Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
There is millions of users in the social networking sites including the users with criminal mentality. The criminals always use sophisticated technology in order to evade detection and perform criminal acts. But any criminal activities can be revealed through forensic science tools and techniques where potential legal evidence can be extracted and presented to the legal authorities. The major concern...
The big data environment supports to resolve the issues of cyber security in terms of finding the attacker. There are security challenges of big data as well as security issues the analyst must understand. In this paper, the challenges faced by an analyst include the fraud detection, network forensics, data privacy issues and data provenance problems are well studied. It is more focused on the tools...
Internet is the biggest source of data and information today. It is the family of web sites and informative files. This paper focuses mainly on the web data and proposes some conceptual theories to extract knowledge through different web mining techniques like Clustering,FIS,ANN,LGP etc. We also focused on various aspects of applications of web mining in E-commerce & Business Intelligence. Finally,...
Mobile robots have been extensively used by many industries as well as organizations are a major problem which must be considered with many acceptable attributes. Selection of a robot for a specific task is challenging one and demanding problems in existing event. Selection of Mobile robot satisfies some performance attributes, which can solve the avoidance of significant issues in the field of application...
In this paper we have explained the detailed work done in developing a framework which can be used for the purpose of discovering business intelligence with the help of decision rules induced from the customer reviews of a product or a service posted online. We have explained the analysis for the product Samsung Galaxy S5. Our proposed framework has been designed by collecting the reviews from Samsung...
In this paper we have explained the detailed work done in developing a system which can be used for the purpose of opinion analysis of a product or a service. The system readily processes the tweets by pulling data from tweeter posts, preprocessing it and connecting to Alchemy API by REST call method. and showing the result graphically. We have given the analysis for the product Samsung Galaxy Our...
In this paper, we employed modified fuzzy multi attribute decision making (FMADM) to rank web services. The modification to the FMADM is that we employed backpropagation trained neural network (BPNN) instead of the analytic hierarchy process (AHP) to determine the weights of the attributes. Thus, the modified FMADM is a hybrid of knowledge-driven and data-driven models. The FMADM is demonstrated on...
This paper applies discriminative multinomial Naïve Bayes with various filtering analysis in order to build a network intrusion detection system. For our experimental analysis, we used the new NSL-KDD dataset, which is considered as a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. We perform 2 class classifications with 10-fold cross validation for building our proposed model...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.