Comparison a Performance of Data Mining Algorithms (CPDMA) in Prediction Of Diabetes Disease
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 3
Abstract
Detection of knowledge patterns in clinicial data through data mining. Data mining algorithms can be trained from past examples in clinical data and model the frequent times non-linear relationships between the independent and dependent variables. The consequential model represents formal knowledge, which can often make available a good analytic judgment. Classification is the generally used technique in medical data mining. This paper presents results comparison of ten supervised data mining algorithms using five performance criteria. We evaluate the performance for C4.5, SVM, K-NN, PNN, BLR, MLR, CRT, CS-CRT, PLS-DA and PLS-LDA then Comparison a performance of data mining algorithms based on computing time, precision value , the data evaluated using 10 fold Cross Validation error rate, error rate focuses True Positive, True Negative, False Positive and False Negative, bootstrap validation and accuracy. A typical confusion matrix is furthermore displayed for quick check. The study describes algorithmic discussion of the dataset for the disease acquired from UCI, on line repository of large datasets. The Best results are achieved by using Tanagra tool. Tanagra is data mining matching set. The accuracy is calculate based on addition of true positive and true negative followed by the division of all possibilities.
Authors and Affiliations
Dr. V. Karthikeyani , I. Parvin Begum
PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS
This paper investigates and undertakes simulation based study of adhoc routing protocols in wireless sensor networks. In this paper we have compared the performance of two routing protocol AODV and DSR by using random wa...
RGB & GRAY SCALE COMPONENT ON MPQ-BTC IN IMAGE COMPRESSION
Block Truncation Coding (BTC) is novel digital technique in image processing using which images can be coded efficiently. BTC has played an important role in the sense that many coding techniques have been developed base...
SArEM: A SPEM extension for software architecture extraction process
In order to maintain a system, it’s critical to understand its architecture. However even though every system has an architecture, not every system has a reliable representation of its architecture. To deal with this pro...
A New Image Steganography Approach for Information Security Using Gray Level Images in Spatial Domain
A new image steganography method for hiding data using Gray Level Images in Spatial Domain is proposed in this paper. This method uses the 5th, 6th and 7th bits of pixel value for insertion and retrieval of message by us...
JAX-WS Web Service for Transferring Image
Using Web Services, it is possible to send any type of information in any form of encryption. In this context, different techniques have been used to attach binary files in SOAP messages. Web services provide communicati...