Proposed Architecture for Terrorist Web Miner
نویسندگان
چکیده
منابع مشابه
A Proposed Architecture for Large Scale Web Accessibility Assessment
This paper outlines the architecture of a system designed to demonstrate large scale web accessibility assessment developed in a European research project. The system consists of a set of integrated software components designed to automatically evaluate accessibility metrics for a large number of websites and present results in a common report. The system architecture is designed to be maintain...
متن کاملWUM: A Web Utilization Miner
Most web sites are set up with little knowledge on the navigational behaviour of the users accessing them. Feedback on the occurring navigation patterns can significantly aid site owners in efficiently (re)organizing the hyperspace they present to their visitors. In this study, we present the Web Utilization Miner WUM, a mining system for the discovery of interesting navigation patterns. The in...
متن کاملAnomaly Extraction Using Efficient-Web Miner Algorithm
Today network security, uptime and performance of network are important and serious issues in computer network. Anomaly is deviation from normal behaviour affecting network security. Anomaly Extraction is identification of unusual flow from network, which is need of network operator. Anomaly extraction aims to automatically find the inconsistencies in large set of data observed during an anomal...
متن کاملProposed Architecture for U-Healthcare Systems
Modernization of medical healthcare system using technology has become an important in research direction today. The healthcare system is intended to efficiently deliver the healthcare services. The healthcare system is defined as the industry which provides health services (health activities) so as to meet the health needs and demands of individuals, the family and the community. In this study...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015906628