This book constitutes the refereed proceedings of the First International Conference on Technology Systems and Management, ICTSM 2011, held in Mumbai, India, in February 2011. The 47 revised full papers presented were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on computer engineering and information technology; electronics and telecommunication; and, as well as technology management.
This book constitutes the refereed proceedings of the First International Conference on Technology Systems and Management, ICTSM 2011, held in Mumbai,...
Traditional association mining often produces large numbers of association rules and sometimes it is very difficult for users to understand such rules and applying this knowledge to any business process. In order to overcome the drawback of association rule mining and to find actionable knowledge from resultant association rules, a novel idea of combined patterns is used here. Combined Mining is a kind of post processing method for association rules generated. In this approach, first the association rules are filtered by varying support and confidence levels, then using the interestingness...
Traditional association mining often produces large numbers of association rules and sometimes it is very difficult for users to understand such rules...
Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming data activities and attempt to detect the intrusions. The classification algorithms in IDS are used to categorize the well known large variety of intrusions. In recent years, data mining based IDS have executed good performance. Still challenges exist in the design and implementation of quality IDSs. The goal of this classification and clustering based IDS...
Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the in...