Volume-10 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information; data mining has become an essential component in various fields of human life. It is used to identify hidden patterns in a large data set. Classification techniques are supervised learning techniques that classify data item into predefined class label. It is one of the most useful techniques in data mining to build classification models from an input data set; these techniques commonly build models that are used to predict future data trends. In this paper we have worked with different data mining applications and various classification algorithms, these algorithms have been applied on different dataset to find out the efficiency of the algorithm and improve the performance by applying data preprocessing techniques and feature selection and also prediction of new class labels.
Keywords: Classification, Mining Techniques, Algorithms.
[1]. SERHAT ÖZEKES and A.YILMAZ ÇAMURCU:" CLASSIFICATION AND PREDICTION IN A DATA MINING APPLICATION "Journal of Marmara for Pure and Applied Sciences, 18 (2002) 159-174 Marmara University, Printed in Turkey.
[2]. Kaushik H and Raviya Biren Gajjar ,"Performance Evaluation of Different Data Mining Classification Algorithm Using WEKA",Indian Journal of Research(PARIPEX) Volume : 2 | Issue : 1 | January 2013 ISSN - 2250-1991.
[3]. WaiHoAu,KeithC.C.Chan;XinYao.ANovelEvolutionaryDataMiningAlgorithmwithApplicationstoChurn Prediction. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, Vol. 7, No. 6, Dec 2003, PP: 532- 545
[4]. Reza Allahyari Soeini and Keyvan Vahidy Rodpysh: "Evaluations of Data Mining Methods in Order to Provide the Optimum Method for Customer Churn Prediction: Case Study Insurance Industry."2012 International Conference on Information and Computer Applications (ICICA 2012)IPCSI vol. 24 (2012) © (2012) IACSIT Press, Singapore.
[5]. Surjeet Kumar Yadav and Saurabh Pal:" Data Mining: A Prediction for Performance Improvement of Engineering Students using Classification"World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 2, 51-56, 2012.
[6]. Zhong, N.; Zhou, L.: "Methodologies for Knowledge Discovery and Data Mining", The Third Pacific-Asia Conference, Pakdd-99, Beijing, China, April 26-28, 1999; Proceedings, Springer Verlag, (1999).
[7]. Raj Kumar, Dr. Rajesh Verma:" Classification Algorithms for Data Mining: A Survey"International Journal of Innovations in Engineering and Technology (IJIET)
[8]. Fayyad, U.: "Mining Databases: Towards Algorithms for Knowledge Discovery", IEEE Bulletin of the Technical Committee on Data Engineering, 21 (1) (1998) 41-48.
[9]. Ling Liu:" From Data Privacy to Location Privacy: Models and Algorithms"September 23-28, 2007, Vienna, Austria.
[10]. Qi Li and Donald W. Tufts:,"Principal Feature Classification " IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 8, NO. 1, JANUARY 1997.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This work presents and investigates the discriminatory capability of contourlet coefficient co-occurrence matrix features in the analysis of mammogram images and its classification. It has been revealed that contourlet transform has a remarkable potential for analysis of images representing smooth contours and fine geometrical structures, thus suitable for textural details. Initially the ROI (Region of Interest) is cropped from the original image and its contrast is enhanced using histogram equalization. The ROI is decomposed using contourlet transform and the co-occurrence matrices are generated for four different directions (θ=0°, 45°, 90° and 135°) and distance (d= 1 pixel). For each co-occurrence matrix a variety of second order statistical texture features are extracted and the dimensionality of the features is reduced using Sequential Floating Forward Selection (SFFS) algorithm. A PNN is used for the purpose of classification. For experimental evaluation, 200 images are taken from mini MIAS (Mammographic Image Analysis Society) database. Experimental results show that the proposed methodology is more efficient and maximum classification accuracy of 92.5% is achieved. The results prove that contourlet coefficient co-occurrence matrix texture features can be successfully applied for the classification of mammogram images.
Keywords-Contourlet Transform, Mammogram, SFFS, PNN, ROI, MIAS
[1] www.cajournal.org
[2] A. Jemal, R. Siegel, E. Ward, Y. Hao, J. Xu, T. Murray,and M. J. Thun, "Cancer Statistics, 2008," CA: A CancerJournal for Clinicians, vol. 58, pp. 71-96, 2008.
[3] A. Jemal, R. Siegel, E. Ward, T. Murray, J. Xu, and M. J.Thun, "Cancer Statistics, 2007," CA: A Cancer Journal for Clinicians, vol. 57, pp. 43-66, 2007.
[4] D. K. Espey, X. C. Wu, J. Swan, C. Wiggins, M. Jim, E.Ward, P. A. Wingo, H. L. Howe, L. A. G. Ries, and B. A. Miller, "Annual report to the nation on the status of cancer, 1975–2004, featuring cancer in American Indians and Alaska Natives," Cancer, vol. 110, pp. 2119-2152, 2007.
[5] C. D. Maggio, "State of the art of current modalities for the diagnosis of breast lesions," European Journal of Nuclear Medicine and Molecular Imaging, vol. 31, pp. 56-69, 2004.
[6] M. J. Homer, Mammographic Interpretation: A Practical Approach. New York: McGraw-Hill Companies, 1991.
[7] ACS, "Cancer Prevention & Early Detection Facts & Figures 2008".
[8] A. O. Malagelada, Automatic mass segmentation in mammographic images, PhD Thesis,Universitat de Girona, Spain, 2004.
[9] D. Raba, A. Oliver, J. Marti, M. Peracaula and J. Espunya, Breast segmentation with pectoral muscle suppression on digital mammograms, Springer-Verlag: Medical Imaging: Pattern Recognition and Image Analysis, 3523 (2005), 471-478.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Using AI Hans peter Wickelgren applying the usage of text-based passwords is common authentication system in any Application. This conventional authentication scheme faces some kind of limitations and drawbacks with usability and crypto-graphical security issues that bring troubles to users. For example, user tends to pick passwords that can be easily guessed. On the contrary, if a password is hard to guess, then it is often hard to remember. An alternative system is required to overcome these problems. To deal with these drawbacks, authentication scheme that use photo ,image, or set of pattern as password is proposed using knowledge Recall-Based System(KRBS).Graphical passwords consist of clicking or dragging activities on the pictures rather than typing textual characters, might be the option to overcome the problems that arise from the text-based passwords authentication system. In this paper, a comprehensive Artificial Intelligence(AI) study of the existing graphical password schemes is performed. The graphical password authentication systems are categorized into two AI approach types: An approach on recognition-based System (RBS) and second approach on Recall-based system (RCBS). We discuss adequately the strengths and limitations of each method in terms of usability and security aspects .
Keywords- Graphical Passwords using Hans peter Wickelgren, Recognition-Based Graphical User Authentication, Recall-Based Graphical User Authentication, Pure Recall-Based Authentication, Knowledge Recall-Based Authentication System, Usability, Security , Artificial Intelligence(AI) ,Knowledge-Based Development Systems(KBDS).
[1] Adams A. and Sasse M.A. (1999) Communications of the ACM, 42, 41-46.
[2] Dhamija R. and Perrig A. (2000) In Proceedings of the 9th USENIX Security Symposium.
[3] Blonder G. (1996) In Lucent Technologies, Inc., Murray Hill, NJ, United States Patent 5559961.
[4] Jansen W., Gavrila S., Korolev V., Ayers R. and Swanstrom R. (2003) NISTt NISTIR 7030.
[5] Real User Corporation (2007) Passfaces T M , http//:www.realuser.com.
[6] Brostoff S. and Sasse M.A. In People and Computers XIV – Usability or Else: Proceedings of HCI. Sunderland, U.K, 2000.
[7] Davis D., Monrose F. and Reiter M.K. (2004) Proceedings of the 13th USENIX Security Symposium. California. [8] So brad o L. and Bi rg et J. ( 200 7) ht tp: // rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbi rg.htm.
[9] Hong D., Man S., Hawes B. and Mathews M. (2004) Interna- tional conference on security and management, Las Vergas, NV.
[10] SFR IT-Engineering (2007) http://www.sfrsoftware. de/cms/ EN/pocketpc/viskey/.
