• Nenhum resultado encontrado

[PDF] Top 20 Classifying and Identifying of Threats in E-mails - Using Data Mining Techniques

Has 10000 "Classifying and Identifying of Threats in E-mails - Using Data Mining Techniques" found on our website. Below are the top 20 most common "Classifying and Identifying of Threats in E-mails - Using Data Mining Techniques".

Classifying and Identifying of Threats in E-mails - Using Data Mining Techniques

Classifying and Identifying of Threats in E-mails - Using Data Mining Techniques

... one of the most ubiquitous methods of ...percentage of the total traffic over the internet is thee-mail. E-mail data is also growing rapidly, creating needs for automated ...bundles of ... See full document

5

MINERAÇÃO DE DADOS E ESTIMATIVA DA MORTALIDADE ALTA DE FRANGOS QUANDO EXPOSTOS A ONDA DE CALOR

MINERAÇÃO DE DADOS E ESTIMATIVA DA MORTALIDADE ALTA DE FRANGOS QUANDO EXPOSTOS A ONDA DE CALOR

... result in losses of animal production since they are exposed to thermal stress inducing an increase in mortality and consequent economical ...science and meteorological databases from ... See full document

7

Data Mining and Neural Network Techniques in Stock Market Prediction : A Methodological Review

Data Mining and Neural Network Techniques in Stock Market Prediction : A Methodological Review

... for Data Mining: In traditional DBMS, Data is stored as a shape of structured ...for and retrieves records that match user’s query ...recognition of intelligent query ... See full document

11

A comparative analysis of classifiers in cancer prediction using multiple data mining techniques

A comparative analysis of classifiers in cancer prediction using multiple data mining techniques

... decade, in light of dramatic developments in analytical medicine tools for automated data collection, exponentially increasing amounts of data have been generated and ... See full document

13

Clustering of User Behaviour based on Web Log data using Improved K-Means Clustering Algorithm

Clustering of User Behaviour based on Web Log data using Improved K-Means Clustering Algorithm

... categories of web mining are web content, web structure and web usage ...Usage Mining addresses the problem of extracting behavioural patterns from one or more web access logs ...task ... See full document

6

Human Capital and the Recent Fall of Earnings Inequality in Brazil

Human Capital and the Recent Fall of Earnings Inequality in Brazil

... decline in earnings inequality in Brazil, for the first time in decades, by means of a flexible decomposition technique and counterfactual ...variance of (log) earnings declined ... See full document

41

Recent Developments in Damage Identification of Structures Using Data Mining

Recent Developments in Damage Identification of Structures Using Data Mining

... life and it leads them to loss their serviceability and ...set of accelerometers to record the response data and a data mining (DM) procedure, is widely used to extract ... See full document

29

Use of Data Mining Techniques to Detect Medical Fraud in Health Insurance

Use of Data Mining Techniques to Detect Medical Fraud in Health Insurance

... characteristics of the insurance fraud case. Hope to use these characteristics in the development of insurance fraud reasoning ...assess of the rules of the insurance fraud prevention ... See full document

12

An Electronic Market Space Architecture Based On Intelligent Agents And Data Mining Technologies

An Electronic Market Space Architecture Based On Intelligent Agents And Data Mining Technologies

... the data mining agent. These actions are: data cleaning, data integra- tion, transformation and pattern ...early and avoided by taking suitable action. Useful patterns discovered ... See full document

4

A Recent Review on XML data mining and FFP

A Recent Review on XML data mining and FFP

... goal of data mining is to extract or mine" knowledge from large amounts of ...technologies of semi-structured data have attracted wide attention of networks, ... See full document

6

Device fingerprinting techniques: threats and protections

Device fingerprinting techniques: threats and protections

... domains in the page code it tries to resolve them, by querying its DNS ...servers, in turn, don’t have any cached registry for those domains (because they don’t exist), so they will request for addresses to ... See full document

130

Feature Relevance Analysis and Classification of Road Traffic Accident Data through Data Mining Techniques

Feature Relevance Analysis and Classification of Road Traffic Accident Data through Data Mining Techniques

... dataset using classification algorithms ...Bayes and Random Tree), feature ranking algorithms (CFS, FCBF, MIFS, MODTree and Feature Ranking), classifiers using Arc-X4 Meta classifier to find ... See full document

6

Evaluation And Characterization Of Trace Metals Contamination In The Surface Sediment Using Pollution Load Index PLI And Geo-Accumulation Index Igeo Of Ona River Western Nigeria

Evaluation And Characterization Of Trace Metals Contamination In The Surface Sediment Using Pollution Load Index PLI And Geo-Accumulation Index Igeo Of Ona River Western Nigeria

... existence of trace metals in aquatic environments has led to serious concerns about their influence on plant and animal life ...measure of the degree of pollution in aquatic ... See full document

6

Using Metadata Analysis and Base Analysis Techniques in Data Qualities Framework for Data Warehouses

Using Metadata Analysis and Base Analysis Techniques in Data Qualities Framework for Data Warehouses

... problems of consistency and ...store in QKB. Then a comparison will be applied to the value in store in sources ...set of algorithm is created to state that the number of ... See full document

8

Synthesis of nanoparticeles in ductile iron with small additions of vanadium and niobium and its mechanical properties

Synthesis of nanoparticeles in ductile iron with small additions of vanadium and niobium and its mechanical properties

... material and offers wide range of mechanical properties with simultaneous high wear resistance and dumping capacity ...that in many cases production of ductile iron ensure fulfillment ... See full document

8

The Impact of E-Commerce Securi ty, and National Environment  on Consumer adoption of Intern et Banking in Malaysia and  Singapore

The Impact of E-Commerce Securi ty, and National Environment on Consumer adoption of Intern et Banking in Malaysia and Singapore

... ways of performing the same task (Roger, 1983; Agarwal & Prasad, ...day and 7 days a week, it provides an enormous advantage and convenience to users (Tan & Teo, ...products and ... See full document

20

COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES

COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES

... day, and it is applied for different purposes in decision support ...Web mining is the application of data mining and is used for the same ...Web mining is ... See full document

11

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

HIDING SENSITIVE ASSOCIATION RULE USING HEURISTIC APPROACH

... Data mining is the process of identifying patterns from large amount of ...rule mining aims to discover dependency relationships across ...application of data ... See full document

7

Explicit and implicit approach of sensitivity analysis in numerical modelling of solidification

Explicit and implicit approach of sensitivity analysis in numerical modelling of solidification

... Keywords: Application of Information Technology to the Foundry Industry: Solidification Process: Numerical Tcchniqucs: Sensitivity Analysis; Borzndary Elcmcnt Mcthod.. Introd[r] ... See full document

6

DATA MINING TECHNIQUES FOR SEPARATION OF SUMMER CROP BASED ON SATELLITE IMAGES

DATA MINING TECHNIQUES FOR SEPARATION OF SUMMER CROP BASED ON SATELLITE IMAGES

... series of spectral-temporal vegetation indexes, obtained from satellite images (Esquerdo et ...soybean and corn crops have some similarities as the spectral signatures and the vegetative cycle, ... See full document

10

Show all 10000 documents...