Niket Bhargava

Learn More
The image depends on the Human perception and is also based on the Machine Vision System. The Image Retrieval is based on the color Histogram, texture. The perception of the Human System of Image is based on the Human Neurons which hold the 10 of Information; the Human brain continuously learns with the sensory organs like eye which transmits the Image to(More)
897 Abstract—With the rapid increase in the number of Internet users, there is a constantly increasing requirement for automatic classification techniques with greater classification accuracy. Existing algorithms are based on the text content of the web pages for classification. However, the web pages classified using text content may not yield desired(More)
We are in an age repeatedly referred to the information age. In this age, because we suppose that information leads to power and achievement, and credit to sophisticated techniques such as computers, satellites etc. we include collecting large amount of information similar to business transaction, scientific data, medical data satellite data, surveillance(More)
With the accessing of millions of web pages for business and personal transactions, huge amounts of web page access data have been stored in web servers. The existing web pattern mining systems do not provide the necessary tools and functionality to capture all stored distributed web page sequences easily. Data mining represents the process of extracting(More)
We consider the problem of discovering frequent item sets and association rules between items in a large database of transactional databases acquired under uncertainty. A probabilistic database considered here is one in which with each transaction associated is a probability, represents the confidence that the transaction will occur with given associated(More)
Traffic modeling and classification find importance in many areas such as bandwidth management, traffic analysis, prediction and engineering, network planning, Quality of Service provisioning and anomalous traffic detection. Much of research work has been done in the area of network traffic classification by application type and several classifiers are(More)
Software security failures are common and a long standing challenge to the research community. We can conceptualize the vulnerability of an application through its attack surface size. A system's attack surface is an indicator of the system’s security. Unfortunately predicting software’s future attack surface size during design phase in earlier stage of(More)
Weka4WS adopts the emerging Web Services Resource Framework (WSRF) for accessing remote data mining algorithms and managing distributed computations. The Weka4WS user interface is a modified Weka Explorer environment that supports the execution of both local and remote data mining tasks. Workflow environments are widely used in data mining systems to manage(More)
  • 1