مرور Volume 1, Issue 4 بر اساس عنوان
در حال نمایش موارد 1 - 6 از 6
-
DOPPONENT: A Socially Efficient Preference Model of Opponent in Bilateral Multi Issue Negotiations
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)During the last decades, opponent modeling techniques, utilized to improve the negotiation outcome, have sparked interest in the negotiation research community. In this study, we first investigate the applicability of ...
-
Effective Intrusion Detection with a Neural Network Ensemble Using Fuzzy Clustering and Stacking Combination Method
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)Data mining techniques are widely used for intrusion detection since they have the capability of automation and improving the performance. However, using a single classification technique for intrusion detection might ...
-
Improving Semi-supervised Constrained k-Means Clustering Method Using User Feedback
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)Recently, semi-supervised clustering methods have been considered by many researchers. In this type of clustering, there are some constraints and information about a small portion of data. In constrained k-means method, ...
-
A more Accurate Clustering Method by using Co-author Social Networks for Author Name Disambiguation
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)Digital libraries may keep millions of citation records and bibliographic attributes such as title, authors' names, and the place of publication. Since the materials and contents in digital libraries are taken from diverse ...
-
A Novel Solution for Author Attribution Problem in Anonymous E-mail
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)Due to increasing criminal activities by anonymous E-mails in the cyber world, it is a challenging task to extract beneficial knowledge from E-mail systems. This problem in cyber world attracts many researchers in cyber-crime ...
-
PSA: A Hybrid Feature Selection Approach for Persian Text Classification
(University of Isfahan & Iranian Society of Cryptology, 2014-10-01)In recent decades, as enormous amount of data being accumulated, the number of text documents is increasing vastly. E-mails, web pages, texts, news and articles are only part of this grow. Thus the need for text mining ...



