نتایج جستجو برای: sensitive j48

تعداد نتایج: 282594  

2010
Kusum Bharti Shweta Jain Sanyam Shukla Junjie Li

Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection. This work evaluates the performance of unsupervised learning techniques over benchmark intrusion detection datasets. The model generation is computation intensive, hence to redu...

Journal: :CoRR 2013
Kyongche Kang Jack Michalak

Machine Learning focuses on the construction and study of systems that can learn from data. This is connected with the classification problem, which usually is what Machine Learning algorithms are designed to solve. When a machine learning method is used by people with no special expertise in machine learning, it is important that the method be ‘robust’ in classification, in the sense that reas...

2014
S. K. Jayanthi

-2007 Link-based features Dataset is used for the -based features. The

2012
Kaveh Mollazade Hojat Ahmadi Mahmoud Omid Reza Alimardani

Recently, the issue of machine condition monitoring and fault diagnosis as a part of maintenance system became global due to the potential advantages to be gained from reduced maintenance costs, improved productivity and increased machine availability. The aim of this work is to investigate the effectiveness of a new fault diagnosis method based on power spectral density (PSD) of vibration sign...

2013
T. Karthikeyan P. Thangaraju Arun K. Pujari Jiawei Han Micheline Kamber Diana Dumitru

This paper mainly deals with various classification algorithms namely, Bayes. NaiveBayes, Bayes. BayesNet, Bayes. NaiveBayesUpdatable, J48, Randomforest, and Multi Layer Perceptron. It analyzes the hepatitis patients from the UC Irvine machine learning repository. The results of the classification model are accuracy and time. Finally, it concludes that the Naive Bayes performance is better than...

Journal: :International Journal of Computer Applications 2015

Journal: :International Journal of Network Security & Its Applications 2017

2010
V. Ravi

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of business data, financial data, networked data and medical data. The goal of data mining is approaches are to develop generalized knowledge rather than identify specific information against specific individual. There has been growing concern that use of this technology is violating individual privac...

Journal: :IJSI 2018
Mohamed K. Elhadad Khaled M. Badran Gouda I. Salama

Thetaskofextractingtheusedfeaturevectorinminingtasks(classification,clustering...etc.)is consideredthemostimportanttaskforenhancingthetextprocessingcapabilities.Thispaperproposes anovelapproachtobeusedinbuildingthefeaturevectorusedinwebtextdocumentclassification process;addingsemanticsinthegeneratedfeaturevector.Thisapproachisbasedonuti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید