نتایج جستجو برای: j48
تعداد نتایج: 584 فیلتر نتایج به سال:
Twitter presents a new forum for spammers to facilitate illegal pharmaceutical scams. We present a classification scheme using decision strategy and data mining techniques taking into account the unbalanced nature of the data set. Four classifiers are used to identify pharmaceutical spam tweets. Classifiers J48 and Random Tree (RT) are generated by Weka tools, and classifiers DL(J48) and DL(RT)...
The objective of this study was to reveal the usefulness image processing and machine learning for non-destructive evaluation changes in mint leaves caused by two natural drying techniques. effects shade open-air sun on ventral side (upper surface) dorsal (lower were compared. Texture parameters extracted from digital color images converted channels R, G, B, L, a, b, X, Y, Z. Models based featu...
Morphological Generation is the task of producing the appropiate inflected form of a lemma in a given textual context and according to some morphological features. This paper describes and evaluates wide-coverage morphological lexicons and a Decision Tree algorithm that perform Morphological Generation in Spanish at state-of-the art level. The Freeling, Leffe and Apertium Spanish lexicons, the ...
This research uses four classification algorithms in standard and boosted forms to predict members of a class for an online community. We compare two performance measures, area under the ROC (Receiver Operating Characteristic) curve (AUC) and accuracy in the standard and boosted forms. The research compares four popular algorithms Bayes, logistic regression, J48 and Nearest Neighbor (NN). The a...
In recent years email has become one of the fastest and most economical means of communication. However increase of email users has resulted in the dramatic increase of spam emails during the past few years. Data mining -classification algorithms are used to categorize the email as spam or non-spam. In this paper, we conducted experiment in the WEKA environment by using four algorithms namely I...
Email has become one of the fastest and most economical forms of communication. However, the increase of email users have resulted in the dramatic increase of spam emails during the past few years. In this paper, email data was classified using four different classifiers (Neural Network, SVM classifier, Naïve Bayesian Classifier, and J48 classifier). The experiment was performed based on differ...
Study the behavior of malicious software, understand the security challenges, detect the malware behavior automatically using dynamic approach. Study various classification techniques and to group these malwares and able to cluster different malware into unknown group whose characteristics are not known. The classifiers used in this research are k-Nearest Neighbors (kNN), J48 Decision Tree, and...
in the present study, classification trees (cts-j48 algorithm) were used to study the occurrence of roach in rivers in flanders (belgium). the presence/absence of roach was modelled based on a set of river characteristics. the predictive performance of the cts models was assessed based on the percentage of correctly classified instances (cci) and cohen's kappa statistics. to find the best model...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید