SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
1
PERFORMANCE ANALYSIS OF DATA MINING
ALGORITHMS WITH NEURAL NETWORK
Ms. Aruna J. Chamatkar
Research Scholar, Department of Electronics & Computer Science,
RTM Nagpur University, Nagpur, India
Dr. P.K. Butey
Research Supervisor, HOD Computer Science Department,
Kamla Nehru Mahavidyalaya, Nagpur India
ABSTRACT
Data mining has evolved into an active and important area of research because of previously
unknown and interesting knowledge from very large real-world database. Data mining methods have
been successfully applied in a wide range of unsupervised and supervised learning applications.
Classification is one of the data mining problems receiving great attention recently in the database
community. Neural networks have not been thought suited for data mining because how the
classifications were made is not explicitly stated as symbolic rules that are suitable for verification or
interpretation by humans. The neural network is first trained to achieve the required accuracy in data
mining. A network pruning algorithm is used to remove redundant connections of the network. The
activation values of the hidden units in the network are analyzed in the network and classification rules
are generated using the result of this analysis. In this paper we are going to combine neural network
with the three different algorithms which are commonly used in data mining to improve the data
mining result. These three algorithms are CHARM Algorithm, Top K Rules mining and CM SPAM
Algorithm.
Keywords: Artificial Neural Network, Data Mining, CHARM algorithm, CM -SPAM Algorithm,
K -rule mining.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 6, Issue 1, January (2015), pp. 01-11
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
2
I. INTRODUCTION
In present day human beings are used in the different technologies to adequate in there society.
Every day the human beings are using the vast data and these data are in the different fields .It may be
in the form of documents, may be graphical formats, may be the video, may be records (varying array)
.As the data are available in the different formats so that the proper action to be taken for better
utilization of the available data. As and when the customer will require the data should be retrieved
from the database and make the better decision.
This technique is actually we called as a data mining or Knowledge Hub or simply KDD
(Knowledge Discovery Process).The important reason that attracted a great deal of attention in
information technology the discovery of useful information from large collections of data industry
towards field of “Data mining” is due to the perception of “we are data rich but information poor”.
Very huge amount of data is available but we hardly able to turn them in to useful information and
knowledge for managerial decision making in different fields. To produce information it requires very
huge database. It may be available in different formats like audio/video, numbers, text, figures, and
Hypertext formats. To take complete advantage of data; the data retrieval is simply not enough, it
requires a tool for extraction of the essence of information stored, automatic summarization of data
and the discovery of patterns in raw data.
With the enormous amount of data stored in databases, files, and other repositories, it is very
important to develop powerful software or tool for analysis and interpretation of such data and for the
extraction of interesting knowledge that could help in decision-making. The only answer to all above is
‘Data Mining’. Data mining is the method of extracting hidden predictive information from large
databases; it is a powerful technology with great potential to help organizations focus on the most
important information in their data warehouses [1][2][3][4]. Data mining tools predict behaviors and
future trends help organizations and firms to make proactive knowledge-driven decisions [2]. The
automated, prospective analyses offered by data mining move beyond the analyses of past events
provided by prospective tools typical of decision support systems. Data mining tools can answer the
questions that traditionally were too time consuming to resolve. They created databases for finding
predictive information, finding hidden patterns that experts may miss because it lies outside their
expectations.
One of the data mining problems is classification. Various classification algorithms have been
designed to tackle the problem by researchers in different fields such as mathematical programming,
machine learning, and statistics. Recently, there is a surge of data mining research in the database
community. The classification problem is re-examined in the context of large databases. Unlike
researchers in other fields, database researchers pay more attention to the issues related to the volume
of data. They are also concerned with the effective use of the available database techniques, such as
efficient data retrieval mechanisms. With such concerns, most algorithms proposed are basically based
on decision trees.
II. ARTIFICIAL NEURAL NETWORK
An artificial neural network (ANN), often just called a "neural network", is a computational
model or mathematical model based on biological neural networks, in other words we can say that it is
an emulation of biological neural system. Artificial neural network consists of an interconnected group
of artificial neurons and processes information using a connectionist approach to computation. Most of
the time ANN is an adaptive system that changes its structure based on external or internal information
that flows through the network during the learning phase [8].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
3
Figure 1: Basic Neural Network Structure
A. Training Of Artificial Neural Networks
A neural network has to be configured such that the application of a set of inputs produces
(either 'direct' or via a relaxation process) the desired set of outputs. Different methods to set the
strengths of the connections presents. Prior knowledge is a one way is to set the weights explicitly.
Another way is to 'train' the neural network by feeding it teaching patterns and letting it change its
weights according to some learning rule. We can categorize the learning situations as follows:
• Supervised learning or Associative learning in which the network is trained by providing it
with input and matching output patterns. These pairs of input-output can be provided by the system
which contains the neural network (self-supervised) or by an external teacher.
• Unsupervised learning or Self-organization in which an (output) unit is trained to respond to
clusters of pattern within the input. The system is supposed to discover statistically salient features of
the input population in this paradigm. Unlike the supervised learning paradigm, there is no other priori
set of categories into which the patterns are to be classified; rather the system must develop its own
representation of the input stimuli.
• Reinforcement learning this type of learning may be considered as an intermediate form of
the above two learning types. Here the learning machine does some action on the environment and gets
a feedback response from the environment system. The learning system grades its action bad
(punishable) or good (rewarding) based on the environmental response and accordingly adjusts its
parameters.
In more practical terms neural networks are non-linear statistical data modeling tools. They can
be used to model complex relationships between inputs and outputs or to find patterns in data. Using
neural networks as a tool, data warehousing firms are harvesting information from datasets in the
process known as data mining. The difference between these data warehouses and ordinary databases
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
4
is that there is actual anipulation and cross-fertilization of the data helping users makes more informed
decisions.
Neural networks essentially comprise three pieces: the architecture or model; the learning
algorithm; and the activation functions. Neural networks are programmed or “trained” to “store,
recognize, and associatively retrieve patterns or database entries; to solve combinatorial optimization
problems; to filter noise from measurement data; to control ill-defined problems. It is precisely these
two abilities (pattern recognition and function estimation) which make artificial neural networks
(ANN) so prevalent a utility in data mining system. As a size of data sets grows massive, the need for
automated processing becomes clear. With their “model-free” estimators and their dual nature, neural
networks serve data mining in a myriad of ways.
Data mining is the business of answering questions that you’ve not asked yet. Data mining
reaches deep into databases. Data mining tasks can be classified into two categories: Descriptive and
predictive data mining. Descriptive data mining provides information to understand what is happening
inside the data without a predetermined idea. Predictive data mining allows the user to submit records
with unknown field values, and based on previous patterns discovered form the database system will
guess the unknown values. Data mining models can be categorized according to the tasks they perform:
Prediction and Classification, Association Rules, Clustering. Prediction and classification is a
predictive model, but clustering and association rules are descriptive models.
Figure 2: Neural-based framework for ARM.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
5
The most common action in data mining is classification. Classification recognizes patterns
that describe the group to which an item relates. It does this by examining existing items that already
have been classified and inferring a set of rules. The major difference being that no groups have been
predefined. Prediction is the construction and use of a model to assess the class of an unlabeled object
or to assess the value or value ranges of a given object is likely to have. The next application is
forecasting. This is different from predictions because it estimates the future value of continuous
variables based on patterns within the database. Neural network works depending on the provide
associations, classifications, architecture, clusters, forecasting and prediction to the data mining
industry.
B. Feedforward Neural Network
A feedforward neural network (FFNN) is the one of the simplest neural network technique,
such as in Figure, consists of three layers: an input, hidden and output layer. In every layer there are one
or more processing elements (PEs). PEs is meant to simulate the neurons in the brain and this is why
they are often referred to as nodes or neurons. A processing element receives inputs from either the
previous layer or the outside world. There are connections between the processing elements in each
layer that have a weight (parameter) associated with the element. During training this weight is
adjusted. Information only travels in the forward direction through the network - there are no feedback
loops.
Figure 3: Flow of the feedforward neural network
The simplified process for training a feedforward neural network is as follows:
1. Input data is presented to the network and propagated through the network until it reaches the
output layer of the network. This forward process produces a predicted output.
2. The predicted output is subtracted from the actual output and an error value for the networks is
calculated.
3. The neural network then uses supervised learning, most of the cases which is back propagation
for training the network. Back propagation is a learning algorithm for adjusting the weights. It
starts with the weights between the output layer PE’s and the last hidden layer PE’s and works
backwards through the network.
4. The forward process starts again once back propagation has finished, and this cycle is continued
until the error between predicted and actual outputs is minimized.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
6
C. The Back Propagation Algorithm
Propagation of error or Back propagation is a common method of teaching artificial neural
networks how to perform a particular task. The back propagation algorithm is used in layered
feedforward ANNs. This means that the artificial neurons are organized in layers, and send their
signals “forward”, and then the errors are propagated backwards. The back propagation algorithm uses
supervised learning, which means that we provide the algorithm with examples of the inputs and
outputs we want the network to compute, and then the error (difference between actual and expected
results) is calculated. The idea of the back propagation algorithm is to reduce this error, until the ANN
learns the training data.
Algorithm:
1. Initialize the weights in the network (often
randomly)
2. repeat
* for each example e in the training set do
1. O = neural-net-output(network, e) ;
forward pass
2. T = teacher output for e
3. Calculate error (T - O) at the output
units
4. Compute delta_wi for all weights
from hidden layer to output layer ;
backward pass
5. Compute delta_wi for all weights
from input layer to hidden layer ;
backward pass continued
6. Update the weights in the network
* end
3. until all examples classified correctly or
stopping criterion satisfied
4. return(network)
III. DIFFRENT DATA MINING ALGORITHMS WITH NEURAL NETWORK
A. Association rule mining with neural network
In this paper we are going to implement the neural network with the different data mining
techniques we discussed in the previous review paper we published.[9] The flowchart of the proposed
Association rule mining with neural network shows in figure 4 . Firstly the Trained Dataset with the
known input and known output is given to the system as the input. The discretization is applied on the
input to obtain the association rules from the dataset. Classification rule set is obtained from the
discretization. Classification Rule Neural Network (CRNN) construction and parameter learning set is
then obtain from the classification rule set. This constructor and learning parameter is then used to
form the classification model of the CRNN. Now we apply the testing dataset with the unknown output
as the input to the classification model of the CRNN to find the known rules from the input. The output
of the CRNN classification is the desired output dataset.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
7
Figure 4: Association rule mining with neural network
A. CHARM Algorithm with Neural Network
CHARM is an efficient algorithm for enumerating the set of all frequent closed item-sets. There
are a number of innovative ideas employed in the development of CHARM; these include:
1) CHARM simultaneously explores both the item-set space and transaction space, over a novel
IT-tree (item set-tides tree) search space of the database. In contrast previous algorithms exploit
only the item-set search space. The integration of the CHARM algorithm with the neural
network is shown in figure 5.
2) CHARM uses a highly efficient hybrid search method that skips many levels of the IT-tree to
quickly identify the frequent closed item-sets, instead of having to enumerate many possible
subsets.
3) It uses a fast hash-based approach to eliminate non-closed item-sets during subsumption
checking. CHARM also able to utilize a novel vertical data representation called diffset [5], for
fast frequency computations. Diffsets also keep track for differences in the tids of a candidate
pattern from its prefix pattern. Diffsets drastically cut down (by orders of magnitude) the size of
Training
Dataset
Discretization if necessary
Association
rule
classification
Rules
associated with
output of
dataset
Rule
Selection
Classification rule set
CRNN Construction and parameter
learning and optimization
Classification model of CRNN
CRNN ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
8
memory required to store intermediate results. Thus the entire working set of patterns can fit
entirely in the memory, even for huge databases.
Figure 5: CHARM algorithms with neural network
B. CM SPAM Algorithm with Neural Network
Mining useful patterns in sequential data is a challenging task. Many studies have been
proposed for mining interesting patterns in sequence databases [6]. Sequential pattern mining is
probably the most popular research topic among them. A subsequence is called sequential pattern or
frequent sequence if it frequently appears in a sequence database and its frequency is no less than a
user-specified minimum support threshold minsup [7]. Sequential pattern mining plays an important
role in data mining and is essential to a wide range of applications such as the analysis of web medical
data, program executions, click-streams, e-learning data and biological data [6]. Several efficient
algorithms have been proposed for sequential data mining and one of them is CM SPAM Algorithm.
The integration of the CM SPAM algorithm from the sequential data mining and neural network is
shown in figure 6. First the trained dataset with known input and output is given as the input to the
system. Discretization is done if it necessary it gives the sequential classification from the known input
and sequential classification form the known output. Combination of this both dataset gives us the
Training
Dataset
Discretization if necessary
Similar
Dataset
classification
Similar Dataset
with output of
dataset
Classification Data set
CHARM Dataset Construction and
parameter learning and optimization
Classification model of CHARM
Dataset
CHARM ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
9
classification sequential dataset.Then CM SPAM algorithm is applied to get the sequential
construction, parameter learning and optimized dataset from the sequential dataset. Combination of all
this parameters gives us the Classification model of Sequential CM SPAM, which is then used on the
testing dataset with unknown output for the sequential data mining.
Figure 6: CM SPAM algorithms with neural network
IV. EXPERIMENTAL RESULT
Once the algorithms were implemented and the results were summarized, we tried to optimize
the algorithms with the help of Neural Network techniques. Out of the many techniques available, we
selected Back Propagation and FeedForward with Back Propagation. Each of the networks when
applied to each of the Data Mining algorithms gave some interesting and conclusive results which we
analyzed to find the best possible application for the given combination of dataset.
In all the techniques, the neural network was first trained with the input dataset of 500 entries,
and the output dataset of mined values. Once the network was trained, we used the network for mining
of 1000 and 2000 records. The same process was followed for each of the neural networks and
corresponding weights were evaluated for each network. Once the networks are trained, we evaluated
each of the networks with a different length of input dataset in order to get the desired data mining
results. The mining results obtained are shown as follows,
Training
Dataset
Discretization if necessary
Sequential
classification
Sequential data
with output of
dataset
Classification Sequential data set
CM SPAM Sequential Construction
and parameter learning and
optimization
Classification model of Sequential CM
SPAM
CM SPAM ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
10
Table 1: Top K Rules Mining (Mining top 10% Rules) with different neural network techniques
Top K Rules BPP FF
Time 1000 24 31 7
Memory 1000 8.28 5.01 2.83
Computational
Complexity 1000
------ 32% 13%
Time 2000 171 119 58
Memory 2000 15.489 7.62 4.72
Computational
Complexity 2000
----- 31% 14%
Table 2: CHARM mining with different neural network
CHARM BPP FF
Time 1000 42 13 10
Memory 1000 33.3 28.8 18.23
Computational
Complexity 1000
----- 30% 11%
Time 2000 1 1 1
Memory 2000 22.28 11.784 7.48
Computational
Complexity 2000
----- 29% 12%
Table 3: CMSPAM mining with different neural network
CHARM BPP FF
Time 1000 2 0.5 1.5
Memory 1000 73.2 36.5 24.7
Computational
Complexity 1000
----- 32.4% 10%
Time 2000 1 0.25 7.5
Memory 2000 75.2 8.93 5.98
Computational
Complexity 2000
----- 32% 10.4%
V. CONCLUSIONS
In this paper we study the Artificial Neural Network and how we can use ANN with the data
mining concept. Computational complexity is the very important term in the any data mining field.
Computational complexity defines the overall efficiency data mining algorithm. The computational
complexities of neural network techniques are calculate for all the three data mining algorithms. In this
paper we are successfully able to integrate the Neural Network with the three data mining techniques.
Because of the neural network the output of the data mining from the all the three techniques has been
improved. The result of the experiment proves our conclusion.
VI. ACKNOWLEDGEMENTS
First Author would like to acknowledge Dr. P.K.Butey for their cooperation and useful
suggestion to the research work.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
11
VII. REFERENCES
1. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN
0-471-66657-2, ohn Wiley & Sons, Inc, 2005.
2. Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5,
Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999.
3. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN
0-471-66657-2, ohn Wiley & Sons, Inc, 2005.
4. Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson
Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006
5. M. J. Zaki and K. Gouda. Fast vertical mining using Diffsets. Technical Report 01-1, Computer
Science Dept., Rensselaer Polytechnic Institute, March 2001.
6. Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM
Computing Surveys 43(1), 1–41 (2010).
7. Agrawal, R., Ramakrishnan, S.: Mining sequential patterns. In: Proc. 11th Intern. Conf. Data
Engineering, pp. 3–14. IEEE (1995)
8. Bradley, I., Introduction to Neural Networks, Multinet Systems Pty Ltd 1997.
9. Chamatkar and Dr. P.K. Butey “Comparison on Different Data Mining Algorithms” at IJCSE
Vol. 2 No.10, Oct 14. E-ISSN: 2347-2693
10. Ms. Aruna J. Chamatkar and Dr. Pradeep K. Butey, “A Comprehensive Study of Data Mining
Methods With Implementation of Neural Network Techniques” International journal of
Computer Engineering & Technology (IJCET), Volume 5, Issue 12, 2014, pp. 12 - 18, ISSN
Print: 0976 – 6367, ISSN Online: 0976 – 6375.
11. Mrs. Charmy Patel and Dr. Ravi Gulati, “Software Performance Analysis: A Data Mining
Approach” International Journal of Information Technology and Management Information
Systems (IJITMIS), Volume 5, Issue 2, 2014, pp. 28 - 31, ISSN Print: 0976 – 6405, ISSN
Online: 0976 – 6413.
AUTHORS DETAILS
Ms. ARUNA J. CHAMATKAR is MCA from Rashtrasant Tukdoji Maharaj Nagpur
University, Nagpur. Currently pursuing PhD from RTM Nagpur University under
the guidance of Dr. Pradeep K. Butey. Her research area is Data Mining and Neural
Network.
Dr. PRADEEP K. BUTEY is research Supervisor for Computer Science at RTM
Nagpur university. He is the Head of Department (Computer Science) at Kamla
Nehru Mahavidyalaya, Nagpur. His area of interest includes Fuzzy Logic, Neural
Network and Data Mining.
Ad

More Related Content

What's hot (19)

IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET Journal
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
IJCSEIT Journal
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
prj_publication
 
Information entanglement
Information entanglementInformation entanglement
Information entanglement
Willard Van De Bogart
 
A review on data mining
A  review on data miningA  review on data mining
A review on data mining
Er. Nancy
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
eSAT Journals
 
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET Journal
 
Successive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing dataSuccessive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing data
IAEME Publication
 
50120130406032
5012013040603250120130406032
50120130406032
IAEME Publication
 
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
IJECEIAES
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
IJET - International Journal of Engineering and Techniques
 
EDRG12_Re.doc
EDRG12_Re.docEDRG12_Re.doc
EDRG12_Re.doc
butest
 
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data    Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
IJECEIAES
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET Journal
 
Novel holistic architecture for analytical operation on sensory data relayed...
Novel holistic architecture for analytical operation  on sensory data relayed...Novel holistic architecture for analytical operation  on sensory data relayed...
Novel holistic architecture for analytical operation on sensory data relayed...
IJECEIAES
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
butest
 
12 非構造化データ解析
12 非構造化データ解析12 非構造化データ解析
12 非構造化データ解析
Seiichi Uchida
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
IRJET Journal
 
A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017
Manish K Patel
 
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET Journal
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
IJCSEIT Journal
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
prj_publication
 
A review on data mining
A  review on data miningA  review on data mining
A review on data mining
Er. Nancy
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
eSAT Journals
 
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET Journal
 
Successive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing dataSuccessive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing data
IAEME Publication
 
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
IJECEIAES
 
EDRG12_Re.doc
EDRG12_Re.docEDRG12_Re.doc
EDRG12_Re.doc
butest
 
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data    Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
IJECEIAES
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET Journal
 
Novel holistic architecture for analytical operation on sensory data relayed...
Novel holistic architecture for analytical operation  on sensory data relayed...Novel holistic architecture for analytical operation  on sensory data relayed...
Novel holistic architecture for analytical operation on sensory data relayed...
IJECEIAES
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
butest
 
12 非構造化データ解析
12 非構造化データ解析12 非構造化データ解析
12 非構造化データ解析
Seiichi Uchida
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
IRJET Journal
 
A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017
Manish K Patel
 

Viewers also liked (17)

Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Universitas Pembangunan Panca Budi
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
Editor IJMTER
 
10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data mining
George Ang
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
Nagasuri Bala Venkateswarlu
 
Data Analysis
Data AnalysisData Analysis
Data Analysis
sikander kushwaha
 
Data Analysison Regression
Data Analysison RegressionData Analysison Regression
Data Analysison Regression
jamuga gitulho
 
Data analysis
Data analysisData analysis
Data analysis
neha147
 
A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...
JYOTIR MOY
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
mayurik19
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
parry prabhu
 
A data analyst view of Bigdata
A data analyst view of Bigdata A data analyst view of Bigdata
A data analyst view of Bigdata
Venkata Reddy Konasani
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
nextlib
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Apriori Algorithm
International School of Engineering
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
jamiebrandon
 
Data analysis using spss
Data analysis using spssData analysis using spss
Data analysis using spss
Muhammad Ibrahim
 
Qualitative data analysis
Qualitative data analysisQualitative data analysis
Qualitative data analysis
Tilahun Nigatu Haregu
 
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Universitas Pembangunan Panca Budi
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
Editor IJMTER
 
10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data mining
George Ang
 
Data Analysison Regression
Data Analysison RegressionData Analysison Regression
Data Analysison Regression
jamuga gitulho
 
Data analysis
Data analysisData analysis
Data analysis
neha147
 
A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...
JYOTIR MOY
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
mayurik19
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
parry prabhu
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
nextlib
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
jamiebrandon
 
Ad

Similar to Performance analysis of data mining algorithms with neural network (20)

A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
Editor IJCATR
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
IAEME Publication
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
IJAEMSJORNAL
 
Data Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and InnovationsData Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and Innovations
Vaishali Pal
 
Deep learning applications and challenges in big data analytics
Deep learning applications and challenges in big data analyticsDeep learning applications and challenges in big data analytics
Deep learning applications and challenges in big data analytics
SoniaDubey6
 
4113ijaia09
4113ijaia094113ijaia09
4113ijaia09
mamin321
 
A new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemA new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender system
IJNSA Journal
 
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMA NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
IJNSA Journal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSA STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
ijistjournal
 
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET Journal
 
Human Activity Recognition System
Human Activity Recognition SystemHuman Activity Recognition System
Human Activity Recognition System
IRJET Journal
 
Introduction to feature subset selection method
Introduction to feature subset selection methodIntroduction to feature subset selection method
Introduction to feature subset selection method
IJSRD
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
BRNSSPublicationHubI
 
HOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORKHOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORK
AM Publications
 
Unit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptxUnit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptx
vipulkondekar
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
IJDKP
 
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
Editor IJCATR
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
IAEME Publication
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
IJAEMSJORNAL
 
Data Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and InnovationsData Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and Innovations
Vaishali Pal
 
Deep learning applications and challenges in big data analytics
Deep learning applications and challenges in big data analyticsDeep learning applications and challenges in big data analytics
Deep learning applications and challenges in big data analytics
SoniaDubey6
 
4113ijaia09
4113ijaia094113ijaia09
4113ijaia09
mamin321
 
A new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemA new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender system
IJNSA Journal
 
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMA NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
IJNSA Journal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ijesajournal
 
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSA STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
ijistjournal
 
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET Journal
 
Human Activity Recognition System
Human Activity Recognition SystemHuman Activity Recognition System
Human Activity Recognition System
IRJET Journal
 
Introduction to feature subset selection method
Introduction to feature subset selection methodIntroduction to feature subset selection method
Introduction to feature subset selection method
IJSRD
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
BRNSSPublicationHubI
 
HOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORKHOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORK
AM Publications
 
Unit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptxUnit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptx
vipulkondekar
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
IJDKP
 
Ad

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

Recently uploaded (20)

Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Top 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing ServicesTop 10 IT Help Desk Outsourcing Services
Top 10 IT Help Desk Outsourcing Services
Infrassist Technologies Pvt. Ltd.
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Web and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in RajpuraWeb and Graphics Designing Training in Rajpura
Web and Graphics Designing Training in Rajpura
Erginous Technology
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 

Performance analysis of data mining algorithms with neural network

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 1 PERFORMANCE ANALYSIS OF DATA MINING ALGORITHMS WITH NEURAL NETWORK Ms. Aruna J. Chamatkar Research Scholar, Department of Electronics & Computer Science, RTM Nagpur University, Nagpur, India Dr. P.K. Butey Research Supervisor, HOD Computer Science Department, Kamla Nehru Mahavidyalaya, Nagpur India ABSTRACT Data mining has evolved into an active and important area of research because of previously unknown and interesting knowledge from very large real-world database. Data mining methods have been successfully applied in a wide range of unsupervised and supervised learning applications. Classification is one of the data mining problems receiving great attention recently in the database community. Neural networks have not been thought suited for data mining because how the classifications were made is not explicitly stated as symbolic rules that are suitable for verification or interpretation by humans. The neural network is first trained to achieve the required accuracy in data mining. A network pruning algorithm is used to remove redundant connections of the network. The activation values of the hidden units in the network are analyzed in the network and classification rules are generated using the result of this analysis. In this paper we are going to combine neural network with the three different algorithms which are commonly used in data mining to improve the data mining result. These three algorithms are CHARM Algorithm, Top K Rules mining and CM SPAM Algorithm. Keywords: Artificial Neural Network, Data Mining, CHARM algorithm, CM -SPAM Algorithm, K -rule mining. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 1, January (2015), pp. 01-11 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 2 I. INTRODUCTION In present day human beings are used in the different technologies to adequate in there society. Every day the human beings are using the vast data and these data are in the different fields .It may be in the form of documents, may be graphical formats, may be the video, may be records (varying array) .As the data are available in the different formats so that the proper action to be taken for better utilization of the available data. As and when the customer will require the data should be retrieved from the database and make the better decision. This technique is actually we called as a data mining or Knowledge Hub or simply KDD (Knowledge Discovery Process).The important reason that attracted a great deal of attention in information technology the discovery of useful information from large collections of data industry towards field of “Data mining” is due to the perception of “we are data rich but information poor”. Very huge amount of data is available but we hardly able to turn them in to useful information and knowledge for managerial decision making in different fields. To produce information it requires very huge database. It may be available in different formats like audio/video, numbers, text, figures, and Hypertext formats. To take complete advantage of data; the data retrieval is simply not enough, it requires a tool for extraction of the essence of information stored, automatic summarization of data and the discovery of patterns in raw data. With the enormous amount of data stored in databases, files, and other repositories, it is very important to develop powerful software or tool for analysis and interpretation of such data and for the extraction of interesting knowledge that could help in decision-making. The only answer to all above is ‘Data Mining’. Data mining is the method of extracting hidden predictive information from large databases; it is a powerful technology with great potential to help organizations focus on the most important information in their data warehouses [1][2][3][4]. Data mining tools predict behaviors and future trends help organizations and firms to make proactive knowledge-driven decisions [2]. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by prospective tools typical of decision support systems. Data mining tools can answer the questions that traditionally were too time consuming to resolve. They created databases for finding predictive information, finding hidden patterns that experts may miss because it lies outside their expectations. One of the data mining problems is classification. Various classification algorithms have been designed to tackle the problem by researchers in different fields such as mathematical programming, machine learning, and statistics. Recently, there is a surge of data mining research in the database community. The classification problem is re-examined in the context of large databases. Unlike researchers in other fields, database researchers pay more attention to the issues related to the volume of data. They are also concerned with the effective use of the available database techniques, such as efficient data retrieval mechanisms. With such concerns, most algorithms proposed are basically based on decision trees. II. ARTIFICIAL NEURAL NETWORK An artificial neural network (ANN), often just called a "neural network", is a computational model or mathematical model based on biological neural networks, in other words we can say that it is an emulation of biological neural system. Artificial neural network consists of an interconnected group of artificial neurons and processes information using a connectionist approach to computation. Most of the time ANN is an adaptive system that changes its structure based on external or internal information that flows through the network during the learning phase [8].
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 3 Figure 1: Basic Neural Network Structure A. Training Of Artificial Neural Networks A neural network has to be configured such that the application of a set of inputs produces (either 'direct' or via a relaxation process) the desired set of outputs. Different methods to set the strengths of the connections presents. Prior knowledge is a one way is to set the weights explicitly. Another way is to 'train' the neural network by feeding it teaching patterns and letting it change its weights according to some learning rule. We can categorize the learning situations as follows: • Supervised learning or Associative learning in which the network is trained by providing it with input and matching output patterns. These pairs of input-output can be provided by the system which contains the neural network (self-supervised) or by an external teacher. • Unsupervised learning or Self-organization in which an (output) unit is trained to respond to clusters of pattern within the input. The system is supposed to discover statistically salient features of the input population in this paradigm. Unlike the supervised learning paradigm, there is no other priori set of categories into which the patterns are to be classified; rather the system must develop its own representation of the input stimuli. • Reinforcement learning this type of learning may be considered as an intermediate form of the above two learning types. Here the learning machine does some action on the environment and gets a feedback response from the environment system. The learning system grades its action bad (punishable) or good (rewarding) based on the environmental response and accordingly adjusts its parameters. In more practical terms neural networks are non-linear statistical data modeling tools. They can be used to model complex relationships between inputs and outputs or to find patterns in data. Using neural networks as a tool, data warehousing firms are harvesting information from datasets in the process known as data mining. The difference between these data warehouses and ordinary databases
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 4 is that there is actual anipulation and cross-fertilization of the data helping users makes more informed decisions. Neural networks essentially comprise three pieces: the architecture or model; the learning algorithm; and the activation functions. Neural networks are programmed or “trained” to “store, recognize, and associatively retrieve patterns or database entries; to solve combinatorial optimization problems; to filter noise from measurement data; to control ill-defined problems. It is precisely these two abilities (pattern recognition and function estimation) which make artificial neural networks (ANN) so prevalent a utility in data mining system. As a size of data sets grows massive, the need for automated processing becomes clear. With their “model-free” estimators and their dual nature, neural networks serve data mining in a myriad of ways. Data mining is the business of answering questions that you’ve not asked yet. Data mining reaches deep into databases. Data mining tasks can be classified into two categories: Descriptive and predictive data mining. Descriptive data mining provides information to understand what is happening inside the data without a predetermined idea. Predictive data mining allows the user to submit records with unknown field values, and based on previous patterns discovered form the database system will guess the unknown values. Data mining models can be categorized according to the tasks they perform: Prediction and Classification, Association Rules, Clustering. Prediction and classification is a predictive model, but clustering and association rules are descriptive models. Figure 2: Neural-based framework for ARM.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 5 The most common action in data mining is classification. Classification recognizes patterns that describe the group to which an item relates. It does this by examining existing items that already have been classified and inferring a set of rules. The major difference being that no groups have been predefined. Prediction is the construction and use of a model to assess the class of an unlabeled object or to assess the value or value ranges of a given object is likely to have. The next application is forecasting. This is different from predictions because it estimates the future value of continuous variables based on patterns within the database. Neural network works depending on the provide associations, classifications, architecture, clusters, forecasting and prediction to the data mining industry. B. Feedforward Neural Network A feedforward neural network (FFNN) is the one of the simplest neural network technique, such as in Figure, consists of three layers: an input, hidden and output layer. In every layer there are one or more processing elements (PEs). PEs is meant to simulate the neurons in the brain and this is why they are often referred to as nodes or neurons. A processing element receives inputs from either the previous layer or the outside world. There are connections between the processing elements in each layer that have a weight (parameter) associated with the element. During training this weight is adjusted. Information only travels in the forward direction through the network - there are no feedback loops. Figure 3: Flow of the feedforward neural network The simplified process for training a feedforward neural network is as follows: 1. Input data is presented to the network and propagated through the network until it reaches the output layer of the network. This forward process produces a predicted output. 2. The predicted output is subtracted from the actual output and an error value for the networks is calculated. 3. The neural network then uses supervised learning, most of the cases which is back propagation for training the network. Back propagation is a learning algorithm for adjusting the weights. It starts with the weights between the output layer PE’s and the last hidden layer PE’s and works backwards through the network. 4. The forward process starts again once back propagation has finished, and this cycle is continued until the error between predicted and actual outputs is minimized.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 6 C. The Back Propagation Algorithm Propagation of error or Back propagation is a common method of teaching artificial neural networks how to perform a particular task. The back propagation algorithm is used in layered feedforward ANNs. This means that the artificial neurons are organized in layers, and send their signals “forward”, and then the errors are propagated backwards. The back propagation algorithm uses supervised learning, which means that we provide the algorithm with examples of the inputs and outputs we want the network to compute, and then the error (difference between actual and expected results) is calculated. The idea of the back propagation algorithm is to reduce this error, until the ANN learns the training data. Algorithm: 1. Initialize the weights in the network (often randomly) 2. repeat * for each example e in the training set do 1. O = neural-net-output(network, e) ; forward pass 2. T = teacher output for e 3. Calculate error (T - O) at the output units 4. Compute delta_wi for all weights from hidden layer to output layer ; backward pass 5. Compute delta_wi for all weights from input layer to hidden layer ; backward pass continued 6. Update the weights in the network * end 3. until all examples classified correctly or stopping criterion satisfied 4. return(network) III. DIFFRENT DATA MINING ALGORITHMS WITH NEURAL NETWORK A. Association rule mining with neural network In this paper we are going to implement the neural network with the different data mining techniques we discussed in the previous review paper we published.[9] The flowchart of the proposed Association rule mining with neural network shows in figure 4 . Firstly the Trained Dataset with the known input and known output is given to the system as the input. The discretization is applied on the input to obtain the association rules from the dataset. Classification rule set is obtained from the discretization. Classification Rule Neural Network (CRNN) construction and parameter learning set is then obtain from the classification rule set. This constructor and learning parameter is then used to form the classification model of the CRNN. Now we apply the testing dataset with the unknown output as the input to the classification model of the CRNN to find the known rules from the input. The output of the CRNN classification is the desired output dataset.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 7 Figure 4: Association rule mining with neural network A. CHARM Algorithm with Neural Network CHARM is an efficient algorithm for enumerating the set of all frequent closed item-sets. There are a number of innovative ideas employed in the development of CHARM; these include: 1) CHARM simultaneously explores both the item-set space and transaction space, over a novel IT-tree (item set-tides tree) search space of the database. In contrast previous algorithms exploit only the item-set search space. The integration of the CHARM algorithm with the neural network is shown in figure 5. 2) CHARM uses a highly efficient hybrid search method that skips many levels of the IT-tree to quickly identify the frequent closed item-sets, instead of having to enumerate many possible subsets. 3) It uses a fast hash-based approach to eliminate non-closed item-sets during subsumption checking. CHARM also able to utilize a novel vertical data representation called diffset [5], for fast frequency computations. Diffsets also keep track for differences in the tids of a candidate pattern from its prefix pattern. Diffsets drastically cut down (by orders of magnitude) the size of Training Dataset Discretization if necessary Association rule classification Rules associated with output of dataset Rule Selection Classification rule set CRNN Construction and parameter learning and optimization Classification model of CRNN CRNN ClassificationTesting Dataset Output
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 8 memory required to store intermediate results. Thus the entire working set of patterns can fit entirely in the memory, even for huge databases. Figure 5: CHARM algorithms with neural network B. CM SPAM Algorithm with Neural Network Mining useful patterns in sequential data is a challenging task. Many studies have been proposed for mining interesting patterns in sequence databases [6]. Sequential pattern mining is probably the most popular research topic among them. A subsequence is called sequential pattern or frequent sequence if it frequently appears in a sequence database and its frequency is no less than a user-specified minimum support threshold minsup [7]. Sequential pattern mining plays an important role in data mining and is essential to a wide range of applications such as the analysis of web medical data, program executions, click-streams, e-learning data and biological data [6]. Several efficient algorithms have been proposed for sequential data mining and one of them is CM SPAM Algorithm. The integration of the CM SPAM algorithm from the sequential data mining and neural network is shown in figure 6. First the trained dataset with known input and output is given as the input to the system. Discretization is done if it necessary it gives the sequential classification from the known input and sequential classification form the known output. Combination of this both dataset gives us the Training Dataset Discretization if necessary Similar Dataset classification Similar Dataset with output of dataset Classification Data set CHARM Dataset Construction and parameter learning and optimization Classification model of CHARM Dataset CHARM ClassificationTesting Dataset Output
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 9 classification sequential dataset.Then CM SPAM algorithm is applied to get the sequential construction, parameter learning and optimized dataset from the sequential dataset. Combination of all this parameters gives us the Classification model of Sequential CM SPAM, which is then used on the testing dataset with unknown output for the sequential data mining. Figure 6: CM SPAM algorithms with neural network IV. EXPERIMENTAL RESULT Once the algorithms were implemented and the results were summarized, we tried to optimize the algorithms with the help of Neural Network techniques. Out of the many techniques available, we selected Back Propagation and FeedForward with Back Propagation. Each of the networks when applied to each of the Data Mining algorithms gave some interesting and conclusive results which we analyzed to find the best possible application for the given combination of dataset. In all the techniques, the neural network was first trained with the input dataset of 500 entries, and the output dataset of mined values. Once the network was trained, we used the network for mining of 1000 and 2000 records. The same process was followed for each of the neural networks and corresponding weights were evaluated for each network. Once the networks are trained, we evaluated each of the networks with a different length of input dataset in order to get the desired data mining results. The mining results obtained are shown as follows, Training Dataset Discretization if necessary Sequential classification Sequential data with output of dataset Classification Sequential data set CM SPAM Sequential Construction and parameter learning and optimization Classification model of Sequential CM SPAM CM SPAM ClassificationTesting Dataset Output
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 10 Table 1: Top K Rules Mining (Mining top 10% Rules) with different neural network techniques Top K Rules BPP FF Time 1000 24 31 7 Memory 1000 8.28 5.01 2.83 Computational Complexity 1000 ------ 32% 13% Time 2000 171 119 58 Memory 2000 15.489 7.62 4.72 Computational Complexity 2000 ----- 31% 14% Table 2: CHARM mining with different neural network CHARM BPP FF Time 1000 42 13 10 Memory 1000 33.3 28.8 18.23 Computational Complexity 1000 ----- 30% 11% Time 2000 1 1 1 Memory 2000 22.28 11.784 7.48 Computational Complexity 2000 ----- 29% 12% Table 3: CMSPAM mining with different neural network CHARM BPP FF Time 1000 2 0.5 1.5 Memory 1000 73.2 36.5 24.7 Computational Complexity 1000 ----- 32.4% 10% Time 2000 1 0.25 7.5 Memory 2000 75.2 8.93 5.98 Computational Complexity 2000 ----- 32% 10.4% V. CONCLUSIONS In this paper we study the Artificial Neural Network and how we can use ANN with the data mining concept. Computational complexity is the very important term in the any data mining field. Computational complexity defines the overall efficiency data mining algorithm. The computational complexities of neural network techniques are calculate for all the three data mining algorithms. In this paper we are successfully able to integrate the Neural Network with the three data mining techniques. Because of the neural network the output of the data mining from the all the three techniques has been improved. The result of the experiment proves our conclusion. VI. ACKNOWLEDGEMENTS First Author would like to acknowledge Dr. P.K.Butey for their cooperation and useful suggestion to the research work.
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 11 VII. REFERENCES 1. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005. 2. Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999. 3. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005. 4. Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006 5. M. J. Zaki and K. Gouda. Fast vertical mining using Diffsets. Technical Report 01-1, Computer Science Dept., Rensselaer Polytechnic Institute, March 2001. 6. Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM Computing Surveys 43(1), 1–41 (2010). 7. Agrawal, R., Ramakrishnan, S.: Mining sequential patterns. In: Proc. 11th Intern. Conf. Data Engineering, pp. 3–14. IEEE (1995) 8. Bradley, I., Introduction to Neural Networks, Multinet Systems Pty Ltd 1997. 9. Chamatkar and Dr. P.K. Butey “Comparison on Different Data Mining Algorithms” at IJCSE Vol. 2 No.10, Oct 14. E-ISSN: 2347-2693 10. Ms. Aruna J. Chamatkar and Dr. Pradeep K. Butey, “A Comprehensive Study of Data Mining Methods With Implementation of Neural Network Techniques” International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 12, 2014, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 11. Mrs. Charmy Patel and Dr. Ravi Gulati, “Software Performance Analysis: A Data Mining Approach” International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 2, 2014, pp. 28 - 31, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413. AUTHORS DETAILS Ms. ARUNA J. CHAMATKAR is MCA from Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur. Currently pursuing PhD from RTM Nagpur University under the guidance of Dr. Pradeep K. Butey. Her research area is Data Mining and Neural Network. Dr. PRADEEP K. BUTEY is research Supervisor for Computer Science at RTM Nagpur university. He is the Head of Department (Computer Science) at Kamla Nehru Mahavidyalaya, Nagpur. His area of interest includes Fuzzy Logic, Neural Network and Data Mining.