CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Empirical Comparison of Data Mining Techniques in Medical Databases

by Kittipol Wisaeng
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 77 - Number 7
Year of Publication: 2013
Authors: Kittipol Wisaeng
10.5120/13408-1061

Kittipol Wisaeng . An Empirical Comparison of Data Mining Techniques in Medical Databases. International Journal of Computer Applications. 77, 7 ( September 2013), 23-27. DOI=10.5120/13408-1061

@article{ 10.5120/13408-1061,
author = { Kittipol Wisaeng },
title = { An Empirical Comparison of Data Mining Techniques in Medical Databases },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 77 },
number = { 7 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume77/number7/13408-1061/ },
doi = { 10.5120/13408-1061 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:50:23.377325+05:30
%A Kittipol Wisaeng
%T An Empirical Comparison of Data Mining Techniques in Medical Databases
%J International Journal of Computer Applications
%@ 0975-8887
%V 77
%N 7
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The application of data mining algorithms requires the use of powerful software tools. As the number of available tools continues to grow, the choice of the most suitable tool becomes increasingly difficult. This paper present the basic data mining techniques i. e. , naive Bayesian tree, RIpple DOwn Rule, naive Bayes and decision tree algorithm J48 for classifying in medical databases. The goal of this paper is to provide a comprehensive of different classifying techniques in data mining. To evaluate the performance of the above techniques recall, precision and accuracy measures are applied.

References
  1. Mikut, R. , Reischl, M. 2011. Data mining and knowledge discovery, Wiley Interdisciplinary Reviews, pp. 431-443.
  2. Barrett, T. , Troup, D. , Wilhite, S. , Ledoux, P. , Rudnev, D. , Evangelista, C. , Kim, I. , Soboleva, A. , Tomashevsky, M. , Edgar, R. 2007. NCBI GEO: Mining tens of millions of expression profiles-database and tools update, Nucleic Acids Re. , pp. 760-765.
  3. Cover, T. , Hart, P. 1967. Nearest neighbor pattern classification, IEEE Transactions on Information Theory, pp. 21–27.
  4. Darwiche, A. 2009. Modeling and reasoning with Bayesian networks, Cambridge University Press, pp. 1-562.
  5. Castro, J. R. , Castillo, O. , Martinez, L. G. 2007. Interval Type-2 Fuzzy Logic Toolbox, Engineering Letters, pp. 89-98.
  6. Minaei-Bidgoli, B. , Punch, W. 2003. Using genetic algorithms for data mining optimization in an educational web-based system, Genetic and Evolutionary Computation, pp: 2252-2263.
  7. Sunita, B. , Jitender, A. 2012. Classification and feature selection techniques in data mining, International Journal of Engineering Research & Technology, pp. 1-6.
  8. Yongheng, Z. , Yanxia, Z. 2007. Comparison of decision tree methods for finding active object, Advances of Space Research, pp. 1955-1959.
  9. Jiang, S. , Harry, Z. 2006. A fast decision tree learning algorithm, In Proc. of the National Conference on Artificial Intelligence, American Association for Artificial Intelligence, pp. 1-6.
  10. Datta, R. P. , Sanjib, S. 2011. An empirical comparison of rule based classification techniques in medical databases, Working Paper, Indian Institute of Foreign Trade, pp. 1-18.
  11. Choochart, H. 2008. A tutorial on naïve Bayes classification, pp. 1-6.
  12. Yogendra, K. J. , Upendra. 2012. An efficient intrusion detection based on decision tree classifier using feature reduction, International Journal of Scientific and Research Publications, pp. 1-6.
  13. Samuel, A. M. , Daniel, M. D. , James, K. , Gray, M. W. 2009. Are decision trees always greener on the open (source) side of the fence?, In Proc. of the Inter. Conf. on Data Mining. pp. 185–188.
  14. Hall, J. , Frank, E. , Holmes, G. , Pfahringer, B. , Reutemann, P. , Witten, I. 2009. The WEKA data mining software: an update, ACM SIGKDD Explorations Newsletter, pp. 10-18.
  15. Tina, R. P. , Sherekar, S. S. 2013. Performance analysis of naïve Bayes and J48 classification algorithm for data classification, Inter. Jour. of Computer Science and Applications, pp. 256-261.
  16. Aman, K. S. , Suruchi, S. 2011. A comparative study of classification algorithms for spam email data analysis, Inter. Jour. of Comp. Sci. and Eng. , pp. 1890-1895.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining naïve Bayesian tree RIpple DOwn Rule naïve Bayes J48