A NEW PRUNING APPROACH FOR BETTER AND COMPACT DECISION TREES
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
The development of computer technology has enhanced the people’s ability to produce and collect data. Data mining techniques can be effectively utilized for analyzing the data to discover hidden knowledge. One of the well known and efficient techniques is decision trees, due to easy understanding tructural output. But they may not always be easy to understand due to very big structural output. To overcome this short coming pruning can be used as a key procedure .It removes overusing noisy, conflicting data, so as to have better generalization. However, In pruning the problem of how to make a trade-off between classification accuracy and tree size has not been well solved. In this paper, firstly we propose a new pruning method aiming on both classification accuracy and tree size. Based upon the method, we introduce a simple decision tree pruning technique, and evaluated the hypothesis – Does our new runing method yields Better and Compact decision trees? The experimental results are verified by using benchmark datasets from UCI machine learning repository. The results indicate that our new tree pruning method is a feasible way of pruning decision trees.
Authors and Affiliations
Ali Mirza Mahmood , Pavani Gudapati , Venu Gopal Kavuluru , Mrithyumjaya Rao Kuppa
On the Timing Analysis of Cluster based Communication Devices for Large Scale Computing Systems
Many parallel computing environments utilize cluster based architecture for large scale computing owing to the ease of their availability. As the cluster based approach may be used extensively, the interconnection mechan...
Applied Medical Informatics Using LabVIEW
Abstract- Telemedicine is best example of Applied Medical Informatics. Several physiologic data and Digital images can be transmitted more rapidly and easily than conventional images. In telemedicine expert physician...
Secure Transmission of Compound Information Using Image Steganography
The security of information handled in real time transmission reception like internet is of paramount consideration, as this information may be confidential. And also, the parameter in concern nowa- days is size as it ma...
Mobility Prediction and Load Balancing Based Adaptive Handovers for LTE Systems
In cellular networks including Long Term Evolution (LTE) systems, how to balance the load is indispensable because traffic load and local user densities vary dynamically. A load balancing problem occurs when available wi...
Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz’s Method
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller bit size, thereby educing processing overhead. E...