SlideShare a Scribd company logo
1 of 8
Download to read offline
http://www.iaeme.com/IJCET/index.asp 27 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 6, Issue 7, Jul 2015, pp. 27-34, Article ID: IJCET_06_07_004
Available online at
http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=7
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
A DATA MINING APPROACH TO AVOID
POTENTIAL BIASES
S. Malpani Radhika
PG Student, Department of Computer Engineering,
JSPM NTC, Savitribai Phule Pune University, Pune, India
Dr. Sulochana Sonkamble
Professor & Head, Department of Computer Engineering,
JSPM NTC, Savitribai Phule Pune University, Pune, India
ABSTRACT
Data Mining is a science of identifying the pattern (Knowledge) from a
large collection of data. The identified pattern serves the Decision Support
System to generate Classification Rules that help in Decision Making.
Potential biases and potential privacy invasion are some of the possible
negative outcomes in the data mining technique. Rule mining of categorization
technique has enclosed the way for making automatic decisions like accepting
or rejecting the request of loan, etc. The biased (discrimination) result may be
generated when the training data set are biased. Therefore in data mining
anti-biasing techniques with discovery and prevention of biases is proposed by
the researchers. Biases are of two types direct and indirect. The direct biases
are occurred when the decisions are made on sensitive attribute. Indirect
biases are occurred when the decisions are made on the basis of non-sensitive
attributes. Number of researchers work for the prevention of direct or indirect
biases. The existing method works on the preprocessing approach for
prevention of biases and uses the method of rule protection and rule
generalization. The preprocessing technique has the limitation i.e. for
preventing the biased rule; the method directly removes the rule from the
database, which decreases the quality of the database. In this paper the system
is proposed for preventing data from the biased rule by using the Post-
processing method. It produces a much smaller set of high quality predictive
rules directly from the dataset.
Key words: Extended-CPAR, Direct Biases, Indirect Biases, Post-processing,
Preprocessing, Measurement of Biases, Transformation of Biases and Direct
Rule Protection (Method 1).
Cite this Article: Radhika, S. M. and Dr. Sonkamble, S. A Data Mining
Approach To Avoid Potential Biases. International Journal of Computer
S. Malpani Radhika and Dr. Sulochana Sonkamble
http://www.iaeme.com/IJCET/index.asp 28 editor@iaeme.com
Engineering and Technology, 6(7), 2015, pp. 27-34.
http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=7
_____________________________________________________________________
1. INTRODUCTION
In the communal intellect, the word biased refers to an action which leads to unfair
decision making towards people on the basis of their membership to a group, without
regard to the personage merit. For an instance, U. S. federal laws forbid biases based
on the race, color, religion, nationality, gender, marital status, and age in a number of
setting, including: scoring of credit or insurance: sale, rental etc [1].
By considering the side of researchers, the problem of biasing in credit, finance,
insurance, labor market, education and other human actions which has been focused
by many of the researchers of the human and economics science. The technology of
data mining is a source of both, generating biased decisions and a method for
determining and preventing the biases. The term direct bias means the apparent when
a user is indulgenced adversed as his or her individual attribute are sensitive like sex,
race, age, disability or the marital status [1].
This type of biased is simple and can influence the person being biased seriously.
The term indirect biased occurs when a confident rule to deal with all people equally
but has the result of affecting a number of certain people. Services in the information
society allow and custom set of large amount of data. These data are used to training
association or categorization rules in view of making automatic decision, like loan
accepting or rejecting, insurance premium calculation, personnel selection, etc.
Automating decisions may give a sense of fairness: categorization rules do not guide
themselves by personal preference. Though, at a closer look, one understands that
categorization rules are learned by the system from the training data. If the training
data are intrinsically biased for or against a particularly community, the learned model
may show a biased intolerant activities. In another words, the genuine reason behind
denying the loan is that the person belongs to other nationality. Therefore there is a
need to remove such a potential biases from the training data without affecting the
decision making utility. Everyone wants to prevent their data from becoming the
source of biases, due to data mining tasks generating biased model from biased data
sets as a part of automated decision making. In [4], its concluded data mining can be
both a source of biased and a resource for discovering biased. Hence some techniques
to avoid biases have to be introduced and they should be revised to achieve more
accuracy and allow the DSS to make biased free decision based on the biased free
dataset [1].
In this paper we discussed about preventing the biased in the dataset. For
preventing the dataset we introduced two methods first one is Post-processing method
which prevent the biased rule by generating strong rules from the input dataset.
Second method is the Categorization with least biased method this method also
prevent the data from generating the biased rule.
We will discuss the implementation details of the proposed system in details in the
further sections.
The remaining paper is organized in the following manner. In section II we
discussed about the related work done by the researchers for preventing the database
from the bias rule. In section III we discussed about the implementation details of the
proposed system. In this section we discussed about the system overview, algorithms
of the proposed system. In section IV discussed about the result and discussion of the
A Data Mining Approach To Avoid Potential Biases
http://www.iaeme.com/IJCET/index.asp 29 editor@iaeme.com
proposed system. In section V we discussed the conclusion of the proposed system
and finally we discussed the references used for the paper.
2. RELATED WORK
2.1. Literature Review
Despite of the tremendous enhancement of information system on the basis of data
mining technology in the decision making, the problem of anti-biasing in the data
mining didn’t receive too much of attention. Now the work done by the researcher for
detection and measuring the biases that occur in the data mining technology is
discussed. Also related work done for the preventing the bias in the data mining is
considered.
In [1], the authors represent two novel algorithms for solving the issues which are
essentially distinct from the recognized algorithms. The algorithms are Apriori and
AprioriTid. The features of the best two algorithms are shared to form the hybrid
algorithm known as AprioriHybrid. The Apriori begins with calculating the number of
item occurrences in every pass. Then the sample item sets are generated and the
support of candidates in each sample item set is evaluated. The distinguishing feature
of AprioriTid is that, it does not calculate the support after every pass.
In [2], the author describes the framework for evaluating potential biases by
analyzing the previous decision records generated out of sensitive attributes and also
addresses the issues regarding determining an accurate measure of the degree of bias
from a known group in a known context with respect to the decision. The author
considers this problem is rearticulated in a classification rule based setting, and a
compilation of quantitative measures of bias is introduced based on the existing norms
and regulation. Few measures to calculate the potential biases i.elift, olift, slift
formulas, are introduced in this work.
In [3], the authors introduced the issue of generating the biases through data
mining in the data set of traditional decision records, selected by the user or by the
system. Author honor the direct and indirect biases discovered by the modeling
protected by law groups and contexts where biases occurs in the classification rule
based syntax.
In [4], the authors introduced and studied the idea of bias classification rules.
Providing an assurance of non bias is shown to be a non trivial task. The authors also
introduced the term” Biases in dataset” for the first time. In data mining, classification
models are constructed on the basis of historical data, hence if there were some biased
decision making done previously, then the classification studied by the classification
models will also be biased. Hence the research focused on identifying the sensitive
attributes that could contribute to biases decision making. This idea lead to the term
called” Direct-Bias prevention”. In addition the” inference model” to tackle with
indirect biases was also introduced. The inference model suggested a secondary
database to be maintained along with original dataset called as “Background
Knowledge”.
In [5], the author guides the people through the legal problems about the biases
hidden in data, and through distinct legally grounded analyses to unveil biases
circumstances. The authors say that DCUBE is an analytical tool supporting the
interactive and iterative procedure of detecting potential biases. The future users of
DCUBE include: anti-bias establishment, proprietors of socially sensitive decision
databases, and auditors, researchers in social sciences, economics and law.
S. Malpani Radhika and Dr. Sulochana Sonkamble
http://www.iaeme.com/IJCET/index.asp 30 editor@iaeme.com
In [6], the authors represent the model for ruling proof of biases in datasets of
traditional decision records in communally responsive tasks, including access to
credit, mortgage, insurance, labor market and other benefits. The authors presented a
reference model for the examination and revelation of biases in socially-sensitive
choices taken by DSS. The methodology comprises first of extracting frequent
classification rules, and afterward of examining them on the premise of quantitative
measures of Biases and their measurable significance. The key legitimate ideas of
protected-by-law groups, direct biases, indirect biases, honest to goodness
occupational prerequisite, affirmative activities and partiality are formalized as
explanations over the set of concentrated runs and, perhaps, extra foundation
information.
In [7], the authors begin with addressing the issue of bias rules occurred in the
dataset by introducing the novel classification method for learning non-bias technique
on the basis of training data. This method is based on the manipulating the dataset by
creating the least intrusive modification which lead to an unbiased dataset.
In [8], the authors examine and study how to adjust the naive Bayes classifier for
performing classification which has restricted to be sovereign with respect to a given
sensitive attributes.
In [9], the authors discussed how to spotless training datasets and outsourced
datasets in such a way those rightful classifications rules can still be remove but
biased rules on the basis of sensitive attributes cannot. The authors analyzed how
biased decision making could affect on cyber security applications, particularly IDSs.
IDSs use computational knowledge advances, for example, data mining. It is evident
that the training data of these frameworks could be capable of generating biases,
which would bring about them to settle on such decision when foreseeing
interruption.
In [10], the authors discussed a novel preprocessing technique for indirect biased
prevention on the basis of data transformation which can consider distinguishes
biased attributes and their mixture. Additionally some measures for assessing their
proposed technique in term of its success in biased prevention and its impact on the
data quality.
In [11], the Adult Dataset is provided; this data set consists of 48,842 records,
split into a “train” part with 32,561 records and a “test” part with 16,281 records. The
data set has 14 attributes (without class attribute).
2.2. Existing System
The existing system used preprocessing approached for preventing direct and indirect
biases in the dataset. The existing system divided up into two phase:
2.2.1. Measurement of biases
Direct and indirect biased recognition contains obtaining the alpha biasing rules and
redlining rules. Initially, potentially biasing rules and potentially nonbiasing rules are
based on the biased items present in the database DB and FP the frequent
categorization rule. After that by using the direct biased measures and the biased
threshold the direct biased is measured by obtaining the alpha biasing rules with the
potentially biasing rules. After that, same as the direct bias, indirect bias is measured
by obtaining the redlining rules with the potentially non biased rules merging with the
background knowledge, using an indirect biased measures and the bias threshold [1].
A Data Mining Approach To Avoid Potential Biases
http://www.iaeme.com/IJCET/index.asp 31 editor@iaeme.com
2.2.2. Transformation of biases
Transforming the original database DB in such way that direct or indirect biases are
eliminate, with least impact on the data and on rightful decision rules, so that no
unfair decision rule can be mined from the transaction database[1].
2.2.3. Algorithms used in the preprocessing approach [1]
We consider the class assume in the database is binary. We consider in FP with the
negative classification rule. Also we consider the biased item set (A’) and non biased
item set (D) to be binary or non-binary category.
i) Direct Biases Prevention Algorithm:
• Direct Rule Protection (Method I)
• Direct Rule Protection (Method II)
• Direct Rule Protection and Rule Generalization
ii) Indirect biases Prevention Algorithm:
3. IMPLEMENTATION DETAILS
3.1. System Overview
In the Figure 1, we discussed the proposed system. In the proposed system we
introduced the method for preventing the bias from the database. Here we discussed
two methods which are Post-processing method i.e. Extended-CPAR for removing
bias and Categorization with least Biased Rule algorithm and initially user uploads the
dataset which contain biased rules. Initially we prevent the biased rule by using Post-
processing method. This algorithm merges the benefits of both the associative
categorization and traditional rule based categorization. This method has basically
splits into three steps:
• Rule generating
• Estimation accuracy of rule
• Categorization and rule analysis.
Figure 1 System Architecture
Here we introduced the method for preventing the bias by using Categorization
with least bias. This method changes the allocation of distinct data objects for a given
data to make it biased free. The basic plan is that the data object nearest to the
decision boundary are more prone to be sufferer of biased. Therefore the main
S. Malpani Radhika and Dr. Sulochana Sonkamble
http://www.iaeme.com/IJCET/index.asp 32 editor@iaeme.com
purpose is to alter the distribution of these borderline objects to make the biased free.
On the original dataset the ranking function was applied, for identifying the dataset
nearest to the bias data. The basic steps of this algorithm are as follows:
• Check the eligibility criteria
• Rank the client based on number of eligibility criteria they satisfied
• The cancellation is applied to those who having lower rank.
3.2. Algorithm
Algorithm 1: Algorithm for Post-processing (Extended-CPAR)
1. Let D be the original data set.
2. Declare a counter Weight.
3. Each attribute is assigned Weight=1.
4. Declare set gain that holds the values of strong attributes.
5. Initially set Rule is NULL.
6. Declare the set “Result” which holds the result obtained by applying the traditional
techniques.
7. Declare the set “Negative” which holds the attributes not included in Result.
8. if Weight (Negative) > Weight (Result) then.
9. Evaluate gain for each attribute in Negative.
10. While for each attribute if gain is strong then.
11. change its Class Attribute ¬c to C
12. Add the new Classification rule in Rules set
13. Include such attributes in result set.
4. RESULTS AND DISCUSSION
4.1. Expected Experimentation
The system is built using Java framework (version jdk 8.1) on Windows platform.
The Netbeans (version 8.0.1) is used as a development tool. The system does not
require any specific hardware to run; any standard machine is capable of running the
application.
4.2. Results
Here we discussed the results and generated graph for the Proposed System. While the
K Value = 3, Minimum Best Gain = 0.3, Total Weight Factor = 0.6, Gain Similarity
Ratio = 0.4, the discrimination removal is as follows:
Here in Graph 1, the Red Bar shows Existing System and the Blue bar shows
Proposed System. In the Existing System the Pre-Processing Algorithms have been
implemented whereas in Proposed System the Post-Processing Algorithms have been
implemented. Potential biases discovered in Existing System ranges between 0.1 to
2.5% whereas the potential biases discovered in Proposed System is 15%.
A Data Mining Approach To Avoid Potential Biases
http://www.iaeme.com/IJCET/index.asp 33 editor@iaeme.com
Graph 1 Degree of Potential Biases Removed
Graph 2, shows memory required for the respective algorithms to execute.
Graph 2 Memory Requirement
5. CONCLUSION
In this paper we discussed regarding the biased rule generated in the database. There
are two types of biased rule which are direct biased rule or indirect biased rule.
S. Malpani Radhika and Dr. Sulochana Sonkamble
http://www.iaeme.com/IJCET/index.asp 34 editor@iaeme.com
Number of techniques was developed for preventing the biased rule. In this paper we
proposed the Post-processing method which prevents the biased rule from the
database. We proposed Post-processing algorithm for preventing the biased rule.
The Existing System (Pre-processing) identifies only 2.5% of the dataset as
discriminated (biased) where as the Proposed System (Post-Processing) identifies up
to 15% of the dataset as biased while generating lesser but strong classification rules.
The proposed system thus is an excellent solution for avoiding biases in Data Mining.
REFERENCES
[1] Hajian, S. and Domingo-Ferrer, J. A Methodology for Direct and Indirect
Discrimination Prevention in Data Mining. IEEE Transactions on Knowledge and
Data Engineering, 25(7), July 2013.
[2] Pedreschi, D., Ruggieri, S. and Turini, F. Measuring Discrimination in Socially-
Sensitive Decision Records. Proc. Ninth SIAM Data Mining Conf. (SDM 09),
2009, pp. 581–592.
[3] Ruggieri, S., Pedreschi, D. and Turini, F. Data Mining for Discrimination
Discovery, ACM Trans. Knowledge Discovery from Data, 4(2), 2010, article 9.
[4] Pedreschi, D., Ruggieri, S., and Turini, F. Discrimination aware data mining. In
Proc. of KDD 2008, ACM, 560568, 2008.
[5] Ruggieri, S., Pedreschi, D. and Turini, F.DCUBE: Discrimination Discovery in
Databases. Proc. ACM Intl Conf. Management of Data (SIGMOD 10), 2010, pp.
1127–1130.
[6] Pedreschi, D., Ruggieri, S. and Turini, F. Integrating Induction and Deduction for
Finding Evidence of Discrimination, Proc. 12th
ACM Intl Conf. Artificial
Intelligence and Law (ICAIL 09), 2009, pp. 157–166.
[7] Kamiran, F. and Calders, T. Classification without Discrimination. Proc. IEEE
Second Intl Conf. Computer, Control and Comm. (IC4 09), 2009.
[8] Calders, T. and Verwer, S. Three Naive Bayes Approaches for Discrimination-
Free Classification. Data Mining and Knowledge Discovery, 21(2), 2010, pp.
277–292.
[9] Hajian, S., Domingo-Ferrer, J. and Martnez-Balleste, A. Discrimination
Preventionin Data Mining for Intrusion and Crime Detection. Proc. IEEE Symp.
Computational Intelligence in Cyber Security (CICS 11), 2011, pp. 47–54.
[10] Hajian, S., Domingo-Ferrer, J. and Martnez-Balleste, A. Rule Protection for
Indirect Discrimination Prevention in Data Mining. Proc. Eighth Intl Conf.
Modeling Decisions for Artificial Intelligence (MDAI 11), 2011, pp. 211–222.
[11] Kohavi, R. and Becker, B. UCI Repository of Machine Learning Databases,
1996, http://archive.ics.uci.edu/ml/datasets/Adult.

More Related Content

What's hot

Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...IJECEIAES
 
IRJET- Disease Prediction System
IRJET- Disease Prediction SystemIRJET- Disease Prediction System
IRJET- Disease Prediction SystemIRJET Journal
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
 
IRJET- Medical Data Mining
IRJET- Medical Data MiningIRJET- Medical Data Mining
IRJET- Medical Data MiningIRJET Journal
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET Journal
 
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...IRJET Journal
 
An efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysisAn efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysisjournalBEEI
 
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET Journal
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...IRJET Journal
 
IRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current ApproachesIRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current ApproachesIRJET Journal
 
IRJET- Predicting Heart Disease using Machine Learning Algorithm
IRJET- Predicting Heart Disease using Machine Learning AlgorithmIRJET- Predicting Heart Disease using Machine Learning Algorithm
IRJET- Predicting Heart Disease using Machine Learning AlgorithmIRJET Journal
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing Techniques
IRJET-  	  Clinical Medical Knowledge Extraction using Crowdsourcing TechniquesIRJET-  	  Clinical Medical Knowledge Extraction using Crowdsourcing Techniques
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing TechniquesIRJET Journal
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCVIRJET Journal
 
Machine Learning in Modern Medicine with Erin LeDell at Stanford Med
Machine Learning in Modern Medicine with Erin LeDell at Stanford MedMachine Learning in Modern Medicine with Erin LeDell at Stanford Med
Machine Learning in Modern Medicine with Erin LeDell at Stanford MedSri Ambati
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
Rule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsRule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsCSCJournals
 
Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesIJARIIE JOURNAL
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its ApplicationsIRJET Journal
 

What's hot (20)

Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
Clustering Prediction Techniques in Defining and Predicting Customers Defecti...
 
IRJET- Disease Prediction System
IRJET- Disease Prediction SystemIRJET- Disease Prediction System
IRJET- Disease Prediction System
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
 
IRJET- Medical Data Mining
IRJET- Medical Data MiningIRJET- Medical Data Mining
IRJET- Medical Data Mining
 
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction SystemIRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
 
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
 
An efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysisAn efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysis
 
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
IRJET- Result on the Application for Multiple Disease Prediction from Symptom...
 
Medic - Artificially Intelligent System for Healthcare Services ...
Medic - Artificially Intelligent System for Healthcare Services              ...Medic - Artificially Intelligent System for Healthcare Services              ...
Medic - Artificially Intelligent System for Healthcare Services ...
 
IRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current ApproachesIRJET- A Review of Data Cleaning and its Current Approaches
IRJET- A Review of Data Cleaning and its Current Approaches
 
IRJET- Predicting Heart Disease using Machine Learning Algorithm
IRJET- Predicting Heart Disease using Machine Learning AlgorithmIRJET- Predicting Heart Disease using Machine Learning Algorithm
IRJET- Predicting Heart Disease using Machine Learning Algorithm
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing Techniques
IRJET-  	  Clinical Medical Knowledge Extraction using Crowdsourcing TechniquesIRJET-  	  Clinical Medical Knowledge Extraction using Crowdsourcing Techniques
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing Techniques
 
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
IRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCVIRJET -  	  Real Time Facial Analysis using Tensorflowand OpenCV
IRJET - Real Time Facial Analysis using Tensorflowand OpenCV
 
Machine Learning in Modern Medicine with Erin LeDell at Stanford Med
Machine Learning in Modern Medicine with Erin LeDell at Stanford MedMachine Learning in Modern Medicine with Erin LeDell at Stanford Med
Machine Learning in Modern Medicine with Erin LeDell at Stanford Med
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
Rule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes ReportsRule-based Information Extraction for Airplane Crashes Reports
Rule-based Information Extraction for Airplane Crashes Reports
 
Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association Rules
 
Ez36937941
Ez36937941Ez36937941
Ez36937941
 
Study of Data Mining Methods and its Applications
Study of  Data Mining Methods and its ApplicationsStudy of  Data Mining Methods and its Applications
Study of Data Mining Methods and its Applications
 

Viewers also liked

A comparative study on synchronization algorithms for various modulation tech...
A comparative study on synchronization algorithms for various modulation tech...A comparative study on synchronization algorithms for various modulation tech...
A comparative study on synchronization algorithms for various modulation tech...IAEME Publication
 
Development the oil system of aircraft
Development the oil system of aircraftDevelopment the oil system of aircraft
Development the oil system of aircraftIAEME Publication
 
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...IAEME Publication
 
A 3 player iterative game to design power system stabilizer that enhances sma...
A 3 player iterative game to design power system stabilizer that enhances sma...A 3 player iterative game to design power system stabilizer that enhances sma...
A 3 player iterative game to design power system stabilizer that enhances sma...IAEME Publication
 
A study about work place stress in food industries in various level of employ...
A study about work place stress in food industries in various level of employ...A study about work place stress in food industries in various level of employ...
A study about work place stress in food industries in various level of employ...IAEME Publication
 

Viewers also liked (19)

Ijmet 06 08_005
Ijmet 06 08_005Ijmet 06 08_005
Ijmet 06 08_005
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
Ijciet 06 08_002
Ijciet 06 08_002Ijciet 06 08_002
Ijciet 06 08_002
 
Ijcet 06 06_001
Ijcet 06 06_001Ijcet 06 06_001
Ijcet 06 06_001
 
A comparative study on synchronization algorithms for various modulation tech...
A comparative study on synchronization algorithms for various modulation tech...A comparative study on synchronization algorithms for various modulation tech...
A comparative study on synchronization algorithms for various modulation tech...
 
Development the oil system of aircraft
Development the oil system of aircraftDevelopment the oil system of aircraft
Development the oil system of aircraft
 
Ijaret 06 07_002
Ijaret 06 07_002Ijaret 06 07_002
Ijaret 06 07_002
 
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...
Pradhan mantri jan dhan yojna pmjdy a new direction for mainstreaming the fin...
 
A 3 player iterative game to design power system stabilizer that enhances sma...
A 3 player iterative game to design power system stabilizer that enhances sma...A 3 player iterative game to design power system stabilizer that enhances sma...
A 3 player iterative game to design power system stabilizer that enhances sma...
 
Ijciet 06 09_003
Ijciet 06 09_003Ijciet 06 09_003
Ijciet 06 09_003
 
A study about work place stress in food industries in various level of employ...
A study about work place stress in food industries in various level of employ...A study about work place stress in food industries in various level of employ...
A study about work place stress in food industries in various level of employ...
 
Ijeet 06 08_004
Ijeet 06 08_004Ijeet 06 08_004
Ijeet 06 08_004
 
Ijm 06 10_007
Ijm 06 10_007Ijm 06 10_007
Ijm 06 10_007
 
Ijm 06 10_009
Ijm 06 10_009Ijm 06 10_009
Ijm 06 10_009
 
Ijm 06 10_004
Ijm 06 10_004Ijm 06 10_004
Ijm 06 10_004
 
Ijciet 06 09_005
Ijciet 06 09_005Ijciet 06 09_005
Ijciet 06 09_005
 
Ijciet 06 09_010
Ijciet 06 09_010Ijciet 06 09_010
Ijciet 06 09_010
 
Ijm 06 09_010
Ijm 06 09_010Ijm 06 09_010
Ijm 06 09_010
 
Ijm 06 09_012
Ijm 06 09_012Ijm 06 09_012
Ijm 06 09_012
 

Similar to Ijcet 06 07_004

Study of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data MiningStudy of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data MiningIRJET Journal
 
C0364012016
C0364012016C0364012016
C0364012016theijes
 
prediction using data mining.pdf
prediction using data mining.pdfprediction using data mining.pdf
prediction using data mining.pdfNavAhmed3
 
Classification with No Direct Discrimination
Classification with No Direct DiscriminationClassification with No Direct Discrimination
Classification with No Direct DiscriminationEditor IJCATR
 
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...A Brief Survey on Recommendation System for a Gradient Classifier based Inade...
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...Christo Ananth
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...IJECEIAES
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmenteSAT Publishing House
 
Running Head Data Mining in The Cloud .docx
Running Head Data Mining in The Cloud                            .docxRunning Head Data Mining in The Cloud                            .docx
Running Head Data Mining in The Cloud .docxhealdkathaleen
 
Protection of Direct and Indirect Discrimination using Prevention Methods
Protection of Direct and Indirect Discrimination using Prevention Methods Protection of Direct and Indirect Discrimination using Prevention Methods
Protection of Direct and Indirect Discrimination using Prevention Methods IOSR Journals
 
A methodology for direct and indirect discrimination prevention in data mining
A methodology for direct and indirect  discrimination prevention in data miningA methodology for direct and indirect  discrimination prevention in data mining
A methodology for direct and indirect discrimination prevention in data miningGitesh More
 
ICU Patient Deterioration Prediction : A Data-Mining Approach
ICU Patient Deterioration Prediction : A Data-Mining ApproachICU Patient Deterioration Prediction : A Data-Mining Approach
ICU Patient Deterioration Prediction : A Data-Mining Approachcsandit
 
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACHICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACHcscpconf
 
IRJET- Breast Cancer Relapse Prognosis by Classic and Modern Structures o...
IRJET-  	  Breast Cancer Relapse Prognosis by Classic and Modern Structures o...IRJET-  	  Breast Cancer Relapse Prognosis by Classic and Modern Structures o...
IRJET- Breast Cancer Relapse Prognosis by Classic and Modern Structures o...IRJET Journal
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare DesignCarmen Martin
 
Advantages And Disadvantages Of Chronic Kidney Disease
Advantages And Disadvantages Of Chronic Kidney DiseaseAdvantages And Disadvantages Of Chronic Kidney Disease
Advantages And Disadvantages Of Chronic Kidney DiseaseKaren Oliver
 
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
IRJET-	 Fault Detection and Prediction of Failure using Vibration AnalysisIRJET-	 Fault Detection and Prediction of Failure using Vibration Analysis
IRJET- Fault Detection and Prediction of Failure using Vibration AnalysisIRJET Journal
 
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNING
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNINGPREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNING
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNINGIRJET Journal
 
New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science IJECEIAES
 

Similar to Ijcet 06 07_004 (20)

Study of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data MiningStudy of Privacy Discrimination and Prevention in Data Mining
Study of Privacy Discrimination and Prevention in Data Mining
 
C0364012016
C0364012016C0364012016
C0364012016
 
prediction using data mining.pdf
prediction using data mining.pdfprediction using data mining.pdf
prediction using data mining.pdf
 
Classification with No Direct Discrimination
Classification with No Direct DiscriminationClassification with No Direct Discrimination
Classification with No Direct Discrimination
 
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...A Brief Survey on Recommendation System for a Gradient Classifier based Inade...
A Brief Survey on Recommendation System for a Gradient Classifier based Inade...
 
J046065457
J046065457J046065457
J046065457
 
Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...Concept drift and machine learning model for detecting fraudulent transaction...
Concept drift and machine learning model for detecting fraudulent transaction...
 
Data discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managmentData discrimination prevention in customer relationship managment
Data discrimination prevention in customer relationship managment
 
Running Head Data Mining in The Cloud .docx
Running Head Data Mining in The Cloud                            .docxRunning Head Data Mining in The Cloud                            .docx
Running Head Data Mining in The Cloud .docx
 
Protection of Direct and Indirect Discrimination using Prevention Methods
Protection of Direct and Indirect Discrimination using Prevention Methods Protection of Direct and Indirect Discrimination using Prevention Methods
Protection of Direct and Indirect Discrimination using Prevention Methods
 
A methodology for direct and indirect discrimination prevention in data mining
A methodology for direct and indirect  discrimination prevention in data miningA methodology for direct and indirect  discrimination prevention in data mining
A methodology for direct and indirect discrimination prevention in data mining
 
ICU Patient Deterioration Prediction : A Data-Mining Approach
ICU Patient Deterioration Prediction : A Data-Mining ApproachICU Patient Deterioration Prediction : A Data-Mining Approach
ICU Patient Deterioration Prediction : A Data-Mining Approach
 
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACHICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
ICU PATIENT DETERIORATION PREDICTION: A DATA-MINING APPROACH
 
IRJET- Breast Cancer Relapse Prognosis by Classic and Modern Structures o...
IRJET-  	  Breast Cancer Relapse Prognosis by Classic and Modern Structures o...IRJET-  	  Breast Cancer Relapse Prognosis by Classic and Modern Structures o...
IRJET- Breast Cancer Relapse Prognosis by Classic and Modern Structures o...
 
Hu3414421448
Hu3414421448Hu3414421448
Hu3414421448
 
Evidence Based Healthcare Design
Evidence Based Healthcare DesignEvidence Based Healthcare Design
Evidence Based Healthcare Design
 
Advantages And Disadvantages Of Chronic Kidney Disease
Advantages And Disadvantages Of Chronic Kidney DiseaseAdvantages And Disadvantages Of Chronic Kidney Disease
Advantages And Disadvantages Of Chronic Kidney Disease
 
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
IRJET-	 Fault Detection and Prediction of Failure using Vibration AnalysisIRJET-	 Fault Detection and Prediction of Failure using Vibration Analysis
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
 
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNING
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNINGPREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNING
PREDICTION OF DISEASE WITH MINING ALGORITHMS IN MACHINE LEARNING
 
New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science New hybrid ensemble method for anomaly detection in data science
New hybrid ensemble method for anomaly detection in data science
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 

Recently uploaded (20)

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 

Ijcet 06 07_004

  • 1. http://www.iaeme.com/IJCET/index.asp 27 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 7, Jul 2015, pp. 27-34, Article ID: IJCET_06_07_004 Available online at http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=7 ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ A DATA MINING APPROACH TO AVOID POTENTIAL BIASES S. Malpani Radhika PG Student, Department of Computer Engineering, JSPM NTC, Savitribai Phule Pune University, Pune, India Dr. Sulochana Sonkamble Professor & Head, Department of Computer Engineering, JSPM NTC, Savitribai Phule Pune University, Pune, India ABSTRACT Data Mining is a science of identifying the pattern (Knowledge) from a large collection of data. The identified pattern serves the Decision Support System to generate Classification Rules that help in Decision Making. Potential biases and potential privacy invasion are some of the possible negative outcomes in the data mining technique. Rule mining of categorization technique has enclosed the way for making automatic decisions like accepting or rejecting the request of loan, etc. The biased (discrimination) result may be generated when the training data set are biased. Therefore in data mining anti-biasing techniques with discovery and prevention of biases is proposed by the researchers. Biases are of two types direct and indirect. The direct biases are occurred when the decisions are made on sensitive attribute. Indirect biases are occurred when the decisions are made on the basis of non-sensitive attributes. Number of researchers work for the prevention of direct or indirect biases. The existing method works on the preprocessing approach for prevention of biases and uses the method of rule protection and rule generalization. The preprocessing technique has the limitation i.e. for preventing the biased rule; the method directly removes the rule from the database, which decreases the quality of the database. In this paper the system is proposed for preventing data from the biased rule by using the Post- processing method. It produces a much smaller set of high quality predictive rules directly from the dataset. Key words: Extended-CPAR, Direct Biases, Indirect Biases, Post-processing, Preprocessing, Measurement of Biases, Transformation of Biases and Direct Rule Protection (Method 1). Cite this Article: Radhika, S. M. and Dr. Sonkamble, S. A Data Mining Approach To Avoid Potential Biases. International Journal of Computer
  • 2. S. Malpani Radhika and Dr. Sulochana Sonkamble http://www.iaeme.com/IJCET/index.asp 28 editor@iaeme.com Engineering and Technology, 6(7), 2015, pp. 27-34. http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=7 _____________________________________________________________________ 1. INTRODUCTION In the communal intellect, the word biased refers to an action which leads to unfair decision making towards people on the basis of their membership to a group, without regard to the personage merit. For an instance, U. S. federal laws forbid biases based on the race, color, religion, nationality, gender, marital status, and age in a number of setting, including: scoring of credit or insurance: sale, rental etc [1]. By considering the side of researchers, the problem of biasing in credit, finance, insurance, labor market, education and other human actions which has been focused by many of the researchers of the human and economics science. The technology of data mining is a source of both, generating biased decisions and a method for determining and preventing the biases. The term direct bias means the apparent when a user is indulgenced adversed as his or her individual attribute are sensitive like sex, race, age, disability or the marital status [1]. This type of biased is simple and can influence the person being biased seriously. The term indirect biased occurs when a confident rule to deal with all people equally but has the result of affecting a number of certain people. Services in the information society allow and custom set of large amount of data. These data are used to training association or categorization rules in view of making automatic decision, like loan accepting or rejecting, insurance premium calculation, personnel selection, etc. Automating decisions may give a sense of fairness: categorization rules do not guide themselves by personal preference. Though, at a closer look, one understands that categorization rules are learned by the system from the training data. If the training data are intrinsically biased for or against a particularly community, the learned model may show a biased intolerant activities. In another words, the genuine reason behind denying the loan is that the person belongs to other nationality. Therefore there is a need to remove such a potential biases from the training data without affecting the decision making utility. Everyone wants to prevent their data from becoming the source of biases, due to data mining tasks generating biased model from biased data sets as a part of automated decision making. In [4], its concluded data mining can be both a source of biased and a resource for discovering biased. Hence some techniques to avoid biases have to be introduced and they should be revised to achieve more accuracy and allow the DSS to make biased free decision based on the biased free dataset [1]. In this paper we discussed about preventing the biased in the dataset. For preventing the dataset we introduced two methods first one is Post-processing method which prevent the biased rule by generating strong rules from the input dataset. Second method is the Categorization with least biased method this method also prevent the data from generating the biased rule. We will discuss the implementation details of the proposed system in details in the further sections. The remaining paper is organized in the following manner. In section II we discussed about the related work done by the researchers for preventing the database from the bias rule. In section III we discussed about the implementation details of the proposed system. In this section we discussed about the system overview, algorithms of the proposed system. In section IV discussed about the result and discussion of the
  • 3. A Data Mining Approach To Avoid Potential Biases http://www.iaeme.com/IJCET/index.asp 29 editor@iaeme.com proposed system. In section V we discussed the conclusion of the proposed system and finally we discussed the references used for the paper. 2. RELATED WORK 2.1. Literature Review Despite of the tremendous enhancement of information system on the basis of data mining technology in the decision making, the problem of anti-biasing in the data mining didn’t receive too much of attention. Now the work done by the researcher for detection and measuring the biases that occur in the data mining technology is discussed. Also related work done for the preventing the bias in the data mining is considered. In [1], the authors represent two novel algorithms for solving the issues which are essentially distinct from the recognized algorithms. The algorithms are Apriori and AprioriTid. The features of the best two algorithms are shared to form the hybrid algorithm known as AprioriHybrid. The Apriori begins with calculating the number of item occurrences in every pass. Then the sample item sets are generated and the support of candidates in each sample item set is evaluated. The distinguishing feature of AprioriTid is that, it does not calculate the support after every pass. In [2], the author describes the framework for evaluating potential biases by analyzing the previous decision records generated out of sensitive attributes and also addresses the issues regarding determining an accurate measure of the degree of bias from a known group in a known context with respect to the decision. The author considers this problem is rearticulated in a classification rule based setting, and a compilation of quantitative measures of bias is introduced based on the existing norms and regulation. Few measures to calculate the potential biases i.elift, olift, slift formulas, are introduced in this work. In [3], the authors introduced the issue of generating the biases through data mining in the data set of traditional decision records, selected by the user or by the system. Author honor the direct and indirect biases discovered by the modeling protected by law groups and contexts where biases occurs in the classification rule based syntax. In [4], the authors introduced and studied the idea of bias classification rules. Providing an assurance of non bias is shown to be a non trivial task. The authors also introduced the term” Biases in dataset” for the first time. In data mining, classification models are constructed on the basis of historical data, hence if there were some biased decision making done previously, then the classification studied by the classification models will also be biased. Hence the research focused on identifying the sensitive attributes that could contribute to biases decision making. This idea lead to the term called” Direct-Bias prevention”. In addition the” inference model” to tackle with indirect biases was also introduced. The inference model suggested a secondary database to be maintained along with original dataset called as “Background Knowledge”. In [5], the author guides the people through the legal problems about the biases hidden in data, and through distinct legally grounded analyses to unveil biases circumstances. The authors say that DCUBE is an analytical tool supporting the interactive and iterative procedure of detecting potential biases. The future users of DCUBE include: anti-bias establishment, proprietors of socially sensitive decision databases, and auditors, researchers in social sciences, economics and law.
  • 4. S. Malpani Radhika and Dr. Sulochana Sonkamble http://www.iaeme.com/IJCET/index.asp 30 editor@iaeme.com In [6], the authors represent the model for ruling proof of biases in datasets of traditional decision records in communally responsive tasks, including access to credit, mortgage, insurance, labor market and other benefits. The authors presented a reference model for the examination and revelation of biases in socially-sensitive choices taken by DSS. The methodology comprises first of extracting frequent classification rules, and afterward of examining them on the premise of quantitative measures of Biases and their measurable significance. The key legitimate ideas of protected-by-law groups, direct biases, indirect biases, honest to goodness occupational prerequisite, affirmative activities and partiality are formalized as explanations over the set of concentrated runs and, perhaps, extra foundation information. In [7], the authors begin with addressing the issue of bias rules occurred in the dataset by introducing the novel classification method for learning non-bias technique on the basis of training data. This method is based on the manipulating the dataset by creating the least intrusive modification which lead to an unbiased dataset. In [8], the authors examine and study how to adjust the naive Bayes classifier for performing classification which has restricted to be sovereign with respect to a given sensitive attributes. In [9], the authors discussed how to spotless training datasets and outsourced datasets in such a way those rightful classifications rules can still be remove but biased rules on the basis of sensitive attributes cannot. The authors analyzed how biased decision making could affect on cyber security applications, particularly IDSs. IDSs use computational knowledge advances, for example, data mining. It is evident that the training data of these frameworks could be capable of generating biases, which would bring about them to settle on such decision when foreseeing interruption. In [10], the authors discussed a novel preprocessing technique for indirect biased prevention on the basis of data transformation which can consider distinguishes biased attributes and their mixture. Additionally some measures for assessing their proposed technique in term of its success in biased prevention and its impact on the data quality. In [11], the Adult Dataset is provided; this data set consists of 48,842 records, split into a “train” part with 32,561 records and a “test” part with 16,281 records. The data set has 14 attributes (without class attribute). 2.2. Existing System The existing system used preprocessing approached for preventing direct and indirect biases in the dataset. The existing system divided up into two phase: 2.2.1. Measurement of biases Direct and indirect biased recognition contains obtaining the alpha biasing rules and redlining rules. Initially, potentially biasing rules and potentially nonbiasing rules are based on the biased items present in the database DB and FP the frequent categorization rule. After that by using the direct biased measures and the biased threshold the direct biased is measured by obtaining the alpha biasing rules with the potentially biasing rules. After that, same as the direct bias, indirect bias is measured by obtaining the redlining rules with the potentially non biased rules merging with the background knowledge, using an indirect biased measures and the bias threshold [1].
  • 5. A Data Mining Approach To Avoid Potential Biases http://www.iaeme.com/IJCET/index.asp 31 editor@iaeme.com 2.2.2. Transformation of biases Transforming the original database DB in such way that direct or indirect biases are eliminate, with least impact on the data and on rightful decision rules, so that no unfair decision rule can be mined from the transaction database[1]. 2.2.3. Algorithms used in the preprocessing approach [1] We consider the class assume in the database is binary. We consider in FP with the negative classification rule. Also we consider the biased item set (A’) and non biased item set (D) to be binary or non-binary category. i) Direct Biases Prevention Algorithm: • Direct Rule Protection (Method I) • Direct Rule Protection (Method II) • Direct Rule Protection and Rule Generalization ii) Indirect biases Prevention Algorithm: 3. IMPLEMENTATION DETAILS 3.1. System Overview In the Figure 1, we discussed the proposed system. In the proposed system we introduced the method for preventing the bias from the database. Here we discussed two methods which are Post-processing method i.e. Extended-CPAR for removing bias and Categorization with least Biased Rule algorithm and initially user uploads the dataset which contain biased rules. Initially we prevent the biased rule by using Post- processing method. This algorithm merges the benefits of both the associative categorization and traditional rule based categorization. This method has basically splits into three steps: • Rule generating • Estimation accuracy of rule • Categorization and rule analysis. Figure 1 System Architecture Here we introduced the method for preventing the bias by using Categorization with least bias. This method changes the allocation of distinct data objects for a given data to make it biased free. The basic plan is that the data object nearest to the decision boundary are more prone to be sufferer of biased. Therefore the main
  • 6. S. Malpani Radhika and Dr. Sulochana Sonkamble http://www.iaeme.com/IJCET/index.asp 32 editor@iaeme.com purpose is to alter the distribution of these borderline objects to make the biased free. On the original dataset the ranking function was applied, for identifying the dataset nearest to the bias data. The basic steps of this algorithm are as follows: • Check the eligibility criteria • Rank the client based on number of eligibility criteria they satisfied • The cancellation is applied to those who having lower rank. 3.2. Algorithm Algorithm 1: Algorithm for Post-processing (Extended-CPAR) 1. Let D be the original data set. 2. Declare a counter Weight. 3. Each attribute is assigned Weight=1. 4. Declare set gain that holds the values of strong attributes. 5. Initially set Rule is NULL. 6. Declare the set “Result” which holds the result obtained by applying the traditional techniques. 7. Declare the set “Negative” which holds the attributes not included in Result. 8. if Weight (Negative) > Weight (Result) then. 9. Evaluate gain for each attribute in Negative. 10. While for each attribute if gain is strong then. 11. change its Class Attribute ¬c to C 12. Add the new Classification rule in Rules set 13. Include such attributes in result set. 4. RESULTS AND DISCUSSION 4.1. Expected Experimentation The system is built using Java framework (version jdk 8.1) on Windows platform. The Netbeans (version 8.0.1) is used as a development tool. The system does not require any specific hardware to run; any standard machine is capable of running the application. 4.2. Results Here we discussed the results and generated graph for the Proposed System. While the K Value = 3, Minimum Best Gain = 0.3, Total Weight Factor = 0.6, Gain Similarity Ratio = 0.4, the discrimination removal is as follows: Here in Graph 1, the Red Bar shows Existing System and the Blue bar shows Proposed System. In the Existing System the Pre-Processing Algorithms have been implemented whereas in Proposed System the Post-Processing Algorithms have been implemented. Potential biases discovered in Existing System ranges between 0.1 to 2.5% whereas the potential biases discovered in Proposed System is 15%.
  • 7. A Data Mining Approach To Avoid Potential Biases http://www.iaeme.com/IJCET/index.asp 33 editor@iaeme.com Graph 1 Degree of Potential Biases Removed Graph 2, shows memory required for the respective algorithms to execute. Graph 2 Memory Requirement 5. CONCLUSION In this paper we discussed regarding the biased rule generated in the database. There are two types of biased rule which are direct biased rule or indirect biased rule.
  • 8. S. Malpani Radhika and Dr. Sulochana Sonkamble http://www.iaeme.com/IJCET/index.asp 34 editor@iaeme.com Number of techniques was developed for preventing the biased rule. In this paper we proposed the Post-processing method which prevents the biased rule from the database. We proposed Post-processing algorithm for preventing the biased rule. The Existing System (Pre-processing) identifies only 2.5% of the dataset as discriminated (biased) where as the Proposed System (Post-Processing) identifies up to 15% of the dataset as biased while generating lesser but strong classification rules. The proposed system thus is an excellent solution for avoiding biases in Data Mining. REFERENCES [1] Hajian, S. and Domingo-Ferrer, J. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining. IEEE Transactions on Knowledge and Data Engineering, 25(7), July 2013. [2] Pedreschi, D., Ruggieri, S. and Turini, F. Measuring Discrimination in Socially- Sensitive Decision Records. Proc. Ninth SIAM Data Mining Conf. (SDM 09), 2009, pp. 581–592. [3] Ruggieri, S., Pedreschi, D. and Turini, F. Data Mining for Discrimination Discovery, ACM Trans. Knowledge Discovery from Data, 4(2), 2010, article 9. [4] Pedreschi, D., Ruggieri, S., and Turini, F. Discrimination aware data mining. In Proc. of KDD 2008, ACM, 560568, 2008. [5] Ruggieri, S., Pedreschi, D. and Turini, F.DCUBE: Discrimination Discovery in Databases. Proc. ACM Intl Conf. Management of Data (SIGMOD 10), 2010, pp. 1127–1130. [6] Pedreschi, D., Ruggieri, S. and Turini, F. Integrating Induction and Deduction for Finding Evidence of Discrimination, Proc. 12th ACM Intl Conf. Artificial Intelligence and Law (ICAIL 09), 2009, pp. 157–166. [7] Kamiran, F. and Calders, T. Classification without Discrimination. Proc. IEEE Second Intl Conf. Computer, Control and Comm. (IC4 09), 2009. [8] Calders, T. and Verwer, S. Three Naive Bayes Approaches for Discrimination- Free Classification. Data Mining and Knowledge Discovery, 21(2), 2010, pp. 277–292. [9] Hajian, S., Domingo-Ferrer, J. and Martnez-Balleste, A. Discrimination Preventionin Data Mining for Intrusion and Crime Detection. Proc. IEEE Symp. Computational Intelligence in Cyber Security (CICS 11), 2011, pp. 47–54. [10] Hajian, S., Domingo-Ferrer, J. and Martnez-Balleste, A. Rule Protection for Indirect Discrimination Prevention in Data Mining. Proc. Eighth Intl Conf. Modeling Decisions for Artificial Intelligence (MDAI 11), 2011, pp. 211–222. [11] Kohavi, R. and Becker, B. UCI Repository of Machine Learning Databases, 1996, http://archive.ics.uci.edu/ml/datasets/Adult.