Research Article
A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
| | K | 4 | 10 | 14 | 40 | | Algorithm | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | | HDFS |
| | Incognito | 84.2 | 81.64 | 84.2 | 81.33 | 84.2 | 81.6 | 84.2 | 81.6 | | Mondrian | 84 | 81.82 | 83.96 | 81.82 | 83.99 | 81.83 | 84.04 | 81.84 | | Datafly | 84.24 | 81.84 | 84.24 | 81.84 | 84.28 | 81.84 | 84.26 | 82 | | ECC-ACO | 84.6 | 81.83 | 84.6 | 81.83 | 84.6 | 81.83 | 84.6 | 81.83 |
|
|