Research Article
A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
| K | 4 | 10 | 14 | 40 | Algorithm | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | HDFS |
| Incognito | 82.99 | 81.8 | 83.03 | 81.3 | 83.04 | 81.8 | 83.04 | 81.8 | Mondrian | 83 | 81.94 | 83.02 | 81.95 | 83.06 | 81.94 | 83.02 | 81.93 | Datafly | 83.2 | 81.96 | 83.21 | 81.96 | 83.2 | 81.98 | 83.2 | 81.98 | ECC-ACO | 85.32 | 81.84 | 85.32 | 81.84 | 85.32 | 81.84 | 85.32 | 81.84 |
|
|