Role of Fuzzy Set in Students’ Performance Prediction
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learning is one of the most famous practical methods for analytical study. We use DT as prediction method inthis paper. In this paper we propose a model using fuzzy set to predict more accurate result.Fuzzy logic brings in an improvement of analysis aspects due to the elasticity of fuzzy sets formalism. Therefore, we proposed a decision tree on fuzzy set data, which combines ID3 with fuzzy theory.The results are compared to some other popular classification algorithms.
Authors and Affiliations
Mrs. Jyoti Upadhyay , Dr. Pratima Gautam
I++Mapreduce: Incremental Mapreduce for Mining the Big Data
Abstract: Data mining is an interdisciplinary area of computer engineering. Incremental processing is a challenging approach to refreshing mining results and it uses saved states to avoid the cost of re computation from...
Threats and Security using Trust Techniques in Wireless Sensor Networks
Abstract: Wireless Sensor Networks are implementing on large scale in real time environments due to its incredible uses in real life. Wireless Sensor Networks don’t need human interference for its working so theycan plac...
Handwritten Bangla Character Recognition Using Artificial Neural Network
Abstract: This paper presents a system for recognizing Bangla handwritten characters using Artificial Neural Network based on Multi Layer Perceptron classifier. The Bangla alphabets Sorborno and Banjonborno have be...
Best Practices in Implementation of Cloud
Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as c...
A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todeman...