SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290
3640
Classification Algorithms with Attribute
Selection: an evaluation study using WEKA
Dr Gnanambal S
Department of Computer Science, Raja Dorai Singam Govt Arts College, Sivagangai
Email: gnanardm@gmail.com
Dr Thangaraj M
Department of Computer Science, Madurai kamaraj University, Madurai
Email: thangarajmku@yahoo.com
Dr Meenatchi V.T
Department of CA & IT, Thiagarajar College, Madurai
Email: vtmeenatchi@gmail.com
Dr Gayathri V
Department of CA, NIT, Tiruchi
Email: debuggay3@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Attribute or feature selection plays an important role in the process of data mining. In general the dataset
contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a
comparative evaluation study of classification algorithms before and after attribute selection using Waikato
Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of
the classification algorithm, improves after performing attribute selection. This will reduce the work of processing
irrelevant attributes.
Keywords – attribute filters, attribute selection, classification, data mining, Weka
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 04, 2018 Date of Acceptance: April 18, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Classification is the one of the main technique
used for discovering pattern from known classes [1]. In
real word, dataset contains hundreds of attributes. But not
all the attributes are needed to complete the mining task
[2]. In order to find the importance of attributes, feature
selections algorithms are utilized. Instead of processing all
the attributes, only relevant attributes are involved in the
mining process. This will reduce processing time as well
as increase the performance of mining task. Therefore
attribute selection algorithms are applied before applying
data mining tasks such as classification, clustering, outlier
analysis and so on.
Attribute selection is a two step process one is subset
generation and another one is ranking. Subset generation is
a searching process which is used to compare the
candidate subset to the subset already determined [3]. If
the new candidate subset returns better results in terms of
certain evaluation then the new subset is termed as best
one. This process is continued until termination condition
is reached.
The next one is Ranking of attributes which is used to
find the importance of attributes [4]. There are many
ranking methods such as which are mostly based on
statistics or information theory. There are two varieties of
attributes selection algorithms. i) Filter approach ii)
Wrapper approach. The learning algorithms itself uses the
attribute selection task then it is called wrapper approach
[5]. In filter approach the attributes are evaluated on the
basis of evaluation metrics with respect to the
characteristics of the dataset [6]. The Table 1 lists the
comparison between filter and wrapper approach in terms
of computational time, attribute dependencies and so on.
Table 1: Comparison between filter and wrapper approach
Filter Wrapper
Computational
time
Simple and fast Complex and
Slower
In terms of
attribute
dependencies
Only to Some
degree
Fully
incorporated
Cost Less expensive Expensive
Scaling ability to
high dimensional
dataset
Easy Complex
This research article is organized as five sections: Of
which, Section 1 is the introduction to attribute selection
and its approaches, Section 2 is devoted to the related
literatures, Section 3 presents the adopted dataset and
algorithms utilized. Section 4 deals with the Experimental
results of classifier with respect to precision, recall and F-
measure before and after attribute selection. Section 5
records the conclusion.
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290
3641
II. RELATED LITERATURES
This paper [7] presents the introduction about the various
classification and feature selection techniques frequently
used data mining. It also states the importance of filter and
wrapper approaches of feature selection methods. But this
study does not contribute to any experimental study.
This study [8] is applied to predict studence
performance. For that purpose feature selection techniques
such as Chi-square, InfoGain, and GainRatio are utilized.
Then classification task is carried out by the use of
NBTree, MultilayerPerceptron, NaiveBayes and Instance
based –K- nearest neighbor classifiers. The result
concludes that the accuracy of the prediction was
improved because of the applied filter techniques. But
there is no comparative study presented to compare the
filter and wrapper approaches.
This comparative study [9] determines the most relevant
subset of attributes based minimum cardinality. In order to
find the goodness of features, the six feature selection
algorithms are involved in this study. It can be measured
in terms of F-measure and ROC value. The result assures
that the computational time and cost is decreased with
minimum number of features.
There are many number feature selection algorithms
available today. Hence this paper [10] presents the benefits
and drawbacks of the some feature selection algorithms in
terms of efficiency. Nearly 12 feature selection algorithms
are involved in this study.
III. DATASET AND OUTCOME OF
PREDICTION
The main goal of this paper is to apply the filter
approach in a credit dataset of Germany. This dataset
contains 21 attributes. The attributes of the
germany_credit dataset is listed in Table 2.
This evaluation study is implemented in the data
mining tool, WEKA . The three filter approaches are
applied to the dataset i) CfsSubsetEval (CSE) ii)
CorrelationBased Feature Selection (CB) iii) GainRatio
Attribute evaluation (GR) iv) InformationGain Attribute
evaluation (IG). These four approaches are explained
below.
CfsSubsetEval (CSE):
This method measures the significance of attributes on
the basis of predictive ability of attributes and its degree of
redundancy. The subsets which are having less inter-
correlation but highly correlated to the target class are
preferred. This attribute evaluator with the Breadth First
Search is applied to the german_credit dataset. The
ranking of first five attributes are taken into accounts
which are 1. checkingstatus, 2. duration, 3.history, 4.
credit-amt, 5. savings-status. Fig 1 shows the ranking of
attributes with respect to CfsSubsetEval method.
Correlation Attribute Eval (CA):
CA evaluates the attributes with respect to the target
class. Pearson’s correlation method is used to measure the
correlation between the each attributes and target class
attribute. It considers nominal attributes in value basis and
each value acts as an indicator. . By the combination of
this attribute evaluator with the Ranking method of Search
is applied to the german_credit dataset. The ranking of
first five attributes are taken into accounts which are
1.checkingstatus, 2.duration, 3.credit-amt, 4.savings-status
and 5.housing. Fig 2 shows the ranking of attributes with
respect to Correlation Attribute Eval method.
Table 2: Attributes list of german_credit dataset
No Attribute name Range
1 checking_status {<0|>=200|no
checking|<200}
2 Duration 4 to 60
3 credit_history 'critical’|’other existing
credit'| 'existing paid'|
'delayed previously'| 'no
credits’|’all paid'
4 Purpose radio/tv| education|
furniture/equipment|new
car|old car| business|
repairs
5 credit_amount 250 to 18424
6 savings_status <100|>500|<1000| 'no
known savings'|>1000
7 Foreign_worker {yes|no}
8 Housing {own|rent|for free}
9 employment 1 to 7
10 installment_commitment 1 to 4
11 personal_status {'male single'|'female
div/dep/mar'|'male
div/sep'|'male mar/wid'}
12 other_parties {none|guarantor}
13 residence_since 1 to 4
14 property_magnitude {'real estate'|car|'life
insurance'|’no known
property’
15 Age 21 to 67
16 other_payment_plans {bank|none}
17 existing_credits 1 or 2
18 job {'unskilled
resident'|’skilled’|’ 'high
qualif/self emp/mgmt'|
19 num_dependents 1 or 2
20 own_telephone Yes or no
21 class Good|bad
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290
3642
Fig 1: Ranking of attributes with respect to CfsSubsetEval
method
Fig 2: Ranking of attributes with respect to Correlation
Attribute Eval (CA) method
GainRatio Attribute evaluation (GA):
This method measures the significance of attributes with
respect to target class on the basis of gain ratio. It can be
calculated by the following formula,
GainR(Class, Attribute) = (H(Class) - H(Class | Attribute))
/ H(Attribute)
Where H represents the Entropy. This attribute evaluator
with the Ranker Searching is applied to the german_credit
dataset. The ranking of first five attributes are taken into
accounts which are 1. checkingstatus, 2.duration,
3.history, 4.forien and 5.credit-amt. Fig 3 shows the
ranking of attributes with respect to GainRatio Attribute
evaluation method.
Fig 3: Ranking of attributes with respect to GainRatio
Attribute evaluation method
Information Gain Attribute evaluation (IG):
This method measures the significance of attribute by
the measure of information gain calculated with respect to
target class. It can be calculated by the formula,
InfoGain(Class,Attribute) = H(Class) - H(Class | Attribute)
Where H represents the Entropy. By the combination of
this attribute evaluator with the Ranking method of Search
is applied to the german_credit dataset. The ranking of
first five attributes are taken into accounts which are
1.checkingstatus, 2.duration, 3.credit-amt, 4.savings-status
and 5.housing. Fig 4 shows the ranking of attributes with
respect to InformationGain Attribute evaluation method.
Fig 4: Ranking of attributes with respect to
InformationGain Attribute evaluation method
This aforementioned attribute selection
algorithms results the ranking of attributes. Based on the
returned ranking of attributes, the dataset is modified. That
is, the irrelevant attributes are removed. This modified
dataset is involved into the classification task. Then the
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290
3643
result of classifier before and after attribute selection is
compared. For that purpose the PART classifier is
utilized. The summary of the PART learning algorithm is
given below.
PART is a decision list generation algorithm. It is
a clone of C4.5 decision tree learner [11]. PART generates
more number of rules than other algorithms. The main
feature of PART is that it doesn’t contain the global
optimization phase. Instead PART uses separate and
conquer strategy to create rules. The PART algorithm
utilizes the pessimistic pruning. PART algorithm generates
a decision tree and it consists of branches to unexpanded
subtrees. In PART the tree construction and pruning
operations are combined to produce the subtree which
cannot be expanded further. A rule is derived from a
partial tree. Each leaf drives a rule and the best leaf is
selected from which leaf that travels more number of
instances is expanded into leaves.
IV. EXPERIMENTAL RESULTS
The PART classifier is first applied to the
german_credit dataset then the classifier is applied to
modified dataset with respect to attribute evaluator. Then
compare the results of PART with original dataset and the
modified dataset after selecting the attributes with respect
to the four attribute evaluator methods. The Fig 5 shows
the results of PART classifier with respect to the original
german_credit dataset. The Table 3 presents the results of
PART classifier after applying the four attribute evaluators
with respect to Precision, Recall, F-measure and Mean
absolute error. The results shows that the combination of
PART classifier with CfsSubsetEval attribute evaluator
performs well in terms of precision, recall, f-measure. This
CfsSubsetEval method also reduces the mean absolute
error of the PART classifier.
Fig 5 results of PART classifier with respect to the
original german_credit dataset
Table 3: Results of PART classifier after applying the four
attribute evaluators
The results of the PART classifier with respect to the four
attribute evaluators are also presented as graph in Fig 6.
This graph shows the comparison of four evaluators
adapted to the PART classifier with respect average
precsion, recall and f-measure.
Fig 6: Metrics of PART classifier with respect to four
evaluators.
CES
CA
GA
IG
0.68 0.7 0.72 0.74
Avg.F-Measure
Avg.Recall
Avg.Precision
Evaluator Avg.Pr
ecision
Avg.
Reca
ll
Avg.F-
Measur
e
Avg.Me
an-
absolut
e error
CfsSubsetE
val (CSE)
0.725 0.73
6
0.729 0.314
Correlation
Attribute
Eval (CA)
0.706 0.71
6
0.714 0.341
GainRatio
Attribute
evaluation
(GA)
0.699 0.71
7
0.703 0.343
Informatio
nGain
Attribute
evaluation
(IG)
0.722 0.73
3
0.726 0.324
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290
3644
V. CONCLUSION
This study compares the four basic attribute selection
algorithms with the utilized PART classifier in terms of
precision , recall , F-measure and mean absolute error. The
study concludes that the performance metrics of the
classifier increases with respect to the attribute evaluator.
The PART classifier returns good results when it evaluates
the attributes by the CfsSubsetEval method for the
german_credit dataset.
REFERENCES
[1] Meenatchi V.T, Gnanambal S, et.al, Comparative
Study and Analysis of Classification Algorithms
through Machine Learning, International Journal of
Computer Engineering and Applications, 9(1),247-
252,2018.
[2] Hany M. Harb1, Malaka A. Moustafa, Selecting
optimal subset of features for student performance
model, IJCSI , 9(5), 2012, 1694-0814
[3] Hwang, Young-Sup,Wrapper-based Feature Selection
Using Support Vector Machine, Department of
Computer Science and Engineering, Sun Moon
University, Asan, Sunmoonro, Korea, Life
Science Journal,11 (7), 221-70,2014.
[4] Wang Liping, Feature Selection Algorithm Based
On Conditional Dynamic Mutual Information,
International Journal Of Smart Sensing and
Intelligent Systems,8(1), 2015.
[5] Qinbao Song, Jingjie Ni and Guangtao Wang, A
Fast Clustering-Based Feature Subset Selection
Algorithm for High-Dimensional Data, IEEE
Transactions on Knowledge and Data Engineering,
25(1), 2013.
[6] Z.Zhao, H.Liu, On Similarity Preserving Feature
Selection, IEEE Transactions on Knowledge and
Data Engineering, 25(3), 2013.
[7] Sunita Beniwal and Jitender Arora, Classification
and Feature Selection Techniques in Data Mining,
International Journal of Engineering Research &
Technology (IJERT), 1(6), 2012.
[8] Mital Doshi and Setu K Chaturvedi, Correlation
Based Feature Selection (Cfs) Technique To Predict
Student Perfromance, International Journal of
Computer Networks & Communications
(IJCNC),6(3),2014.
[9] M. Ramaswami and R. Bhaskaran,A Study on
Feature Selection Techniques in Educational Data
Mining, Journal Of Computing,1(1),December
2009.
[10] K.Sutha and J. Jebamalar Tamilselv, A Review of
Feature Selection Algorithms for Data Mining
Techniques, International Journal on Computer
Science and Engineering (IJCSE), 7(6), ,2015.
[11] Gnanambal S and Thangaraj M, A new architectural
framework for Rule Based Healthcare System using
Semantic Web Technologies, International Journal
of Computers in Healthcare, Inderscience, 2(1),
2014, 1-14. ISSN: 1755-3202.

Contenu connexe

Tendances

Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...
Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...
Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...IRJET Journal
 
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET Journal
 
Ontologies mining using association rules
Ontologies mining using association rulesOntologies mining using association rules
Ontologies mining using association rulesChemseddine Berbague
 
IRJET- Online Course Recommendation System
IRJET- Online Course Recommendation SystemIRJET- Online Course Recommendation System
IRJET- Online Course Recommendation SystemIRJET Journal
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryWaqas Tariq
 
Paper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityPaper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityGon-soo Moon
 
Study of relevancy, diversity, and novelty in recommender systems
Study of relevancy, diversity, and novelty in recommender systemsStudy of relevancy, diversity, and novelty in recommender systems
Study of relevancy, diversity, and novelty in recommender systemsChemseddine Berbague
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionCSCJournals
 
On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...UniversitasGadjahMada
 
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMS
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMSMULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMS
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMSijcsit
 
Estimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachEstimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachcsandit
 
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHcscpconf
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...eSAT Journals
 
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Ferhat Ozgur Catak
 
final report (ppt)
final report (ppt)final report (ppt)
final report (ppt)butest
 
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...IRJET Journal
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemslaxmanLaxman03209
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...csandit
 
Fuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW AlgorithmFuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW Algorithmijceronline
 

Tendances (19)

Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...
Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...
Selecting Best Tractor Ranking Wise by Software using MADM(Multiple –Attribut...
 
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
 
Ontologies mining using association rules
Ontologies mining using association rulesOntologies mining using association rules
Ontologies mining using association rules
 
IRJET- Online Course Recommendation System
IRJET- Online Course Recommendation SystemIRJET- Online Course Recommendation System
IRJET- Online Course Recommendation System
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
 
Paper-Allstate-Claim-Severity
Paper-Allstate-Claim-SeverityPaper-Allstate-Claim-Severity
Paper-Allstate-Claim-Severity
 
Study of relevancy, diversity, and novelty in recommender systems
Study of relevancy, diversity, and novelty in recommender systemsStudy of relevancy, diversity, and novelty in recommender systems
Study of relevancy, diversity, and novelty in recommender systems
 
Independent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face RecognitionIndependent Component Analysis of Edge Information for Face Recognition
Independent Component Analysis of Edge Information for Face Recognition
 
On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...
 
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMS
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMSMULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMS
MULTI-PARAMETER BASED PERFORMANCE EVALUATION OF CLASSIFICATION ALGORITHMS
 
Estimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approachEstimating project development effort using clustered regression approach
Estimating project development effort using clustered regression approach
 
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACHESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
ESTIMATING PROJECT DEVELOPMENT EFFORT USING CLUSTERED REGRESSION APPROACH
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...
 
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
Fuzzy Analytic Hierarchy Based DBMS Selection In Turkish National Identity Ca...
 
final report (ppt)
final report (ppt)final report (ppt)
final report (ppt)
 
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
Comparative Analysis of Machine Learning Algorithms for their Effectiveness i...
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problems
 
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
IMPROVING SUPERVISED CLASSIFICATION OF DAILY ACTIVITIES LIVING USING NEW COST...
 
Fuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW AlgorithmFuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW Algorithm
 

Similaire à Classification Algorithms with Attribute Selection: an evaluation study using WEKA

INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...IJDKP
 
IRJET- Customer Relationship and Management System
IRJET-  	  Customer Relationship and Management SystemIRJET-  	  Customer Relationship and Management System
IRJET- Customer Relationship and Management SystemIRJET Journal
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET Journal
 
Performance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRPerformance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRAM Publications
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET Journal
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsIRJET Journal
 
Loan Analysis Predicting Defaulters
Loan Analysis Predicting DefaultersLoan Analysis Predicting Defaulters
Loan Analysis Predicting DefaultersIRJET Journal
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...IRJET Journal
 
Graduate Admission Predictor
Graduate Admission PredictorGraduate Admission Predictor
Graduate Admission PredictorIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Booster in High Dimensional Data Classification
Booster in High Dimensional Data ClassificationBooster in High Dimensional Data Classification
Booster in High Dimensional Data Classificationrahulmonikasharma
 
Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...IRJET Journal
 
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWSUNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWSIJDKP
 
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS IJDKP
 

Similaire à Classification Algorithms with Attribute Selection: an evaluation study using WEKA (20)

INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
INTEGRATED ASSOCIATIVE CLASSIFICATION AND NEURAL NETWORK MODEL ENHANCED BY US...
 
DataMining_CA2-4
DataMining_CA2-4DataMining_CA2-4
DataMining_CA2-4
 
IRJET- Customer Relationship and Management System
IRJET-  	  Customer Relationship and Management SystemIRJET-  	  Customer Relationship and Management System
IRJET- Customer Relationship and Management System
 
IRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data MiningIRJET- A Detailed Study on Classification Techniques for Data Mining
IRJET- A Detailed Study on Classification Techniques for Data Mining
 
Performance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDRPerformance Comparison of Dimensionality Reduction Methods using MCDR
Performance Comparison of Dimensionality Reduction Methods using MCDR
 
IRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering TechniqueIRJET- Automated CV Classification using Clustering Technique
IRJET- Automated CV Classification using Clustering Technique
 
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...
 
Survey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy AlgorithmsSurvey paper on Big Data Imputation and Privacy Algorithms
Survey paper on Big Data Imputation and Privacy Algorithms
 
Ijmet 10 01_141
Ijmet 10 01_141Ijmet 10 01_141
Ijmet 10 01_141
 
Loan Analysis Predicting Defaulters
Loan Analysis Predicting DefaultersLoan Analysis Predicting Defaulters
Loan Analysis Predicting Defaulters
 
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
E-Healthcare monitoring System for diagnosis of Heart Disease using Machine L...
 
Graduate Admission Predictor
Graduate Admission PredictorGraduate Admission Predictor
Graduate Admission Predictor
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
Gc3310851089
Gc3310851089Gc3310851089
Gc3310851089
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Booster in High Dimensional Data Classification
Booster in High Dimensional Data ClassificationBooster in High Dimensional Data Classification
Booster in High Dimensional Data Classification
 
Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...
 
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWSUNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
 
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
UNDERSTANDING CUSTOMERS' EVALUATIONS THROUGH MINING AIRLINE REVIEWS
 

Plus de Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHBandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
 

Plus de Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHBandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASH
 

Dernier

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Classification Algorithms with Attribute Selection: an evaluation study using WEKA

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290 3640 Classification Algorithms with Attribute Selection: an evaluation study using WEKA Dr Gnanambal S Department of Computer Science, Raja Dorai Singam Govt Arts College, Sivagangai Email: gnanardm@gmail.com Dr Thangaraj M Department of Computer Science, Madurai kamaraj University, Madurai Email: thangarajmku@yahoo.com Dr Meenatchi V.T Department of CA & IT, Thiagarajar College, Madurai Email: vtmeenatchi@gmail.com Dr Gayathri V Department of CA, NIT, Tiruchi Email: debuggay3@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Attribute or feature selection plays an important role in the process of data mining. In general the dataset contains more number of attributes. But in the process of effective classification not all attributes are relevant. Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes. Keywords – attribute filters, attribute selection, classification, data mining, Weka -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: April 04, 2018 Date of Acceptance: April 18, 2018 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Classification is the one of the main technique used for discovering pattern from known classes [1]. In real word, dataset contains hundreds of attributes. But not all the attributes are needed to complete the mining task [2]. In order to find the importance of attributes, feature selections algorithms are utilized. Instead of processing all the attributes, only relevant attributes are involved in the mining process. This will reduce processing time as well as increase the performance of mining task. Therefore attribute selection algorithms are applied before applying data mining tasks such as classification, clustering, outlier analysis and so on. Attribute selection is a two step process one is subset generation and another one is ranking. Subset generation is a searching process which is used to compare the candidate subset to the subset already determined [3]. If the new candidate subset returns better results in terms of certain evaluation then the new subset is termed as best one. This process is continued until termination condition is reached. The next one is Ranking of attributes which is used to find the importance of attributes [4]. There are many ranking methods such as which are mostly based on statistics or information theory. There are two varieties of attributes selection algorithms. i) Filter approach ii) Wrapper approach. The learning algorithms itself uses the attribute selection task then it is called wrapper approach [5]. In filter approach the attributes are evaluated on the basis of evaluation metrics with respect to the characteristics of the dataset [6]. The Table 1 lists the comparison between filter and wrapper approach in terms of computational time, attribute dependencies and so on. Table 1: Comparison between filter and wrapper approach Filter Wrapper Computational time Simple and fast Complex and Slower In terms of attribute dependencies Only to Some degree Fully incorporated Cost Less expensive Expensive Scaling ability to high dimensional dataset Easy Complex This research article is organized as five sections: Of which, Section 1 is the introduction to attribute selection and its approaches, Section 2 is devoted to the related literatures, Section 3 presents the adopted dataset and algorithms utilized. Section 4 deals with the Experimental results of classifier with respect to precision, recall and F- measure before and after attribute selection. Section 5 records the conclusion.
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290 3641 II. RELATED LITERATURES This paper [7] presents the introduction about the various classification and feature selection techniques frequently used data mining. It also states the importance of filter and wrapper approaches of feature selection methods. But this study does not contribute to any experimental study. This study [8] is applied to predict studence performance. For that purpose feature selection techniques such as Chi-square, InfoGain, and GainRatio are utilized. Then classification task is carried out by the use of NBTree, MultilayerPerceptron, NaiveBayes and Instance based –K- nearest neighbor classifiers. The result concludes that the accuracy of the prediction was improved because of the applied filter techniques. But there is no comparative study presented to compare the filter and wrapper approaches. This comparative study [9] determines the most relevant subset of attributes based minimum cardinality. In order to find the goodness of features, the six feature selection algorithms are involved in this study. It can be measured in terms of F-measure and ROC value. The result assures that the computational time and cost is decreased with minimum number of features. There are many number feature selection algorithms available today. Hence this paper [10] presents the benefits and drawbacks of the some feature selection algorithms in terms of efficiency. Nearly 12 feature selection algorithms are involved in this study. III. DATASET AND OUTCOME OF PREDICTION The main goal of this paper is to apply the filter approach in a credit dataset of Germany. This dataset contains 21 attributes. The attributes of the germany_credit dataset is listed in Table 2. This evaluation study is implemented in the data mining tool, WEKA . The three filter approaches are applied to the dataset i) CfsSubsetEval (CSE) ii) CorrelationBased Feature Selection (CB) iii) GainRatio Attribute evaluation (GR) iv) InformationGain Attribute evaluation (IG). These four approaches are explained below. CfsSubsetEval (CSE): This method measures the significance of attributes on the basis of predictive ability of attributes and its degree of redundancy. The subsets which are having less inter- correlation but highly correlated to the target class are preferred. This attribute evaluator with the Breadth First Search is applied to the german_credit dataset. The ranking of first five attributes are taken into accounts which are 1. checkingstatus, 2. duration, 3.history, 4. credit-amt, 5. savings-status. Fig 1 shows the ranking of attributes with respect to CfsSubsetEval method. Correlation Attribute Eval (CA): CA evaluates the attributes with respect to the target class. Pearson’s correlation method is used to measure the correlation between the each attributes and target class attribute. It considers nominal attributes in value basis and each value acts as an indicator. . By the combination of this attribute evaluator with the Ranking method of Search is applied to the german_credit dataset. The ranking of first five attributes are taken into accounts which are 1.checkingstatus, 2.duration, 3.credit-amt, 4.savings-status and 5.housing. Fig 2 shows the ranking of attributes with respect to Correlation Attribute Eval method. Table 2: Attributes list of german_credit dataset No Attribute name Range 1 checking_status {<0|>=200|no checking|<200} 2 Duration 4 to 60 3 credit_history 'critical’|’other existing credit'| 'existing paid'| 'delayed previously'| 'no credits’|’all paid' 4 Purpose radio/tv| education| furniture/equipment|new car|old car| business| repairs 5 credit_amount 250 to 18424 6 savings_status <100|>500|<1000| 'no known savings'|>1000 7 Foreign_worker {yes|no} 8 Housing {own|rent|for free} 9 employment 1 to 7 10 installment_commitment 1 to 4 11 personal_status {'male single'|'female div/dep/mar'|'male div/sep'|'male mar/wid'} 12 other_parties {none|guarantor} 13 residence_since 1 to 4 14 property_magnitude {'real estate'|car|'life insurance'|’no known property’ 15 Age 21 to 67 16 other_payment_plans {bank|none} 17 existing_credits 1 or 2 18 job {'unskilled resident'|’skilled’|’ 'high qualif/self emp/mgmt'| 19 num_dependents 1 or 2 20 own_telephone Yes or no 21 class Good|bad
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290 3642 Fig 1: Ranking of attributes with respect to CfsSubsetEval method Fig 2: Ranking of attributes with respect to Correlation Attribute Eval (CA) method GainRatio Attribute evaluation (GA): This method measures the significance of attributes with respect to target class on the basis of gain ratio. It can be calculated by the following formula, GainR(Class, Attribute) = (H(Class) - H(Class | Attribute)) / H(Attribute) Where H represents the Entropy. This attribute evaluator with the Ranker Searching is applied to the german_credit dataset. The ranking of first five attributes are taken into accounts which are 1. checkingstatus, 2.duration, 3.history, 4.forien and 5.credit-amt. Fig 3 shows the ranking of attributes with respect to GainRatio Attribute evaluation method. Fig 3: Ranking of attributes with respect to GainRatio Attribute evaluation method Information Gain Attribute evaluation (IG): This method measures the significance of attribute by the measure of information gain calculated with respect to target class. It can be calculated by the formula, InfoGain(Class,Attribute) = H(Class) - H(Class | Attribute) Where H represents the Entropy. By the combination of this attribute evaluator with the Ranking method of Search is applied to the german_credit dataset. The ranking of first five attributes are taken into accounts which are 1.checkingstatus, 2.duration, 3.credit-amt, 4.savings-status and 5.housing. Fig 4 shows the ranking of attributes with respect to InformationGain Attribute evaluation method. Fig 4: Ranking of attributes with respect to InformationGain Attribute evaluation method This aforementioned attribute selection algorithms results the ranking of attributes. Based on the returned ranking of attributes, the dataset is modified. That is, the irrelevant attributes are removed. This modified dataset is involved into the classification task. Then the
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290 3643 result of classifier before and after attribute selection is compared. For that purpose the PART classifier is utilized. The summary of the PART learning algorithm is given below. PART is a decision list generation algorithm. It is a clone of C4.5 decision tree learner [11]. PART generates more number of rules than other algorithms. The main feature of PART is that it doesn’t contain the global optimization phase. Instead PART uses separate and conquer strategy to create rules. The PART algorithm utilizes the pessimistic pruning. PART algorithm generates a decision tree and it consists of branches to unexpanded subtrees. In PART the tree construction and pruning operations are combined to produce the subtree which cannot be expanded further. A rule is derived from a partial tree. Each leaf drives a rule and the best leaf is selected from which leaf that travels more number of instances is expanded into leaves. IV. EXPERIMENTAL RESULTS The PART classifier is first applied to the german_credit dataset then the classifier is applied to modified dataset with respect to attribute evaluator. Then compare the results of PART with original dataset and the modified dataset after selecting the attributes with respect to the four attribute evaluator methods. The Fig 5 shows the results of PART classifier with respect to the original german_credit dataset. The Table 3 presents the results of PART classifier after applying the four attribute evaluators with respect to Precision, Recall, F-measure and Mean absolute error. The results shows that the combination of PART classifier with CfsSubsetEval attribute evaluator performs well in terms of precision, recall, f-measure. This CfsSubsetEval method also reduces the mean absolute error of the PART classifier. Fig 5 results of PART classifier with respect to the original german_credit dataset Table 3: Results of PART classifier after applying the four attribute evaluators The results of the PART classifier with respect to the four attribute evaluators are also presented as graph in Fig 6. This graph shows the comparison of four evaluators adapted to the PART classifier with respect average precsion, recall and f-measure. Fig 6: Metrics of PART classifier with respect to four evaluators. CES CA GA IG 0.68 0.7 0.72 0.74 Avg.F-Measure Avg.Recall Avg.Precision Evaluator Avg.Pr ecision Avg. Reca ll Avg.F- Measur e Avg.Me an- absolut e error CfsSubsetE val (CSE) 0.725 0.73 6 0.729 0.314 Correlation Attribute Eval (CA) 0.706 0.71 6 0.714 0.341 GainRatio Attribute evaluation (GA) 0.699 0.71 7 0.703 0.343 Informatio nGain Attribute evaluation (IG) 0.722 0.73 3 0.726 0.324
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 06 Pages: 3640-3644 (2018) ISSN: 0975-0290 3644 V. CONCLUSION This study compares the four basic attribute selection algorithms with the utilized PART classifier in terms of precision , recall , F-measure and mean absolute error. The study concludes that the performance metrics of the classifier increases with respect to the attribute evaluator. The PART classifier returns good results when it evaluates the attributes by the CfsSubsetEval method for the german_credit dataset. REFERENCES [1] Meenatchi V.T, Gnanambal S, et.al, Comparative Study and Analysis of Classification Algorithms through Machine Learning, International Journal of Computer Engineering and Applications, 9(1),247- 252,2018. [2] Hany M. Harb1, Malaka A. Moustafa, Selecting optimal subset of features for student performance model, IJCSI , 9(5), 2012, 1694-0814 [3] Hwang, Young-Sup,Wrapper-based Feature Selection Using Support Vector Machine, Department of Computer Science and Engineering, Sun Moon University, Asan, Sunmoonro, Korea, Life Science Journal,11 (7), 221-70,2014. [4] Wang Liping, Feature Selection Algorithm Based On Conditional Dynamic Mutual Information, International Journal Of Smart Sensing and Intelligent Systems,8(1), 2015. [5] Qinbao Song, Jingjie Ni and Guangtao Wang, A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data, IEEE Transactions on Knowledge and Data Engineering, 25(1), 2013. [6] Z.Zhao, H.Liu, On Similarity Preserving Feature Selection, IEEE Transactions on Knowledge and Data Engineering, 25(3), 2013. [7] Sunita Beniwal and Jitender Arora, Classification and Feature Selection Techniques in Data Mining, International Journal of Engineering Research & Technology (IJERT), 1(6), 2012. [8] Mital Doshi and Setu K Chaturvedi, Correlation Based Feature Selection (Cfs) Technique To Predict Student Perfromance, International Journal of Computer Networks & Communications (IJCNC),6(3),2014. [9] M. Ramaswami and R. Bhaskaran,A Study on Feature Selection Techniques in Educational Data Mining, Journal Of Computing,1(1),December 2009. [10] K.Sutha and J. Jebamalar Tamilselv, A Review of Feature Selection Algorithms for Data Mining Techniques, International Journal on Computer Science and Engineering (IJCSE), 7(6), ,2015. [11] Gnanambal S and Thangaraj M, A new architectural framework for Rule Based Healthcare System using Semantic Web Technologies, International Journal of Computers in Healthcare, Inderscience, 2(1), 2014, 1-14. ISSN: 1755-3202.