IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 3, March 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Evaluation And A Reconcile Analysis Of Lda And Svm Category

[Full Text]

 

AUTHOR(S)

Seethamani P, Vinotha R

 

KEYWORDS

SVM classifier, Data mining, LDA, Sequence Classification, Rating Prediction.

 

ABSTRACT

Fixed sequence classification is an important task in data mining. The problem of sequence classification is the use of rules consisting of interesting items that are contained in the data sets labeled sequences and the included class labels. Interesting levels are calculated from a set of items that are in a class ordered by linking and maintaining each item. There are a number of security patterns that may be hidden in the database. A mining algorithm looks for a complete set of patterns and meets the minimum support threshold (frequency), highly efficient and scalable, with a number of database scans incorporating various types of user-specific constraints. In the existing system, sequence classification techniques use several machine learning algorithms such as NaiveBayes, neighboring K-neighbors, decision trees, hidden markov models, SVM. This exit methodology can handle cases of minor deviations in certain events and acknowledges the occurrence of the pattern several times. In this work, LDA classifiers are used to classify and train datasets to improve dataset accuracy and efficiency to facilitate user analysis. Machine learning process is implemented to maintain the effectiveness of the prediction methodology. LDA prediction compared to SVM to prove performance improvement and linear classification id is used to improve classifier accuracy. Finally, the quality of the miner pattern is evaluated by the proposed approach pattern as features in several classification features based on different features.

 

REFERENCES

[1]. Cui L, Meng F , Shi Y, Li M, and Liu A, "A hierarchy method based on LDA and SVM for news classification," in Data Mining Workshop (ICDMW), 2014 IEEE International Conference on, 2014, pp. 60-64.
[2]. Luo L and Li L, "Defining and evaluating classification algorithm for high-dimensional data based on latent topics," PloS one, vol. 9, p. e82119, 2014.
[3]. Zhou C, Cule B, and Goethals B, "Itemset based sequence classification," in Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 2013, pp. 353-368.
[4]. Ramani R G and Jacob S G, "Improved classification of lung cancer tumors based on structural and physicochemical properties of proteins using data mining models," PloS one, vol. 8, p. e58772, 2013.
[5]. Adhikari U, Morris T, and Pan S, "WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining," IEEE Transactions on Smart Grid, 2016.
[6]. Zhao W, Chen J J, Perkins R , Wang Y, Liu Z, Hong H, et al., "A novel procedure on next generation sequencing data analysis using text mining algorithm," BMC bioinformatics, vol. 17, p. 213, 2016.Lam H T, Mörchen F, Fradkin D, and Calders T, "Mining compressing sequential patterns," Statistical Analysis and Data Mining, vol. 7, pp. 34-52, 2014.
[7]. Jena M K and Samantaray S R, "Data-mining-based intelligent differential relaying for transmission lines including UPFC and wind farms," IEEE transactions on neural networks and learning systems, vol. 27, pp. 8-17, 2016.
[8]. Zhao Y, Wang G, Yin Y, Li Y, and Wang Z, "Improving ELM-based microarray data classification by diversified sequence features selection," Neural Computing and Applications, vol. 27, pp. 155-166, 2016.
[9]. Kwon B C, Verma J, and Perer A, "Peekquence: Visual analytics for event sequence data," in ACM SIGKDD 2016 Workshop on Interactive Data Exploration and Analytics, 2016.
[10]. Di Francescomarino C, Dumas M, Maggi F M, and Teinemaa I, "Clustering-based predictive process monitoring," IEEE Transactions on Services Computing, 2016.
[11]. Song X, He H, Niu S, and Gao J, "A data streams analysis strategy based on hoeffding tree with concept drift on Hadoop system," in Advanced Cloud and Big Data (CBD), 2016 International Conference on, 2016, pp. 45-48.
[12]. Chandel K, Kunwar V, Sabitha S, Choudhury T, and Mukherjee S, "A comparative study on thyroid disease detection using K-nearest neighbor and Naive Bayes classification techniques," CSI Transactions on ICT, pp. 1-7, 2017.
[13]. Huang Y A, You Z H, Li X, Chen X, Hu P, Li S, et al., "Construction of reliable protein–protein interaction networks using weighted sparse representation based classifier with pseudo substitution matrix representation features," Neurocomputing, vol. 218, pp. 131-138, 2016.
[14]. Kumar G R, Mangathayaru N, and Narsimha G, "Intrusion Detection-A Text Mining Based Approach," International Journal of Computer Science and Information Security, vol. 14, p. 76, 2016.
[15]. Sundar C, and Manjula L, “A Survey on Ergodic Rating Prediction using Sequence Classification,” Elysium Journal of Engineering Research & Management, vol.3, p.40-44, 2016.