Research Article
A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
| K | 4 | 10 | 14 | 40 | Algorithm | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | HDFS |
| Incognito | 0.836 | 0.808 | 0.838 | 0.801 | 0.836 | 0.806 | 0.836 | 0.806 | Mondrian | 0.832 | 0.808 | 0.83 | 0.808 | 0.83 | 0.808 | 0.831 | 0.808 | Datafly | 0.84 | 0.809 | 0.839 | 0.809 | 0.839 | 0.809 | 0.838 | 0.814 | ECC-ACO | 0.842 | 0.809 | 0.842 | 0.809 | 0.842 | 0.809 | 0.842 | 0.809 |
|
|