To search, Click below search items.
All Published Papers Search Service
Title
Anti ? Counterfeiting Detection for Near Field Communication (NFC) ? Enabled Logistics
Author
Manmeet Mahinderjit Singh, Tan Han Yee, and Rohail Hassan
Vol. 18 No. 2 pp. 63-73
Keywords
Near Field Communication (NFC), Tags, Counterfeiting, J48 technique, Logistics, Security attack.
Educational Data Mining for Supporting Students' Courses Selection
Thi Yen Tran, Ba Lam To
Vol. 19 No. 7 pp. 106-110
Educational Data Mining, Apriori, J48, K-Means
State-of-the-art Machine Learning Classifiers: A Comparative Study on Health Data
Sadia Maqsood and Muhammad Sheraz Arshad Malik
Vol. 19 No. 9 pp. 96-102
LMT (Logistic Model Tree), SMO (Sequential Minimal Optimization), JRip (Java Repeated Incremental Pruning) and J48 Decision Tree, Medical data analyses.
An Analysis of Various Social Engineering Attack in Social Network using Machine Learning Algorithm
Dalal Al-dablan, Amal Al-hamad, Raghad Al-Bahlal, and Maria Altaib Badawi
Vol. 20 No. 10 pp. 46-49
Social Engineering, Social engineering attacks, J48 algorithm, Uniform Resource Locator (URL).