SlideShare a Scribd company logo
MAJOR PROJECT
ANALYZING ADVERSE DRUG EVENT USING DATA MINING APPROACH
What is Adverse Drug event
????
- Adverse drug event is the result of adverse drug reaction.
- Adverse drug reaction is defined as any undesirable experience associated
with the use of a medical product in a individual.
- In short Adverse drug event is defined as an unwanted or unintended
reaction that results from the normal use of one or more medications
Why Adverse Drug Events
happens ???
The adverse drug event have started taking place more frequently and is
increasing because of several reasons like development of new medications,
increase in the use of medications for disease prevention, increased
coverage prescription medications.
How can ADEs be prevented
????
If a database of adverse drug events which took place anywhere in the
world is maintained and can be accessed by the authorities ,hospitals ,etc. ,
any possible risks to patient's life can be avoided as we are already aware of
the outcomes.
So , How can we help here
????
In this project, we plan on creating an Adverse drug reaction response system
which refers to the analytical tool which will be helping to analyze the
adverse drug reaction triples from the database.
What is to be done ??
Firstly the database is maintained using the already existing data or the data
provided by the user via. Interfaces for which we use the client-server
connection. Then, we use Apriori algorithm for mining the data which gives us
the potential drugs or drug pairs or triplets which can result into Adverse Drug
Events which initially starts with a transaction table.
Data saved and managed
using client-server
connection.
5 interfaces for entry but one database from which the data is mined.
Apriori Algorithm used for
mining data
The Apriori algorithm is a classic algorithm for learning association rules.
Association rule learning is a popular method for discovering relations
between variables in large databases.
Some definitions to
be aware of
What is the support ??
The support of an item (or set of items) is the number of transactions in which
that item (or items) occur.
What is the support threshold
??
The support threshold is defined by the user and is a number for which the
support for each item (or items) has to be equal or above for the support
threshold to be fulfilled.
Lets say in this example ,the value is 40 %.
What is a frequent item set
??
A frequent item set is an item set whose number of occurrences in the
transactions are above the support threshold.
Firstly, start with the
transaction database.
Transaction database contains the relationship status of medicines to cases
already present in the database.
From where we create a
candidate item set – Pass 1
We basically find the support values for each item i.e. drug in our case.
Now we create the frequent
item set – Pass 1
Where we keep the items , i.e. drugs whose support >= threshold support (40%
in this case).
Now we find the support
values for drug pairs – Pass 2
Here the item set contains all the possible permutations between the given
items and their support values are found.
Then again, we find the
frequent item set for Pass 2
Support >= threshold or min. support , else the item i.e. drug pair is
removed ; which in turn means that the removed pairs are not so
frequent.
Now moving on to drug
triplets – Pass 3
- Here, first we combine the elements to get triplets using the frequent item
set from pass 2, where the first element is same.
- Their support value is the min. [support{1st element in the combination from
pass 2), support (2nd element in the combination from pass 3)]
For frequent item set ,the sets
are pruned similarly – Pass 3
Support >= threshold or min. support
So in this way we find the frequent item set in
each pass and the result can be displayed after
each pass, in accordance to the user
requirements. So the user can see the risk in taking
the drugs as their effect and rest of the related
information is displayed.
Pseudo Code :-
Pass 1
1.Generate the candidate itemsets in C1
2.Save the frequent itemsets in L1
3.Pass kGenerate the candidate itemsets in Ck from the frequent
itemsets in Lk-1
1. Join Lk-1 p with Lk-1q, as follows:
insert into Ck
select p.item1, p.item2, . . . , p.itemk-1, q.itemk-1
from Lk-1 p, Lk-1q
where p.item1 = q.item1, . . . p.itemk-2 = q.itemk-2, p.itemk-1 < q.itemk-1
2. Generate all (k-1)-subsets from the candidate itemsets in Ck
3. Prune all candidate itemsets from Ck where some (k-1)-subset of the candidate itemset is not in the frequent itemset Lk-1
4.Scan the transaction database to determine the support for each candidate itemset in Ck
5.Save the frequent itemsets in Lk
Pseudo Code (for our project) :-
In pass 1 , Candidate item sets are generated and then frequent item sets are
generated when the support values from candidate item sets are compared
to the specified min. support value which act as a threshold support value
and the items with support value less than this value is removed, which then
leads to pass 2 which uses the frequent item sets from pass 1 to create item
sets of entities pairs where only the elements with support value greater than
specified support value are kept giving us a new frequent item set . Then this
frequent item sets are used in pass 3 where the two elements with first
element same are combined to get triplets and the min. support value of the
taken two frequent set is taken and then compared to the min. specified
support value to get the frequent item sets for pass 3. So, here we can get the
output from all the passes depending upon the user requirements.
Supervisor – Ms. Megha Rathi
Submitted by – Rupal Bhardwaj (10503880)
Amisha Kathuria (10501832)
Batch – B11

More Related Content

What's hot

Presentation on the topic of association rule mining
Presentation on the topic of association rule miningPresentation on the topic of association rule mining
Presentation on the topic of association rule mining
HamzaJaved64
 
Final_Project
Final_ProjectFinal_Project
Final_Project
Ashwin Dinoriya
 
Volume 14 issue 03 march 2014_ijcsms_march14_10_14_rahul
Volume 14  issue 03  march 2014_ijcsms_march14_10_14_rahulVolume 14  issue 03  march 2014_ijcsms_march14_10_14_rahul
Volume 14 issue 03 march 2014_ijcsms_march14_10_14_rahul
Deepak Agarwal
 
Harnessing The Proteome With Proteo Iq Quantitative Proteomics Software
Harnessing The Proteome With Proteo Iq Quantitative Proteomics SoftwareHarnessing The Proteome With Proteo Iq Quantitative Proteomics Software
Harnessing The Proteome With Proteo Iq Quantitative Proteomics Software
jatwood3
 
Classification vs clustering
Classification vs clusteringClassification vs clustering
Classification vs clustering
Khadija Parween
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
Dinusha Dilanka
 

What's hot (6)

Presentation on the topic of association rule mining
Presentation on the topic of association rule miningPresentation on the topic of association rule mining
Presentation on the topic of association rule mining
 
Final_Project
Final_ProjectFinal_Project
Final_Project
 
Volume 14 issue 03 march 2014_ijcsms_march14_10_14_rahul
Volume 14  issue 03  march 2014_ijcsms_march14_10_14_rahulVolume 14  issue 03  march 2014_ijcsms_march14_10_14_rahul
Volume 14 issue 03 march 2014_ijcsms_march14_10_14_rahul
 
Harnessing The Proteome With Proteo Iq Quantitative Proteomics Software
Harnessing The Proteome With Proteo Iq Quantitative Proteomics SoftwareHarnessing The Proteome With Proteo Iq Quantitative Proteomics Software
Harnessing The Proteome With Proteo Iq Quantitative Proteomics Software
 
Classification vs clustering
Classification vs clusteringClassification vs clustering
Classification vs clustering
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 

Viewers also liked

Es embase pico form
Es embase pico formEs embase pico form
Es embase pico form
Ann-Marie Roche
 
Prevent Adverse Drug Events by Implimentation of Medication Reconciliation
Prevent Adverse Drug Events by Implimentation of Medication ReconciliationPrevent Adverse Drug Events by Implimentation of Medication Reconciliation
Prevent Adverse Drug Events by Implimentation of Medication Reconciliation
Private Hospital
 
Embase: Adverse Drug Reactions - webinar September 25 2013
Embase: Adverse Drug Reactions - webinar September 25 2013Embase: Adverse Drug Reactions - webinar September 25 2013
Embase: Adverse Drug Reactions - webinar September 25 2013
Ann-Marie Roche
 
Webinar slides 26 may
Webinar slides 26 mayWebinar slides 26 may
Webinar slides 26 may
Ann-Marie Roche
 
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
Ann-Marie Roche
 
Harm in homeopathy: Aggravations, adverse drug events or medication errors?
Harm in homeopathy: Aggravations, adverse drug events or medication errors?Harm in homeopathy: Aggravations, adverse drug events or medication errors?
Harm in homeopathy: Aggravations, adverse drug events or medication errors?
home
 

Viewers also liked (6)

Es embase pico form
Es embase pico formEs embase pico form
Es embase pico form
 
Prevent Adverse Drug Events by Implimentation of Medication Reconciliation
Prevent Adverse Drug Events by Implimentation of Medication ReconciliationPrevent Adverse Drug Events by Implimentation of Medication Reconciliation
Prevent Adverse Drug Events by Implimentation of Medication Reconciliation
 
Embase: Adverse Drug Reactions - webinar September 25 2013
Embase: Adverse Drug Reactions - webinar September 25 2013Embase: Adverse Drug Reactions - webinar September 25 2013
Embase: Adverse Drug Reactions - webinar September 25 2013
 
Webinar slides 26 may
Webinar slides 26 mayWebinar slides 26 may
Webinar slides 26 may
 
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
Pathway studio reaxys medicinal chemistry schizophrenia presentation 063015
 
Harm in homeopathy: Aggravations, adverse drug events or medication errors?
Harm in homeopathy: Aggravations, adverse drug events or medication errors?Harm in homeopathy: Aggravations, adverse drug events or medication errors?
Harm in homeopathy: Aggravations, adverse drug events or medication errors?
 

Similar to Analyzing Adverse Drug Events Using Data Mining Approach

Dma unit 2
Dma unit  2Dma unit  2
Dma unit 2
thamizh arasi
 
Lec6_Association.ppt
Lec6_Association.pptLec6_Association.ppt
Lec6_Association.ppt
prema370155
 
Association and Correlation analysis.....
Association and Correlation analysis.....Association and Correlation analysis.....
Association and Correlation analysis.....
anjanasharma77573
 
Result analysis of mining fast frequent itemset using compacted data
Result analysis of mining fast frequent itemset using compacted dataResult analysis of mining fast frequent itemset using compacted data
Result analysis of mining fast frequent itemset using compacted data
ijistjournal
 
Result Analysis of Mining Fast Frequent Itemset Using Compacted Data
Result Analysis of Mining Fast Frequent Itemset Using Compacted DataResult Analysis of Mining Fast Frequent Itemset Using Compacted Data
Result Analysis of Mining Fast Frequent Itemset Using Compacted Data
ijistjournal
 
Pattern Discovery Using Apriori and Ch-Search Algorithm
 Pattern Discovery Using Apriori and Ch-Search Algorithm Pattern Discovery Using Apriori and Ch-Search Algorithm
Pattern Discovery Using Apriori and Ch-Search Algorithm
ijceronline
 
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of  Apriori and Apriori with Hashing AlgorithmIRJET-Comparative Analysis of  Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
IRJET Journal
 
A NEW ASSOCIATION RULE MINING BASED ON FREQUENT ITEM SET
A NEW ASSOCIATION RULE MINING BASED  ON FREQUENT ITEM SETA NEW ASSOCIATION RULE MINING BASED  ON FREQUENT ITEM SET
A NEW ASSOCIATION RULE MINING BASED ON FREQUENT ITEM SET
cscpconf
 
Assignment #3 10.19.14
Assignment #3 10.19.14Assignment #3 10.19.14
Assignment #3 10.19.14
Lourdes Greenwood
 
V34132136
V34132136V34132136
V34132136
IJERA Editor
 
Dm unit ii r16
Dm unit ii   r16Dm unit ii   r16
Dm unit ii r16
Kishore Kumar
 
IBM impact-final-reviewed1
IBM impact-final-reviewed1IBM impact-final-reviewed1
IBM impact-final-reviewed1
Priya Thinagar
 
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
IOSR Journals
 
Apriori Algorithm.pptx
Apriori Algorithm.pptxApriori Algorithm.pptx
Apriori Algorithm.pptx
Rashi Agarwal
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Editor IJARCET
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Editor IJARCET
 
Introduction to Association Rules.pptx
Introduction  to  Association  Rules.pptxIntroduction  to  Association  Rules.pptx
Introduction to Association Rules.pptx
Harsha Patel
 
Association rules apriori algorithm
Association rules   apriori algorithmAssociation rules   apriori algorithm
Association rules apriori algorithm
Dr. Jasmine Beulah Gnanadurai
 
BAS 250 Lecture 4
BAS 250 Lecture 4BAS 250 Lecture 4
BAS 250 Lecture 4
Wake Tech BAS
 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data mining
ijpla
 

Similar to Analyzing Adverse Drug Events Using Data Mining Approach (20)

Dma unit 2
Dma unit  2Dma unit  2
Dma unit 2
 
Lec6_Association.ppt
Lec6_Association.pptLec6_Association.ppt
Lec6_Association.ppt
 
Association and Correlation analysis.....
Association and Correlation analysis.....Association and Correlation analysis.....
Association and Correlation analysis.....
 
Result analysis of mining fast frequent itemset using compacted data
Result analysis of mining fast frequent itemset using compacted dataResult analysis of mining fast frequent itemset using compacted data
Result analysis of mining fast frequent itemset using compacted data
 
Result Analysis of Mining Fast Frequent Itemset Using Compacted Data
Result Analysis of Mining Fast Frequent Itemset Using Compacted DataResult Analysis of Mining Fast Frequent Itemset Using Compacted Data
Result Analysis of Mining Fast Frequent Itemset Using Compacted Data
 
Pattern Discovery Using Apriori and Ch-Search Algorithm
 Pattern Discovery Using Apriori and Ch-Search Algorithm Pattern Discovery Using Apriori and Ch-Search Algorithm
Pattern Discovery Using Apriori and Ch-Search Algorithm
 
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of  Apriori and Apriori with Hashing AlgorithmIRJET-Comparative Analysis of  Apriori and Apriori with Hashing Algorithm
IRJET-Comparative Analysis of Apriori and Apriori with Hashing Algorithm
 
A NEW ASSOCIATION RULE MINING BASED ON FREQUENT ITEM SET
A NEW ASSOCIATION RULE MINING BASED  ON FREQUENT ITEM SETA NEW ASSOCIATION RULE MINING BASED  ON FREQUENT ITEM SET
A NEW ASSOCIATION RULE MINING BASED ON FREQUENT ITEM SET
 
Assignment #3 10.19.14
Assignment #3 10.19.14Assignment #3 10.19.14
Assignment #3 10.19.14
 
V34132136
V34132136V34132136
V34132136
 
Dm unit ii r16
Dm unit ii   r16Dm unit ii   r16
Dm unit ii r16
 
IBM impact-final-reviewed1
IBM impact-final-reviewed1IBM impact-final-reviewed1
IBM impact-final-reviewed1
 
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
A Survey on Identification of Closed Frequent Item Sets Using Intersecting Al...
 
Apriori Algorithm.pptx
Apriori Algorithm.pptxApriori Algorithm.pptx
Apriori Algorithm.pptx
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Introduction to Association Rules.pptx
Introduction  to  Association  Rules.pptxIntroduction  to  Association  Rules.pptx
Introduction to Association Rules.pptx
 
Association rules apriori algorithm
Association rules   apriori algorithmAssociation rules   apriori algorithm
Association rules apriori algorithm
 
BAS 250 Lecture 4
BAS 250 Lecture 4BAS 250 Lecture 4
BAS 250 Lecture 4
 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data mining
 

Recently uploaded

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 

Recently uploaded (20)

Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 

Analyzing Adverse Drug Events Using Data Mining Approach

  • 1. MAJOR PROJECT ANALYZING ADVERSE DRUG EVENT USING DATA MINING APPROACH
  • 2. What is Adverse Drug event ???? - Adverse drug event is the result of adverse drug reaction. - Adverse drug reaction is defined as any undesirable experience associated with the use of a medical product in a individual. - In short Adverse drug event is defined as an unwanted or unintended reaction that results from the normal use of one or more medications
  • 3. Why Adverse Drug Events happens ??? The adverse drug event have started taking place more frequently and is increasing because of several reasons like development of new medications, increase in the use of medications for disease prevention, increased coverage prescription medications.
  • 4. How can ADEs be prevented ???? If a database of adverse drug events which took place anywhere in the world is maintained and can be accessed by the authorities ,hospitals ,etc. , any possible risks to patient's life can be avoided as we are already aware of the outcomes.
  • 5. So , How can we help here ???? In this project, we plan on creating an Adverse drug reaction response system which refers to the analytical tool which will be helping to analyze the adverse drug reaction triples from the database.
  • 6. What is to be done ?? Firstly the database is maintained using the already existing data or the data provided by the user via. Interfaces for which we use the client-server connection. Then, we use Apriori algorithm for mining the data which gives us the potential drugs or drug pairs or triplets which can result into Adverse Drug Events which initially starts with a transaction table.
  • 7. Data saved and managed using client-server connection. 5 interfaces for entry but one database from which the data is mined.
  • 8. Apriori Algorithm used for mining data The Apriori algorithm is a classic algorithm for learning association rules. Association rule learning is a popular method for discovering relations between variables in large databases.
  • 10. What is the support ?? The support of an item (or set of items) is the number of transactions in which that item (or items) occur.
  • 11. What is the support threshold ?? The support threshold is defined by the user and is a number for which the support for each item (or items) has to be equal or above for the support threshold to be fulfilled. Lets say in this example ,the value is 40 %.
  • 12. What is a frequent item set ?? A frequent item set is an item set whose number of occurrences in the transactions are above the support threshold.
  • 13. Firstly, start with the transaction database. Transaction database contains the relationship status of medicines to cases already present in the database.
  • 14. From where we create a candidate item set – Pass 1 We basically find the support values for each item i.e. drug in our case.
  • 15. Now we create the frequent item set – Pass 1 Where we keep the items , i.e. drugs whose support >= threshold support (40% in this case).
  • 16. Now we find the support values for drug pairs – Pass 2 Here the item set contains all the possible permutations between the given items and their support values are found.
  • 17. Then again, we find the frequent item set for Pass 2 Support >= threshold or min. support , else the item i.e. drug pair is removed ; which in turn means that the removed pairs are not so frequent.
  • 18. Now moving on to drug triplets – Pass 3 - Here, first we combine the elements to get triplets using the frequent item set from pass 2, where the first element is same. - Their support value is the min. [support{1st element in the combination from pass 2), support (2nd element in the combination from pass 3)]
  • 19. For frequent item set ,the sets are pruned similarly – Pass 3 Support >= threshold or min. support
  • 20. So in this way we find the frequent item set in each pass and the result can be displayed after each pass, in accordance to the user requirements. So the user can see the risk in taking the drugs as their effect and rest of the related information is displayed.
  • 21. Pseudo Code :- Pass 1 1.Generate the candidate itemsets in C1 2.Save the frequent itemsets in L1 3.Pass kGenerate the candidate itemsets in Ck from the frequent itemsets in Lk-1 1. Join Lk-1 p with Lk-1q, as follows: insert into Ck select p.item1, p.item2, . . . , p.itemk-1, q.itemk-1 from Lk-1 p, Lk-1q where p.item1 = q.item1, . . . p.itemk-2 = q.itemk-2, p.itemk-1 < q.itemk-1 2. Generate all (k-1)-subsets from the candidate itemsets in Ck 3. Prune all candidate itemsets from Ck where some (k-1)-subset of the candidate itemset is not in the frequent itemset Lk-1 4.Scan the transaction database to determine the support for each candidate itemset in Ck 5.Save the frequent itemsets in Lk
  • 22. Pseudo Code (for our project) :- In pass 1 , Candidate item sets are generated and then frequent item sets are generated when the support values from candidate item sets are compared to the specified min. support value which act as a threshold support value and the items with support value less than this value is removed, which then leads to pass 2 which uses the frequent item sets from pass 1 to create item sets of entities pairs where only the elements with support value greater than specified support value are kept giving us a new frequent item set . Then this frequent item sets are used in pass 3 where the two elements with first element same are combined to get triplets and the min. support value of the taken two frequent set is taken and then compared to the min. specified support value to get the frequent item sets for pass 3. So, here we can get the output from all the passes depending upon the user requirements.
  • 23. Supervisor – Ms. Megha Rathi Submitted by – Rupal Bhardwaj (10503880) Amisha Kathuria (10501832) Batch – B11