Anomaly Threat Detection System using User and Role-Based Profile Assessment IJTSRD
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously […]
Business Analytics using Microsoft Power BI and AWS Redshift IJTSRD
A Data-Warehouse is a repository that fetches data from many diverse sources within an organization for Business-Reporting and Business-Analysis. The reports created from intricate queries within a Data-Warehouse are used to improve business process, make optimal judgements, and even announce viable advantages. Since the Organizational Data is increasing exponentially day by day hence in-house Data […]
Analysis of Imbalanced Classification Algorithms A Perspective View IJTSRD
Classification of data has become an important research area. The process of classifying documents into predefined categories Unbalanced data set, a problem often found in real world application, can cause seriously negative effect on classification performance of machine learning algorithms. There have been many attempts at dealing with classification of unbalanced data sets. In this […]
Automatic Image Captions for Lightly Labelled Images IJTSRD
We initiate a new distance metric learning technique recognized as ambiguously supervised structural metric learning to find out discriminative Mahalanobis distance metric that is based on weak supervision data. For improving the performance, two affinity matrices are combined to get a fused affinity matrix which is used for face naming. When specified a collection of […]
Successive Security Challenges Implementation on Internet of Things IJTSRD
This Paper demonstrates commonly used communication scheme and information retrieval which are carried out via Internet using numerous types of smart devices, can turn the Internet into a very dangerous platform because of its built-in nature of making its users’ identity easily traceable and discusses some countermeasures that can be used to prevent existing and […]