The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in a system. A security breach will be any action the owner of the system deems unauthorized. Current methods used for...
Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays,...
For extorting the helpful comprehension concealed in the biggest compilation of a database the data mining technology is used. There are some negative approaches occurred about the data mining technology, among which the potential privacy incursion and potential discrimination. The latter consists of irrationally considering individuals on the source of their fitting to an exact group. Data mining...
XML actually developed as a benchmark for caching, dispense and interchanging data over multiple platforms. The XML data is on the grow over the time in fast rate. Enterprises want formulating queries on XML datasets habitually. As giant XML data is retrievable, it is not easy job to pull out vital data from XML dataset. It is computationally expensive to answer queries without any sustain. Towards...
Data preprocessing describes any type of processing performed on raw data to prepare it for another processing procedure. Commonly used as a preliminary data mining practice, data preprocessing transforms the data into a format that will be more easily and effectively processed. Sequential Pattern Mining finds interesting sequential patterns among the large database. Data acquired from the dataset...
Integratedly use the knowledge of the social network theory based on the traditional trust, and compute the trust of the users of online auction transactions, because of lack of Intelligence, flexibility and initiative in current recommendation system, the Auction Mechanism Based Distributed Personalized Recommendation System was proposed. In this system, intelligent agent technology was used. The...
The feature of the proposed computer assisted test system is to apply data mining technology to computer test analysis and intelligentizing it. It can help teachers analyze how well students understand the knowledge points in assignments and exams. It can also visualize the test points of each questions and error rates. The results obtained by the system can tell teachers which parts of teaching activities...
Any activity in a computer-supported cooperative working environment produces a set of traces. In a collaborative working context, such traces may be very voluminous and heterogeneous. They reflect all the interactive actions among the actors themselves and between the actors and the system. This paper examines what is required to exploit traces in the context of a collaborative working environment...
In the cyber crime huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic investigators to play plenty of time to find out clue and analyze those data. In network forensic analysis involves network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network...
Data mining is comprised of many data analysis techniques. Its basic objective is to discover the hidden and useful data pattern from very large set of data. Graph mining, which has gained much attention in the last few decades, is one of the novel approaches for mining the dataset represented by graph structure. Graph mining finds its applications in various problem domains, including: bioinformatics,...
This paper deals with a system for extracting information from scientific papers. We analyze drawbacks of an existing implementation running on the N1 Grid Engine. Reasons for moving extraction to the Cloud are presented next. The architecture of the Cloud port is discussed and the links to the API and the platform developed within the mOSCAIC project are elaborated.
Positive emotions have been proven to be a key factor for successful learning. In modern personalized learning environments informal learning takes a prominent role and with this the use of computer-mediated communication. Communication data, like for example chat logs, can be harvested for sentiments. Most sentiment analyses operate processing only verbal information. But the messages exchanged in...
The paper discusses about automatic Information Extraction (IE) through mobile devices for unstructured documents. To convert the unstructured data into a structured format, we use the Natural Language Processing (NLP) technique such as Information Extraction. Here when a user gives a query into the mobile, the query is searched in the database which is filled using the information provided by the...
The exponential growth in the number of web documents and the technological advancements in communication systems over the Internet has resulted in tremendous increase in users accessing those documents for their needs. They may search for documents or for data available in the web. In the former situation, the documents are ranked using different techniques to list the relevant documents in the beginning...
Mining sequential pattern is one of the common data mining task for many real-life applications. Previous existing algorithm such as CAMLS(Constraint-based Apriori Algorithm for Mining Long Sequences) mines the complete set of frequent sequences(Long) satisfying a min-sup threshold in a sequence. However, mining long sequences will generate an explosive number of frequent sequences, which is prohibitively...
To meet the needs of desire of using natural language to describe data analysis, this paper combines ideas of both fuzzy query language and linguistic summaries, introduces fuzzy set theory and presents a more powerful algorithm based on relational database, which can find fuzzy rules among crisp data. As a result, an automatic fuzzy rule extraction system is developed, which can support users extract...
The integration of heterogeneous multi-source geospatial information always has been the research focus of geographic information sharing. As an efficient tool to describe, discover and retrieve the information source, metadata is the key technology the implement the integration and sharing of information sources. Metadata directory service is to describe various information use metadata as the basic...
Computer logs are generated by application activities, network accesses and system audit, which are important data sources for user pattern mining, computer forensic analysis, intrusion detection analysis and outlier detection. Algorithms for mining association rule are useful methods to find interesting rules implied in large computer log data. But existing algorithms which based on confidence and...
With the advances in computer technology, many systems have been developed for educational and instructional purposes. In particular, a computer-based system is very attractive in sports instruction and training as compared to the traditional human coaching approach, saving time, space, and cost. Among several important technical issues to be resolved in such sports instructional systems, motion or...
In order to save the computer data effectively, we should not only check the integrity for the data integrity, but also check storage system to recover data in a timely manner to reduce losses to a minimum, to prevent the recover fails when the fault occurred. The viability and integrity of the system to recover the data is determined by the recovery algorithm, so the key to recover the data is how...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.