SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
DOI:10.5121/ijcsa.2016.6401 1
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR
THE SLOW LEARNER PREDICTION OVER
MULTICLASS STUDENT DATASET
Swati1
, Rajinder Kaur2
1
M.E student of Chandigarh University , Gharuan
2
Assist. Professor of Chandigarh University, Gharuan
ABSTRACT
The high school students must be observed for their slow learning or quick learning abilities to provide
them with the best education practices. Such analysis can be perfectly performed over the student
performance data. The high school student data has been obtained from the schools from the various
regions in Punjab, a pivotal state of India. The complete student data and the selective data of almost 1300
students obtained from one school in the regions has been undergone the test using the proposed model in
this paper. The proposed model is based upon the naïve bayes classification model for the data
classification using the multi-factor features obtained from the input dataset. The subject groups have been
divided into the two primary groups: difficult and normal. The classification algorithm has been applied
individually over data grouped in the various subject groups. Both of the early stage classification events
have produced the almost similar results, whereas the results obtained from the classification events over
the averaging factors and the floating factors told the different story than the early stage classification. The
proposed model results have shown that the deep analysis of the data tells the in-depth facts from the input
data. The proposed model can be considered as the effective classification model when evaluated from the
results described in the earlier sections.
KEYWORDS
Slow learner prediction, data classification, averaging factor classification, floating factor classification.
1. INTRODUCTION
Self-organizing Sensor networks dynamically changes the network topology and distributed
either randomly or uniformly. A huge amount of tiny sensor nodes (SNs) monitor temperature,
humidity, motions and sound. In multi-hop transmission of WSN each sensor nodes play dual
characteristic of perceiving the environment and forwards the collected data to the base station
(BS) via integrated radio transmitters. The key challenge is to prolong the lifetime of WSN since
it is not possible to recharge the batteries of SNs in unattended environment. Considering every
node in the network for a time periodic data collection generates more traffic. So the period for
data collection is to be enough for collecting data from nodes. To avoid traffic congestion and
packet drop over transmission only random nodes to be selected for data collection in every
miniature period. Therefore, energy efficient mechanisms are required for computation operations
like data storage, path construction and decision making of source nodes and to secure the
communication from sources to sink.
In the Internet, web is a vast, dynamic, diverse and amorphous data repository that stores
information/data in incredible amount and also enhances the complexity to deal with the
information from different opinion of users, view, and business analyst and web service
providers. The Internet service providers desire to search the technique to guess the user's
behaviors and customize information to shrink the traffic load and create the Web site suited for
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
2
different set of users. The business analysts need to have tools to learn consumer's needs. All of
them are expecting equipment or techniques to help them satisfy their requirements and solve the
problems encountered on Web. Thus, Web mining has become trendy active area and is taken as
the research topic for this analysis.
In the prediction model, we find out what users are looking for on internet or Few user so be
might be survey at only documented data. It is the submission of form and facts of mining
techniques to find out interesting usage pattern from World Wide Web facts and figures in the
alignment to realize and better serve the desires of Web based applications. Usage figures and
facts hold the personal or source of World Wide Web users along with browsing at World Wide
Web site. Web usage excavation itself could be categorized farther counting on the kind of usage
facts and figures considered:
• Web Server Data: The client logs are anthologized by the Web server.
1.1 Application Server Data
Financial submission servers have significant characteristics to endue ecommerce
submissions to be built on peak of them with tiny effort. A key feature is thedexterity to
pathway diverse kind of enterprise events and logs them in application server logs.
1.2 Application Level Data
New type of events can be characterized in an application, and logging can be two times on
for them, therefore generating histories of these particularly characterized events. It should be
noted however, that numerous end submissions need a combination of one or more then one
of the methods directed in the classes above.
In the current scenario of the World Wide Web, the popularity is increasing day by day, so as the
web mining. In the web, increasing the number of websites and web users, the data of web usage
is stored on web servers. By analysis of web server data, we have several information such as
user surfing behavior that is most crucial aspect of business marketing which helpsto user profile,
web site designs meliorate and make better marketing and business decision making website user
friendly and popular. With looking at minimum data we cannot identify patterns, for purpose of
analyst need significantly huge amount of data. All the data collected by the service providers is
stored in the high capacity servers. As the user becomes high in the numbers this data also grows
and the data logs are not easy to maintain. To analyze such kind of large data we need to extract
the useful data and this data is then mined to get the patterns of the user behavior. For this
purpose an efficient algorithm is needed, which can do the purpose and help extracting the
information. There are so many algorithms which are liable to resolve the purpose but they all
take the time in scanning and pattern matching. In this synopsis, an algorithm is designed which
employs the website architecture and gives the information about the users’ usage behavior. The
users access a website by going from one page to another page, by the hyperlinks provided in the
web pages. Mining the information identified by the analysis, will not only help making the user
interface better but also in various business decision making.
The user traverses web-site in different-different ways. The variations between traversal patterns
increase the complexity of obtained information from path traversed. There are several available
algorithms for citing the user traversal patterns. In this paper a new approach has been proposed
for mining the large reference patterns. The traversal patterns have achieved by first mining the
maximal forward references take away the web server log and after this maximal forward
reference are obtained and large references can be calculated that are most frequently used paths
followed by user for website.
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
3
2. LITERATURE REVIEW
Eltahir, Mirghani, and Anour FA Dafa-Alla [2] have proposedto extract the information from web
server logs using prediction model.The major problem which faces any website admin or web
application system is data increase per-second that is stored in different formats and types in
server log files about users, future needs and maintains structure and apprised of website or web
services according to their preceding data. Prediction model aims at discovering useful
information or learning from usage data registered in log files, based on primary kinds of data
used in the mining process. By using one of the web mining techniques, this paper cause a
prediction model techniques to procure knowledge from web server log files where all user
piloting history is registered. Gupta, Ashika, Rakhi Arora, Ranjana Sikarwar, and Neha Saxena
[3] have projected a technique for prediction model using improved Frequent Pattern Tree
algorithms. Prediction model itself can be categorized further dependsupon usage data considered
are application server, web server and application level data. This Research work target on web
use mining and especially keeps tabs on running crosswise the web utilization examples of sites
from the server log records. The binding of memory and time usage is compared by means of
Apriori algorithm and refined Frequent Pattern Tree algorithm. Sharma, Murli Manohar, and
Anju Bala [4] discussed an algorithm for frequent access pattern identification in prediction
model. In web mining the analysis of web logs is done to identify the user search patterns. In
general approaches of find the patterns, pattern tree is created and the analysis is done, but in
proposed algorithm there is no need of tree creation and the analysis is done based on the website
architecture, which will increase the ability of the other pattern matching algorithms and needs
only one database scan. Bhargav, Anshul, and MunishBhargav [5] have worked on pattern
discovery and users classification through prediction model. The proposed structure is based on
three steps. In the first step, preprocessing is done to remove useless data from web log file so as
to depreciate its size. In the second step, this clean up the log file is used for discovering usage
patterns. For ever, the discovered patterns conduct to the classification of users: on the basis of
countries; on the basis of direct portal to the site or associated by the new site; on the basis of
time of connection , i.e., either different seasons or different months or peculiar days. This
information can then be used by the website administrators for efficient legislation and personal
of their websites and thus the specific needs of express communities of users can be fulfilled and
so the profit can be increased.
3. SIMULATION MODEL
Prediction is making claims about the something that will happen, often based on information
from past and from current state. Everyone has solved their issue of prediction every day with
several degrees of success. For example harvest, weather, energy consumption, movements of
fore x currency pairs or of shares of stocks, earthquakes, and lot of stuff needs to be predicted. In
technical domain predictable of system can be often expressed and evaluated using equations -
prediction is simply evaluation or solution of equations. However, practically face the problems
where such a description would be too complicated or not possible fully. In addition, the solution
by method could be complicated computationally, and sometimes get the solution after event to
be predicted happened. There is possibility to use several approximations, for example regression
of dependency of predicted variable on events which is extrapolated to future. Find such
approximation can be also difficult. This approach is generally means create the model of
predicted event. Neural networks can be used for prediction with several levels of success. The
advantage of automatic learning of dependencies only from measured the data without any need
to add further information. The neural network is trained from the historical data with the hope
that it will be discover hidden dependencies and that it will be able to use them for predicting into
future. In other words, neural network is not represent by an explicitly given model. It is more a
black box that is able to learn something. It is possible to be predict various types of data,
however in the rest of this text we will focus on predicting of time series. Time series show the
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
4
development of a value in time. Of course, the value can be impact by also other factors than just
for time. Time series are be represents discrete history of a value and from a continuous function
it can be obtained using sampling.
The Bayesian Classification is represented supervised learning method too a statistical method for
classification. Assumean underlying probabilistic model which allowscapturing uncertainty about
the model in a principle way by determining probabilities of the outcomes. It can solve diagnostic
and predictive problems.
Figure 3.1: Naïve Bayes classification model for slow learner prediction
In this Classification is named after Thomas Bayes (1702-1761), who projected Bayes Theorem.
Bayesian classification offers prior knowledge and practical learning algorithms and observed
data can be combined. explicit probabilities to hypothesis and it is robust to noise in input data.
The slow-learner prediction model is used for purpose of slow learner prediction model using
adaptive classification model. Dependsupon the precise nature of probability model, naive Bayes
classifiers can be trained efficiently in the supervised learning setting. Naive Bayes classifiers
work much better in several complex situations than one might expect. Here independent or
dependent variables are considered for the purpose of the prediction or existence of the crisis. In
spite of their naive design oversimplified assumptions, naive Bayes classifiers often work much
better in more complex real world situations and it is also solve the floating point values
problems . Recently, careful analysis of the Bayesian classification problem has shown the some
theoretical reasons of the apparently unreasonable efficacy of naive Bayes classifiers. An
advantage of naive Bayes classifier is that it required a small amount of training data to estimate
the parameters that are necessary for classification.
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
5
Navie Bayes Classifier Algorithm is generic is described as following:
1. Each data sample is represented by an n dimensional element vector, X = (x1, x2….. xn),
depicting n measurements made on the sample from n attributes, respectively A1, A2, An.
2. Suppose that there is m classes, C1, C2……Cm. Given an unknown data sample, X (i.e.,
having no class label), the classifier desire predict that X belongs to the class having the
highest posterior probability, conditioned on X. That is, the naive probability appoint an
unknown sample X to the class Ci.
3. if and only if:
P(Ci/X)>P(Cj/X) for all 1< = j< = m and j!= i
So we maximize P(Ci|X). The class Ci for which P(Ci|X) is maximized is called the
maximum posteriori hypothesis. Beyond Bayes theorem,
P(Ci/X)= (P(X/Ci)P(Ci))/P(X)
As P(X) is constant for all classes, only P(X|Ci)P(Ci) need be maximized. If the class anterior
probabilities are not known, then it is commonly assumed that the classes are same likely, i.e.
P(C1) = P(C2) = …..= P(Cm), and we would therefore maximize P(X|Ci). Otherwise, we
maximize P(X|Ci)P(Ci). Note that the class anterior probabilities may be estimated by P(Ci)
= si/s , where Si is the number of training pattern of class Ci, and s is the total number of
training samples.
Algorithm 1: Naive Bayes Classifier for Slow Learner Prediction
• Computation diagnosis=“yes”, diagnosis=“no” probabilities Pyes, Pno from training
input.
• For Each Test Input Record
• For Each Attribute
• Count Category of Attribute Based On Categorical Division
• Calculate Probabilities Of Diagnosis=“Yes”, Diagnosis=“No” Corresponds To This
Category P(Attr,Yes), P(Attr,No) From Training Input.
• For Each Attribute
• CountResultyes= Resultyes* P(Attr,Yes),Resultno= Resultno*P(Attr,No);
• Calculate Resultyes= Resultyes *Pyes
• Resultno= Resultno*Pno;
• If(Resultyes>Resultno) So Diagnosis=“Yes”;
• Else Then Diagnosis =“No”;
The Formulae used under the Naïve Bayes classifier algorithm:
• Pyes=total number of yes/total no. of records.
• Pno=total number of no/total no.of records.
• P(attr,yes)=total number of yes in corresponding category/entire number of yes.
• P(attr,no)=total number of yes in corresponding category/entire number of yes.
Algorithm 2: Customized Naïve bayes classification model
1. Load the student review dataset
2. Select the parameter set according to the input requirement
3. Select the naïve bayes for the classification model
4. Run the classification model
5. Initiate the iteration parameters
6. For each input record
a. For each attribute
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
6
i. The entities are divided in the separate categories according the categorical data.
ii. The probability is calculated from the training input
7. For each attributes
a. Calculate the probability and classify the data according the found irrelevance
parametric setup.
b. Return the diagnosis parameters
8. Return the sentiment classification data
4. RESULT ANALYSIS
4.1 Precision:
Precision can be defined as the ratio of related retrieved documents and the information needed
by the users. High precision defines this the algorithm returns results that are relevant as
compared to irrelevant results. It also defines a predictive value that is positive and this is defined
in terms of the binary classification. This classification defines the documents that are retrieved. It
is defined in terms of the results that the system returns at some close-off rank. Precision is also
known as sensitivity.
Precision= A/ (A+D)
Where, A depicts True Positive, B gives the True Negative, C depicts the False Negative and D is
the False Positive.
4.2 Recall
Recall is the probability that a test will indicate ‘test’ amid those with the matching sample.
Recall= A/ (A+C) * 100
4.3 True Positive Rate (TPR)
True positive rate is describe as division of system whichdoes not matches patterns of input
correctly to template that is non matching. It is defined percentage of inputs that are valid. True
positive rate is dependent upon threshold. It is also defined as the measure that an attempt by the
user that is unauthorized will be accepted by the classification calssic.
4.4 False Positive Rate (FPR)
False positive rate is describe as the probability of a system to detect the matching between the
pattern that is given as input and the matching template. It is the fraction of number of false
appearances to the number of attempts that are identified. It defines a measure that an attempt by
the user that is unauthorized is rejected by the classification model.
Table 4.1: The classification instances based analysis
CLASS NUMBER OF INSTANCES PERCENTAGE
Correctly Classified
Instances
10279 92.98%
Incorrectly Classified
Instances
776 7.02%
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
7
The correctly classified and incorrectly classified instanced along with the percentage has been
studied in the table 4.1. The table shows the 10279 samples as the correctly classified instances,
which makes the 92.98% percent of the total instance population, whereas the 776 samples have
been incorrectly classified using the proposed model and it makes the 7.02% of the total
instances.
Figure 4.1: Percentage of classification instances
The figure 4.1 shows the graphical presentation of the table 4.1 in the form of the bar graph. The
left side bar graph shows the higher level of percentage, whereas the incorrect bar in the right side
is showing very low level which shows the marginal value of the incorrectly classified samples
using the naïve bayes classifier over the direct score based evaluation.
Figure 4.2: Number of classification instances
The figure 4.1 shows the graphical presentation of the table 4.1 to depict the instance
classification in the form of number of instances. The left side bar graph shows the higher number
of correctly classified instances, whereas the right side bar shows the incorrect number of
instances using the naïve bayes classifier over the direct score based evaluation.
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
8
Table 4.2: The results of the statistical cross-validation tests
PARAMETER VALUE
Kappa Statistics 0.86%
Mean Absolute Error 0.089%
Root Mean Squared Error 0.23%
Relative Absolute Error 18.12%
Root relative squared error 46.39%
Total Number of Instances 11055
The table 4.2 shows the study of various performance errors, which are calculated using the
statistical measures, which are studied in the form of the statistical errortype 1 and type 2. The
statistical errorshave been utilized to read the various performance errors.
Figure 4.3: Statistics Error Analysis of the classification model
The table 4.3 shows the graphical presentation of the study of various performance errors, which
are calculated using the statistical measures in the above table 4.2. The density of the errors has
been measured in the performance error wheel. The highest error has been recorded for the root
relative squared error, which shows the difference between the multi-methodbased evaluation of
the proposed model results.
Table 4.3: The parametric results obtained from the simulation
PARAMETER CLASS WEIGHTED
AVERAGE-1 1
True Positive Rate 0.904 0.95 0.93
False Positive Rate 0.05 0.096 0.076
Precision 0.936 0.926 0.93
Recall 0.904 0.95 0.93
F-Measure 0.919 0.938 0.93
ROC Area 0.981 0.981 0.981
The table 4.3 shows the study of various performance parameters, which are calculated using the
statistical measures, which are studied in the form of the statistical error type 1 and type 2. The
statistical measures has been utilized to read the various performance parameters.
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
9
Table 4.4: The overall result confusion matrix
CLASS
CLASSIFIED AS
A B
4427 471 A = -1
305 5852 B = 1
The table 4.4 shows the measurement of the number of instances according to the statistical type
1 and type 2 errors, which are calculated using the statistical measures, which are studied in the
form of the statistical error type 1 and type 2. The statistical measures have been utilized to read
the various performance parameters. The proposed model results have been obtained in the form
of various performance parameters.
Figure 4.4: Naïve based classification based upon the student group 1
The results of the first method of the proposed model have been shown in the figure 4.4. The
naïve bayes classification has been performed over the input data using the subject group one.
The subject group one includes the subjects of mathematics and science, which are considered as
the higher order classification of the slow learner students out of the given databases. The most
normalized classification spread has been shown in the figure 4.4 and 4.5. The figure 4.5 shows
the classification results over the subject group 2, which includes the social studies and the
English language. The proposed model has performed almost similar in the case of both of the
subject groups.
Table 4.5: The pre-classification categorization results
Value
Count of
Values Percentage
Normal 1155 88.85
Slow 145 11.15
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
10
The table 4.5 contains the results obtained from one entity (or one school), which contains the
total records of the 1300 students from the 8th
, 9th
and 10th
grades. The earlier stage manual
classification shows the results shown in the table 4.5, where the 88.85% students are considered
as the normal students and the others are estimated as the slow learners.
Figure 4.5: Naïve based classification based upon the student group 2
Table 4.6: The post-classification categorization results after the multiple variance based result evaluation
Category normal Slow
First Stage Classification 88.85 11.15
Subject Class 1 40.8 10.54
Subject Class 2 47.2 13.14
Averaging Factors 44.82 6.3
Floating Factors 11.42 3.71
The 4.6 shows the results obtained from all of the classification stages for the prediction of the
slow learner students out of the given data.
5. CONCLUSION
The proposed model has been programmed to return the results in the form of accuracy and class
density along with the classification obtained from the input dataset. The proposed model has
been designed to detect and classify the input dataset to the given classifier by using the results
obtained from the online student data portal. The experimental results have been obtained from
the simulation model in the form of the enlisted performance parameters. The proposed model
output has been designed in the way to perform all of the operations in the sequential order as per
the system design. The simulation model detects the abnormalities in the given API data. The
International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016
11
proposed model has been designed to detect and track the slow learners in the given database
which is observed on the basis of the input dataset. The proposed model results show the
effectiveness in the automatic classification of the student data. The proposed model has
performed better for the classification of the student data.
REFERENCES
[1] Aggarwal, C. C., & Zhai, C. (2012). A survey of text classification algorithms. In Mining text
data (pp. 163-222). Springer US.
[2] Eltahir, M. A., & Dafa-Alla, A. F. (2013, August). Extracting knowledge from web server logs using
web usage mining. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International
Conference on (pp. 413-417). IEEE.
[3] Gupta, A., Arora, R., Sikarwar, R., & Saxena, N. (2014, February). Web usage mining using improved
Frequent Pattern Tree algorithms. In Issues and Challenges in Intelligent Computing Techniques (ICICT),
2014 International Conference on (pp. 573-578). IEEE.
[4] Sharma, M. M., & Bala, A. (2014, September). An approach for frequent access pattern identification
in web usage mining. In Advances in Computing, Communications and Informatics (ICACCI, 2014
International Conference on (pp. 730-735). IEEE.
[5] Bhargav, A., & Bhargav, M. (2014, July). Pattern discovery and users classification through web usage
mining. In Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014
International Conference on (pp. 632-636). IEEE.
[6] Ting, S. L., Ip, W. H., & Tsang, A. H. (2011). Is Naive Bayes a good classifier for document
classification?. International Journal of Software Engineering and Its Applications, 5(3), 37-46
[7] Siddiqui, A. T., & Aljahdali, S. (2013). Web mining techniques in e-commerce applications. arXiv
preprint arXiv:1311.7388.
[8] Baker, R. S. (2014). Educational Data Mining: An Advance for Intelligent Systems in Education. IEEE
Intelligent Systems, 29(3), 78-82.
[9] Aggarwal, C. C., & Zhai, C. (2012). A survey of text classification algorithms. In Mining text data (pp.
163-222). Springer US.
AUTHOR
Swati is completed the B.Tech in 2014. She is pursuing the Master of Engineering
in the Chandigarh university Gharuan, Kharar from the 2014 to till date. Her
area of interest in the Education data mining is sub area of Data mining.

More Related Content

What's hot

IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMS
IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMSIDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMS
IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMSIJwest
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningIJERA Editor
 
UProRevs-User Profile Relevant Results
UProRevs-User Profile Relevant ResultsUProRevs-User Profile Relevant Results
UProRevs-User Profile Relevant ResultsRoyston Olivera
 
Comparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining CategoriesComparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining Categoriestheijes
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...IJSRD
 
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLES
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLESCOLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLES
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLESijcsit
 
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search EngineMulti Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search EngineIDES Editor
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
 
TEXT ANALYZER
TEXT ANALYZER TEXT ANALYZER
TEXT ANALYZER ijcseit
 
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity StructureA Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structureiosrjce
 
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...SURAJ NAYAK
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cijcsa
 

What's hot (17)

IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMS
IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMSIDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMS
IDENTIFYING IMPORTANT FEATURES OF USERS TO IMPROVE PAGE RANKING ALGORITHMS
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
UProRevs-User Profile Relevant Results
UProRevs-User Profile Relevant ResultsUProRevs-User Profile Relevant Results
UProRevs-User Profile Relevant Results
 
Comparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining CategoriesComparable Analysis of Web Mining Categories
Comparable Analysis of Web Mining Categories
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
 
50120140506005 2
50120140506005 250120140506005 2
50120140506005 2
 
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLES
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLESCOLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLES
COLLABORATIVE BIBLIOGRAPHIC SYSTEM FOR REVIEW/SURVEY ARTICLES
 
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search EngineMulti Similarity Measure based Result Merging Strategies in Meta Search Engine
Multi Similarity Measure based Result Merging Strategies in Meta Search Engine
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
Webmining Overview
Webmining OverviewWebmining Overview
Webmining Overview
 
TEXT ANALYZER
TEXT ANALYZER TEXT ANALYZER
TEXT ANALYZER
 
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity StructureA Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structure
 
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...
SEMINAR_REPORT -Model-View-Controller design architecture to develop web base...
 
Kp3518241828
Kp3518241828Kp3518241828
Kp3518241828
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studio
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
 

Viewers also liked

DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWARE
DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWAREDISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWARE
DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWAREijcsit
 
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...ijcsit
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
 
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...ijitcs
 
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...ijcsit
 
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...ijitcs
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMScseij
 
VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM cseij
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...ijcsit
 
SEGMENTING TWITTER HASHTAGS
SEGMENTING TWITTER HASHTAGSSEGMENTING TWITTER HASHTAGS
SEGMENTING TWITTER HASHTAGSijnlc
 
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...ijnlc
 
INTELLIGENT CALENDAR SCHEDULER ON EMAILS
INTELLIGENT CALENDAR SCHEDULER ON EMAILSINTELLIGENT CALENDAR SCHEDULER ON EMAILS
INTELLIGENT CALENDAR SCHEDULER ON EMAILSijnlc
 
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...ijcseit
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
 
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHSTEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHSijcsit
 
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEWRAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEWijcsit
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...ijait
 
Ijp2 p
Ijp2 pIjp2 p
Ijp2 pijp2p
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Managementijitcs
 

Viewers also liked (20)

DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWARE
DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWAREDISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWARE
DISCOVERABILITY A NEW LEARNABILITY PRINCIPLE FOR CHILDREN’S APPLICATION SOFTWARE
 
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...
STATISTICAL APPROACH TO DETERMINE MOST EFFICIENT VALUE FOR TIME QUANTUM IN RO...
 
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION
 
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...
RESEARCH REVIEW FOR POSSIBLE RELATION BETWEEN MOBILE PHONE REDIATION AND BRAI...
 
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...
A REPLICATED ASSESSMENT OF THE CRITICAL SUCCESS FACTORS FOR THE ADOPTION OF M...
 
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMSVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
VIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
 
VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
 
SEGMENTING TWITTER HASHTAGS
SEGMENTING TWITTER HASHTAGSSEGMENTING TWITTER HASHTAGS
SEGMENTING TWITTER HASHTAGS
 
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...
WRITER RECOGNITION FOR SOUTH INDIAN LANGUAGES USING STATISTICAL FEATURE EXTRA...
 
INTELLIGENT CALENDAR SCHEDULER ON EMAILS
INTELLIGENT CALENDAR SCHEDULER ON EMAILSINTELLIGENT CALENDAR SCHEDULER ON EMAILS
INTELLIGENT CALENDAR SCHEDULER ON EMAILS
 
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...
TRAFFIC CONTROL MANAGEMENT AND ROAD SAFETY USING VEHICLE TO VEHICLE DATA TRAN...
 
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...
 
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHSTEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
 
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEWRAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
RAMEWORKS FOR CLOUD COMPUTING: A CRITICAL REVIEW
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
 
Ijp2 p
Ijp2 pIjp2 p
Ijp2 p
 
Information Systems Management
Information Systems ManagementInformation Systems Management
Information Systems Management
 

Similar to MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER MULTICLASS STUDENT DATASET

Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...IJAEMSJORNAL
 
A Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionA Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionEditor IJMTER
 
WEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSWEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSacijjournal
 
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...IRJET Journal
 
IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs
IRJET- Enhancing Prediction of User Behavior on the Basic of Web LogsIRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs
IRJET- Enhancing Prediction of User Behavior on the Basic of Web LogsIRJET Journal
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesijctet
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...IOSR Journals
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...James Heller
 
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...ijdkp
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining Editor IJMTER
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A SurveyIJMER
 
WebSite Visit Forecasting Using Data Mining Techniques
WebSite Visit Forecasting Using Data Mining  TechniquesWebSite Visit Forecasting Using Data Mining  Techniques
WebSite Visit Forecasting Using Data Mining TechniquesChandana Napagoda
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningIJERA Editor
 
Semantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movementsSemantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movementsIJwest
 

Similar to MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER MULTICLASS STUDENT DATASET (20)

Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
 
A Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionA Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior Prediction
 
WEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSWEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESS
 
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
 
IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs
IRJET- Enhancing Prediction of User Behavior on the Basic of Web LogsIRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs
IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 
Ab03401550159
Ab03401550159Ab03401550159
Ab03401550159
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...
AN INTELLIGENT OPTIMAL GENETIC MODEL TO INVESTIGATE THE USER USAGE BEHAVIOUR ...
 
H0314450
H0314450H0314450
H0314450
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
Webmining ppt
Webmining pptWebmining ppt
Webmining ppt
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A Survey
 
WebSite Visit Forecasting Using Data Mining Techniques
WebSite Visit Forecasting Using Data Mining  TechniquesWebSite Visit Forecasting Using Data Mining  Techniques
WebSite Visit Forecasting Using Data Mining Techniques
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
 
Semantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movementsSemantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movements
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER MULTICLASS STUDENT DATASET

  • 1. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 DOI:10.5121/ijcsa.2016.6401 1 MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER MULTICLASS STUDENT DATASET Swati1 , Rajinder Kaur2 1 M.E student of Chandigarh University , Gharuan 2 Assist. Professor of Chandigarh University, Gharuan ABSTRACT The high school students must be observed for their slow learning or quick learning abilities to provide them with the best education practices. Such analysis can be perfectly performed over the student performance data. The high school student data has been obtained from the schools from the various regions in Punjab, a pivotal state of India. The complete student data and the selective data of almost 1300 students obtained from one school in the regions has been undergone the test using the proposed model in this paper. The proposed model is based upon the naïve bayes classification model for the data classification using the multi-factor features obtained from the input dataset. The subject groups have been divided into the two primary groups: difficult and normal. The classification algorithm has been applied individually over data grouped in the various subject groups. Both of the early stage classification events have produced the almost similar results, whereas the results obtained from the classification events over the averaging factors and the floating factors told the different story than the early stage classification. The proposed model results have shown that the deep analysis of the data tells the in-depth facts from the input data. The proposed model can be considered as the effective classification model when evaluated from the results described in the earlier sections. KEYWORDS Slow learner prediction, data classification, averaging factor classification, floating factor classification. 1. INTRODUCTION Self-organizing Sensor networks dynamically changes the network topology and distributed either randomly or uniformly. A huge amount of tiny sensor nodes (SNs) monitor temperature, humidity, motions and sound. In multi-hop transmission of WSN each sensor nodes play dual characteristic of perceiving the environment and forwards the collected data to the base station (BS) via integrated radio transmitters. The key challenge is to prolong the lifetime of WSN since it is not possible to recharge the batteries of SNs in unattended environment. Considering every node in the network for a time periodic data collection generates more traffic. So the period for data collection is to be enough for collecting data from nodes. To avoid traffic congestion and packet drop over transmission only random nodes to be selected for data collection in every miniature period. Therefore, energy efficient mechanisms are required for computation operations like data storage, path construction and decision making of source nodes and to secure the communication from sources to sink. In the Internet, web is a vast, dynamic, diverse and amorphous data repository that stores information/data in incredible amount and also enhances the complexity to deal with the information from different opinion of users, view, and business analyst and web service providers. The Internet service providers desire to search the technique to guess the user's behaviors and customize information to shrink the traffic load and create the Web site suited for
  • 2. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 2 different set of users. The business analysts need to have tools to learn consumer's needs. All of them are expecting equipment or techniques to help them satisfy their requirements and solve the problems encountered on Web. Thus, Web mining has become trendy active area and is taken as the research topic for this analysis. In the prediction model, we find out what users are looking for on internet or Few user so be might be survey at only documented data. It is the submission of form and facts of mining techniques to find out interesting usage pattern from World Wide Web facts and figures in the alignment to realize and better serve the desires of Web based applications. Usage figures and facts hold the personal or source of World Wide Web users along with browsing at World Wide Web site. Web usage excavation itself could be categorized farther counting on the kind of usage facts and figures considered: • Web Server Data: The client logs are anthologized by the Web server. 1.1 Application Server Data Financial submission servers have significant characteristics to endue ecommerce submissions to be built on peak of them with tiny effort. A key feature is thedexterity to pathway diverse kind of enterprise events and logs them in application server logs. 1.2 Application Level Data New type of events can be characterized in an application, and logging can be two times on for them, therefore generating histories of these particularly characterized events. It should be noted however, that numerous end submissions need a combination of one or more then one of the methods directed in the classes above. In the current scenario of the World Wide Web, the popularity is increasing day by day, so as the web mining. In the web, increasing the number of websites and web users, the data of web usage is stored on web servers. By analysis of web server data, we have several information such as user surfing behavior that is most crucial aspect of business marketing which helpsto user profile, web site designs meliorate and make better marketing and business decision making website user friendly and popular. With looking at minimum data we cannot identify patterns, for purpose of analyst need significantly huge amount of data. All the data collected by the service providers is stored in the high capacity servers. As the user becomes high in the numbers this data also grows and the data logs are not easy to maintain. To analyze such kind of large data we need to extract the useful data and this data is then mined to get the patterns of the user behavior. For this purpose an efficient algorithm is needed, which can do the purpose and help extracting the information. There are so many algorithms which are liable to resolve the purpose but they all take the time in scanning and pattern matching. In this synopsis, an algorithm is designed which employs the website architecture and gives the information about the users’ usage behavior. The users access a website by going from one page to another page, by the hyperlinks provided in the web pages. Mining the information identified by the analysis, will not only help making the user interface better but also in various business decision making. The user traverses web-site in different-different ways. The variations between traversal patterns increase the complexity of obtained information from path traversed. There are several available algorithms for citing the user traversal patterns. In this paper a new approach has been proposed for mining the large reference patterns. The traversal patterns have achieved by first mining the maximal forward references take away the web server log and after this maximal forward reference are obtained and large references can be calculated that are most frequently used paths followed by user for website.
  • 3. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 3 2. LITERATURE REVIEW Eltahir, Mirghani, and Anour FA Dafa-Alla [2] have proposedto extract the information from web server logs using prediction model.The major problem which faces any website admin or web application system is data increase per-second that is stored in different formats and types in server log files about users, future needs and maintains structure and apprised of website or web services according to their preceding data. Prediction model aims at discovering useful information or learning from usage data registered in log files, based on primary kinds of data used in the mining process. By using one of the web mining techniques, this paper cause a prediction model techniques to procure knowledge from web server log files where all user piloting history is registered. Gupta, Ashika, Rakhi Arora, Ranjana Sikarwar, and Neha Saxena [3] have projected a technique for prediction model using improved Frequent Pattern Tree algorithms. Prediction model itself can be categorized further dependsupon usage data considered are application server, web server and application level data. This Research work target on web use mining and especially keeps tabs on running crosswise the web utilization examples of sites from the server log records. The binding of memory and time usage is compared by means of Apriori algorithm and refined Frequent Pattern Tree algorithm. Sharma, Murli Manohar, and Anju Bala [4] discussed an algorithm for frequent access pattern identification in prediction model. In web mining the analysis of web logs is done to identify the user search patterns. In general approaches of find the patterns, pattern tree is created and the analysis is done, but in proposed algorithm there is no need of tree creation and the analysis is done based on the website architecture, which will increase the ability of the other pattern matching algorithms and needs only one database scan. Bhargav, Anshul, and MunishBhargav [5] have worked on pattern discovery and users classification through prediction model. The proposed structure is based on three steps. In the first step, preprocessing is done to remove useless data from web log file so as to depreciate its size. In the second step, this clean up the log file is used for discovering usage patterns. For ever, the discovered patterns conduct to the classification of users: on the basis of countries; on the basis of direct portal to the site or associated by the new site; on the basis of time of connection , i.e., either different seasons or different months or peculiar days. This information can then be used by the website administrators for efficient legislation and personal of their websites and thus the specific needs of express communities of users can be fulfilled and so the profit can be increased. 3. SIMULATION MODEL Prediction is making claims about the something that will happen, often based on information from past and from current state. Everyone has solved their issue of prediction every day with several degrees of success. For example harvest, weather, energy consumption, movements of fore x currency pairs or of shares of stocks, earthquakes, and lot of stuff needs to be predicted. In technical domain predictable of system can be often expressed and evaluated using equations - prediction is simply evaluation or solution of equations. However, practically face the problems where such a description would be too complicated or not possible fully. In addition, the solution by method could be complicated computationally, and sometimes get the solution after event to be predicted happened. There is possibility to use several approximations, for example regression of dependency of predicted variable on events which is extrapolated to future. Find such approximation can be also difficult. This approach is generally means create the model of predicted event. Neural networks can be used for prediction with several levels of success. The advantage of automatic learning of dependencies only from measured the data without any need to add further information. The neural network is trained from the historical data with the hope that it will be discover hidden dependencies and that it will be able to use them for predicting into future. In other words, neural network is not represent by an explicitly given model. It is more a black box that is able to learn something. It is possible to be predict various types of data, however in the rest of this text we will focus on predicting of time series. Time series show the
  • 4. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 4 development of a value in time. Of course, the value can be impact by also other factors than just for time. Time series are be represents discrete history of a value and from a continuous function it can be obtained using sampling. The Bayesian Classification is represented supervised learning method too a statistical method for classification. Assumean underlying probabilistic model which allowscapturing uncertainty about the model in a principle way by determining probabilities of the outcomes. It can solve diagnostic and predictive problems. Figure 3.1: Naïve Bayes classification model for slow learner prediction In this Classification is named after Thomas Bayes (1702-1761), who projected Bayes Theorem. Bayesian classification offers prior knowledge and practical learning algorithms and observed data can be combined. explicit probabilities to hypothesis and it is robust to noise in input data. The slow-learner prediction model is used for purpose of slow learner prediction model using adaptive classification model. Dependsupon the precise nature of probability model, naive Bayes classifiers can be trained efficiently in the supervised learning setting. Naive Bayes classifiers work much better in several complex situations than one might expect. Here independent or dependent variables are considered for the purpose of the prediction or existence of the crisis. In spite of their naive design oversimplified assumptions, naive Bayes classifiers often work much better in more complex real world situations and it is also solve the floating point values problems . Recently, careful analysis of the Bayesian classification problem has shown the some theoretical reasons of the apparently unreasonable efficacy of naive Bayes classifiers. An advantage of naive Bayes classifier is that it required a small amount of training data to estimate the parameters that are necessary for classification.
  • 5. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 5 Navie Bayes Classifier Algorithm is generic is described as following: 1. Each data sample is represented by an n dimensional element vector, X = (x1, x2….. xn), depicting n measurements made on the sample from n attributes, respectively A1, A2, An. 2. Suppose that there is m classes, C1, C2……Cm. Given an unknown data sample, X (i.e., having no class label), the classifier desire predict that X belongs to the class having the highest posterior probability, conditioned on X. That is, the naive probability appoint an unknown sample X to the class Ci. 3. if and only if: P(Ci/X)>P(Cj/X) for all 1< = j< = m and j!= i So we maximize P(Ci|X). The class Ci for which P(Ci|X) is maximized is called the maximum posteriori hypothesis. Beyond Bayes theorem, P(Ci/X)= (P(X/Ci)P(Ci))/P(X) As P(X) is constant for all classes, only P(X|Ci)P(Ci) need be maximized. If the class anterior probabilities are not known, then it is commonly assumed that the classes are same likely, i.e. P(C1) = P(C2) = …..= P(Cm), and we would therefore maximize P(X|Ci). Otherwise, we maximize P(X|Ci)P(Ci). Note that the class anterior probabilities may be estimated by P(Ci) = si/s , where Si is the number of training pattern of class Ci, and s is the total number of training samples. Algorithm 1: Naive Bayes Classifier for Slow Learner Prediction • Computation diagnosis=“yes”, diagnosis=“no” probabilities Pyes, Pno from training input. • For Each Test Input Record • For Each Attribute • Count Category of Attribute Based On Categorical Division • Calculate Probabilities Of Diagnosis=“Yes”, Diagnosis=“No” Corresponds To This Category P(Attr,Yes), P(Attr,No) From Training Input. • For Each Attribute • CountResultyes= Resultyes* P(Attr,Yes),Resultno= Resultno*P(Attr,No); • Calculate Resultyes= Resultyes *Pyes • Resultno= Resultno*Pno; • If(Resultyes>Resultno) So Diagnosis=“Yes”; • Else Then Diagnosis =“No”; The Formulae used under the Naïve Bayes classifier algorithm: • Pyes=total number of yes/total no. of records. • Pno=total number of no/total no.of records. • P(attr,yes)=total number of yes in corresponding category/entire number of yes. • P(attr,no)=total number of yes in corresponding category/entire number of yes. Algorithm 2: Customized Naïve bayes classification model 1. Load the student review dataset 2. Select the parameter set according to the input requirement 3. Select the naïve bayes for the classification model 4. Run the classification model 5. Initiate the iteration parameters 6. For each input record a. For each attribute
  • 6. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 6 i. The entities are divided in the separate categories according the categorical data. ii. The probability is calculated from the training input 7. For each attributes a. Calculate the probability and classify the data according the found irrelevance parametric setup. b. Return the diagnosis parameters 8. Return the sentiment classification data 4. RESULT ANALYSIS 4.1 Precision: Precision can be defined as the ratio of related retrieved documents and the information needed by the users. High precision defines this the algorithm returns results that are relevant as compared to irrelevant results. It also defines a predictive value that is positive and this is defined in terms of the binary classification. This classification defines the documents that are retrieved. It is defined in terms of the results that the system returns at some close-off rank. Precision is also known as sensitivity. Precision= A/ (A+D) Where, A depicts True Positive, B gives the True Negative, C depicts the False Negative and D is the False Positive. 4.2 Recall Recall is the probability that a test will indicate ‘test’ amid those with the matching sample. Recall= A/ (A+C) * 100 4.3 True Positive Rate (TPR) True positive rate is describe as division of system whichdoes not matches patterns of input correctly to template that is non matching. It is defined percentage of inputs that are valid. True positive rate is dependent upon threshold. It is also defined as the measure that an attempt by the user that is unauthorized will be accepted by the classification calssic. 4.4 False Positive Rate (FPR) False positive rate is describe as the probability of a system to detect the matching between the pattern that is given as input and the matching template. It is the fraction of number of false appearances to the number of attempts that are identified. It defines a measure that an attempt by the user that is unauthorized is rejected by the classification model. Table 4.1: The classification instances based analysis CLASS NUMBER OF INSTANCES PERCENTAGE Correctly Classified Instances 10279 92.98% Incorrectly Classified Instances 776 7.02%
  • 7. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 7 The correctly classified and incorrectly classified instanced along with the percentage has been studied in the table 4.1. The table shows the 10279 samples as the correctly classified instances, which makes the 92.98% percent of the total instance population, whereas the 776 samples have been incorrectly classified using the proposed model and it makes the 7.02% of the total instances. Figure 4.1: Percentage of classification instances The figure 4.1 shows the graphical presentation of the table 4.1 in the form of the bar graph. The left side bar graph shows the higher level of percentage, whereas the incorrect bar in the right side is showing very low level which shows the marginal value of the incorrectly classified samples using the naïve bayes classifier over the direct score based evaluation. Figure 4.2: Number of classification instances The figure 4.1 shows the graphical presentation of the table 4.1 to depict the instance classification in the form of number of instances. The left side bar graph shows the higher number of correctly classified instances, whereas the right side bar shows the incorrect number of instances using the naïve bayes classifier over the direct score based evaluation.
  • 8. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 8 Table 4.2: The results of the statistical cross-validation tests PARAMETER VALUE Kappa Statistics 0.86% Mean Absolute Error 0.089% Root Mean Squared Error 0.23% Relative Absolute Error 18.12% Root relative squared error 46.39% Total Number of Instances 11055 The table 4.2 shows the study of various performance errors, which are calculated using the statistical measures, which are studied in the form of the statistical errortype 1 and type 2. The statistical errorshave been utilized to read the various performance errors. Figure 4.3: Statistics Error Analysis of the classification model The table 4.3 shows the graphical presentation of the study of various performance errors, which are calculated using the statistical measures in the above table 4.2. The density of the errors has been measured in the performance error wheel. The highest error has been recorded for the root relative squared error, which shows the difference between the multi-methodbased evaluation of the proposed model results. Table 4.3: The parametric results obtained from the simulation PARAMETER CLASS WEIGHTED AVERAGE-1 1 True Positive Rate 0.904 0.95 0.93 False Positive Rate 0.05 0.096 0.076 Precision 0.936 0.926 0.93 Recall 0.904 0.95 0.93 F-Measure 0.919 0.938 0.93 ROC Area 0.981 0.981 0.981 The table 4.3 shows the study of various performance parameters, which are calculated using the statistical measures, which are studied in the form of the statistical error type 1 and type 2. The statistical measures has been utilized to read the various performance parameters.
  • 9. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 9 Table 4.4: The overall result confusion matrix CLASS CLASSIFIED AS A B 4427 471 A = -1 305 5852 B = 1 The table 4.4 shows the measurement of the number of instances according to the statistical type 1 and type 2 errors, which are calculated using the statistical measures, which are studied in the form of the statistical error type 1 and type 2. The statistical measures have been utilized to read the various performance parameters. The proposed model results have been obtained in the form of various performance parameters. Figure 4.4: Naïve based classification based upon the student group 1 The results of the first method of the proposed model have been shown in the figure 4.4. The naïve bayes classification has been performed over the input data using the subject group one. The subject group one includes the subjects of mathematics and science, which are considered as the higher order classification of the slow learner students out of the given databases. The most normalized classification spread has been shown in the figure 4.4 and 4.5. The figure 4.5 shows the classification results over the subject group 2, which includes the social studies and the English language. The proposed model has performed almost similar in the case of both of the subject groups. Table 4.5: The pre-classification categorization results Value Count of Values Percentage Normal 1155 88.85 Slow 145 11.15
  • 10. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 10 The table 4.5 contains the results obtained from one entity (or one school), which contains the total records of the 1300 students from the 8th , 9th and 10th grades. The earlier stage manual classification shows the results shown in the table 4.5, where the 88.85% students are considered as the normal students and the others are estimated as the slow learners. Figure 4.5: Naïve based classification based upon the student group 2 Table 4.6: The post-classification categorization results after the multiple variance based result evaluation Category normal Slow First Stage Classification 88.85 11.15 Subject Class 1 40.8 10.54 Subject Class 2 47.2 13.14 Averaging Factors 44.82 6.3 Floating Factors 11.42 3.71 The 4.6 shows the results obtained from all of the classification stages for the prediction of the slow learner students out of the given data. 5. CONCLUSION The proposed model has been programmed to return the results in the form of accuracy and class density along with the classification obtained from the input dataset. The proposed model has been designed to detect and classify the input dataset to the given classifier by using the results obtained from the online student data portal. The experimental results have been obtained from the simulation model in the form of the enlisted performance parameters. The proposed model output has been designed in the way to perform all of the operations in the sequential order as per the system design. The simulation model detects the abnormalities in the given API data. The
  • 11. International Journal on Computational Science & Applications (IJCSA) Vol.6, No. 4, August 2016 11 proposed model has been designed to detect and track the slow learners in the given database which is observed on the basis of the input dataset. The proposed model results show the effectiveness in the automatic classification of the student data. The proposed model has performed better for the classification of the student data. REFERENCES [1] Aggarwal, C. C., & Zhai, C. (2012). A survey of text classification algorithms. In Mining text data (pp. 163-222). Springer US. [2] Eltahir, M. A., & Dafa-Alla, A. F. (2013, August). Extracting knowledge from web server logs using web usage mining. In Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on (pp. 413-417). IEEE. [3] Gupta, A., Arora, R., Sikarwar, R., & Saxena, N. (2014, February). Web usage mining using improved Frequent Pattern Tree algorithms. In Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on (pp. 573-578). IEEE. [4] Sharma, M. M., & Bala, A. (2014, September). An approach for frequent access pattern identification in web usage mining. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 730-735). IEEE. [5] Bhargav, A., & Bhargav, M. (2014, July). Pattern discovery and users classification through web usage mining. In Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on (pp. 632-636). IEEE. [6] Ting, S. L., Ip, W. H., & Tsang, A. H. (2011). Is Naive Bayes a good classifier for document classification?. International Journal of Software Engineering and Its Applications, 5(3), 37-46 [7] Siddiqui, A. T., & Aljahdali, S. (2013). Web mining techniques in e-commerce applications. arXiv preprint arXiv:1311.7388. [8] Baker, R. S. (2014). Educational Data Mining: An Advance for Intelligent Systems in Education. IEEE Intelligent Systems, 29(3), 78-82. [9] Aggarwal, C. C., & Zhai, C. (2012). A survey of text classification algorithms. In Mining text data (pp. 163-222). Springer US. AUTHOR Swati is completed the B.Tech in 2014. She is pursuing the Master of Engineering in the Chandigarh university Gharuan, Kharar from the 2014 to till date. Her area of interest in the Education data mining is sub area of Data mining.