SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1581
Approaching Rules Induction:
CN2 Algorithm in Categorizing of Biodiversity
Su Myo Swe1, Khin Myo Sett2
1Lecturer, 2Professor
1Department of Computer Studies, Dagon University, Yangon Region, Myanmar
2Department of Computer Studies, University of Mandalay, Mandalay Region, Myanmar
How to cite this paper: Su Myo Swe |
Khin Myo Sett "Approaching Rules
Induction: CN2 Algorithm in
Categorizing of Biodiversity" Published
in International Journal of Trend in
Scientific Research and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.1581-1584, URL:
https://www.ijtsrd.c
om/papers/ijtsrd25
153.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
Rule induction is an area of machine learning in whichformalrules areextracted
from a set of observations. Machine learningisafieldofartificialintelligencethat
uses statistical techniques to give computer systems the ability to "learn" from
data, without being explicitly programmed. Machine learning applications are
classification, regression, clustering, density estimation and dimensionality
reduction. The CN2 algorithm is a classification technique designed for the
efficient induction of simple, comprehensible rules of form “if cond then predict
class”, even in domains where noise may be present. Biodiversity means
biological diversity, the variety of life found in a place on Earthor,often,thetotal
variety of life on Earth. This research used butterflies as biological dataset for
categorizing biodiversity and passed it to CN2 Rule Induction. In this research,
“The Fauna of British India, Ceylon and Burma. Butterflies. Vol. I and Vol. II”
written by C.T Bingham are used as the required knowledge for resource and
categorizing biodiversity of butterfly families by rules induction with CN2
algorithm system has developed. In this system, MS Visual Studio as a
programming tool and MS SQL Server as for database development are used.
Keywords: Machine Learning, Rule Induction, CN2 Algorithm, Biodiversity
1. INTRODUCTION
In artificial intelligence, an expert system is a computer system that follows the
decision-making ability of a human expert. Expert systems are designed to solve
complex problems by reasoning through bodies of knowledge, represented
mainly as if–then rules rather than through conventional
procedural code. [11]
The most common form of architecture used in expert and
other types of knowledge-based systems is the production
system, also called therule-based system. In computer
science, rule-based systems are used as a way to store and
manipulate knowledge to interpret information in a useful
way. They are often used in artificial intelligence
applications and research. [5] This type of system use
knowledge encoded in the form of production rules, that is,
if…then rules. Rule have an antecedent or condition part,the
left-hand side, and a conclusion ofaction pert,the right-hand
side. [4]
1.1. The Representative Architectures of Expert
System
An expert system is divided into two subsystems: the
knowledge base and the interface engine. The knowledge
base represents facts and rules. Theinferenceengine applies
the rules to the known facts to deduce new facts. Inference
engines can also include explanation anddebuggingabilities.
[11] The architectures of Expert Systems today reflect
knowledge engineers understanding of how to represent
knowledge and how to perform intelligent decision-making
tasks with the support of knowledge base system. The
Expert System architecture is independent of specific
computer hardware. Determinants for computer hardware
selection would include the size of the knowledge database,
the desire speed of the system’s responses and the level of
sophistication for the user interface.
Figure (1.1) shows the architecture of a simple Expert
System. The architecture of the simple Expert System could
be extended. One common extension is to expand the
knowledge base into a knowledge database and a domain
database. These two databases could be managed by a
database management system (DBMS). [9]
Figure (1.1) Architecture of a simple Expert System
IJTSRD25153
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1582
1.2. Building A Knowledge Base
The procedure of building a knowledge base is called
knowledge engineering.Investigation of aparticulardomain,
determining what concepts are important inthat thedomain
and creation of a formal representation of the objects and
relations in the domain are the role of aknowledge engineer.
Often, the knowledge engineer is trained in representation
but is not an expert in the domain at hand, be it circuit
design, space station mission scheduling or whatever. The
knowledge will usually interview the real experts to become
educated about the domain and to elicit the required
knowledge, in a process called knowledge acquisition.
1.3. Architectures of a Rule-Based System
Each rule represents a small piece of knowledge relating to
the given domain of expertise. A number of related rules
collectively may correspond to a chain of inferences which
lead from some initially known facts to some useful
conclusions. The inference process is carried out in an
interactive mode with the use providing input data needed
to complete rule chaining process. Figure (1.2) shows the
architecture of Rule-based system. [5]
Figure (1.2) Architecture of Rule-Base System
A typical rule-based system consists of the following
components are:
Knowledge base: contains the rules embodying expert
knowledge about the problem domain
Database: contains the setof known facts abouttheproblem
currently being solved
Inference engine: carries out the reasoning process by
linking the rules with the known facts to find a solution
Explanation facilities: provides information touser about
the reasoning steps that are being followed
User interface: communication between the user and the
system
In this research, rule induction with CN2 was used for
classification of butterfly that is the simplest setting for
classification.
1.4. Rule Induction
The rule induction system can create rule that fit the
example cases. The rule can then be used to access other
cases the outcome is not known. The heart of a rule
induction system is an algorithm, which is used toinduce the
rules from the examples.
Induction methods use various algorithms to convert a
knowledge matrix of attributes, values, and selections to
rules. Some well-known rule learning algorithms are AQ,
CN2, FOIL, RIPPER AND OPUS. [7]
1.5. Rule Induction with CN2
The CN2 induction algorithm is a learning algorithm for
rule induction. It is designed to work even when thetraining
data isimperfect. It is based on ideas from the AQ algorithm
to produce rules and combine decisiontreelearning(such as
C 4.5, ID3) to handle noise. As a consequence it creates arule
set like that created by AQ but is able to handle noisy data
like ID3. [4]
2. Materials and Methods
In this research, family keys of butterflies are used as
materials or biological data set and rule induction with CN2
algorithm is used as rule indention method.
2.1. Identifying Keys of the Butterfly
Butterflies are the most well-known of all insects. They are
among the most beautiful creatures on Earth. They are
popular among nature lovers as well as a subject for
scientific study. Figure (2.1) shows the external features of
the butterfly that are used in the scientific categorizing.
Figure (2.1) External Features of Butterfly
Butterflies and moths are insects that make up the order
Lepidoptera, derived from the Greek words lepidos for scaly
and ptera for wings. Four wings are present. The wings are
membranous, with veins or nervures running longitudinal
form base to the wing margins. The pattern formed by these
veins (wing venation) is of primary importance in the
classification ofLepidoptera. Wings of all the butterflies’
families showed considerable variations in shapes and vein
patterns reflecting their specific nature. [8] Figure (2.2)
shows the parts of wings and venation pattern of butterflies
that are also used in the scientific categorizing.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1583
Figure (2.2) Parts of Wings and Venation Pattern of
Butterfly
2.2. Exploring the Rule Induction with CN2 Algorithm
Rule induction is a popular method that automates the
knowledge acquisition process when knowledge is
expressed in terms of rules in classification-type problems.
Rule induction examines historical cases and generates the
rules that were used to arrive at certain recommendations.
Rule induction can be used by a system engineer, an expert,
or any other system builder.
CN2 based on the ID3 (Quinlan, 1983) and AQ (Michalski,
1969) algorithms. The ID3 algorithm provides itself to such
modification by the nature of its general-to-specific search.
The AQ algorithm's dependence on specific training
examples during search makes it less easy to modify. CN2
was designed to modify the AQ algorithm itself in ways that
removed this dependence on specific examples and
increased the space of rules searched. CN2, a new induction
algorithm combines the efficiency and ability to cope with
noisy data of ID3 with the if-then rule form and flexible
search strategy of the AQ family. Figure (2.3) shows the CN2
induction algorithm. [4]
Figure (2.3) The CN2 Induction Algorithm
3. Approaching Rules Induction: CN2 Algorithm in
Butterfly Families
In this research, the proposed system contributedaccording
with the following system flow diagram.
3.1. System Flow Diagram
Figure (3.1) System Flow Diagram
3.2. Executing Family Keys for Categorizing
A dichotomous key is a tool that can be used to classify
objects. Dichotomous means “divided in two parts” or
“binaryclassification”. Therefore,this keyusesaseries of yes
or no questions to place objects into groups. [8] Butterflies
are classified in theKingdom: Animalia,Phylum: Arthropoda,
and Order: Lepidoptera. [1] [2]
Kingdom Animalia (animals)
Phylum Arthropoda (arthropods, invertebrate animals
with an exoskeleton, a segmented
body, and jointed legs)
Class Insecta (insects, rthropods with 6
legs, 2 antennae, and a3-part body)
Order Lepidoptera (butterflies and moths)
By using the rule induction with CN2 algorithm and
identification key of family of butterfly, the following rules
can be developed. Table 3.1 shows the family keys of
butterfly.
Table (3.1) Family Keys of Butterflies
1 A. Antennae approximate at base, hind tibiae with only a
terminal pair of spurs, one or more of the veins in the
fore wing forked or coincident beyond the cell
……………………………………………………………………….……2
B. Antennae wide apart at base, hind tibiae generally
with a medial as well as a terminal pair of spurs, all
the veins in the fore wing from base or from cell, none
forked or coincidentbeyond ………….……..Hesperiidae
2 a. Precostal nervure in hind wing present
…………………………………………….……….…..…………………3
b. Precostal nervure in hind wing absent
…………………………………………………....……...Lycaenidae
3 a1. Front pair of legs imperfect in one or both
sexes………………………………….………….……………………4
b1. Front pair of legs perfect in both
sexes………………………………………………………….………5
Let E be a set of classified examples.
Let SELECTORS be the set of all possible
selectors.
Procedure CN2 (E)
Let RULE-LIST be the empty list.
Repeat until BEST.CPX is nil or E is empty:
Let BEST.CPX be Find-Best.Complex(E).
If BEST.CPX is not nil,
Then let E' be the examples covered
by BEST.CPX.
Remove from E the examples E'
covered by BEST.CPX.
Let C be the most common class of
examples in E'.
Add the rule 'If BEST.CPX then the
class is C' to the end of RULE-LIST.
Return RULE-LIST.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1584
4 a2. Front pair of legs perfect in both
sexes……………………..……………………....Nymphalidae
b2. Front pair of legs imperfect in male, perfect in
female........................................................Nemeobidae
5 a2. Vein 1a in hind wing wanting, claws
simple…….…………………………………...….Papilionidae
b2. Vein 1a in hind wing present, claws
bifid………………………………….………………...…Pieridae
4. Result and Discussion
After categorizing of the butterflies by using rule induction
with CN2 algorithm, there have six rules for six families
respectively as the result. Table (4.1) shows the results of
the rules for butterfly family.
Table (4.1) Rule for Family of Butterfly
Rule No Family Name
Rule for Family
(Family Key)
1 Nymphalidae A (a) (a1 ) (a2)
2 Nemeobidae A (a) (a1 ) (b2)
3 Papilionidae A (b) (a1 ) (a2)
4 Pieridae A (b) (a1 ) (b2)
5 Lycaenidae A (b)
6 Hesperidae B
Rule induction can be used by a system engineer, an expert,
or any other system builder. The categorization of butterfly
family by using rule induction with CN2 was simple, clear
and useful for the researcher. This research is starting for
approach the co-operation of computer area and the
biological area. That is showing the usefulness of the
computer field of biological field for the categorization in
biodiversity.
5. Conclusion
This research paper has introduced the idea of inducing
rules from sets of examples in order to speed up the
development of knowledge bases in expertsystems.Therule
induction with CN2 algorithm is the best technique for
categorizing of biological dataset. The results give rules for
categorization and the implemented system is easy to use
and understand for biologist; who is willingto categorizethe
butterflies by computerization. A big advantage of the rule
induction is that it enhances the thinking process of the
expert. Butterflies are the best-known and best group of
insects for examining pattern of terrestrial biotic diversity
and distribution. For the children, schools are being
encouraged to study the life and habit of butterflies and in
this way come to appreciate the beauty of the natural
environment and become involved in efforts for its
conservation. So, this research will meet the aim of correct,
easy, fast, simple and useful than traditional manual
methods. As a future work, we will continue to do the
research for the applied algorithm in biodiversity.
References
[1] Bingham. C.T, “The Fauna of British India, Ceylon and
Burma. Butterflies. Vol. I Taylar and Francis, London”,
1905
[2] Bingham. C.T, “The Fauna of British India, Ceylon and
Burma. Butterflies. Vol. II Taylar and Francis, London”,
1907
[3] Clark Peter and Boswell Robin. “Rule Induction with
CN2: Some Recent Improvement” Machine Learning,
Fifth European Conference, 1991
[4] Clark Peter and Niblett T. “The CN2 induction
algorithm” Machine Learning Journal, 3(4); 261-283,
1989
[5] CSCU9T6 /ITNP60. “ReasoningSystems”,Universityof
Stirling, 2015
[6] Faruk Ertuğrul Ömer et al. “Identification of Butterfly
Species by Similarity Indexes Based on Prototypes”,
International Journal of Computer Vision, Machine
Learning and Data Mining, Volume 1, 2015
[7] Furnkranz Johannes and Kliegr Tomas. “A Brief
Overview of Rule Learning”
[8] Omaha’s Henry Doorly Zoo, “BUTTERFLIES. Taking
Science to the Backyard”, 2011
[9] Tan C. F. “The Application of Expert System: A Review
of Research And Applications”, ARPN Journal of
Engineering and Applied Sciences, Vol. 11, No. 4,
February 2016
[10] https://docs.orange.niolab.si/3/visual
programming/widgets/model/cn2ruleinduction.html
[11] https://en.wikipedia.org/wiki

More Related Content

What's hot

IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET Journal
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationeSAT Journals
 
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data    Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data IJECEIAES
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileeSAT Publishing House
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksIJSRED
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataIRJET Journal
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
 
Data mining techniques
Data mining techniquesData mining techniques
Data mining techniqueseSAT Journals
 
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)IJCSEA Journal
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...ijdms
 
June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligenceaciijournal
 
Analysis of Machine Learning Techniques for Breast Cancer Prediction
Analysis of Machine Learning Techniques for Breast Cancer PredictionAnalysis of Machine Learning Techniques for Breast Cancer Prediction
Analysis of Machine Learning Techniques for Breast Cancer PredictionDr. Amarjeet Singh
 
Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...IJECEIAES
 
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...home
 
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEMEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEIAEME Publication
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationeSAT Journals
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systemsijsrd.com
 

What's hot (20)

G44083642
G44083642G44083642
G44083642
 
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face RecognitionIRJET- Spot Me - A Smart Attendance System based on Face Recognition
IRJET- Spot Me - A Smart Attendance System based on Face Recognition
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
 
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data    Mining Fuzzy Time Interval Periodic Patterns  in Smart Home Data
Mining Fuzzy Time Interval Periodic Patterns in Smart Home Data
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for file
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological Data
 
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
[IJCT-V3I3P1] Authors: Sunny Sharma, Karandeep Kaur, Amritpal Singh
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
Data mining techniques
Data mining techniquesData mining techniques
Data mining techniques
 
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)
MICROARRAY GENE EXPRESSION ANALYSIS USING TYPE 2 FUZZY LOGIC(MGA-FL)
 
Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...Delineation of techniques to implement on the enhanced proposed model using d...
Delineation of techniques to implement on the enhanced proposed model using d...
 
June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligence
 
Analysis of Machine Learning Techniques for Breast Cancer Prediction
Analysis of Machine Learning Techniques for Breast Cancer PredictionAnalysis of Machine Learning Techniques for Breast Cancer Prediction
Analysis of Machine Learning Techniques for Breast Cancer Prediction
 
Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...
 
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...
A Novel Technique for Name Identification from Homeopathy Diagnosis Discussio...
 
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASEMEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
MEMORY EFFICIENT FREQUENT PATTERN MINING USING TRANSPOSITION OF DATABASE
 
IJSRED-V2I1P12
IJSRED-V2I1P12IJSRED-V2I1P12
IJSRED-V2I1P12
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communication
 
A Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection SystemsA Survey of Various Intrusion Detection Systems
A Survey of Various Intrusion Detection Systems
 

Similar to Approaching Rules Induction CN2 Algorithm in Categorizing of Biodiversity

A Survey of Convolutional Neural Network Architectures for Deep Learning via ...
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...A Survey of Convolutional Neural Network Architectures for Deep Learning via ...
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...ijtsrd
 
Knowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis SystemKnowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis Systemijtsrd
 
Data mining techniques a survey paper
Data mining techniques a survey paperData mining techniques a survey paper
Data mining techniques a survey papereSAT Publishing House
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalIJAEMSJORNAL
 
Deep Learning-Based Approach for Thyroid Dysfunction Prediction
Deep Learning-Based Approach for Thyroid Dysfunction PredictionDeep Learning-Based Approach for Thyroid Dysfunction Prediction
Deep Learning-Based Approach for Thyroid Dysfunction PredictionIRJET Journal
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET Journal
 
Potato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningPotato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningIRJET Journal
 
An Approach for IRIS Plant Classification Using Neural Network
An Approach for IRIS Plant Classification Using Neural Network  An Approach for IRIS Plant Classification Using Neural Network
An Approach for IRIS Plant Classification Using Neural Network ijsc
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope IJCSEIT Journal
 
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...ijassn
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing withijcsa
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET Journal
 
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...theijes
 
Human Activity Recognition System
Human Activity Recognition SystemHuman Activity Recognition System
Human Activity Recognition SystemIRJET Journal
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)ieijjournal1
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 

Similar to Approaching Rules Induction CN2 Algorithm in Categorizing of Biodiversity (20)

A Survey of Convolutional Neural Network Architectures for Deep Learning via ...
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...A Survey of Convolutional Neural Network Architectures for Deep Learning via ...
A Survey of Convolutional Neural Network Architectures for Deep Learning via ...
 
Knowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis SystemKnowledge Acquisition Based on Repertory Grid Analysis System
Knowledge Acquisition Based on Repertory Grid Analysis System
 
Data mining techniques a survey paper
Data mining techniques a survey paperData mining techniques a survey paper
Data mining techniques a survey paper
 
Applying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information RetrievalApplying Soft Computing Techniques in Information Retrieval
Applying Soft Computing Techniques in Information Retrieval
 
Deep Learning-Based Approach for Thyroid Dysfunction Prediction
Deep Learning-Based Approach for Thyroid Dysfunction PredictionDeep Learning-Based Approach for Thyroid Dysfunction Prediction
Deep Learning-Based Approach for Thyroid Dysfunction Prediction
 
IRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN AlgorithmIRJET- Prediction of Heart Disease using RNN Algorithm
IRJET- Prediction of Heart Disease using RNN Algorithm
 
Potato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine LearningPotato Leaf Disease Detection Using Machine Learning
Potato Leaf Disease Detection Using Machine Learning
 
8 ijcse-01235
8 ijcse-012358 ijcse-01235
8 ijcse-01235
 
An Approach for IRIS Plant Classification Using Neural Network
An Approach for IRIS Plant Classification Using Neural Network  An Approach for IRIS Plant Classification Using Neural Network
An Approach for IRIS Plant Classification Using Neural Network
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
 
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
IRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived VideosIRJET- Anomaly Detection System in CCTV Derived Videos
IRJET- Anomaly Detection System in CCTV Derived Videos
 
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...
Applying K-Means Clustering Algorithm to Discover Knowledge from Insurance Da...
 
Human Activity Recognition System
Human Activity Recognition SystemHuman Activity Recognition System
Human Activity Recognition System
 
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
CLASSIFIER SELECTION MODELS FOR INTRUSION DETECTION SYSTEM (IDS)
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Approaching Rules Induction CN2 Algorithm in Categorizing of Biodiversity

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1581 Approaching Rules Induction: CN2 Algorithm in Categorizing of Biodiversity Su Myo Swe1, Khin Myo Sett2 1Lecturer, 2Professor 1Department of Computer Studies, Dagon University, Yangon Region, Myanmar 2Department of Computer Studies, University of Mandalay, Mandalay Region, Myanmar How to cite this paper: Su Myo Swe | Khin Myo Sett "Approaching Rules Induction: CN2 Algorithm in Categorizing of Biodiversity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.1581-1584, URL: https://www.ijtsrd.c om/papers/ijtsrd25 153.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT Rule induction is an area of machine learning in whichformalrules areextracted from a set of observations. Machine learningisafieldofartificialintelligencethat uses statistical techniques to give computer systems the ability to "learn" from data, without being explicitly programmed. Machine learning applications are classification, regression, clustering, density estimation and dimensionality reduction. The CN2 algorithm is a classification technique designed for the efficient induction of simple, comprehensible rules of form “if cond then predict class”, even in domains where noise may be present. Biodiversity means biological diversity, the variety of life found in a place on Earthor,often,thetotal variety of life on Earth. This research used butterflies as biological dataset for categorizing biodiversity and passed it to CN2 Rule Induction. In this research, “The Fauna of British India, Ceylon and Burma. Butterflies. Vol. I and Vol. II” written by C.T Bingham are used as the required knowledge for resource and categorizing biodiversity of butterfly families by rules induction with CN2 algorithm system has developed. In this system, MS Visual Studio as a programming tool and MS SQL Server as for database development are used. Keywords: Machine Learning, Rule Induction, CN2 Algorithm, Biodiversity 1. INTRODUCTION In artificial intelligence, an expert system is a computer system that follows the decision-making ability of a human expert. Expert systems are designed to solve complex problems by reasoning through bodies of knowledge, represented mainly as if–then rules rather than through conventional procedural code. [11] The most common form of architecture used in expert and other types of knowledge-based systems is the production system, also called therule-based system. In computer science, rule-based systems are used as a way to store and manipulate knowledge to interpret information in a useful way. They are often used in artificial intelligence applications and research. [5] This type of system use knowledge encoded in the form of production rules, that is, if…then rules. Rule have an antecedent or condition part,the left-hand side, and a conclusion ofaction pert,the right-hand side. [4] 1.1. The Representative Architectures of Expert System An expert system is divided into two subsystems: the knowledge base and the interface engine. The knowledge base represents facts and rules. Theinferenceengine applies the rules to the known facts to deduce new facts. Inference engines can also include explanation anddebuggingabilities. [11] The architectures of Expert Systems today reflect knowledge engineers understanding of how to represent knowledge and how to perform intelligent decision-making tasks with the support of knowledge base system. The Expert System architecture is independent of specific computer hardware. Determinants for computer hardware selection would include the size of the knowledge database, the desire speed of the system’s responses and the level of sophistication for the user interface. Figure (1.1) shows the architecture of a simple Expert System. The architecture of the simple Expert System could be extended. One common extension is to expand the knowledge base into a knowledge database and a domain database. These two databases could be managed by a database management system (DBMS). [9] Figure (1.1) Architecture of a simple Expert System IJTSRD25153
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1582 1.2. Building A Knowledge Base The procedure of building a knowledge base is called knowledge engineering.Investigation of aparticulardomain, determining what concepts are important inthat thedomain and creation of a formal representation of the objects and relations in the domain are the role of aknowledge engineer. Often, the knowledge engineer is trained in representation but is not an expert in the domain at hand, be it circuit design, space station mission scheduling or whatever. The knowledge will usually interview the real experts to become educated about the domain and to elicit the required knowledge, in a process called knowledge acquisition. 1.3. Architectures of a Rule-Based System Each rule represents a small piece of knowledge relating to the given domain of expertise. A number of related rules collectively may correspond to a chain of inferences which lead from some initially known facts to some useful conclusions. The inference process is carried out in an interactive mode with the use providing input data needed to complete rule chaining process. Figure (1.2) shows the architecture of Rule-based system. [5] Figure (1.2) Architecture of Rule-Base System A typical rule-based system consists of the following components are: Knowledge base: contains the rules embodying expert knowledge about the problem domain Database: contains the setof known facts abouttheproblem currently being solved Inference engine: carries out the reasoning process by linking the rules with the known facts to find a solution Explanation facilities: provides information touser about the reasoning steps that are being followed User interface: communication between the user and the system In this research, rule induction with CN2 was used for classification of butterfly that is the simplest setting for classification. 1.4. Rule Induction The rule induction system can create rule that fit the example cases. The rule can then be used to access other cases the outcome is not known. The heart of a rule induction system is an algorithm, which is used toinduce the rules from the examples. Induction methods use various algorithms to convert a knowledge matrix of attributes, values, and selections to rules. Some well-known rule learning algorithms are AQ, CN2, FOIL, RIPPER AND OPUS. [7] 1.5. Rule Induction with CN2 The CN2 induction algorithm is a learning algorithm for rule induction. It is designed to work even when thetraining data isimperfect. It is based on ideas from the AQ algorithm to produce rules and combine decisiontreelearning(such as C 4.5, ID3) to handle noise. As a consequence it creates arule set like that created by AQ but is able to handle noisy data like ID3. [4] 2. Materials and Methods In this research, family keys of butterflies are used as materials or biological data set and rule induction with CN2 algorithm is used as rule indention method. 2.1. Identifying Keys of the Butterfly Butterflies are the most well-known of all insects. They are among the most beautiful creatures on Earth. They are popular among nature lovers as well as a subject for scientific study. Figure (2.1) shows the external features of the butterfly that are used in the scientific categorizing. Figure (2.1) External Features of Butterfly Butterflies and moths are insects that make up the order Lepidoptera, derived from the Greek words lepidos for scaly and ptera for wings. Four wings are present. The wings are membranous, with veins or nervures running longitudinal form base to the wing margins. The pattern formed by these veins (wing venation) is of primary importance in the classification ofLepidoptera. Wings of all the butterflies’ families showed considerable variations in shapes and vein patterns reflecting their specific nature. [8] Figure (2.2) shows the parts of wings and venation pattern of butterflies that are also used in the scientific categorizing.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1583 Figure (2.2) Parts of Wings and Venation Pattern of Butterfly 2.2. Exploring the Rule Induction with CN2 Algorithm Rule induction is a popular method that automates the knowledge acquisition process when knowledge is expressed in terms of rules in classification-type problems. Rule induction examines historical cases and generates the rules that were used to arrive at certain recommendations. Rule induction can be used by a system engineer, an expert, or any other system builder. CN2 based on the ID3 (Quinlan, 1983) and AQ (Michalski, 1969) algorithms. The ID3 algorithm provides itself to such modification by the nature of its general-to-specific search. The AQ algorithm's dependence on specific training examples during search makes it less easy to modify. CN2 was designed to modify the AQ algorithm itself in ways that removed this dependence on specific examples and increased the space of rules searched. CN2, a new induction algorithm combines the efficiency and ability to cope with noisy data of ID3 with the if-then rule form and flexible search strategy of the AQ family. Figure (2.3) shows the CN2 induction algorithm. [4] Figure (2.3) The CN2 Induction Algorithm 3. Approaching Rules Induction: CN2 Algorithm in Butterfly Families In this research, the proposed system contributedaccording with the following system flow diagram. 3.1. System Flow Diagram Figure (3.1) System Flow Diagram 3.2. Executing Family Keys for Categorizing A dichotomous key is a tool that can be used to classify objects. Dichotomous means “divided in two parts” or “binaryclassification”. Therefore,this keyusesaseries of yes or no questions to place objects into groups. [8] Butterflies are classified in theKingdom: Animalia,Phylum: Arthropoda, and Order: Lepidoptera. [1] [2] Kingdom Animalia (animals) Phylum Arthropoda (arthropods, invertebrate animals with an exoskeleton, a segmented body, and jointed legs) Class Insecta (insects, rthropods with 6 legs, 2 antennae, and a3-part body) Order Lepidoptera (butterflies and moths) By using the rule induction with CN2 algorithm and identification key of family of butterfly, the following rules can be developed. Table 3.1 shows the family keys of butterfly. Table (3.1) Family Keys of Butterflies 1 A. Antennae approximate at base, hind tibiae with only a terminal pair of spurs, one or more of the veins in the fore wing forked or coincident beyond the cell ……………………………………………………………………….……2 B. Antennae wide apart at base, hind tibiae generally with a medial as well as a terminal pair of spurs, all the veins in the fore wing from base or from cell, none forked or coincidentbeyond ………….……..Hesperiidae 2 a. Precostal nervure in hind wing present …………………………………………….……….…..…………………3 b. Precostal nervure in hind wing absent …………………………………………………....……...Lycaenidae 3 a1. Front pair of legs imperfect in one or both sexes………………………………….………….……………………4 b1. Front pair of legs perfect in both sexes………………………………………………………….………5 Let E be a set of classified examples. Let SELECTORS be the set of all possible selectors. Procedure CN2 (E) Let RULE-LIST be the empty list. Repeat until BEST.CPX is nil or E is empty: Let BEST.CPX be Find-Best.Complex(E). If BEST.CPX is not nil, Then let E' be the examples covered by BEST.CPX. Remove from E the examples E' covered by BEST.CPX. Let C be the most common class of examples in E'. Add the rule 'If BEST.CPX then the class is C' to the end of RULE-LIST. Return RULE-LIST.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25153 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 1584 4 a2. Front pair of legs perfect in both sexes……………………..……………………....Nymphalidae b2. Front pair of legs imperfect in male, perfect in female........................................................Nemeobidae 5 a2. Vein 1a in hind wing wanting, claws simple…….…………………………………...….Papilionidae b2. Vein 1a in hind wing present, claws bifid………………………………….………………...…Pieridae 4. Result and Discussion After categorizing of the butterflies by using rule induction with CN2 algorithm, there have six rules for six families respectively as the result. Table (4.1) shows the results of the rules for butterfly family. Table (4.1) Rule for Family of Butterfly Rule No Family Name Rule for Family (Family Key) 1 Nymphalidae A (a) (a1 ) (a2) 2 Nemeobidae A (a) (a1 ) (b2) 3 Papilionidae A (b) (a1 ) (a2) 4 Pieridae A (b) (a1 ) (b2) 5 Lycaenidae A (b) 6 Hesperidae B Rule induction can be used by a system engineer, an expert, or any other system builder. The categorization of butterfly family by using rule induction with CN2 was simple, clear and useful for the researcher. This research is starting for approach the co-operation of computer area and the biological area. That is showing the usefulness of the computer field of biological field for the categorization in biodiversity. 5. Conclusion This research paper has introduced the idea of inducing rules from sets of examples in order to speed up the development of knowledge bases in expertsystems.Therule induction with CN2 algorithm is the best technique for categorizing of biological dataset. The results give rules for categorization and the implemented system is easy to use and understand for biologist; who is willingto categorizethe butterflies by computerization. A big advantage of the rule induction is that it enhances the thinking process of the expert. Butterflies are the best-known and best group of insects for examining pattern of terrestrial biotic diversity and distribution. For the children, schools are being encouraged to study the life and habit of butterflies and in this way come to appreciate the beauty of the natural environment and become involved in efforts for its conservation. So, this research will meet the aim of correct, easy, fast, simple and useful than traditional manual methods. As a future work, we will continue to do the research for the applied algorithm in biodiversity. References [1] Bingham. C.T, “The Fauna of British India, Ceylon and Burma. Butterflies. Vol. I Taylar and Francis, London”, 1905 [2] Bingham. C.T, “The Fauna of British India, Ceylon and Burma. Butterflies. Vol. II Taylar and Francis, London”, 1907 [3] Clark Peter and Boswell Robin. “Rule Induction with CN2: Some Recent Improvement” Machine Learning, Fifth European Conference, 1991 [4] Clark Peter and Niblett T. “The CN2 induction algorithm” Machine Learning Journal, 3(4); 261-283, 1989 [5] CSCU9T6 /ITNP60. “ReasoningSystems”,Universityof Stirling, 2015 [6] Faruk Ertuğrul Ömer et al. “Identification of Butterfly Species by Similarity Indexes Based on Prototypes”, International Journal of Computer Vision, Machine Learning and Data Mining, Volume 1, 2015 [7] Furnkranz Johannes and Kliegr Tomas. “A Brief Overview of Rule Learning” [8] Omaha’s Henry Doorly Zoo, “BUTTERFLIES. Taking Science to the Backyard”, 2011 [9] Tan C. F. “The Application of Expert System: A Review of Research And Applications”, ARPN Journal of Engineering and Applied Sciences, Vol. 11, No. 4, February 2016 [10] https://docs.orange.niolab.si/3/visual programming/widgets/model/cn2ruleinduction.html [11] https://en.wikipedia.org/wiki