The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware is a computer program or a piece of software that is designed to penetrate and detriment computers without owner's permission. There are different malware types such as viruses, rootkits, keyloggers, worms, trojans, spywares, ransomware, backdoors, bots, logic bomb, etc. Volume, Variant and speed of propagation of malwares are increasing every year. Antivirus companies are receiving thousands...
Automatic identification of emotions from text has been an interesting area of research in the recent times. With the exponentially growing number of online users, emotion identification of the text being read by the users can help in providing a comforting environment to the readers. In this paper, emotion classification is attempted on the news articles from the society channel of Sina. The proposed...
To create a sentimental analysis tool for opinion mining of social media data. Information available from social networks is beneficial for analysis of user opinion, for example measuring the feedback on a recently released product, movie or a MOOC, policy change or ongoing events. Using Social network APIs, Python NLTK, automatic collection of a corpus for sentiment analysis and opinion mining purposes...
Data Mining is the process of identifying new patterns, insights in data and knowledge discovery, and is at the intersection of multiple research areas, including Machine Learning, Statistics, Pattern Recognition, Databases, and Visualization. With the maturity of databases and constant improvements in computational speed, data mining algorithms that were too expensive to execute are now within reach...
This paper proposes a new system of categorization and classification using data mining techniques based on certain criteria/topics. We describe the design and implementation of proposed system that automatically categorizes a restaurant as being good or bad, using data mining techniques, based on users' reviews. For this study we took a data set consisting of approximately 9,000 reviews for 2,355...
Playing computer games for many years has led to a large volume of gaming data that consist of gamers' likings and their playing behavior. Such data can be used by game creators to extract knowledge for enhancing games. Mining computer game data is a new data mining approach that can help in developing games as per a gamer's requirements and his/her area of interest. Since the gaming industry has...
In today's world Cyber Crimes are happening at a very rapid rate, the tools and techniques required to handle bulky and complex cyber crimes and attacks, are making organisations to remain coherent with evolving threats. Big data analytics provides a better and focussed way to overcome these threats and shorten their time to remediate with the help of tools like MongoDB. While the crime complete impairment...
Nowadays, large volumes of data and measurements are being continuously generated by computer and telecommunication networks, but such volumes make it difficult to extract meaningful knowledge from them. This paper presents SaFe-NeC, an innovative methodology for analyzing network traffic by exploiting data mining techniques, i.e. clustering and classification algorithms, focusing on self-learning...
Weighted item-set mining is used to find the profitable connection between the data. There are two types of items contained in dataset i.e. frequent and infrequent. Infrequent item-sets are nothing but items which are rarely found in database. Mining frequent items in data mining are very helpful for retrieving the related data present in the dataset. Using transactional dataset as an input dataset...
Prefixspan algorithm with GRC constraints which generates sequential patterns by using prefix projected pattern growth approach is implemented. Other than frequency this algorithm also uses gap, compactness and recency constraints during sequential pattern mining process. The gap constraint applies limit on the separation of two consecutive transactions of discovered patterns, recency constraint makes...
In today's world, the daily hustle-bustle does not permit a human being to devote time for manually summarizing various lengthy documents. Hence it is of utmost importance to devise an application that will facilitate automated text summarization. Not only will this application save time but also render higher scope of efficiency. This application will allow the user to automatically summarize relevant...
One of the important approach in data mining is sequential pattern mining that is used for discovering behaviors of sequential databases. There are various challenges in sequential pattern mining such as efficiency and effectiveness. In this paper different sequential pattern mining algorithm are discussed such as GSP, FreeSpan, PrefixSpan, and CAI-PrefixSpan to improve performance to finding sequential...
Network Intrusion Detection Systems must effectively identify security threats and protect the applications. The focus of the paper is the presence of class imbalance problem in intrusion datasets. An efficient intrusion detection system must accurately identify all threats even if they form a small fraction of the intrusion data. The effect of class imbalance on the benchmark NSL_KDD dataset is evaluated...
Enzymes play an important role in metabolism that helps in catalyzing bio-chemical reactions. A computational method is required to predict the function of enzymes. Many feature selection technique have been used in this paper by examining many previous research paper. This paper presents a comparative analysis of different supervised machine learning approach to predict the functional classes of...
Aimed at solving the problem of low-level intelligence and low utilization of audit logs of the security audit system, a secure audit system based on association rule mining is proposed in this paper. The system is able to take full advantage of the existing audit logs, establish the behavior pattern database of users and the system with data mining technique, and discover abnormal situation in a...
A framework for secure sensitive data sharing on data mining platform, that includes secured delivery, usage, storage, and data destruction for semi-trusted data mining sharing platform. We propose a proxy re-encryption algorithm based heterogeneous cipher text transformation and user protection method based on virtual machine monitor, which provides for realization of system functions. The framework...
Even today, a large number of organizations collect data using paper forms. However, it can be difficult to aggregate, and analyze the data collected using paper forms. Better management and processing of forms and applications is indispensable to improving customer experience. But, typing the form data into a spreadsheet is time-consuming, mundane and may result in errors. Various attempts have been...
Text Summarization is the task of extracting salient information from the original text document. In this process, the extracted information is generated as a condensed report and presented as a concise summary to the user. It is very difficult for humans to understand and interpret the content of the text. In this paper, an exhaustive survey on abstractive text summarization methods has been presented...
Information analysis tasks are becoming increasingly complex as the growth in volume and variety of available data continues to outpace methods to automatically analyze it. The result is an increasing burden on knowledge workers. Industry and academia are currently lacking platforms and tools that can help provide enterprise-wide understanding of how humans analyze information. Through instrumentation...
Besides required courses which are compulsory for each student to be taken, universities also offer elective courses chosen by the students themselves. In their undergraduate study, since students are not guided about the elective courses, they lack information about the description and content of the course and generally fail to take the appropriate ones for their course of study. As a solution,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.