Learn More
One of the most difficult problems in the design of an anomaly based intrusion detection system (IDS) that uses clustering is that of labelling the obtained clusters, i.e. determining which of them correspond to " good " behaviour on the network/host and which to " bad " behaviour. In this paper, a new clusters' labelling strategy, which makes use of a(More)
The purpose of the present study was to model the effects of the concentration of Eudragit L 100 and compression pressure as the most important process and formulation variables on the in vitro release profile of aspirin from matrix tablets formulated with Eudragit L 100 as matrix substance and to optimize the formulation by artificial neural network. As(More)
There is growing concern that pollution from petrochemical and oil refinery installations in Pancevo (Serbia) has increased the incidence of various diseases including cancer. The aim of our study was to investigate cancer incidence in Pancevo and to compare it with the region of central Serbia. Cancer incidence data were obtained from the corresponding(More)
Twitter has grown so rapidly that its users are suffering from an information ove rload. In order to help people to find interesting tweets and users from the enormous Twitter space, by applying the document similarity of Gerard Salton and Christopher Buckley to Twitter streaming data, we attempt to devise a content-based scheme that compares similarities(More)
  • 1