The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are numerous problems of increasing significance where a pattern can have several classes simultaneously associated. This kind of problems, usually called multi-label problems, should be tackled with specific techniques in order to generate models more accurate than those obtained with classical classification algorithms. This work presents the adaptation of the J48 algorithm to multi-label...
This paper presents a method of applying text mining techniques and data mining tools for pharmaceutical spam detection from Twitter data. A simple method based on a manually selected list of 65 pharmaceutical discriminating words is used for labeling spam training tweets. Preliminary experimental results show that J48 decision tree classifier has better performance over Naïve Bayesian algorithm.
Use of unmanned Aerial Vehicles (UAVs) has gained significant importance in the recent years because of their ability to remotely monitor and perform various tasks in an autonomous manner. However, the control unit of such UAVs fails to adapt quickly when the UAVs are exposed to unpredictable and violent external disturbances such as violent wind gusts and extreme weather conditions. The cost of such...
Having an accurate Signature Detection Classification (SDC) Model has become highly demanding for Intrusion Detection Systems (IDS) to secure networks, especially when dealing with large and complex security audit data set. Selecting appropriate network features is one of the factors that influence the accuracy of SDC model. Past research has shown that the Hidden Marcov Chain, Genetic Algorithm,...
This paper compares performance of several classifiers provided in WEKA such as Bayes, decision tree and classification rules in classifying student's learning style. The student's preferences and behavior while using e-learning system have been observed and analyzed and twenty attributes have been selected to map into Felder Silverman learning style model. There are four learning dimensions in Felder...
Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources. That leads to huge repetitions in checking security rules. One of the efficient mechanisms that handle these repetitions is the Hierarchical Clustering Mechanism (HCM) [1]. HCM reduces the redundancy in checking security rules compared to the Brute Force Approach as well...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.