Weakly Supervised Critical Nugget Finding Algorithm for Improving Classification Accuracy
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1
Abstract
Accuracy is more important in data classification. An elimination of noisy data, attribute and property discovery is a major consideration in the proposed research. From the overall given population the system predicts the nuggets effectively. The subpopulation and exceptional property pair which is known as outliers. With the aim of effective critical nuggets detection, the proposed WS-CNF algorithm applies a provisional model which identifies the exceptional property pair with the scoring method implementation. Several outlier detection methods have been introduced with certain domains and applications, but they were more generic and affected by subset detection problem. The proposed concept effectively implements DBD (Data Boundary Detection) model based approach which is used for improving the classification accuracy by extending the boundary values by various iterations, the collection of these have named as Weakly Supervised Critical Nugget Finding algorithm and primary direction algorithm for the detection of sub population scores for both numerical and categorical datasets. Also the system performs the classification method in order to find best class based on the score and label. Finally, the proposed algorithm can reduce the computation cost and lack of accuracy problem by applying best data mining and suitable pruning techniques. The experiments and the results provide the mild and extreme outlier ranges with score values.
Authors and Affiliations
Veni , K. Saraswathi
Image Search Reranking
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...
A Novel Technique in Cryptography for Data Hiding i n Digital Images
Visual cryptography [1],[6] an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption[13] and decryption levels of many digital images. Generally...
Object Deployment Using Data Trans-Reception in Military Applications
An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed b...
Securing Web Accounts Using Graphical Password Authentication through Watermarking
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security research...
Change Management for Human in Enterprise Resource Planning System
In recent years, there are more enterprises that use Enterprise Resource Planning (ERP) to gain significant advantages through allowing for An organization to control its business processes and gaining benefits of enhan...