Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Monark Bag"'
Publikováno v:
International Journal of Industrial Engineering Computations, Vol 3, Iss 2, Pp 199-210 (2012)
Control chart pattern (CCP) recognition can act as a problem identification tool in any manufacturing organization. Feature-based rules in the form of decision trees have become quite popular in recent years for CCP recognition. This is because the p
Externí odkaz:
https://doaj.org/article/4487628fbaa149d5ba7899b45a18132d
Publikováno v:
International Journal of Industrial Engineering Computations, Vol 2, Iss 4, Pp 801-810 (2011)
Supplier evaluation and selection has been a vital issue of strategic importance for long time. Different multi-criteria decision making (MCDM) approaches have been proposed by the researchers in past, to solve the supplier evaluation and selection p
Externí odkaz:
https://doaj.org/article/cc904ca6be9049859d89dbf199781058
Publikováno v:
International Journal of Engineering and Manufacturing. 4:1-9
In the increasing competition it has become important in business world to understand the different aspects of production and purchasing to understand the need for desired material in the organization. The managers have an important responsibility of
Cascading of C4.5 Decision Tree and Support Vector Machine for Rule Based Intrusion Detection System
Autor:
Jashan Koshal, Monark Bag
Publikováno v:
International Journal of Computer Network and Information Security. 4:8-20
Main reason for the attack being introduced to the system is because of popularity of the internet. Information security has now become a vital subject. Hence, there is an immediate need to recognize and detect the attacks. Intrusion Detection is def
Autor:
Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh
Publikováno v:
International Journal of Computer Network and Information Security. 4:13-21
6 Abstract — The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the us
Publikováno v:
International Journal of Industrial Engineering Computations, Vol 3, Iss 2, Pp 199-210 (2012)
Article history: Received 30 April 2011 Received in revised form September, 01, 2011 Accepted 01 September 2011 Available online 2 September 2011 Control chart pattern (CCP) recognition can act as a problem identification tool in any manufacturing or
Publikováno v:
The International Journal of Advanced Manufacturing Technology. 62:291-301
This paper focuses on the design and development of an expert system for on-line detection of various control chart patterns so as to enable the quality control practitioners to initiate prompt corrective actions for an out-of-control manufacturing p
Publikováno v:
International Journal of Information and Network Security (IJINS). 1
The objective of this research is to present and demonstrate an analytical approach towards Social Engineering. A questionnaire was created and a survey was conducted accordingly to determine the understanding of IT practitioners and social networkin
Autor:
Vrijendra Singh, Sushil Kumar, Ravi Krishna, Devki Gaurav Pal, Prashant Srivastava, Monark Bag
Publikováno v:
International Journal of Cloud Computing and Services Science (IJ-CLOSER). 1
Article history: Received Apr 24 th , 2012 Revised May 17 th , 2012 Accepted June 01 th , 2012 The evolution of cloud computing enables organizations to reduce their expenditure on IT infrastructure and is advantageous to both the serving and served
Autor:
Anant Kumar Rai, Monark Bag, Abhinav Kumar, Ankur K Shrivastava, Vrijendra Singh, Dhirendra Yadav
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642227851
Software piracy is a main concerned for organization worldwide, not considering the numerous defence techniques in position and various others that have been anticipated to stop it, thus resulting in the loss of millions of revenue for such organizat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::87867d9a20dd7df57d3753d6aabf4fc4
https://doi.org/10.1007/978-3-642-22786-8_37
https://doi.org/10.1007/978-3-642-22786-8_37