نتایج جستجو برای: classification trees j48

تعداد نتایج: 573912  

2009
Thomas Scalea

s Accepted or Presented since last Annual Report Prediction of MortalitySlaughter G, Kurtz Z, desJardins M, Hu PF, Mackenzie C, Stansbury L, Stein DM.2012 IEEE Biomedical Circuits & Systems conference, Nov 28-30, Taiwan Abstract— Real-time patient monitoring data collected over the course of trauma care are often large inquantities and require systematic representation that can comb...

Dekamini, Fatemeh, Ehsanifar, Mohammad,

Background: Diabetes is one of the major health problems in Iran and about 4.6 million adults suffer from this disease. Poor diagnosis of this disease has caused half of this number to be unaware of their disease. In recent years, along with the use of computers in data analysis and storage, the volume and complexity of data has increased dramatically. Methods: In health organizations, data pl...

Introduction: The early diagnosis of breast cancer as prevalent cancer among women, is a necessity in the research on cancers since it could simplify the clinical management of other patients. The importance of the classification of breast cancer patients into high- or low-risk groups has led research groups in the biomedical and informatics departments to evaluate and use computer techniques s...

Introduction: The early diagnosis of breast cancer as prevalent cancer among women, is a necessity in the research on cancers since it could simplify the clinical management of other patients. The importance of the classification of breast cancer patients into high- or low-risk groups has led research groups in the biomedical and informatics departments to evaluate and use computer techniques s...

2012
Mahani Saron Zulaiha Ali Othman

In higher education such as university, academic is becoming major asset. The performance of academic has become a yardstick of university performance. Therefore it's important to know the talent of academicians in their university, so that the management can plan for enhancing the academic talent using human resource data. Therefore, this research aims to develop an academic talent model using...

Journal: :Science, engineering and technology 2021

Network traffic recognition serves as a basic condition for network operators to differentiate and prioritize number of purposes, from guaranteeing the Quality Service (QoS), monitoring safety, well detecting anomalies. Web Real-Time Communication (WebRTC) is an open-source project that enables real-time audio, video, text communication among browsers. Since WebRTC does not include any characte...

Journal: :IEEE Access 2021

Cervical cancer is a potentially life-threatening disease marked by health practitioners. The late diagnosis and treatment, being quite challenging, stake the precious lives of patients. In both developed undeveloped states, formal screening for identification suffers due to its medical cost, unavailable facilities, society norms, appearance symptoms. Machine intelligence cost-effective, comput...

Journal: :CoRR 2016
Adwan Yasin Abdelmunem Abuhasan

Phishing attacks are one of the trending cyber-attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling users to reveal their sensitive information, the most popular communication channel to those messages is through users’ emails. This paper presents an intelligent classification model for detecting phishing emails using knowle...

2016

with the exponential growth of social media i.e. blogs and social networks, organizations and individual persons are increasingly using the number of reviews of these media for decision making about a product or service. Opinion mining detects whether the emotions of an opinion expressed by a user on Web platforms in natural language, is positive or negative. This paper presents extensive exper...

2018
G. ROOPA

Data mining has become one of the emerging fields in research because of its vast contents. Data mining is used for finding hidden patterns in the database or any other information repository. This information is necessary to generate knowledge from the patterns. The main task is to extract knowledge out of the information. In this paper we use a data mining technique called classification to d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید