional input data to low dimensional in...
Clustering is unsupervised learning method to extract hidden patterns and disciplines. Swarm intelligence deals with natural and artificial systems composed of many individuals that coordinate using decentralized control and self-organization. In this paper, we propose a new Swarm Intelligence based hybrid method for data clustering. The main difficulty in clustering is the numbers of resulting clusters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.