To found security events from web logs has become an important aspect of network security. This paper proposes a website anomaly detection model based on security-log-analysis. After creating a anomaly feature sets of...
详细信息
ISBN:
(纸本)9781479947195
To found security events from web logs has become an important aspect of network security. This paper proposes a website anomaly detection model based on security-log-analysis. After creating a anomaly feature sets of the model, c4.5 algorithm was used to improve feature sets, making the abnormal records in feature sets store hierarchically. compared logs in website with the treated feature stes, the model ultimately achieves the purpose of checking website's security event fast and accurately.
The healthcare industry collects large amounts of healthcare information which cannot be mined to find unknown information for efficient evaluation. Discovery of buried patterns frequently goes unexploited. Heart dise...
详细信息
ISBN:
(纸本)9781479939664
The healthcare industry collects large amounts of healthcare information which cannot be mined to find unknown information for efficient evaluation. Discovery of buried patterns frequently goes unexploited. Heart disease is a term for defining a huge amount of healthcare conditions that are related to the heart. This medicinal condition defines the unpredicted health conditions that directly control all the parts of the heart. Different data mining techniques such as association rule mining, classification, clustering are used to predict the heart disease in health care industry. The heart disease database is preprocessed to make the mining process more efficient. The preprocessed data is clustered using clustering algorithms like K-means to cluster relevant data in database. Maximal Frequent Itemset algorithm (MAFIA) is used for mining maximal frequent patterns in heart disease database. The frequent patterns can be classified using c4.5 algorithm as training algorithm using the concept of information entropy. The results showed that the designed prediction system is capable of predicting the heart attack successfully.
With the growing use of the internet worldwide, internet security becomes more and more important. There are many techniques available for intrusion detection. However, there remain various issues to be improved, such...
详细信息
ISBN:
(纸本)9783642550324;9783642550317
With the growing use of the internet worldwide, internet security becomes more and more important. There are many techniques available for intrusion detection. However, there remain various issues to be improved, such as detection rate, false positive rate, memory overhead, time overhead, and so on. In this paper, a new hybrid system for network intrusion detection system using principal component analysis and c4.5 is presented, which has a good detection rate and keeps false positive and false negative rate at an acceptable level for different types of network attacks. Especially, this system can effectively reduce the memory overhead and the time overhead of building the intrusion detection model. These claims are verified by experimental results on the KDD cup 99 benchmark network intrusion detection dataset.
When it comes to taking the public transportation, time and patience are of essence. In other words, many people using public transport buses have experienced time loss because of waiting at the bus stops. In this pap...
详细信息
ISBN:
(纸本)9781479930203
When it comes to taking the public transportation, time and patience are of essence. In other words, many people using public transport buses have experienced time loss because of waiting at the bus stops. In this paper, we proposed smart bus tracking system that any passenger with a smart phone or mobile device with the QR (Quick Response) code reader can scan QR codes placed at bus stops to view estimated bus arrival times, buses' current locations, and bus routes on a map. Anyone can access these maps and have the option to sign up to receive free alerts about expected bus arrival times for the interested buses and related routes via SMS and e-mails. We used c4.5 (a statistical classifier) algorithm for the estimation of bus arrival times to minimize the passengers waiting time. GPS (Global Positioning System) and Google Maps are used for navigation and display services, respectively.
The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance...
详细信息
ISBN:
(纸本)9781479939756
The proposed methodology involves to compares classification techniques for predicting the cognitive skill of students which can be evaluate by conducting the online test. The paper focuses the comparative performance of c4.5 algorithm, Naive Bayes classifier algorithm which one is well suited accuracy for predicting the skill of expertise by experimenting in Rapid miner.
Heat stress is an important factor affecting the agricultural production. At the molecular level post translational modifications have been shown to be influenced in plants under heat stress. The authors have studied ...
详细信息
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve c...
详细信息
ISBN:
(纸本)9781479922918
The disclosure of information and its misuse in Privacy Preserving Data Mining (PPDM) systems is a concern to the parties involved. In PPDM systems data is available amongst multiple parties collaborating to achieve cumulative mining accuracy. The vertically partitioned data available with the parties involved cannot provide accurate mining results when compared to the collaborative mining results. To overcome the privacy issue in data disclosure this paper describes a Key Distribution-Less Privacy Preserving Data Mining (KDLPPDM) system in which the publication of local association rules generated by the parties is published. The association rules are securely combined to form the combined rule set using the commutative RSA algorithm. The combined rule sets established are used to classify or mine the data. The results discussed in this paper compare the accuracy of the rules generated using the c4. 5 based KDLPPDM system and the cS. 0 based KDLPPDM system using receiver operating characteristics curves (ROc).
In order to provide good service and improve user's feeling and degree of satisfaction, video service providers are now interested in understanding the influence of attributes on Quality of Experience (QoE). In th...
详细信息
ISBN:
(纸本)9781467376884
In order to provide good service and improve user's feeling and degree of satisfaction, video service providers are now interested in understanding the influence of attributes on Quality of Experience (QoE). In this paper, based on IPTV business, we study the relationship between alarming data from IPTV set-top boxes and the user's QoE. First, data cleaning and analysis are performed. After these procedures, the important attributes influencing QoE are selected. Then decision tree is used for modeling dataset. Here information entropy minimization heuristic is adopted to discretize continuous-valued attributes and the improved c4.5 algorithm is designed to fastly and accurately build the tree. Experimental results show that the proposed scheme can indeed improve the prediction accuracy when compared with other competing schemes.
The paper introduces a balanced coefficient to improve the veracity of c4.5 algorithm. It can be fixed by decision maker according to priori intellectual and domain intellectual. It harmonized the information gain-rat...
详细信息
ISBN:
(纸本)9780769538655
The paper introduces a balanced coefficient to improve the veracity of c4.5 algorithm. It can be fixed by decision maker according to priori intellectual and domain intellectual. It harmonized the information gain-ratio of each attributes artificially in specific environment. The classification is more veracious and rational by the decision tree made from the improved algorithm. And compared the improved algorithm to c4.5 algorithm by analyzing examples, to prove the efficiency of the improved algorithm.
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used t...
详细信息
To found security events from web logs has become an important aspect of network *** paper proposes a website anomaly detection model based on *** creating a anomaly feature sets of the model,c4.5 algorithm was used to improve feature sets,making the abnormal records in feature sets store *** logs in website with the treated feature stes,the model ultimately achieves the purpose of checking website’s security event fast and accurately.
暂无评论