Implementation of Association Rule Mining for Bridge Datasets Using Weka
Journal Title: International Research Journal in Global Engineering and Sciences - Year 2016, Vol 1, Issue 1
Abstract
Data mining playing vital information in extracting useful information from large amount of data set. Apriori algorithm generate useful rule by finding frequent itemset from huge data set. In this paper can apply the Apriori Algorithm to generate rules for the given data set (bridge) using Waikato Environment for Knowledge Analysis tool. Bridge dataset is taken from UCI machine learning repository. These articles explore and visualize the apriori technique in data mining concept.
Authors and Affiliations
Thangamani M, Prasanna V
Effective Customer Patterns Analysis Using Open Source Weka Data Mining Tool
Data mining playing vital information in extracting useful information from large amount of data set. Apriori algorithm generate useful rule by finding frequent itemset from huge data set. In this paper can apply the Ap...
Automatic Blackboard Erasing Mechanism
The automatic blackboard erasing mechanism is mainly designed for cleaning board without any manual effort. Cleaning board manually may some medical problems likes coughing because of allergy to the chock dust, asthma ma...
Role of Self-Help Groups in Empowering Tribes of Nilgiris District
Self-help groups are small informal association of the poor created at the grass root level for the purpose of enabling members to reap economic benefits out of mutual help and joint responsibility. Self-help groups are...
EXPLORING DATA MINING CLASSIFICATION APPROACH IN WEKA OPEN SOURCE
The extraction of information from huge amount of data set is called data mining. Classification and prediction are two forms of data analysis that can be used to extract models describing important data classes or to pr...
Exploring knowledge on Image Retrieval with Data hiding Technique
Nowadays, security for any data is of major concern. Steganography is the practice of concealing messages or information within other non-secret text or data. Reversible data hiding .is used to embed secret message into...