نتایج جستجو برای: classification tree models j48
تعداد نتایج: 1478980 فیلتر نتایج به سال:
Using echocardiography flexible Transthoracic Echocardiography reported data set detecting heart disease by using mining techniques designed prediction model the data set can develop the reliability of analysis of cardiac diseases by echocardiography, using eight iterative and interactive steps consisting Knowledge Discovery in Database (KDD) methodology including from 209 patients with echocar...
In this paper, we propose a classification based approach to the morphological disambiguation for Turkish language. Due to complex morphology in Turkish, any word can get unlimited number of affixes resulting very large tag sets. The problem is defined as choosing one of parses of a word not taking the existing root word into consideration. We trained our model with well-known classifiers using...
Classification is a supervised learning approach, which maps a data item into predefined classes. There are various classification algorithms proposed in the literature. In this paper authors have used four classification algorithms such as J48, Random Forest (RF), Reduce Error Pruning (REP) and Logistic Model Tree (LMT) to classify the "WEATHER NOMINAL" open source Data Set. Waikato ...
Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...
High fire occurrence in Riau Province, Indonesia has been going on in the recent years with large areas occurring in the peat soil. In this paper a data mining technique namely classification was applied on forest fire data to develop classification models for hotspots occurrence in Riau Province. The models provide characteristics of areas where active fires occurred. We studied physical data ...
Intrusion detection systems (IDSs) are currently drawing a great amount of interest as a key part of system defence. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Recently, machine learning methodologies are playing an important role in detecting network intrusions (or attacks), which further helps...
The bank conducts an analysis or survey in the credit system to determine whether customer is eligible receive credit. With a case study of Bank BJB debtor data December 2021, classification was carried out by forming model using Naïve Bayes Classifier and Decision Tree J48. Thus it expected minimize occurrence bad loans. are divided into several categories: debtors with good, substandard, doub...
Background & objective: One of the common purposes of medical research is Determination of effective factors on the occurrence of event. Due to the interaction of risk factors regression models, discriminant analysis and classification procedures used. Uses of these models require making the assumption which in the medical data isn’t usually established. Therefore, alternative methods must be u...
Activity recognition has become the necessity of smart homes, future factories, and surveillance. Activities independent of body posture predominantly exhibiting gestures involving both arm and the wrist motion supports the use of the wearable sensors for data acquisition. This paper uses an algorithm based prediction method to recognize the Activities of Daily Life (ADL) involving activities l...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید