Loading...
  • Home
  • Search Results
761-762 of 4327 Papers

A NOVEL APPROACH FOR DYNAMIC CLASSIFICATION IN CRM USING FUZZY LOGIC

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): EKTA PATEL , FALGUNI SONI , KHUSHBU TAPIAWALA , RUTVIJ JHAVERI

Abstract: Customer Relationship Management (CRM) analyzes, classifies, examines and manages customer\'s needs according to their interest. In this paper, we propose an algorithm for grouping customers using fuzzy logic. The term fuzzy means not clear or blurred and fuzzy logic means representing variation or imprecision in logic. We use fuzzy logic, and not other mining and statistical methods, to dynamically classify the customers. As a result, we dynamically classify customers into more than one groups at the same time. The algorithm calculates the customer\'s chance of belonging to a particular group on the basis of probabilities without using any prior information. Fixed number of groups is not given as input because groups are dynamically generated according to the requirement

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-24
  • Views: 0
  • Downloads: 0

FRAMEWORK FOR CHOOSING BEST INTRUSION DETECTION AND PREVENTION SYSTEM FOR AN ORGANIZATION

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): BILAL MAQBOOL BEIGH , MUSHTAQ AHMAD PEER

Abstract: In today’s world, where every organization relay on computer systems and stores it’s all critical information on the computer systems via online and off-line systems. Critical information is being sent via network. But in recent time’s computer system are facing problems in the form of malicious data which can cause different problems such as denial of services, information theft, information lost etc. Till date many detection and prevention techniques are available in market, but how an organization will choose the best security policy for it remains a big issue for researchers and security professionals. In order to solve this issue we are devising a framework in terms of guidelines for choosing best intrusion detection system for your organization. The results of current research are very useful for educational purpose and organization who are interested in intrusion detection systems (IDSs).

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-27
  • Views: 0
  • Downloads: 0