Survey on Data Mining Applications and Various Techniques of classification

Authors

  • Gagan Madaan  Assistant Professor, Department of Computer Science & Applications, S.U.S. Panjab University Constituent College Guru Harsahai, Punjab, India

Keywords:

Routing, non-repudiation, Byzantine failure, MANET, Security, Authentication, Integrity, Non-repudiation, Confidentiality, Key and Trust Management(KTM).

Abstract

Data Mining is method to extract hidden patterns from raw dataset. During this method classification of raw information has been done on the premise of various classification approaches. During this paper dataset classification has been finished extraction of various options and sophistication labels to raw info. Data processing victimization naive Bayes and tree primarily based classifier that's J48 classifier has been done. Tree primarily based classification divides dataset intro totally different roots and sub roots for classification of dataset. On the premise of these classifiers totally different parameters are analyzed for performance analysis. Naïve Bayes provides higher classification than tree primarily based classifier attributable to utilization of weight age issue.

References

  1. CLUSTERING AND CLASSIFICATION: DATA MINING APPROACHES by Ed Colet
  2. Support Vector Machine Solvers Leon Bottou NEC Labs America, Princeton, NJ 08540, USA Chih-Jen Lin cjlin@csie.ntu.edu.tw Department of Computer Science National Taiwan University, Taipei, Taiwan.
  3. Singh Vijendra. Efficient Clustering For High Dimensional Data: Subspace Based Clustering and Density Based Clustering, Information Technology Journal; 2011, 10(6), pp. 1092-1105.
  4. D Breiman, L., Friedman, J. H., Olshen, R. A., and Stone, C. J. "Classification and Regression Trees". Wadsworth International Group. Belmont, CA: The Wadsworth Statistics/Probability Series1984.
  5. Quinlan, J. R. "Induction of Decision Trees". Machine Learning; 1986,pp. 81-106.
  6. Quinlan, J. R. Simplifying "Decision Trees. International Journal of Man-Machine Studies" ;1987, 27:pp. 221-234.
  7. Gama, J. and Brazdil, P. "Linear Tree. Intelligent DataAnalysis",1999,.3(1): pp. 1-22.
  8. M. Ramaswami et al., "A CHAID Based Performance Prediction Model in Educational Data Mining," IJCSI International Journal of Computer Science Issues, vol. 7, Issue 1, no. 1, January 2010, ISSN (Online): 1694-0784.
  9. P. Cortez and A. Silva, "Using Data Mining To Predict Secondary School Student Performance," In EUROSIS, A. Brito and J. Teixeira (Eds.), pp. 5-12, 2008.
  10. Q. A. AI-Radaideh, E. M. AI-Shawakfa, and M. I. AI-Najjar, "Mining Student Data using Decision Trees,," International Arab Conference on Information Technology(ACIT'2006), Yarmouk University, Jordan.
  11. Hejab M. Alfawareh "Resolving Ambiguous Preposition Phrase for Text Mining Applications" Computer application technology (ICCAT) international conference (2013), Pp 1-5.
  12. Shaidah Jusoh and Hejab M. Alfawareh, "Techniques, Applications and Challenging Issue in Text Mining" IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 2, November 2012.
  13. Ning Zhong, Yuefeng Li, and Sheng-Tang Wu, " Effective Pattern Discovery for Text Mining" IEEETransactions on Knowledge and Data Engineering, Vol. 24, No. 1, January 2012.
  14. Mrs. Sayantani Ghosh, Mr. Sudipta Roy, and Prof. Samir K. Bandyo padhyay, "A tutorial review on Text Mining Algorithms" International Journal of Advanced Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2012

Downloads

Published

2017-12-30

Issue

Section

Research Articles

How to Cite

[1]
Gagan Madaan, " Survey on Data Mining Applications and Various Techniques of classification, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 8, pp.1105-1108, November-December-2017.