نتایج جستجو برای: j48

تعداد نتایج: 584  

2011
Chandra Shekar Kathy J. Liszka Chien-Chung Chan

Twitter presents a new forum for spammers to facilitate illegal pharmaceutical scams. We present a classification scheme using decision strategy and data mining techniques taking into account the unbalanced nature of the data set. Four classifiers are used to identify pharmaceutical spam tweets. Classifiers J48 and Random Tree (RT) are generated by Weka tools, and classifiers DL(J48) and DL(RT)...

Journal: :Applied sciences 2022

The objective of this study was to reveal the usefulness image processing and machine learning for non-destructive evaluation changes in mint leaves caused by two natural drying techniques. effects shade open-air sun on ventral side (upper surface) dorsal (lower were compared. Texture parameters extracted from digital color images converted channels R, G, B, L, a, b, X, Y, Z. Models based featu...

Journal: :Procesamiento del Lenguaje Natural 2017
Daniel Ferrés Ahmed AbuRa'ed Horacio Saggion

Morphological Generation is the task of producing the appropiate inflected form of a lemma in a given textual context and according to some morphological features. This paper describes and evaluates wide-coverage morphological lexicons and a Decision Tree algorithm that perform Morphological Generation in Spanish at state-of-the art level. The Freeling, Leffe and Apertium Spanish lexicons, the ...

Journal: :Paradigma - Jurnal Komputer dan Informatika 2020

Journal: :International Journal of Scientific Research in Science, Engineering and Technology 2020

2012
Christopher Sibona Jon Brickey

This research uses four classification algorithms in standard and boosted forms to predict members of a class for an online community. We compare two performance measures, area under the ROC (Receiver Operating Characteristic) curve (AUC) and accuracy in the standard and boosted forms. The research compares four popular algorithms Bayes, logistic regression, J48 and Nearest Neighbor (NN). The a...

2011
Aman Kumar Sharma Suruchi Sahni Abdelghani Bellaachia Erhan Guven Dongil Shin Dongkyoo Shin

In recent years email has become one of the fastest and most economical means of communication. However increase of email users has resulted in the dramatic increase of spam emails during the past few years. Data mining -classification algorithms are used to categorize the email as spam or non-spam. In this paper, we conducted experiment in the WEKA environment by using four algorithms namely I...

2006
Seongwook Youn Dennis McLeod

Email has become one of the fastest and most economical forms of communication. However, the increase of email users have resulted in the dramatic increase of spam emails during the past few years. In this paper, email data was classified using four different classifiers (Neural Network, SVM classifier, Naïve Bayesian Classifier, and J48 classifier). The experiment was performed based on differ...

2016
Ajeet Kumar Naman Sharma Abhishek Khanna Saurav Gandhi Jigar J. Mody Yongtao Hu Hengli Zhao Ming Xu Ning Zheng Jingjing Yao Qiang Hou

Study the behavior of malicious software, understand the security challenges, detect the malware behavior automatically using dynamic approach. Study various classification techniques and to group these malwares and able to cluster different malware into unknown group whose characteristics are not known. The classifiers used in this research are k-Nearest Neighbors (kNN), J48 Decision Tree, and...

Journal: :caspian journal of environmental sciences 2011
r. zarkami

in the present study, classification trees (cts-j48 algorithm) were used to study the occurrence of roach in rivers in flanders (belgium). the presence/absence of roach was modelled based on a set of river characteristics. the predictive performance of the cts models was assessed based on the percentage of correctly classified instances (cci) and cohen's kappa statistics. to find the best model...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید