The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Demographic information plays an important role in gaining valuable insights about a web-site's user-base and is used extensively to target online advertisements and promotions. This paper investigates machine-learning approaches for predicting the demographic attributes of web-sites using information derived from their content and their hyper linked structure and not relying on any information directly...
Web based commercial recommender systems (RS) can help users to make decisions about which product to purchase from the vast amount of products available on the Internet. Currently, many commercial recommender systems are developed for recommending frequently purchased products where a large amount of explicit ratings or purchase history data is available to predict user preferences. However, for...
This paper demonstrates an application, blog templates recommendation system, applied with Support Vector Machine (SVM). In recent years, the population of Blog users keeps growing rapidly. This study uses SVM to be a training method for creating a recommendation module. When the new user's data have been got into the modules, it will produce a suitable CSS template. Users can use the generated template...
Contrary to popular beliefs, (Web) application security is a quality management problem and must be treated as such. Security flaws are actually bugs and affect the quality of software the same way as functional bugs do. If we don't accept this and attempt to treat the problem differently, we are going to fail.
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Classification of the numerical data is a very important research topic in machine learning. But the incomplete data is very common in real world application. And the existence of incomplete data degrades the learning quality of classification models. But the existence of incomplete data always decrease the quality of classification models, To show the definition of missing data more intuitively,...
Style-based text authorship identification extracts features from authorship-known texts, constructs classifier and then identifies disputed texts. Authorship identification belongs to the domain of style classification and is a branch of text classification. In contrast with text classification which deals with the content of texts, authorship identification focuses on the form property of texts...
Signature-based anti-viruses are very accurate, but are limited in detecting new malicious code. Dozens of new malicious codes are created every day, and the rate is expected to increase in coming years. To extend the generalization to detect unknown malicious code, heuristic methods are used; however, these are not successful enough. Recently, classification algorithms were used successfully for...
Port state control (PSC) inspection is the most important mechanism to ensure world marine safe. Recently, some SVM-based risk assessment systems have been presented in the world. They estimate the risk of each candidate ship based on its generic factors and history inspection factors to select high-risk one before conducting on-board PSC inspection. However, how to improve the performance of the...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.