Survey on Electricity Consumption using Data Mining Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survey on Anomaly Detection using Data Mining Techniques

In the present world huge amounts of data are stored and transferred from one location to another. The data when transferred or stored is primed exposed to attack. Although various techniques or applications are available to protect data, loopholes exist. Thus to analyze data and to determine various kind of attack data mining techniques have emerged to make it less vulnerable. Anomaly detectio...

متن کامل

A Survey on Wireless Intrusion Detection using Data Mining Techniques

An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administration. In recent years, since the computer network keeps expanding drastically, the incidents of data theft and hacking are also increased. In order to control and monitor such activity that violates the security policy of system, it is necessary to have intrusion d...

متن کامل

A Survey on Intrusion Detection using Data Mining Techniques

Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on extending dramatically. Information Systems and Networks are subject to electronic attacks and the possibilities of intrusion are very high. An Intrusio...

متن کامل

A Survey on Intrusion Detection System Using Data Mining Techniques

Nowadays, an increasing number of populations are accessing the Internet for commercial services which is the major cause for attack. Threats are created everyday by an individual or by the organization that attacks the network system. Unusual Malicious activities and unauthorized access are identified by observing the network in Intrusion Detection System. IDS is a passive monitoring system, i...

متن کامل

Survey on Classification Techniques for Data Mining

This paper focuses on the various techniques that can be implemented for classification of observations that are initially uncategorized. Our objective is to compare the different classification methods and classifiers that can be used for this purpose. In this paper, we study and demonstrate the different accuracies and usefulness of classifiers and the circumstances in which they should be im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Networking and Applications

سال: 2019

ISSN: 0975-0290,0975-0282

DOI: 10.35444/ijana.2019.100410