SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
1
PERFORMANCE ANALYSIS OF DATA MINING
ALGORITHMS WITH NEURAL NETWORK
Ms. Aruna J. Chamatkar
Research Scholar, Department of Electronics & Computer Science,
RTM Nagpur University, Nagpur, India
Dr. P.K. Butey
Research Supervisor, HOD Computer Science Department,
Kamla Nehru Mahavidyalaya, Nagpur India
ABSTRACT
Data mining has evolved into an active and important area of research because of previously
unknown and interesting knowledge from very large real-world database. Data mining methods have
been successfully applied in a wide range of unsupervised and supervised learning applications.
Classification is one of the data mining problems receiving great attention recently in the database
community. Neural networks have not been thought suited for data mining because how the
classifications were made is not explicitly stated as symbolic rules that are suitable for verification or
interpretation by humans. The neural network is first trained to achieve the required accuracy in data
mining. A network pruning algorithm is used to remove redundant connections of the network. The
activation values of the hidden units in the network are analyzed in the network and classification rules
are generated using the result of this analysis. In this paper we are going to combine neural network
with the three different algorithms which are commonly used in data mining to improve the data
mining result. These three algorithms are CHARM Algorithm, Top K Rules mining and CM SPAM
Algorithm.
Keywords: Artificial Neural Network, Data Mining, CHARM algorithm, CM -SPAM Algorithm,
K -rule mining.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 6, Issue 1, January (2015), pp. 01-11
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
2
I. INTRODUCTION
In present day human beings are used in the different technologies to adequate in there society.
Every day the human beings are using the vast data and these data are in the different fields .It may be
in the form of documents, may be graphical formats, may be the video, may be records (varying array)
.As the data are available in the different formats so that the proper action to be taken for better
utilization of the available data. As and when the customer will require the data should be retrieved
from the database and make the better decision.
This technique is actually we called as a data mining or Knowledge Hub or simply KDD
(Knowledge Discovery Process).The important reason that attracted a great deal of attention in
information technology the discovery of useful information from large collections of data industry
towards field of “Data mining” is due to the perception of “we are data rich but information poor”.
Very huge amount of data is available but we hardly able to turn them in to useful information and
knowledge for managerial decision making in different fields. To produce information it requires very
huge database. It may be available in different formats like audio/video, numbers, text, figures, and
Hypertext formats. To take complete advantage of data; the data retrieval is simply not enough, it
requires a tool for extraction of the essence of information stored, automatic summarization of data
and the discovery of patterns in raw data.
With the enormous amount of data stored in databases, files, and other repositories, it is very
important to develop powerful software or tool for analysis and interpretation of such data and for the
extraction of interesting knowledge that could help in decision-making. The only answer to all above is
‘Data Mining’. Data mining is the method of extracting hidden predictive information from large
databases; it is a powerful technology with great potential to help organizations focus on the most
important information in their data warehouses [1][2][3][4]. Data mining tools predict behaviors and
future trends help organizations and firms to make proactive knowledge-driven decisions [2]. The
automated, prospective analyses offered by data mining move beyond the analyses of past events
provided by prospective tools typical of decision support systems. Data mining tools can answer the
questions that traditionally were too time consuming to resolve. They created databases for finding
predictive information, finding hidden patterns that experts may miss because it lies outside their
expectations.
One of the data mining problems is classification. Various classification algorithms have been
designed to tackle the problem by researchers in different fields such as mathematical programming,
machine learning, and statistics. Recently, there is a surge of data mining research in the database
community. The classification problem is re-examined in the context of large databases. Unlike
researchers in other fields, database researchers pay more attention to the issues related to the volume
of data. They are also concerned with the effective use of the available database techniques, such as
efficient data retrieval mechanisms. With such concerns, most algorithms proposed are basically based
on decision trees.
II. ARTIFICIAL NEURAL NETWORK
An artificial neural network (ANN), often just called a "neural network", is a computational
model or mathematical model based on biological neural networks, in other words we can say that it is
an emulation of biological neural system. Artificial neural network consists of an interconnected group
of artificial neurons and processes information using a connectionist approach to computation. Most of
the time ANN is an adaptive system that changes its structure based on external or internal information
that flows through the network during the learning phase [8].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
3
Figure 1: Basic Neural Network Structure
A. Training Of Artificial Neural Networks
A neural network has to be configured such that the application of a set of inputs produces
(either 'direct' or via a relaxation process) the desired set of outputs. Different methods to set the
strengths of the connections presents. Prior knowledge is a one way is to set the weights explicitly.
Another way is to 'train' the neural network by feeding it teaching patterns and letting it change its
weights according to some learning rule. We can categorize the learning situations as follows:
• Supervised learning or Associative learning in which the network is trained by providing it
with input and matching output patterns. These pairs of input-output can be provided by the system
which contains the neural network (self-supervised) or by an external teacher.
• Unsupervised learning or Self-organization in which an (output) unit is trained to respond to
clusters of pattern within the input. The system is supposed to discover statistically salient features of
the input population in this paradigm. Unlike the supervised learning paradigm, there is no other priori
set of categories into which the patterns are to be classified; rather the system must develop its own
representation of the input stimuli.
• Reinforcement learning this type of learning may be considered as an intermediate form of
the above two learning types. Here the learning machine does some action on the environment and gets
a feedback response from the environment system. The learning system grades its action bad
(punishable) or good (rewarding) based on the environmental response and accordingly adjusts its
parameters.
In more practical terms neural networks are non-linear statistical data modeling tools. They can
be used to model complex relationships between inputs and outputs or to find patterns in data. Using
neural networks as a tool, data warehousing firms are harvesting information from datasets in the
process known as data mining. The difference between these data warehouses and ordinary databases
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
4
is that there is actual anipulation and cross-fertilization of the data helping users makes more informed
decisions.
Neural networks essentially comprise three pieces: the architecture or model; the learning
algorithm; and the activation functions. Neural networks are programmed or “trained” to “store,
recognize, and associatively retrieve patterns or database entries; to solve combinatorial optimization
problems; to filter noise from measurement data; to control ill-defined problems. It is precisely these
two abilities (pattern recognition and function estimation) which make artificial neural networks
(ANN) so prevalent a utility in data mining system. As a size of data sets grows massive, the need for
automated processing becomes clear. With their “model-free” estimators and their dual nature, neural
networks serve data mining in a myriad of ways.
Data mining is the business of answering questions that you’ve not asked yet. Data mining
reaches deep into databases. Data mining tasks can be classified into two categories: Descriptive and
predictive data mining. Descriptive data mining provides information to understand what is happening
inside the data without a predetermined idea. Predictive data mining allows the user to submit records
with unknown field values, and based on previous patterns discovered form the database system will
guess the unknown values. Data mining models can be categorized according to the tasks they perform:
Prediction and Classification, Association Rules, Clustering. Prediction and classification is a
predictive model, but clustering and association rules are descriptive models.
Figure 2: Neural-based framework for ARM.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
5
The most common action in data mining is classification. Classification recognizes patterns
that describe the group to which an item relates. It does this by examining existing items that already
have been classified and inferring a set of rules. The major difference being that no groups have been
predefined. Prediction is the construction and use of a model to assess the class of an unlabeled object
or to assess the value or value ranges of a given object is likely to have. The next application is
forecasting. This is different from predictions because it estimates the future value of continuous
variables based on patterns within the database. Neural network works depending on the provide
associations, classifications, architecture, clusters, forecasting and prediction to the data mining
industry.
B. Feedforward Neural Network
A feedforward neural network (FFNN) is the one of the simplest neural network technique,
such as in Figure, consists of three layers: an input, hidden and output layer. In every layer there are one
or more processing elements (PEs). PEs is meant to simulate the neurons in the brain and this is why
they are often referred to as nodes or neurons. A processing element receives inputs from either the
previous layer or the outside world. There are connections between the processing elements in each
layer that have a weight (parameter) associated with the element. During training this weight is
adjusted. Information only travels in the forward direction through the network - there are no feedback
loops.
Figure 3: Flow of the feedforward neural network
The simplified process for training a feedforward neural network is as follows:
1. Input data is presented to the network and propagated through the network until it reaches the
output layer of the network. This forward process produces a predicted output.
2. The predicted output is subtracted from the actual output and an error value for the networks is
calculated.
3. The neural network then uses supervised learning, most of the cases which is back propagation
for training the network. Back propagation is a learning algorithm for adjusting the weights. It
starts with the weights between the output layer PE’s and the last hidden layer PE’s and works
backwards through the network.
4. The forward process starts again once back propagation has finished, and this cycle is continued
until the error between predicted and actual outputs is minimized.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
6
C. The Back Propagation Algorithm
Propagation of error or Back propagation is a common method of teaching artificial neural
networks how to perform a particular task. The back propagation algorithm is used in layered
feedforward ANNs. This means that the artificial neurons are organized in layers, and send their
signals “forward”, and then the errors are propagated backwards. The back propagation algorithm uses
supervised learning, which means that we provide the algorithm with examples of the inputs and
outputs we want the network to compute, and then the error (difference between actual and expected
results) is calculated. The idea of the back propagation algorithm is to reduce this error, until the ANN
learns the training data.
Algorithm:
1. Initialize the weights in the network (often
randomly)
2. repeat
* for each example e in the training set do
1. O = neural-net-output(network, e) ;
forward pass
2. T = teacher output for e
3. Calculate error (T - O) at the output
units
4. Compute delta_wi for all weights
from hidden layer to output layer ;
backward pass
5. Compute delta_wi for all weights
from input layer to hidden layer ;
backward pass continued
6. Update the weights in the network
* end
3. until all examples classified correctly or
stopping criterion satisfied
4. return(network)
III. DIFFRENT DATA MINING ALGORITHMS WITH NEURAL NETWORK
A. Association rule mining with neural network
In this paper we are going to implement the neural network with the different data mining
techniques we discussed in the previous review paper we published.[9] The flowchart of the proposed
Association rule mining with neural network shows in figure 4 . Firstly the Trained Dataset with the
known input and known output is given to the system as the input. The discretization is applied on the
input to obtain the association rules from the dataset. Classification rule set is obtained from the
discretization. Classification Rule Neural Network (CRNN) construction and parameter learning set is
then obtain from the classification rule set. This constructor and learning parameter is then used to
form the classification model of the CRNN. Now we apply the testing dataset with the unknown output
as the input to the classification model of the CRNN to find the known rules from the input. The output
of the CRNN classification is the desired output dataset.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
7
Figure 4: Association rule mining with neural network
A. CHARM Algorithm with Neural Network
CHARM is an efficient algorithm for enumerating the set of all frequent closed item-sets. There
are a number of innovative ideas employed in the development of CHARM; these include:
1) CHARM simultaneously explores both the item-set space and transaction space, over a novel
IT-tree (item set-tides tree) search space of the database. In contrast previous algorithms exploit
only the item-set search space. The integration of the CHARM algorithm with the neural
network is shown in figure 5.
2) CHARM uses a highly efficient hybrid search method that skips many levels of the IT-tree to
quickly identify the frequent closed item-sets, instead of having to enumerate many possible
subsets.
3) It uses a fast hash-based approach to eliminate non-closed item-sets during subsumption
checking. CHARM also able to utilize a novel vertical data representation called diffset [5], for
fast frequency computations. Diffsets also keep track for differences in the tids of a candidate
pattern from its prefix pattern. Diffsets drastically cut down (by orders of magnitude) the size of
Training
Dataset
Discretization if necessary
Association
rule
classification
Rules
associated with
output of
dataset
Rule
Selection
Classification rule set
CRNN Construction and parameter
learning and optimization
Classification model of CRNN
CRNN ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
8
memory required to store intermediate results. Thus the entire working set of patterns can fit
entirely in the memory, even for huge databases.
Figure 5: CHARM algorithms with neural network
B. CM SPAM Algorithm with Neural Network
Mining useful patterns in sequential data is a challenging task. Many studies have been
proposed for mining interesting patterns in sequence databases [6]. Sequential pattern mining is
probably the most popular research topic among them. A subsequence is called sequential pattern or
frequent sequence if it frequently appears in a sequence database and its frequency is no less than a
user-specified minimum support threshold minsup [7]. Sequential pattern mining plays an important
role in data mining and is essential to a wide range of applications such as the analysis of web medical
data, program executions, click-streams, e-learning data and biological data [6]. Several efficient
algorithms have been proposed for sequential data mining and one of them is CM SPAM Algorithm.
The integration of the CM SPAM algorithm from the sequential data mining and neural network is
shown in figure 6. First the trained dataset with known input and output is given as the input to the
system. Discretization is done if it necessary it gives the sequential classification from the known input
and sequential classification form the known output. Combination of this both dataset gives us the
Training
Dataset
Discretization if necessary
Similar
Dataset
classification
Similar Dataset
with output of
dataset
Classification Data set
CHARM Dataset Construction and
parameter learning and optimization
Classification model of CHARM
Dataset
CHARM ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
9
classification sequential dataset.Then CM SPAM algorithm is applied to get the sequential
construction, parameter learning and optimized dataset from the sequential dataset. Combination of all
this parameters gives us the Classification model of Sequential CM SPAM, which is then used on the
testing dataset with unknown output for the sequential data mining.
Figure 6: CM SPAM algorithms with neural network
IV. EXPERIMENTAL RESULT
Once the algorithms were implemented and the results were summarized, we tried to optimize
the algorithms with the help of Neural Network techniques. Out of the many techniques available, we
selected Back Propagation and FeedForward with Back Propagation. Each of the networks when
applied to each of the Data Mining algorithms gave some interesting and conclusive results which we
analyzed to find the best possible application for the given combination of dataset.
In all the techniques, the neural network was first trained with the input dataset of 500 entries,
and the output dataset of mined values. Once the network was trained, we used the network for mining
of 1000 and 2000 records. The same process was followed for each of the neural networks and
corresponding weights were evaluated for each network. Once the networks are trained, we evaluated
each of the networks with a different length of input dataset in order to get the desired data mining
results. The mining results obtained are shown as follows,
Training
Dataset
Discretization if necessary
Sequential
classification
Sequential data
with output of
dataset
Classification Sequential data set
CM SPAM Sequential Construction
and parameter learning and
optimization
Classification model of Sequential CM
SPAM
CM SPAM ClassificationTesting
Dataset
Output
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
10
Table 1: Top K Rules Mining (Mining top 10% Rules) with different neural network techniques
Top K Rules BPP FF
Time 1000 24 31 7
Memory 1000 8.28 5.01 2.83
Computational
Complexity 1000
------ 32% 13%
Time 2000 171 119 58
Memory 2000 15.489 7.62 4.72
Computational
Complexity 2000
----- 31% 14%
Table 2: CHARM mining with different neural network
CHARM BPP FF
Time 1000 42 13 10
Memory 1000 33.3 28.8 18.23
Computational
Complexity 1000
----- 30% 11%
Time 2000 1 1 1
Memory 2000 22.28 11.784 7.48
Computational
Complexity 2000
----- 29% 12%
Table 3: CMSPAM mining with different neural network
CHARM BPP FF
Time 1000 2 0.5 1.5
Memory 1000 73.2 36.5 24.7
Computational
Complexity 1000
----- 32.4% 10%
Time 2000 1 0.25 7.5
Memory 2000 75.2 8.93 5.98
Computational
Complexity 2000
----- 32% 10.4%
V. CONCLUSIONS
In this paper we study the Artificial Neural Network and how we can use ANN with the data
mining concept. Computational complexity is the very important term in the any data mining field.
Computational complexity defines the overall efficiency data mining algorithm. The computational
complexities of neural network techniques are calculate for all the three data mining algorithms. In this
paper we are successfully able to integrate the Neural Network with the three data mining techniques.
Because of the neural network the output of the data mining from the all the three techniques has been
improved. The result of the experiment proves our conclusion.
VI. ACKNOWLEDGEMENTS
First Author would like to acknowledge Dr. P.K.Butey for their cooperation and useful
suggestion to the research work.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME
11
VII. REFERENCES
1. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN
0-471-66657-2, ohn Wiley & Sons, Inc, 2005.
2. Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5,
Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999.
3. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN
0-471-66657-2, ohn Wiley & Sons, Inc, 2005.
4. Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson
Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006
5. M. J. Zaki and K. Gouda. Fast vertical mining using Diffsets. Technical Report 01-1, Computer
Science Dept., Rensselaer Polytechnic Institute, March 2001.
6. Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM
Computing Surveys 43(1), 1–41 (2010).
7. Agrawal, R., Ramakrishnan, S.: Mining sequential patterns. In: Proc. 11th Intern. Conf. Data
Engineering, pp. 3–14. IEEE (1995)
8. Bradley, I., Introduction to Neural Networks, Multinet Systems Pty Ltd 1997.
9. Chamatkar and Dr. P.K. Butey “Comparison on Different Data Mining Algorithms” at IJCSE
Vol. 2 No.10, Oct 14. E-ISSN: 2347-2693
10. Ms. Aruna J. Chamatkar and Dr. Pradeep K. Butey, “A Comprehensive Study of Data Mining
Methods With Implementation of Neural Network Techniques” International journal of
Computer Engineering & Technology (IJCET), Volume 5, Issue 12, 2014, pp. 12 - 18, ISSN
Print: 0976 – 6367, ISSN Online: 0976 – 6375.
11. Mrs. Charmy Patel and Dr. Ravi Gulati, “Software Performance Analysis: A Data Mining
Approach” International Journal of Information Technology and Management Information
Systems (IJITMIS), Volume 5, Issue 2, 2014, pp. 28 - 31, ISSN Print: 0976 – 6405, ISSN
Online: 0976 – 6413.
AUTHORS DETAILS
Ms. ARUNA J. CHAMATKAR is MCA from Rashtrasant Tukdoji Maharaj Nagpur
University, Nagpur. Currently pursuing PhD from RTM Nagpur University under
the guidance of Dr. Pradeep K. Butey. Her research area is Data Mining and Neural
Network.
Dr. PRADEEP K. BUTEY is research Supervisor for Computer Science at RTM
Nagpur university. He is the Head of Department (Computer Science) at Kamla
Nehru Mahavidyalaya, Nagpur. His area of interest includes Fuzzy Logic, Neural
Network and Data Mining.

Más contenido relacionado

La actualidad más candente

Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
eSAT Journals
 
Successive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing dataSuccessive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing data
IAEME Publication
 
EDRG12_Re.doc
EDRG12_Re.docEDRG12_Re.doc
EDRG12_Re.doc
butest
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
butest
 

La actualidad más candente (19)

IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...IRJET-  	  Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
IRJET- Improved Model for Big Data Analytics using Dynamic Multi-Swarm Op...
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
 
Information entanglement
Information entanglementInformation entanglement
Information entanglement
 
A review on data mining
A  review on data miningA  review on data mining
A review on data mining
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
 
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...IRJET-  	  Predicting Outcome of Judicial Cases and Analysis using Machine Le...
IRJET- Predicting Outcome of Judicial Cases and Analysis using Machine Le...
 
Successive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing dataSuccessive iteration method for reconstruction of missing data
Successive iteration method for reconstruction of missing data
 
50120130406032
5012013040603250120130406032
50120130406032
 
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
 
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
 
EDRG12_Re.doc
EDRG12_Re.docEDRG12_Re.doc
EDRG12_Re.doc
 
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data    Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN Algorithm
 
Novel holistic architecture for analytical operation on sensory data relayed...
Novel holistic architecture for analytical operation  on sensory data relayed...Novel holistic architecture for analytical operation  on sensory data relayed...
Novel holistic architecture for analytical operation on sensory data relayed...
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
 
12 非構造化データ解析
12 非構造化データ解析12 非構造化データ解析
12 非構造化データ解析
 
Mining Social Media Data for Understanding Drugs Usage
Mining Social Media Data for Understanding Drugs  UsageMining Social Media Data for Understanding Drugs  Usage
Mining Social Media Data for Understanding Drugs Usage
 
A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017A study on cloud computing ppt n_24-12-2017
A study on cloud computing ppt n_24-12-2017
 

Destacado

10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data mining
George Ang
 
Data Analysison Regression
Data Analysison RegressionData Analysison Regression
Data Analysison Regression
jamuga gitulho
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
mayurik19
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
nextlib
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
jamiebrandon
 

Destacado (18)

Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
Data Mining Classification Comparison (Naïve Bayes and C4.5 Algorithms)
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
 
10 Algorithms in data mining
10 Algorithms in data mining10 Algorithms in data mining
10 Algorithms in data mining
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
Data Analysis
Data AnalysisData Analysis
Data Analysis
 
Data Analysison Regression
Data Analysison RegressionData Analysison Regression
Data Analysison Regression
 
Data analysis
Data analysisData analysis
Data analysis
 
A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...A study on the factors considered when choosing an appropriate data mining a...
A study on the factors considered when choosing an appropriate data mining a...
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank Algorithm
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
 
A data analyst view of Bigdata
A data analyst view of Bigdata A data analyst view of Bigdata
A data analyst view of Bigdata
 
Support Vector Machines
Support Vector MachinesSupport Vector Machines
Support Vector Machines
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Apriori Algorithm
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
 
Data analysis using spss
Data analysis using spssData analysis using spss
Data analysis using spss
 
Qualitative data analysis
Qualitative data analysisQualitative data analysis
Qualitative data analysis
 

Similar a Performance analysis of data mining algorithms with neural network

A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
IAEME Publication
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
Subrat Swain
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
BRNSSPublicationHubI
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
eSAT Journals
 

Similar a Performance analysis of data mining algorithms with neural network (20)

A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
A Comparative Study of Various Data Mining Techniques: Statistics, Decision T...
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
 
Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
 
Data Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and InnovationsData Science Demystified_ Journeying Through Insights and Innovations
Data Science Demystified_ Journeying Through Insights and Innovations
 
4113ijaia09
4113ijaia094113ijaia09
4113ijaia09
 
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEMA NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
A NEW HYBRID ALGORITHM FOR BUSINESS INTELLIGENCE RECOMMENDER SYSTEM
 
A new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender systemA new hybrid algorithm for business intelligence recommender system
A new hybrid algorithm for business intelligence recommender system
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICSA STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
 
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
 
Human Activity Recognition System
Human Activity Recognition SystemHuman Activity Recognition System
Human Activity Recognition System
 
Introduction to feature subset selection method
Introduction to feature subset selection methodIntroduction to feature subset selection method
Introduction to feature subset selection method
 
A Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data MiningA Comprehensive Study on Outlier Detection in Data Mining
A Comprehensive Study on Outlier Detection in Data Mining
 
HOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORKHOW NEURAL NETWORKS WORK
HOW NEURAL NETWORKS WORK
 
Unit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptxUnit 1 Introduction to Data Analytics .pptx
Unit 1 Introduction to Data Analytics .pptx
 
Effective data mining for proper
Effective data mining for properEffective data mining for proper
Effective data mining for proper
 
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
 

Más de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Más de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Performance analysis of data mining algorithms with neural network

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 1 PERFORMANCE ANALYSIS OF DATA MINING ALGORITHMS WITH NEURAL NETWORK Ms. Aruna J. Chamatkar Research Scholar, Department of Electronics & Computer Science, RTM Nagpur University, Nagpur, India Dr. P.K. Butey Research Supervisor, HOD Computer Science Department, Kamla Nehru Mahavidyalaya, Nagpur India ABSTRACT Data mining has evolved into an active and important area of research because of previously unknown and interesting knowledge from very large real-world database. Data mining methods have been successfully applied in a wide range of unsupervised and supervised learning applications. Classification is one of the data mining problems receiving great attention recently in the database community. Neural networks have not been thought suited for data mining because how the classifications were made is not explicitly stated as symbolic rules that are suitable for verification or interpretation by humans. The neural network is first trained to achieve the required accuracy in data mining. A network pruning algorithm is used to remove redundant connections of the network. The activation values of the hidden units in the network are analyzed in the network and classification rules are generated using the result of this analysis. In this paper we are going to combine neural network with the three different algorithms which are commonly used in data mining to improve the data mining result. These three algorithms are CHARM Algorithm, Top K Rules mining and CM SPAM Algorithm. Keywords: Artificial Neural Network, Data Mining, CHARM algorithm, CM -SPAM Algorithm, K -rule mining. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 1, January (2015), pp. 01-11 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 2 I. INTRODUCTION In present day human beings are used in the different technologies to adequate in there society. Every day the human beings are using the vast data and these data are in the different fields .It may be in the form of documents, may be graphical formats, may be the video, may be records (varying array) .As the data are available in the different formats so that the proper action to be taken for better utilization of the available data. As and when the customer will require the data should be retrieved from the database and make the better decision. This technique is actually we called as a data mining or Knowledge Hub or simply KDD (Knowledge Discovery Process).The important reason that attracted a great deal of attention in information technology the discovery of useful information from large collections of data industry towards field of “Data mining” is due to the perception of “we are data rich but information poor”. Very huge amount of data is available but we hardly able to turn them in to useful information and knowledge for managerial decision making in different fields. To produce information it requires very huge database. It may be available in different formats like audio/video, numbers, text, figures, and Hypertext formats. To take complete advantage of data; the data retrieval is simply not enough, it requires a tool for extraction of the essence of information stored, automatic summarization of data and the discovery of patterns in raw data. With the enormous amount of data stored in databases, files, and other repositories, it is very important to develop powerful software or tool for analysis and interpretation of such data and for the extraction of interesting knowledge that could help in decision-making. The only answer to all above is ‘Data Mining’. Data mining is the method of extracting hidden predictive information from large databases; it is a powerful technology with great potential to help organizations focus on the most important information in their data warehouses [1][2][3][4]. Data mining tools predict behaviors and future trends help organizations and firms to make proactive knowledge-driven decisions [2]. The automated, prospective analyses offered by data mining move beyond the analyses of past events provided by prospective tools typical of decision support systems. Data mining tools can answer the questions that traditionally were too time consuming to resolve. They created databases for finding predictive information, finding hidden patterns that experts may miss because it lies outside their expectations. One of the data mining problems is classification. Various classification algorithms have been designed to tackle the problem by researchers in different fields such as mathematical programming, machine learning, and statistics. Recently, there is a surge of data mining research in the database community. The classification problem is re-examined in the context of large databases. Unlike researchers in other fields, database researchers pay more attention to the issues related to the volume of data. They are also concerned with the effective use of the available database techniques, such as efficient data retrieval mechanisms. With such concerns, most algorithms proposed are basically based on decision trees. II. ARTIFICIAL NEURAL NETWORK An artificial neural network (ANN), often just called a "neural network", is a computational model or mathematical model based on biological neural networks, in other words we can say that it is an emulation of biological neural system. Artificial neural network consists of an interconnected group of artificial neurons and processes information using a connectionist approach to computation. Most of the time ANN is an adaptive system that changes its structure based on external or internal information that flows through the network during the learning phase [8].
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 3 Figure 1: Basic Neural Network Structure A. Training Of Artificial Neural Networks A neural network has to be configured such that the application of a set of inputs produces (either 'direct' or via a relaxation process) the desired set of outputs. Different methods to set the strengths of the connections presents. Prior knowledge is a one way is to set the weights explicitly. Another way is to 'train' the neural network by feeding it teaching patterns and letting it change its weights according to some learning rule. We can categorize the learning situations as follows: • Supervised learning or Associative learning in which the network is trained by providing it with input and matching output patterns. These pairs of input-output can be provided by the system which contains the neural network (self-supervised) or by an external teacher. • Unsupervised learning or Self-organization in which an (output) unit is trained to respond to clusters of pattern within the input. The system is supposed to discover statistically salient features of the input population in this paradigm. Unlike the supervised learning paradigm, there is no other priori set of categories into which the patterns are to be classified; rather the system must develop its own representation of the input stimuli. • Reinforcement learning this type of learning may be considered as an intermediate form of the above two learning types. Here the learning machine does some action on the environment and gets a feedback response from the environment system. The learning system grades its action bad (punishable) or good (rewarding) based on the environmental response and accordingly adjusts its parameters. In more practical terms neural networks are non-linear statistical data modeling tools. They can be used to model complex relationships between inputs and outputs or to find patterns in data. Using neural networks as a tool, data warehousing firms are harvesting information from datasets in the process known as data mining. The difference between these data warehouses and ordinary databases
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 4 is that there is actual anipulation and cross-fertilization of the data helping users makes more informed decisions. Neural networks essentially comprise three pieces: the architecture or model; the learning algorithm; and the activation functions. Neural networks are programmed or “trained” to “store, recognize, and associatively retrieve patterns or database entries; to solve combinatorial optimization problems; to filter noise from measurement data; to control ill-defined problems. It is precisely these two abilities (pattern recognition and function estimation) which make artificial neural networks (ANN) so prevalent a utility in data mining system. As a size of data sets grows massive, the need for automated processing becomes clear. With their “model-free” estimators and their dual nature, neural networks serve data mining in a myriad of ways. Data mining is the business of answering questions that you’ve not asked yet. Data mining reaches deep into databases. Data mining tasks can be classified into two categories: Descriptive and predictive data mining. Descriptive data mining provides information to understand what is happening inside the data without a predetermined idea. Predictive data mining allows the user to submit records with unknown field values, and based on previous patterns discovered form the database system will guess the unknown values. Data mining models can be categorized according to the tasks they perform: Prediction and Classification, Association Rules, Clustering. Prediction and classification is a predictive model, but clustering and association rules are descriptive models. Figure 2: Neural-based framework for ARM.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 5 The most common action in data mining is classification. Classification recognizes patterns that describe the group to which an item relates. It does this by examining existing items that already have been classified and inferring a set of rules. The major difference being that no groups have been predefined. Prediction is the construction and use of a model to assess the class of an unlabeled object or to assess the value or value ranges of a given object is likely to have. The next application is forecasting. This is different from predictions because it estimates the future value of continuous variables based on patterns within the database. Neural network works depending on the provide associations, classifications, architecture, clusters, forecasting and prediction to the data mining industry. B. Feedforward Neural Network A feedforward neural network (FFNN) is the one of the simplest neural network technique, such as in Figure, consists of three layers: an input, hidden and output layer. In every layer there are one or more processing elements (PEs). PEs is meant to simulate the neurons in the brain and this is why they are often referred to as nodes or neurons. A processing element receives inputs from either the previous layer or the outside world. There are connections between the processing elements in each layer that have a weight (parameter) associated with the element. During training this weight is adjusted. Information only travels in the forward direction through the network - there are no feedback loops. Figure 3: Flow of the feedforward neural network The simplified process for training a feedforward neural network is as follows: 1. Input data is presented to the network and propagated through the network until it reaches the output layer of the network. This forward process produces a predicted output. 2. The predicted output is subtracted from the actual output and an error value for the networks is calculated. 3. The neural network then uses supervised learning, most of the cases which is back propagation for training the network. Back propagation is a learning algorithm for adjusting the weights. It starts with the weights between the output layer PE’s and the last hidden layer PE’s and works backwards through the network. 4. The forward process starts again once back propagation has finished, and this cycle is continued until the error between predicted and actual outputs is minimized.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 6 C. The Back Propagation Algorithm Propagation of error or Back propagation is a common method of teaching artificial neural networks how to perform a particular task. The back propagation algorithm is used in layered feedforward ANNs. This means that the artificial neurons are organized in layers, and send their signals “forward”, and then the errors are propagated backwards. The back propagation algorithm uses supervised learning, which means that we provide the algorithm with examples of the inputs and outputs we want the network to compute, and then the error (difference between actual and expected results) is calculated. The idea of the back propagation algorithm is to reduce this error, until the ANN learns the training data. Algorithm: 1. Initialize the weights in the network (often randomly) 2. repeat * for each example e in the training set do 1. O = neural-net-output(network, e) ; forward pass 2. T = teacher output for e 3. Calculate error (T - O) at the output units 4. Compute delta_wi for all weights from hidden layer to output layer ; backward pass 5. Compute delta_wi for all weights from input layer to hidden layer ; backward pass continued 6. Update the weights in the network * end 3. until all examples classified correctly or stopping criterion satisfied 4. return(network) III. DIFFRENT DATA MINING ALGORITHMS WITH NEURAL NETWORK A. Association rule mining with neural network In this paper we are going to implement the neural network with the different data mining techniques we discussed in the previous review paper we published.[9] The flowchart of the proposed Association rule mining with neural network shows in figure 4 . Firstly the Trained Dataset with the known input and known output is given to the system as the input. The discretization is applied on the input to obtain the association rules from the dataset. Classification rule set is obtained from the discretization. Classification Rule Neural Network (CRNN) construction and parameter learning set is then obtain from the classification rule set. This constructor and learning parameter is then used to form the classification model of the CRNN. Now we apply the testing dataset with the unknown output as the input to the classification model of the CRNN to find the known rules from the input. The output of the CRNN classification is the desired output dataset.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 7 Figure 4: Association rule mining with neural network A. CHARM Algorithm with Neural Network CHARM is an efficient algorithm for enumerating the set of all frequent closed item-sets. There are a number of innovative ideas employed in the development of CHARM; these include: 1) CHARM simultaneously explores both the item-set space and transaction space, over a novel IT-tree (item set-tides tree) search space of the database. In contrast previous algorithms exploit only the item-set search space. The integration of the CHARM algorithm with the neural network is shown in figure 5. 2) CHARM uses a highly efficient hybrid search method that skips many levels of the IT-tree to quickly identify the frequent closed item-sets, instead of having to enumerate many possible subsets. 3) It uses a fast hash-based approach to eliminate non-closed item-sets during subsumption checking. CHARM also able to utilize a novel vertical data representation called diffset [5], for fast frequency computations. Diffsets also keep track for differences in the tids of a candidate pattern from its prefix pattern. Diffsets drastically cut down (by orders of magnitude) the size of Training Dataset Discretization if necessary Association rule classification Rules associated with output of dataset Rule Selection Classification rule set CRNN Construction and parameter learning and optimization Classification model of CRNN CRNN ClassificationTesting Dataset Output
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 8 memory required to store intermediate results. Thus the entire working set of patterns can fit entirely in the memory, even for huge databases. Figure 5: CHARM algorithms with neural network B. CM SPAM Algorithm with Neural Network Mining useful patterns in sequential data is a challenging task. Many studies have been proposed for mining interesting patterns in sequence databases [6]. Sequential pattern mining is probably the most popular research topic among them. A subsequence is called sequential pattern or frequent sequence if it frequently appears in a sequence database and its frequency is no less than a user-specified minimum support threshold minsup [7]. Sequential pattern mining plays an important role in data mining and is essential to a wide range of applications such as the analysis of web medical data, program executions, click-streams, e-learning data and biological data [6]. Several efficient algorithms have been proposed for sequential data mining and one of them is CM SPAM Algorithm. The integration of the CM SPAM algorithm from the sequential data mining and neural network is shown in figure 6. First the trained dataset with known input and output is given as the input to the system. Discretization is done if it necessary it gives the sequential classification from the known input and sequential classification form the known output. Combination of this both dataset gives us the Training Dataset Discretization if necessary Similar Dataset classification Similar Dataset with output of dataset Classification Data set CHARM Dataset Construction and parameter learning and optimization Classification model of CHARM Dataset CHARM ClassificationTesting Dataset Output
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 9 classification sequential dataset.Then CM SPAM algorithm is applied to get the sequential construction, parameter learning and optimized dataset from the sequential dataset. Combination of all this parameters gives us the Classification model of Sequential CM SPAM, which is then used on the testing dataset with unknown output for the sequential data mining. Figure 6: CM SPAM algorithms with neural network IV. EXPERIMENTAL RESULT Once the algorithms were implemented and the results were summarized, we tried to optimize the algorithms with the help of Neural Network techniques. Out of the many techniques available, we selected Back Propagation and FeedForward with Back Propagation. Each of the networks when applied to each of the Data Mining algorithms gave some interesting and conclusive results which we analyzed to find the best possible application for the given combination of dataset. In all the techniques, the neural network was first trained with the input dataset of 500 entries, and the output dataset of mined values. Once the network was trained, we used the network for mining of 1000 and 2000 records. The same process was followed for each of the neural networks and corresponding weights were evaluated for each network. Once the networks are trained, we evaluated each of the networks with a different length of input dataset in order to get the desired data mining results. The mining results obtained are shown as follows, Training Dataset Discretization if necessary Sequential classification Sequential data with output of dataset Classification Sequential data set CM SPAM Sequential Construction and parameter learning and optimization Classification model of Sequential CM SPAM CM SPAM ClassificationTesting Dataset Output
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 10 Table 1: Top K Rules Mining (Mining top 10% Rules) with different neural network techniques Top K Rules BPP FF Time 1000 24 31 7 Memory 1000 8.28 5.01 2.83 Computational Complexity 1000 ------ 32% 13% Time 2000 171 119 58 Memory 2000 15.489 7.62 4.72 Computational Complexity 2000 ----- 31% 14% Table 2: CHARM mining with different neural network CHARM BPP FF Time 1000 42 13 10 Memory 1000 33.3 28.8 18.23 Computational Complexity 1000 ----- 30% 11% Time 2000 1 1 1 Memory 2000 22.28 11.784 7.48 Computational Complexity 2000 ----- 29% 12% Table 3: CMSPAM mining with different neural network CHARM BPP FF Time 1000 2 0.5 1.5 Memory 1000 73.2 36.5 24.7 Computational Complexity 1000 ----- 32.4% 10% Time 2000 1 0.25 7.5 Memory 2000 75.2 8.93 5.98 Computational Complexity 2000 ----- 32% 10.4% V. CONCLUSIONS In this paper we study the Artificial Neural Network and how we can use ANN with the data mining concept. Computational complexity is the very important term in the any data mining field. Computational complexity defines the overall efficiency data mining algorithm. The computational complexities of neural network techniques are calculate for all the three data mining algorithms. In this paper we are successfully able to integrate the Neural Network with the three data mining techniques. Because of the neural network the output of the data mining from the all the three techniques has been improved. The result of the experiment proves our conclusion. VI. ACKNOWLEDGEMENTS First Author would like to acknowledge Dr. P.K.Butey for their cooperation and useful suggestion to the research work.
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 1, January (2015), pp. 01-11© IAEME 11 VII. REFERENCES 1. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005. 2. Introduction to Data Mining and Knowledge Discovery, Third Edition ISBN: 1-892095-02-5, Two Crows Corporation, 10500 Falls Road, Potomac, MD 20854 (U.S.A.), 1999. 3. Larose, D. T., “Discovering Knowledge in Data: An Introduction to Data Mining”, ISBN 0-471-66657-2, ohn Wiley & Sons, Inc, 2005. 4. Dunham, M. H., Sridhar S., “Data Mining: Introductory and Advanced Topics”, Pearson Education, New Delhi, ISBN: 81-7758-785-4, 1st Edition, 2006 5. M. J. Zaki and K. Gouda. Fast vertical mining using Diffsets. Technical Report 01-1, Computer Science Dept., Rensselaer Polytechnic Institute, March 2001. 6. Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM Computing Surveys 43(1), 1–41 (2010). 7. Agrawal, R., Ramakrishnan, S.: Mining sequential patterns. In: Proc. 11th Intern. Conf. Data Engineering, pp. 3–14. IEEE (1995) 8. Bradley, I., Introduction to Neural Networks, Multinet Systems Pty Ltd 1997. 9. Chamatkar and Dr. P.K. Butey “Comparison on Different Data Mining Algorithms” at IJCSE Vol. 2 No.10, Oct 14. E-ISSN: 2347-2693 10. Ms. Aruna J. Chamatkar and Dr. Pradeep K. Butey, “A Comprehensive Study of Data Mining Methods With Implementation of Neural Network Techniques” International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 12, 2014, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 11. Mrs. Charmy Patel and Dr. Ravi Gulati, “Software Performance Analysis: A Data Mining Approach” International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 2, 2014, pp. 28 - 31, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413. AUTHORS DETAILS Ms. ARUNA J. CHAMATKAR is MCA from Rashtrasant Tukdoji Maharaj Nagpur University, Nagpur. Currently pursuing PhD from RTM Nagpur University under the guidance of Dr. Pradeep K. Butey. Her research area is Data Mining and Neural Network. Dr. PRADEEP K. BUTEY is research Supervisor for Computer Science at RTM Nagpur university. He is the Head of Department (Computer Science) at Kamla Nehru Mahavidyalaya, Nagpur. His area of interest includes Fuzzy Logic, Neural Network and Data Mining.