The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Craters are important geographical features caused by the impacts of meteoroids. Craters have been widely studied because they contain crucial information about the age and geologic formations of planets. This paper discusses an automated crater-detection framework using knowledge discovery and data mining (KDD) process including sampling, feature selection and creation, and supervised learning methods...
Fuzzy ontology is based on the concept that each index object is related to every other object in the ontology, with a degree of membership assigned to that relationship based on fuzzy set theory. This paper proposes use cases based on the related process of the terrorism event extraction using fuzzy ontology, especially the terrorism fuzzy ontology construction methodology. The related use cases...
Nowadays, detecting and filtering are still the most feasible ways of fighting spam emails . There are many reasonably successful spam email filters in operation. However, proactively catching new strains of spam emails, where no previous knowledge is available, is still a major challenge. Negative selection is a branch of artificial immune systems. It has a strong temporal nature and is especially...
This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.