نتایج جستجو برای: sensitive j48

تعداد نتایج: 282594  

2013
V. Vaithiyanathan K. Rajeswari Kapil Tajane Rahul Pitale

In this paper different classification techniques of Data Mining are compared using diverse datasets from University of California, Irvine(UCI). Accuracy and time required for execution by each technique is observed. The Data Mining refers to extracting or mining knowledge from huge volume of data. Classification is an important data mining technique with broad applications. It classifies data ...

2014
Kailas Shivshankar Elekar

Internet growth has increased rapidly due to which number of network attacks have been increased. This emphasis importance of network intrusion detection systems (IDS) for securing the network. It is the process of monitoring and analyzing network traffic for detecting security violations many researcher suggested data mining technique such as classification, clustering ,pattern matching and ru...

2012
Rohit Arora R. Agrawal T. Imielinski A. N. Swami J. W. Shavlik R. J. Mooney

Data mining is the upcoming research area to solve various problems and classification is one of main problem in the field of data mining. In this paper, we use two classification algorithms J48 (which is java implementation of C4. 5 algorithm) and multilayer perceptron alias MLP (which is a modification of the standard linear perceptron) of the Weka interface. It can be used for testing severa...

2011
Chandra Shekar Kathy J. Liszka Chien-Chung Chan

Twitter presents a new forum for spammers to facilitate illegal pharmaceutical scams. We present a classification scheme using decision strategy and data mining techniques taking into account the unbalanced nature of the data set. Four classifiers are used to identify pharmaceutical spam tweets. Classifiers J48 and Random Tree (RT) are generated by Weka tools, and classifiers DL(J48) and DL(RT)...

Journal: :Applied sciences 2022

The objective of this study was to reveal the usefulness image processing and machine learning for non-destructive evaluation changes in mint leaves caused by two natural drying techniques. effects shade open-air sun on ventral side (upper surface) dorsal (lower were compared. Texture parameters extracted from digital color images converted channels R, G, B, L, a, b, X, Y, Z. Models based featu...

Journal: :Procesamiento del Lenguaje Natural 2017
Daniel Ferrés Ahmed AbuRa'ed Horacio Saggion

Morphological Generation is the task of producing the appropiate inflected form of a lemma in a given textual context and according to some morphological features. This paper describes and evaluates wide-coverage morphological lexicons and a Decision Tree algorithm that perform Morphological Generation in Spanish at state-of-the art level. The Freeling, Leffe and Apertium Spanish lexicons, the ...

Journal: :Paradigma - Jurnal Komputer dan Informatika 2020

Journal: :International Journal of Scientific Research in Science, Engineering and Technology 2020

2012
Christopher Sibona Jon Brickey

This research uses four classification algorithms in standard and boosted forms to predict members of a class for an online community. We compare two performance measures, area under the ROC (Receiver Operating Characteristic) curve (AUC) and accuracy in the standard and boosted forms. The research compares four popular algorithms Bayes, logistic regression, J48 and Nearest Neighbor (NN). The a...

2011
Aman Kumar Sharma Suruchi Sahni Abdelghani Bellaachia Erhan Guven Dongil Shin Dongkyoo Shin

In recent years email has become one of the fastest and most economical means of communication. However increase of email users has resulted in the dramatic increase of spam emails during the past few years. Data mining -classification algorithms are used to categorize the email as spam or non-spam. In this paper, we conducted experiment in the WEKA environment by using four algorithms namely I...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید