Research Article
A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques
| | K | 4 | 10 | 14 | 40 | | Algorithm | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | J48 classifier | NB classifier | | HDFS |
| | Incognito | 0.818 | 0.809 | 0.819 | 0.81 | 0.819 | 0.809 | 0.819 | 0.809 | | Mondrian | 0.818 | 0.809 | 0.818 | 0.809 | 0.819 | 0.809 | 0.818 | 0.809 | | Datafly | 0.821 | 0.81 | 0.821 | 0.81 | 0.821 | 0.81 | 0.821 | 0.81 | | ECC-ACO | 0.849 | 0.808 | 0.849 | 0.808 | 0.849 | 0.808 | 0.849 | 0.808 |
|
|