• No results found

[PDF] Top 20 Information Security: An Artificial Intelligence and Data Mining Based Approach

Has 10000 "Information Security: An Artificial Intelligence and Data Mining Based Approach" found on our website. Below are the top 20 most common "Information Security: An Artificial Intelligence and Data Mining Based Approach".

Information Security: An Artificial Intelligence and Data Mining Based Approach

Information Security: An Artificial Intelligence and Data Mining Based Approach

... [4] Chakrabarti P. et. al. ., “Approach towards key generation in multi-party communication and computational complexity of RSA algorithm” published in NCET-08, Integral University, Lucknow, Mar 2008 [5] ... See full document

6

A survey of artificial intelligence for enhancing the information security

A survey of artificial intelligence for enhancing the information security

... the security of the expert systems is an audit problem, it is treated in isolation as it involves a wide range of ...of security in expert ...the security of these ...same security measures as ... See full document

7

Impact of Industrial Revolution 4.0 to the Accounting Industry in Vietnam

Impact of Industrial Revolution 4.0 to the Accounting Industry in Vietnam

... transparency, data protected by high-tech companies and data recovery ...applications based on artificial intelligence, Blockchain, to meet the requirements of data analysis, ... See full document

8

Data mining for business intelligence with data integration

Data mining for business intelligence with data integration

... source data files. Data federation technique normally employs a metadata reference file to connect related customer information together based on a common ...key. Data federation always ... See full document

5

Artificial Intelligence in Cyber Security

Artificial Intelligence in Cyber Security

... and security tools in a ...this approach needed legions of employees to comb through the massive quantity of knowledge to attach the dots and realise latent ...ancient security operations tasks with ... See full document

6

Data Mining, Big Data and Artificial Intelligence: An Overview, Challenges and Research Questions

Data Mining, Big Data and Artificial Intelligence: An Overview, Challenges and Research Questions

... richer data that include images, videos, and interactive maps as well as associated metadata such as geolocation information and time and date ...of data captured in bidirectional interactions, both ... See full document

8

The Role of Data Mining in Information Security

The Role of Data Mining in Information Security

... released data set was supposed to be privacy-safe, since each data record only contained a subscriber ID (irrelevant with the subscriber’s real identity), the movie info, the rating, and the date on which ... See full document

20

Integrating Artificial Intelligence into Data Warehousing and Data Mining

Integrating Artificial Intelligence into Data Warehousing and Data Mining

... of information technologies. Integrating data and extracting knowledge from the market environment is always complex; in fact, this requires sufficient modeling ...“is data rich and ... See full document

5

Credit Card Fraud Detection Analysis

Credit Card Fraud Detection Analysis

... techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, Genetic Programming ...methodology based on certain design ... See full document

6

Information Security and Data Mining in Big Data

Information Security and Data Mining in Big Data

... of information sanitization whose intent is privacy ...identifiable information from data sets so that identity and sensitive attribute values hidden from ...a data set that refer to the ... See full document

13

Information Security Risk Management: An Intelligence-Driven Approach

Information Security Risk Management: An Intelligence-Driven Approach

... analysis based on their titles and apparent ...the data we had collected concerned details that—though they concerned the structure of the USNSIE at the highest strategic level—were still too specific (and ... See full document

14

Data Mining Techniques to Find Out Heart Diseases: An Overview

Data Mining Techniques to Find Out Heart Diseases: An Overview

... applied data mining technique, which employs a set of pre-classified examples to develop a model that can classify the population of records at ...This approach frequently employs decision tree or ... See full document

7

ARTIFICIAL INTELLIGENCE AND MULTI AGENT TECHNOLOGY

ARTIFICIAL INTELLIGENCE AND MULTI AGENT TECHNOLOGY

... Another paradigm commonly used with MAS systems is the pheromone, where components "leave" information for other components "next in line" or "in the vicinity". These "pheromones" ... See full document

8

Data Mining: A Knowledge Discovery Approach

Data Mining: A Knowledge Discovery Approach

... this data can provide ...transaction data can yield information on which products are selling and ...Knowledge: Information can be converted into knowledge about historical patterns and future ... See full document

6

Artificial Neural Network Based Data Mining

Artificial Neural Network Based Data Mining

... In data mining neural network methodology is used for classification, clustering, feature mining, prediction and pattern ...training data mining, the neural network method gradually ... See full document

6

The determinants of the adoption and application of business intelligence : an ERP perspective

The determinants of the adoption and application of business intelligence : an ERP perspective

... effective information from voluminous ...complex data consisting of structured data and semi-structured data, it has been suggested that BI is an appropriate tool to deal with this (Moss 2003; ... See full document

357

Intelligent Computational Techniques for Crops Yield Prediction and Fertilizer Management over Big Data Environment

Intelligent Computational Techniques for Crops Yield Prediction and Fertilizer Management over Big Data Environment

... the economic rate of the country. Crop yield prediction is a new emerging idea in agriculture. There are several challenges of crops yield prediction in the field of precision agriculture are (i). Obtain minimized ... See full document

6

Analysis of Multiple Classification Algorithms using Real Time Twitter Data

Analysis of Multiple Classification Algorithms using Real Time Twitter Data

... verses data mining are: in statistics the data is a sample from a (Data Storage) population, but in Data Mining the data is taken from a large database ...in Data ... See full document

6

Classification Techniques for Speech Recognition: A Review

Classification Techniques for Speech Recognition: A Review

... The input layer has been enlarged to accept as many input patterns as the fixed sequence length to be processed at each time step. There are three layers input, hidden and output layers. The input vector enters the ... See full document

6

Scope of artificial intelligence in the field of research in the department of computer science

Scope of artificial intelligence in the field of research in the department of computer science

... 5.2) NPC Decision Making Using Bayesian Networks: In the previous example of the monster negotiating a path to the player, a different problem must be solved first before negotiating the path. The problem is does the ... See full document

5

Show all 10000 documents...