SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1579
www.ijarcet.org
Data Mining: Estimation of Missing Values Using Lagrange
Interpolation Technique
L.Sunitha Dr M.BalRaju J.Sasikiran
Department of computer Science and Engineering
Vidya Vikas Institute of Technology, Hyderabad, India
Abstract
In the real world Most of the datasets
have missing data. The presence of
missing values in a dataset can affect the
performance of Mining Algorithms. In
this paper we are using Lagrange
interpolation method for prediction of
missing values. This method is used to
map a data item to a real valued
prediction variable. In a dataset if one
attributes is depending on other then by
using known values we can find the
unknown values.
KEYWORDS: Missing values,
Interpolation, Prediction.
1. Introduction
In Data mining preprocessing [1] is
important step .Pre processing means
preparing data for mining. Missing data
[2][3] is a common problem in all kids
of research. The presence of missing
values in a dataset can affect the
performance of a classifier constructed
using that dataset as a training sample.
Several methods have been proposed to
treat missing data and the one used more
frequently is deleting instances
containing at least one we can handle the
missing values by ignoring data row,
using global constant to fill missing
value, using attribute mean to fill
missing value missing value of a feature.
2. Common missing value mechanisms
In this paper we carry out experiments
with datasets to evaluate the Effect on
the misclassification.
Four methods for dealing with missing
values:
1. Removing the tuples: If a missing
value occurs on any of the p variables,
eliminate the entire observation. This is
the default method for most procedures.
Problem with this method data set with
even a modest amount of missing values
scattered throughout can result in a
substantial reduction in sample size.
2. Filling the missing values manually:
This method is time consuming and not
feasible for a large data set with many
missing values.
3. Use global constant: Replace all
missing attribute values by the same
constant such as a label “unknown “or -
∞.
4. Use the attribute mean value: Filling
in the missing values of a variable.
Substitution with a measure of central
tendency, Mean, Median, Midrange,
(Max + Min)/2 and Mode
2. Interpolation
Interpolation [4] is the process of finding
unknown values from known values.
Interpolation is one of the simplest
methods which require knowledge of
two point’s constant rate of change. In
computers, it is expensive to store
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1580
www.ijarcet.org
tabulated functions in its memory. For
this, it is more convenient to use an
algorithm to calculate the value of
functions like sine for any arbitrary
values of the argument. For instance,
Take values (xi , yi), where i = 0, 1, ... ,
n of any function Y = f(x), The process
of estimating the values of y, for any
intermediate value of x is called
interpolation. The method of computing
the value of y,
3. Lagrange interpolation:
The Lagrange gave the following
interpolation polynomial p(X) of degree
n given n+1 points (xi, yi) .An
interesting feature of this formula, and
the feature we aim to preserve in
generalizing it, is that
When we substitute xi for X, `i(xi) = 1
and `j(xi) = 0 (j 6= i), giving y = yi.
where
Complete formula is
(x-x1)(x-x2)…(x-xn)/(x0-x1)(x0-x2).(x0-xn)
*f(x0) + (x-x0)(x-x1)…(x-xn)/(x1-x0)(x1-x2).(x0-xn)
*f(x1)+(x-x0)(x-x1).(x-xn)/(x2-x0)(x2-x2).(x2-xn)
Example:
Compute f(0.3) for the data
x0 1 3 4 7
f 1 3 49129 813
X=0.3
(0.3-1)(0.3-3)(0.3-4)(0.3-7)/(0.3-0)(0.3-3)(0.3-4)(0.7)
(0.3-0)(0.3-1)(0.3-4)(0.3-7) *3
+(0-1)(0-3)(0-4)(0-7)/(1-0)(1-3)(1-4)(1-7)
(3-0)(3-1)(3-4)(3-7) *49 +(0.3-0)(0.3-1)(0.3-3)(0.3-7)
(0.3-0)(0.3-1)(0.3-3)(0.3-4) *129 + *813
(4-0)(4-1)(4-3)(4-7) / (7-0)(7-1)(7-3)(7-
4)
=1.831
Algorithm: Lagrange interpolation
Step1: Read list of x value and
corresponding y
Step2: Read Xp
Step3: Initialize sum to 0 and lf to 1
Step 4: for i=0 to n-1 do
Step 5: for j=0 to n-1 do
Step 6:if(i!=j)
Step 7:lf= (xp-xi)/(xi-xj)*lf
Step 8:sum=sum+lf*yi
Step 9:write ‘estimated value at xp’,sum
Stop
4. Implemetation and experimental
Results
Example:
years(x) 3 8 9 6 11 1
salary(y) 30 57 64 43 59 20
salary with experience
0
20
40
60
80
0 5 10 15
years
salaryinthossand
salary(y)
How many record you will be enter: 6
Enter the value of x0 and y0 3 30
Enter the value of x1 and y1 8 57
Enter the value of x2 and y2 9 64
Enter the value of x3 and y3 6 43
Enter the value of x4 and y4 11 59
Enter the value of x5 and y5 1 20
Enter X for finding f(x): 10
f(10.0) = 66.729988
Therefore salary for 10 years is
66.729988
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1581
www.ijarcet.org
Inverse Interpolation: It is possible to
find x value for given f(x) value this
process is known as inverse interpolation
[6]. In Lagrange formula just by
substituting x=y,x[i]=y[i],x[j]=y[j]
Example: The following table gives the
sales of a concern for the five years.
Estimate the sales for year 1990.
Year(x) 1985 1987 1989 1991
Sales(in
lakhs)
40 43 48 52
Results: we can enter (input) the above
table to the program
How many record you will be enter: 4
enter the value of x0 and y0 1985 40
enter the value of x1 and y1 1987 43
enter the value of x2 and y2 1989 48
enter the value of x3 and y3 1991 52
Enter x for finding f(x): 1990
F (1990.0) = 50.312500
Result2: now we can find in which year
50 lakh sales will takes place
How many record you will be enter: 4
enter the value of x0 and y0 1985 40
enter the value of x1 and y1 1987 43
enter the value of x2 and y2 1989 48
enter the value of x3 and y3 1991 52
Enter f(x) for finding x: 50
f(50.0) = 1989.851807
Therefore In the year 1990(rounding) the
sales are 50 lakhs.
how many record you will be enter: 3
enter the value of x0 and y0 2 1.414
enter the value of x1 and y1 3 1.732
enter the value of x2 and y2 4 2
Enter f(x) for finding x: 1.5793
f (1.6) = 2.494540.
5. Conclusion.
In this proposed work using Lagrange’s
Interpolation we can find the missing
values in preprocessing. If two attributes
are related to each other .x is
independent and f(x) these are
depending on x.from known values we
find values .and also possible beyond the
boundaries which are closer to
boundaries also possible to estimate this
is known as extrapolation .algorithm is
implemented in c and test results are
generated. Both for a give set of x and
corresponding f(x) values are
considered, we find f(x) for given x
value .By using inverse interpolation we
can find x for given f(x) value vise
versa. The limitation is if the
polynomial is existing then interpolation
is used, if the f(x) not in uniform change
we can go for regression model.
6. References:
1.http://www.iasri.res.in/ebook/win_sch
ool_aa/notes/Data_Preprocessing.pdf
2.DataPreprocessing,n.wikipedia.org/wi
ki/Data_pre-processing
3. TREATMENT of Missing Data--Part
David C. Howell,
http://www.uvm.edu/~dhowell/StatPages
/More_Stuff/Missing_Data/Missing.html
4.http://mat.iitm.ac.in/home/sryedida/pu
blic_html/caimna/interpolation/lagrange.
html
5.Chapter3Interpolationhttp://www.math
works.com/moler/interp.pdf
6. New inverse interpolation methods,
Alexandra opris¸
http://www.cs.ubbcluj.ro/~studia-
m/2006-1/oprisan.pdf
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1582
www.ijarcet.org
Lingam sunitha received her
MCA from Kakatiya University
in 1999, and M.Tech (CSE) from
JNTU, Hyderabad in 2009. She is
now working as Associate
Professor and also pursuing Ph.D
in Computing Science and
Engineering from JNTU
Hyderabad, India. Her area of
specialization is Data Mining.
Dr M.BalRaju
received M.Tech
(CSE) from Osmania
University and Ph.D
from JNTU
Hyderabad in
2010.Now he is
working as Professor and Principal in
Vidya Vikas Institute of Technology,
Hyderabad, India. His area of
specialization includes Data Base, Data
Mining, and Image Processing.
J.SasiKiran received
M.Tech (CC) from
Bharath University,
,Chennai.He
registered Ph.D (CS) from
Univ. of. Mysore in [2009-13].Now he is
working as Associate Professor in Vidya
Vikas Institute of Technology,
Hyderabad, India. His area of
specialization includes Network Security
and Image Processing
Author profile.

Contenu connexe

Tendances

THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...ijcseit
 
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...IAEME Publication
 
Machine Learning Feature Selection - Random Forest
Machine Learning Feature Selection - Random Forest Machine Learning Feature Selection - Random Forest
Machine Learning Feature Selection - Random Forest Rupak Roy
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...IJERA Editor
 
Dat 305 dat305 dat 305 education for service uopstudy.com
Dat 305 dat305 dat 305 education for service   uopstudy.comDat 305 dat305 dat 305 education for service   uopstudy.com
Dat 305 dat305 dat 305 education for service uopstudy.comNewUOPCourse
 
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...i-Eclat: performance enhancement of Eclat via incremental approach in frequen...
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...TELKOMNIKA JOURNAL
 
Handling missing data with expectation maximization algorithm
Handling missing data with expectation maximization algorithmHandling missing data with expectation maximization algorithm
Handling missing data with expectation maximization algorithmLoc Nguyen
 
Dimension reduction(jiten01)
Dimension reduction(jiten01)Dimension reduction(jiten01)
Dimension reduction(jiten01)Jiten Dhimmar
 
Principal Components Analysis, Calculation and Visualization
Principal Components Analysis, Calculation and VisualizationPrincipal Components Analysis, Calculation and Visualization
Principal Components Analysis, Calculation and VisualizationMarjan Sterjev
 
2018 p 2019-ee-a2
2018 p 2019-ee-a22018 p 2019-ee-a2
2018 p 2019-ee-a2uetian12
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reductionmrizwan969
 

Tendances (17)

Random forest
Random forestRandom forest
Random forest
 
A new approach for ranking of intuitionistic fuzzy numbers
A new approach for ranking of intuitionistic fuzzy numbersA new approach for ranking of intuitionistic fuzzy numbers
A new approach for ranking of intuitionistic fuzzy numbers
 
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
THE IMPLICATION OF STATISTICAL ANALYSIS AND FEATURE ENGINEERING FOR MODEL BUI...
 
Fuzzy
FuzzyFuzzy
Fuzzy
 
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
FUZZY DIAGONAL OPTIMAL ALGORITHM TO SOLVE INTUITIONISTIC FUZZY ASSIGNMENT PRO...
 
Chapter 9 ds
Chapter 9 dsChapter 9 ds
Chapter 9 ds
 
Machine Learning Feature Selection - Random Forest
Machine Learning Feature Selection - Random Forest Machine Learning Feature Selection - Random Forest
Machine Learning Feature Selection - Random Forest
 
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
Transportation Problem with Pentagonal Intuitionistic Fuzzy Numbers Solved Us...
 
Dat 305 dat305 dat 305 education for service uopstudy.com
Dat 305 dat305 dat 305 education for service   uopstudy.comDat 305 dat305 dat 305 education for service   uopstudy.com
Dat 305 dat305 dat 305 education for service uopstudy.com
 
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...i-Eclat: performance enhancement of Eclat via incremental approach in frequen...
i-Eclat: performance enhancement of Eclat via incremental approach in frequen...
 
Chapter 3 ds
Chapter 3 dsChapter 3 ds
Chapter 3 ds
 
Handling missing data with expectation maximization algorithm
Handling missing data with expectation maximization algorithmHandling missing data with expectation maximization algorithm
Handling missing data with expectation maximization algorithm
 
Dimension reduction(jiten01)
Dimension reduction(jiten01)Dimension reduction(jiten01)
Dimension reduction(jiten01)
 
Principal Components Analysis, Calculation and Visualization
Principal Components Analysis, Calculation and VisualizationPrincipal Components Analysis, Calculation and Visualization
Principal Components Analysis, Calculation and Visualization
 
2018 p 2019-ee-a2
2018 p 2019-ee-a22018 p 2019-ee-a2
2018 p 2019-ee-a2
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
Decision tree
Decision treeDecision tree
Decision tree
 

En vedette

Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Editor IJARCET
 
Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392Editor IJARCET
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Editor IJARCET
 
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Editor IJARCET
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesJim Cahill
 

En vedette (8)

Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336Ijarcet vol-2-issue-7-2333-2336
Ijarcet vol-2-issue-7-2333-2336
 
Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392
 
Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362Ijarcet vol-2-issue-7-2357-2362
Ijarcet vol-2-issue-7-2357-2362
 
386 390
386 390386 390
386 390
 
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340
 
A Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant ObjectivesA Unified PID Control Methodology to Meet Plant Objectives
A Unified PID Control Methodology to Meet Plant Objectives
 
Class 19 pi & pd control modes
Class 19   pi & pd control modesClass 19   pi & pd control modes
Class 19 pi & pd control modes
 
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUESChapter 8-SAMPLE & SAMPLING TECHNIQUES
Chapter 8-SAMPLE & SAMPLING TECHNIQUES
 

Similaire à Ijarcet vol-2-issue-4-1579-1582

Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithmijsrd.com
 
Finding the Extreme Values with some Application of Derivatives
Finding the Extreme Values with some Application of DerivativesFinding the Extreme Values with some Application of Derivatives
Finding the Extreme Values with some Application of Derivativesijtsrd
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageeSAT Publishing House
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageeSAT Journals
 
25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septianIAESIJEECS
 
UNIT1-2.pptx
UNIT1-2.pptxUNIT1-2.pptx
UNIT1-2.pptxcsecem
 
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)Sherri Gunder
 
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVER
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVERA DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVER
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVERZac Darcy
 
2014-mo444-practical-assignment-04-paulo_faria
2014-mo444-practical-assignment-04-paulo_faria2014-mo444-practical-assignment-04-paulo_faria
2014-mo444-practical-assignment-04-paulo_fariaPaulo Faria
 
A Derivative Free High Ordered Hybrid Equation Solver
A Derivative Free High Ordered Hybrid Equation Solver  A Derivative Free High Ordered Hybrid Equation Solver
A Derivative Free High Ordered Hybrid Equation Solver Zac Darcy
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduceijircee
 
The Fundamental theorem of calculus
The Fundamental theorem of calculus The Fundamental theorem of calculus
The Fundamental theorem of calculus AhsanIrshad8
 
Probability distribution Function & Decision Trees in machine learning
Probability distribution Function  & Decision Trees in machine learningProbability distribution Function  & Decision Trees in machine learning
Probability distribution Function & Decision Trees in machine learningSadia Zafar
 
3 descritive statistics measure of central tendency variatio
3 descritive statistics measure of   central   tendency variatio3 descritive statistics measure of   central   tendency variatio
3 descritive statistics measure of central tendency variatioLama K Banna
 
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUESGI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUESAM Publications
 
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...A Mathematical Programming Approach for Selection of Variables in Cluster Ana...
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...IJRES Journal
 

Similaire à Ijarcet vol-2-issue-4-1579-1582 (20)

wzhu_paper
wzhu_paperwzhu_paper
wzhu_paper
 
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning AlgorithmImproving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
 
WAVELET TRANSFORM
WAVELET TRANSFORMWAVELET TRANSFORM
WAVELET TRANSFORM
 
Finding the Extreme Values with some Application of Derivatives
Finding the Extreme Values with some Application of DerivativesFinding the Extreme Values with some Application of Derivatives
Finding the Extreme Values with some Application of Derivatives
 
AI Final report 1.pdf
AI Final report 1.pdfAI Final report 1.pdf
AI Final report 1.pdf
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr image
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr image
 
25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian
 
UNIT1-2.pptx
UNIT1-2.pptxUNIT1-2.pptx
UNIT1-2.pptx
 
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)
Ch17 lab r_verdu103: Entry level statistics exercise (descriptives)
 
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVER
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVERA DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVER
A DERIVATIVE FREE HIGH ORDERED HYBRID EQUATION SOLVER
 
2014-mo444-practical-assignment-04-paulo_faria
2014-mo444-practical-assignment-04-paulo_faria2014-mo444-practical-assignment-04-paulo_faria
2014-mo444-practical-assignment-04-paulo_faria
 
A Derivative Free High Ordered Hybrid Equation Solver
A Derivative Free High Ordered Hybrid Equation Solver  A Derivative Free High Ordered Hybrid Equation Solver
A Derivative Free High Ordered Hybrid Equation Solver
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- ReduceBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce
 
The Fundamental theorem of calculus
The Fundamental theorem of calculus The Fundamental theorem of calculus
The Fundamental theorem of calculus
 
Probability distribution Function & Decision Trees in machine learning
Probability distribution Function  & Decision Trees in machine learningProbability distribution Function  & Decision Trees in machine learning
Probability distribution Function & Decision Trees in machine learning
 
3 descritive statistics measure of central tendency variatio
3 descritive statistics measure of   central   tendency variatio3 descritive statistics measure of   central   tendency variatio
3 descritive statistics measure of central tendency variatio
 
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUESGI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
GI-ANFIS APPROACH FOR ENVISAGE HEART ATTACK DISEASE USING DATA MINING TECHNIQUES
 
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...A Mathematical Programming Approach for Selection of Variables in Cluster Ana...
A Mathematical Programming Approach for Selection of Variables in Cluster Ana...
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Ijarcet vol-2-issue-4-1579-1582

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1579 www.ijarcet.org Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique L.Sunitha Dr M.BalRaju J.Sasikiran Department of computer Science and Engineering Vidya Vikas Institute of Technology, Hyderabad, India Abstract In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for prediction of missing values. This method is used to map a data item to a real valued prediction variable. In a dataset if one attributes is depending on other then by using known values we can find the unknown values. KEYWORDS: Missing values, Interpolation, Prediction. 1. Introduction In Data mining preprocessing [1] is important step .Pre processing means preparing data for mining. Missing data [2][3] is a common problem in all kids of research. The presence of missing values in a dataset can affect the performance of a classifier constructed using that dataset as a training sample. Several methods have been proposed to treat missing data and the one used more frequently is deleting instances containing at least one we can handle the missing values by ignoring data row, using global constant to fill missing value, using attribute mean to fill missing value missing value of a feature. 2. Common missing value mechanisms In this paper we carry out experiments with datasets to evaluate the Effect on the misclassification. Four methods for dealing with missing values: 1. Removing the tuples: If a missing value occurs on any of the p variables, eliminate the entire observation. This is the default method for most procedures. Problem with this method data set with even a modest amount of missing values scattered throughout can result in a substantial reduction in sample size. 2. Filling the missing values manually: This method is time consuming and not feasible for a large data set with many missing values. 3. Use global constant: Replace all missing attribute values by the same constant such as a label “unknown “or - ∞. 4. Use the attribute mean value: Filling in the missing values of a variable. Substitution with a measure of central tendency, Mean, Median, Midrange, (Max + Min)/2 and Mode 2. Interpolation Interpolation [4] is the process of finding unknown values from known values. Interpolation is one of the simplest methods which require knowledge of two point’s constant rate of change. In computers, it is expensive to store
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1580 www.ijarcet.org tabulated functions in its memory. For this, it is more convenient to use an algorithm to calculate the value of functions like sine for any arbitrary values of the argument. For instance, Take values (xi , yi), where i = 0, 1, ... , n of any function Y = f(x), The process of estimating the values of y, for any intermediate value of x is called interpolation. The method of computing the value of y, 3. Lagrange interpolation: The Lagrange gave the following interpolation polynomial p(X) of degree n given n+1 points (xi, yi) .An interesting feature of this formula, and the feature we aim to preserve in generalizing it, is that When we substitute xi for X, `i(xi) = 1 and `j(xi) = 0 (j 6= i), giving y = yi. where Complete formula is (x-x1)(x-x2)…(x-xn)/(x0-x1)(x0-x2).(x0-xn) *f(x0) + (x-x0)(x-x1)…(x-xn)/(x1-x0)(x1-x2).(x0-xn) *f(x1)+(x-x0)(x-x1).(x-xn)/(x2-x0)(x2-x2).(x2-xn) Example: Compute f(0.3) for the data x0 1 3 4 7 f 1 3 49129 813 X=0.3 (0.3-1)(0.3-3)(0.3-4)(0.3-7)/(0.3-0)(0.3-3)(0.3-4)(0.7) (0.3-0)(0.3-1)(0.3-4)(0.3-7) *3 +(0-1)(0-3)(0-4)(0-7)/(1-0)(1-3)(1-4)(1-7) (3-0)(3-1)(3-4)(3-7) *49 +(0.3-0)(0.3-1)(0.3-3)(0.3-7) (0.3-0)(0.3-1)(0.3-3)(0.3-4) *129 + *813 (4-0)(4-1)(4-3)(4-7) / (7-0)(7-1)(7-3)(7- 4) =1.831 Algorithm: Lagrange interpolation Step1: Read list of x value and corresponding y Step2: Read Xp Step3: Initialize sum to 0 and lf to 1 Step 4: for i=0 to n-1 do Step 5: for j=0 to n-1 do Step 6:if(i!=j) Step 7:lf= (xp-xi)/(xi-xj)*lf Step 8:sum=sum+lf*yi Step 9:write ‘estimated value at xp’,sum Stop 4. Implemetation and experimental Results Example: years(x) 3 8 9 6 11 1 salary(y) 30 57 64 43 59 20 salary with experience 0 20 40 60 80 0 5 10 15 years salaryinthossand salary(y) How many record you will be enter: 6 Enter the value of x0 and y0 3 30 Enter the value of x1 and y1 8 57 Enter the value of x2 and y2 9 64 Enter the value of x3 and y3 6 43 Enter the value of x4 and y4 11 59 Enter the value of x5 and y5 1 20 Enter X for finding f(x): 10 f(10.0) = 66.729988 Therefore salary for 10 years is 66.729988
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1581 www.ijarcet.org Inverse Interpolation: It is possible to find x value for given f(x) value this process is known as inverse interpolation [6]. In Lagrange formula just by substituting x=y,x[i]=y[i],x[j]=y[j] Example: The following table gives the sales of a concern for the five years. Estimate the sales for year 1990. Year(x) 1985 1987 1989 1991 Sales(in lakhs) 40 43 48 52 Results: we can enter (input) the above table to the program How many record you will be enter: 4 enter the value of x0 and y0 1985 40 enter the value of x1 and y1 1987 43 enter the value of x2 and y2 1989 48 enter the value of x3 and y3 1991 52 Enter x for finding f(x): 1990 F (1990.0) = 50.312500 Result2: now we can find in which year 50 lakh sales will takes place How many record you will be enter: 4 enter the value of x0 and y0 1985 40 enter the value of x1 and y1 1987 43 enter the value of x2 and y2 1989 48 enter the value of x3 and y3 1991 52 Enter f(x) for finding x: 50 f(50.0) = 1989.851807 Therefore In the year 1990(rounding) the sales are 50 lakhs. how many record you will be enter: 3 enter the value of x0 and y0 2 1.414 enter the value of x1 and y1 3 1.732 enter the value of x2 and y2 4 2 Enter f(x) for finding x: 1.5793 f (1.6) = 2.494540. 5. Conclusion. In this proposed work using Lagrange’s Interpolation we can find the missing values in preprocessing. If two attributes are related to each other .x is independent and f(x) these are depending on x.from known values we find values .and also possible beyond the boundaries which are closer to boundaries also possible to estimate this is known as extrapolation .algorithm is implemented in c and test results are generated. Both for a give set of x and corresponding f(x) values are considered, we find f(x) for given x value .By using inverse interpolation we can find x for given f(x) value vise versa. The limitation is if the polynomial is existing then interpolation is used, if the f(x) not in uniform change we can go for regression model. 6. References: 1.http://www.iasri.res.in/ebook/win_sch ool_aa/notes/Data_Preprocessing.pdf 2.DataPreprocessing,n.wikipedia.org/wi ki/Data_pre-processing 3. TREATMENT of Missing Data--Part David C. Howell, http://www.uvm.edu/~dhowell/StatPages /More_Stuff/Missing_Data/Missing.html 4.http://mat.iitm.ac.in/home/sryedida/pu blic_html/caimna/interpolation/lagrange. html 5.Chapter3Interpolationhttp://www.math works.com/moler/interp.pdf 6. New inverse interpolation methods, Alexandra opris¸ http://www.cs.ubbcluj.ro/~studia- m/2006-1/oprisan.pdf
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1582 www.ijarcet.org Lingam sunitha received her MCA from Kakatiya University in 1999, and M.Tech (CSE) from JNTU, Hyderabad in 2009. She is now working as Associate Professor and also pursuing Ph.D in Computing Science and Engineering from JNTU Hyderabad, India. Her area of specialization is Data Mining. Dr M.BalRaju received M.Tech (CSE) from Osmania University and Ph.D from JNTU Hyderabad in 2010.Now he is working as Professor and Principal in Vidya Vikas Institute of Technology, Hyderabad, India. His area of specialization includes Data Base, Data Mining, and Image Processing. J.SasiKiran received M.Tech (CC) from Bharath University, ,Chennai.He registered Ph.D (CS) from Univ. of. Mysore in [2009-13].Now he is working as Associate Professor in Vidya Vikas Institute of Technology, Hyderabad, India. His area of specialization includes Network Security and Image Processing Author profile.