Search results for "Mining"

showing 10 items of 1730 documents

On handling exceptions

1995

The current literature of information systems has dealt extensively with all kinds of exceptions. There are several studies defining the concept of exception and even providing classifications. However, no studies provide a method for verifying the rules in order to handle exceptions and to achieve the goals set by an organization's rules. In this paper, a model employing a set of unique input/output (UIO) sequences is presented for verifying such rules. The model originally presented for Finite State Machines (FSM) has been modified to include concepts of exception handling and will be used to form a tool usable for verifying exception handling rules in OISs.

Set (abstract data type)Finite-state machineProgramming languageComputer scienceException handlingInformation systemData miningUSablecomputer.software_genrecomputerProceedings of conference on Organizational computing systems - COCS '95
researchProduct

PRIvacy LEakage Methodology (PRILE) for IDS Rules

2010

This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data sessions are defined as privacy leaking. Furthermore, it analyses the IDS rule attack specific pattern size required in order to keep the privacy leakage below a given threshold, presuming that occurrence frequencies of the attack pattern in normal text are known. We have applied the methodology on the network intrusion detection system Snort’s rule set. The evaluation confirms that Snort in its default configuration aims at not being excessively privacy invasive. However we have identified s…

Set (abstract data type)Pattern sizeEngineeringbusiness.industryPrivacy softwareData miningNetwork intrusion detectionLeakage (economics)computer.software_genreComputer securitybusinesscomputerSignature (logic)
researchProduct

<strong>New tool useful for drug discovery validated through benchmark datasets</strong>

2018

Atomic Weighted Vectors (AWVs) are vectors that contain the codified information of molecular structures, which can apply to a set of Aggregation Operators (AOs) to calculate total and local molecular descriptors (MDs). This article presents an exploratory study of a new tool useful for drug discovery using different datasets, such as DRAGON and Sutherland’s datasets, as well as their comparison with other well-known approaches. In order to evaluate the performance of the tool, several statistics and QSAR/QSPR experiments were performed. Variability analyses are used to quantify the information content of the AWVs obtained from the tool, by the way of an information theory-based algorithm. …

Set (abstract data type)Quantitative structure–activity relationshipOrthogonalityComputer scienceMolecular descriptorPrincipal component analysisGenetic algorithmBenchmark (computing)Data miningInformation theorycomputer.software_genrecomputerProceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition
researchProduct

A Logical Explication of the Concepts of Incomplete and Uncertain Information

1994

Discovery of elementary knowledge and its constituents, i.e. information contained in objects of reality is realized through asking questions including certain aspects called attributes in this paper. We describe a fragment of a discovered reality as an information system (cf. Pawlak [1,3,4]), which consists of the universum U of all the objects of this reality we are concerned with, and of a set A of attributes understood as functions each of which assigns to every object of U 1) a value of given attribute belonging to A or 2) an interval of approximate values of this attribute, i.e. an established set of possible values of this attribute. From the point of view of the cognitive agent and …

Set (abstract data type)Theoretical computer scienceExplicationFragment (logic)Computer scienceInformation systemPoint (geometry)Interval (mathematics)Data miningcomputer.software_genreObject (computer science)computerValue (mathematics)
researchProduct

Semantic traffic applications based on DatexII

2009

In this work we demonstrate a particular use of ontologies based on the European specifications DATEXII. These specifications are designed and developed as a traffic and travel data exchange mechanism by a European task force to set up and standardise the interface between traffic control and information centres. It is the reference for applications that are developed and implemented in Europe.This language describes concepts and structures of data related to traffic, but the description is just syntactic, not semantic. Therefore the objective to be reached in this part of the research has been to develop a semantic description in order to carry out some applications like syndication and a …

Set (abstract data type)Web syndicationSemantic gridInformation retrievalInterface (Java)Computer scienceData exchangeSemantic computingSemantic analyticsSemantic Web StackData miningcomputer.software_genrecomputerProceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
researchProduct

Deriving and comparing deduplication techniques using a model-based classification

2015

Data deduplication has been a hot research topic and a large number of systems have been developed. These systems are usually seen as an inherently linked set of characteristics. However, a detailed analysis shows independent concepts that can be used in other systems. In this work, we perform this analysis on the main representatives of deduplication systems. We embed the results in a model, which shows two yet unexplored combinations of characteristics. In addition, the model enables a comprehensive evaluation of the representatives and the two new systems. We perform this evaluation based on real world data sets.

Set (abstract data type)Work (electrical)Computer scienceData deduplicationData miningcomputer.software_genrecomputerReal world dataProceedings of the Tenth European Conference on Computer Systems
researchProduct

Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques

2013

Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm for HTTP intrusions detection based on simple clustering algorithms and advanced processing of HTTP requests which allows the analysis of all queries at once and does not separate them by resource. The method proposed allows detection of HTTP intrusions in case of continuously updated web-applications and does not require a set of HTTP requests free of attacks to build the normal user behaviour model. The algorithm is tested using logs acquired from a large real-life web service and, as a result, all attacks from these logs are detected, while the numbe…

Set (abstract data type)n-gramResource (project management)Computer scienceServerAnomaly detectionIntrusion detection systemData miningWeb serviceCluster analysiscomputer.software_genrecomputer
researchProduct

Biotechnology of the Recultivation of Technogenically Disturbed Landscapes in the South and East of Kazakhstan (биотехнология рекультивации техногенн…

2018

Reclamation of technogenically disturbed lands requires several procedures and assignments. In the South of Kazakhstan during the field development of phosphate deposits, pastoral type lands were disturbed. Reclamation works were done in two stages - technical and biological. The technical stage included the dump planning, loamy ground delivery for bottom lining, layer-bylayer covering and stabilisation. The biological stage included planting of phyto-meliorants, biochar and carbamide insertion under crops. In the city of Ridder, around the mining processing industry, the black humus soil was exposed to aggressive emission of zinc plant. The soil is currently degraded and devoid of vegetati…

Settore AGR/14 - Pedologiasoil degradation mining industry dumps technogenically disturbed landscape phytomelioration
researchProduct

Detecting significant features in modeling microRNA-target interactions

2017

MicroRNAs (miRNAs) are small non-coding RNA molecules mediating the translational repression and degradation of target mRNAs in the cell. Mature miRNAs are used as a template by the RNA-induced silencing complex (RISC) to recognize the complementary mRNAs to be regulated. Up to 60% of human genes are putative targets of one or more miRNAs. Several prediction tools are available to suggest putative miRNA targets, however, only a small part of the interaction pairs has been validated by experimental approaches. The analysis of the expression profile of the RNA fraction immunoprecipitated (IP) with the RISC proteins is an established method to detect which genes are actually regulated by the R…

Settore BIO/18 - GeneticaText miningComputer sciencebusiness.industryRNA interference miRNA gene expressionmicroRNAComputational biologyBioinformaticsbusiness
researchProduct

Iteratively reweighted least squares in crystal structure refinements

2011

The use of robust techniques in crystal structure multipole refinements of small molecules as an alternative to the commonly adopted weighted least squares is presented and discussed. As is well known, the main disadvantage of least-squares fitting is its sensitivity to outliers. The elimination from the data set of the most aberrant reflections (due to both experimental errors and incompleteness of the model) is an effective practice that could yield satisfactory results, but it is often complicated in the presence of a great number of bad data points, whose one-by-one elimination could become unattainable. This problem can be circumvented by means of a robust least-squares regression that…

Settore GEO/06 - MineralogiaLeast trimmed squarescomputer.software_genreRegressionRobust regressionIteratively reweighted least squaresData setRobust regression outlier refinementData pointStructural BiologyOutlierSensitivity (control systems)Data miningcomputerAlgorithmMathematicsActa Crystallographica Section A Foundations of Crystallography
researchProduct