SlideShare a Scribd company logo
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 30 | P a g e 
Dynamic & Attribute Weighted KNN for Document Classification 
Using Bootstrap Sampling 
Dharmendra S Panwar, Kshitij Pathak 
Mahakal Institute of Technology Ujjain 
Abstract— 
Although publicly accessible databases containing speech documents. It requires a great deal of time and effort 
required to keep them up to date is often burdensome. In an effort to help identify speaker of speech if text is 
available, text-mining tools, from the machine learning discipline, it can be applied to help in this process also. 
Here, we describe and evaluate document classification algorithms i.e. a combo pack of text mining and 
classification. This task asked participants to design classifiers for identifying documents containing speech 
related information in the main literature, and evaluated them against one another. Expected systems utilizes a 
novel approach of k -nearest neighbour classification and compare its performance by taking different values of 
k. 
Keywords— Data Mining, Text Mining, Classification, K-nearest neighbour, KNN 
I. INTRODUCTION 
Text mining is a prosper new field that attempts 
to extract meaningful information from natural 
language text. It can be characterized as the process 
of analysing unstructured text to extract or retrieve 
information that is useful for particular purposes. 
Compared with other type of data stored in databases, 
algorithmically dealing with text is very difficult 
because text is irregular and unstructured. In modern 
or recent culture, text is the most and common way 
for the formal exchange of information. Emphasis in 
text mining is to find hidden patterns or opinions and 
extraction of information related to communication 
from an individual or parties. Mining the text is 
fruitful even if it provides partial success. 
II. TEXT MINING 
Recently text mining has become an important 
research area. Text can be placed in organization 
files, mails, online chats, product reviews, 
newspaper articles, journal and SMS. Text mining 
can also be called as text data mining, intelligent text 
analysis or knowledge discovery in text (KDT) 
refers to extracting the useful information from the 
natural language text. Text mining extracts the new 
pieces of knowledge from textual data. 
Fundamentally text mining is used to joint countless 
pages of plain-language digitized text to calculate 
useful information that has been hiding in plain sight 
(Gary Belsky: 2012). 
Approximately 80% of the world’s data is in not 
structured format. Data are stored in most of the 
government sectors, organization, industries and 
institutes in electronic form. These all data are stored 
in text database format. Text database is semi 
structured format which contains many structured 
fields and few unstructured fields. For example 
students name, roll no, class, semester are the 
structured fields and Address, remarks are 
unstructured fields in an educational institution. Text 
mining is very essential for an organization or 
institution because most of the information in the 
organizations is in text format. 
Text Mining [1] is the discovery by computer of new, 
previously unknown information, by automatically 
extracting information from different written 
resources. 
Figure 2.1 Text Mining Basic 
A main element is linking to together to form new 
facts or new conclusion to be research further by 
conventional means of experimentation. Text mining 
is different from the web search. In web search, the 
user is looking for something that is already known 
and which has been written by someone. The 
problem is pushing aside all the material that 
currently is not relevant to your needs in order to 
find the relevant information. In text mining, the aim 
is to discover unknown information from the 
RESEARCH ARTICLE OPEN ACCESS
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 31 | P a g e 
datasets that no one yet knows and so could not have yet written down. Text mining is a part of data mining [2] that tries to find interesting patterns from large databases and data warehouse. Text mining can also be known as Knowledge-Discovery in Text (KDT), Text Data Mining or Intelligent Text Analysis is the process of extracting interesting and valuable information and knowledge from unstructured text. Text mining is a new and young interdisciplinary field which draws on data mining, information retrieval, machine learning, computational and statistics linguistics. As per the study, 80% information is stored as text form, text mining is considered to have a big commercial potential value. Knowledge may be discovered from many or multiple sources of information but unstructured text remains the largest readily available source of knowledge. The problem of Knowledge Discovery from Text (KDT) [3] is to extract explicit and implicit concepts and semantic relations between concepts using Natural Language Processing techniques (NLP). Its purpose to get insights into large quantities of text data. Knowledge Discovery from Text, while deeply rooted in Natural Language Processing, draws on methods from statistics, information extraction, machine learning, reasoning, knowledge management, and others for its discovery process. KDT plays an important and increasingly significant role in emerging applications for example Text Understanding. Text mining [1] is just like of data mining, except that data mining tools [2] are designed to work with structured data from databases, but text mining can apply with unstructured, semi-structured and structured data sets such as Internet files (HTML), emails and full text files etc. As a result, text mining is a better solution for companies. To date, however, most research and development efforts have centered on data mining efforts using structured data. The problem introduced by text mining is obvious: natural language was developed for humans to communicate with one another and to record and save information, and computers are a large way from comprehending natural language. Figure 2.2 An Example of Text Mining 
Humans have the ability to distinguish and apply linguistic patterns to text and humans can easily overcome obstacles that computers cannot easily handle such as contextual meaning slang and spelling variations. However, although our language capabilities allow us to comprehend unstructured data and lacking of the computer’s ability to process unstructured text in large volumes or at high speeds. Figure 2.2 shows a generic process model [4] for a text mining application. Starting with a collection of documents and a text mining tool would be retrieve a specific document and pre-process it by checking character sets and format. Then it would be go through by a text analysis phase and repeating techniques of mining until information is extracted. The final resulting information would be placed in a management information system and that helps to yielding an abundant amount of knowledge that is very useful for the user of that system. 
III. CLASSIFICATION 
All Classification, which is the task of assigning objects to one of several predefined categories or class, is a pervasive problem that encloses many diverse applications. Examples that include classifying galaxies based upon their shapes, categorizing cells as malignant or benign based upon the results of MRI scans and detecting spam email messages based upon the message content and header. Figure 3.1 Classification as the task of mapping an input attribute set x into its class label y The input data for a classification task is a set of records. Every record also know as instance or can characterized by a tuble(x,y),where x is attribute set and y is a unique attribute as class label also know as target or category attribute. Mainly Classification is the task of learning a target function f that Assign each attribute of set x to one of the predefined class labels y. The target function is also known informally as a classification model. A classification model is useful for the following purposes:- Descriptive Modeling: It is a classification model that serves as an informing tool to distinguish between objects of different classes. Predictive Modeling: It is a classification model that also be used to predict the class label of unknown records. 
Classification techniques are most suited for predicting or describing or defining data sets with nominal or binary categories. They are less effective for ordinal categories (e.g., to classify a person in terms of their income group like high, medium or low income group) because they do not consider the implicit order among the categories. Other forms of
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 32 | P a g e 
relationships, such as the subclass–super class relationships among categories (e.g., apes and humans are primates which is a subclass of mammals) are also ignored. Following are the general Approach to Solving a Classification Problem 
A classification technique (or classifier) is a systematic approach to building classification models from an input data set. Examples include decision neural networks, naıve Bayes classifiers, rule-based classifiers, tree classifiers, support vector machines. Each technique uses learning algorithm to identify a model that best fits the relationship between class label and the attributes set of the input datasets. The algorithm generated model should both fit the input data and correctly predict the class labels of records it hasn’t seen before. That’s why a main objective of the learning algorithm is to build models with good generalization capability; that is to say, models that accurately predict the class labels of previously unknown records. 
Figure 3.2 shows a general approach for solving classification problems. First, a training set containing the records whose class labels are known must be given. Figure 3.2 General approach for building a classification model. Table 3.1 Confusion matrix for a 2-class problem The training set is used to generate a classification model that is applied to the test dataset, which consist unknown class labels records. The performance and evaluation of the model is based on correctly or incorrectly predict the counts of the test records. These counts are tabulated in a table known as a confusion matrix. Table 3.1 depicts the confusion matrix for a binary classification problem. Each entry fij in this table shows the number of records from class i predicted to be of class j. Here f01 is the number of records from class 0 incorrectly predicted as class 1. On the basis of the entries in the confusion matrix and the total number of correct predictions made by the model is (f11+f00) and the total number of incorrect predictions is (f10+f01). Confusion matrix provides the useful information that determine how well model perform or work and its summarized this information with single number that it more convenient to compare with different models performance. This can also be done using a performance metric like that accuracy, which is defined as follows:
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 33 | P a g e 
Likewise, the performance of a model can be calculated in terms of its error rate, using the following equation: 
Most of the classification algorithms seek models that attain the highest accuracy, or equivalently, the lowest 
error rate when applied to the test set. 
K-Nearest Neighbors (KNN) 
One of the various classifier, 'KNN classifier' is a case based learning algorithm which is based on a distance or 
similarity function for various pairs of observation such as the Euclidean distance function. It is tried for many 
applications because of its effectiveness, non-parametric & easy to implementation properties. However, under 
this method, the classification time is very long & it is difficult to find optimal value of K. Generally, the best 
alternative of k to be chosen depends on the data. Also, the effect of noise on the classification is reduced by the 
larger values of k but make boundaries between classes less distinct. By using various heuristic techniques, a 
good 'k' can be selected. In order to overcome the above said drawback, modify traditional KNN with different 
K values for different classes rather than fixed value for all classes. 
How KNN Algorithm Works 
KNN algorithm is used to classify instances based on nearest training examples in the frame space. KNN 
algorithm is known as lazy learning algorithm in which function is approximated locally & computations are 
delayed until classification. A majority of instances is used for classification process. Object is classified into 
the particular class which has maximum number of nearest instances. 
Fig 3.3 Example of k- nearest neighbor [11] 
In above figure the test instance (green circle) should be classified either into blue square class or into red 
triangle class. If k = 3 (solid line circle) test object (green circle) is classified into red triangle class because 
there are 2 triangle instances and only 1 square instance in the inner circle. 
If k = 5 (dashed line circle) test object (green circle) is classified into blue square class because there are 3 blue 
square instances and only 2 red triangle instances in the inner circle. 
SCOPE OF KNN 
Improvement of KNN can be done on following parameters. [12] 
A. Distance or similarity Function: The distance or similarity function is used for measuring the difference or 
similarity between two instances is the standard Euclidean distance. 
B. Selection of K Value: It represents neighbourhood size, which is artificially assigned as an input parameter. 
C. Calculating Class Probability: The class probability assumption, based on a simple voting.
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 34 | P a g e 
IV. BOOTSTRAP SAMPLING 
Bootstrap methods are more than 30 years old 
[8], but they are computer-intensive and have only 
recently become widely available in statistical 
programs. Powerful and widely available computing 
capability is transforming statistics. Originally, 
computers just speeded up data handling and 
statistical computations. Now they enable exploratory 
analysis of gigantic data sets (data mining), creating 
neural network algorithms, analysing complex 
genomic data records, and supplementing traditional 
statistical methods using large numbers of data 
simulations. 
As per statistics, bootstrapping is a method for 
assigning measures of accuracy to sample estimates. 
This technique also allows estimation of the sampling 
distribution of almost any statistic using only very 
simple methods.[9,10] Generally, it falls in the 
broader class of resampling methods. 
Bootstrapping is the process of estimating properties 
of an estimator (like variance) by measuring those 
properties when sampling from an approximating 
distribution. 
To understand bootstrap, suppose it were possible to 
draw repeated samples (of the same size) from the 
population of interest, a large and more number of 
times. Then one would obtain a fairly good idea 
about the sampling distribution of a particular 
statistic from the collection of its values arising from 
these repeated samples. But, that does not mean that 
it would be too expensive and defeat the purpose of a 
sample study. The aim of a sample study is to collect 
information cheaply in a timely fashion. The main 
idea behind bootstrap sampling is to use the data of a 
sample study at hand as a ―surrogate population‖, for 
the aim of approximating the sampling distribution of 
a statistic; i.e. to resample (with replacement) from 
the sample data at hand and create a large number of 
―phantom samples‖ known as bootstrap samples. The 
summary of the sample is then computed on each of 
the bootstrap samples (usually a few or more 
thousand). A histogram of the set of these computed 
values is referred to as the bootstrap distribution of 
the statistic. 
V. TEXT CLASSIFICATION 
The Text classification is a supervised learning 
algorithm whose approach is to classify a text 
documents into pre-defined categories [5]. 
Classification has basic four types as per applications 
– Binary Hard, Multiclass single label, Multi-class 
Multi label hard and multi-class multi label soft 
classification [6]. 
Figure -5.1 General model of text classification 
Multi-class means multi categories are allowed like sport, jokes, and business in news data. Multi –label means 
document belong to more than one category like any documents belong to business and sport categories. Hard 
classification means document has Boolean membership into classes and soft means fuzzy membership into all 
classes. In this paper, our approach is regarding multi-class single label classification.
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 35 | P a g e 
For classification, general model is represented in figure -5.1. There are two phases - training and testing phase. In training phase, training documents that are pre-labeled are used to build a model using its feature vectors which are generated by pre-processing. Actual class assignment process performed in test phase. Whenever a new test document come for classification, then feature vector of test document is applied in model and class label assigned. In our literature research we found that most methods and developments can be divided into following distinct steps. The steps are: 1. Text gathering, 2. Text pre-processing, i. Stopword ii. Stemming iii. Pruning 3. Document Indexing, 4. Pattern Mining and Result Evaluation i. Categorization a. Sentiment Classification b. Authorship identification c. Web classification ii. Information Retrieval 
VI. PROPOSED WORK 
The simplicity and robustness of k-NN has been evident, and has been discussed already. This work target on one of the most vital factors of k-NN, namely, the selection of the value of k. Various experiments using different adaptations of the traditional k-NN to both improve its accuracy, and address its shortcomings have been researched in [7]. With the increasing variety of document, and the complex nature displayed by these document pages, a dynamic value of k is of ever increasing importance. In this work value of k is set dynamically and classify the document using dynamic weighted K-nearest neighbor classifier using bootstrap sampling. In the proposed work, first set the value of k which is dynamically and classify the document using dynamic weighted K-nearest neighbour classifier using bootstrap sampling. Algorithm 6.1 Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling (DAWk-nn) Phase-I 
1. Clean Corpus by // Corpus: Collection of documents. 
i. Removing Punctuation 
ii. Removing White space 
iii. Converting text to either upper or lower case 
iv. Removing Stopwords 
2. Make Term document matrix. 
3. Remove sparse terms. 
4. Let r=maximum expected value of K 
For i=1 to r 
i. Take a bootstrap sample 
ii. Evaluate the performance by simple distance based KNN 
iii. Stored in performance matrix (performance[i]) 
5. Select the best value from performance array & store it in K. Phase-2 1. Again apply bootstrap sampling on original dataset, divide dataset into training & testing module. 2. Clean Corpus by 
i. Punctuation 
ii. White space 
iii. Either select upper or lower case 
iv. Stopwords 
3. Make document matrix 4. Remove sparse terms 5. Assign the Weight to training dataset by using following equation:- Wr= 1/ [d (xi, xq)2 + 0.001] 6. Calculate Distance using K-NN algorithm with the help of K Picked in Step 5.
Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 
www.ijera.com 36 | P a g e 
7. Return the class label. 
In this algorithm, in Phase-1, first step we have to clean the raw data or unstructured text that is called clean corpus by removing punctuation, removing white space, converting text to either upper or lower case, removing stopwords. In the next step make the document matrix and remove the sparse terms. In the fourth step calculate the value of K for proposed work using bootstrap sampling and performance calculation and after the select the best K in performance matrix. When get the value of K from Phase-1, use it in Phase-2 for calculating beast nearest neighbor. Now Phas-2, again we apply the bootstrap sampling but in this time work on original dataset and clean that original data sets using clean corpus, make document matrix, remove sparse terms. In fifth step Find the best K nearest neighbor to meet training dataset by using following equation:- Wr= 1/ [d (xi, xq)2 + 0.001] After calculate the weight return the class label. 
VII. CONCLUSION 
In this proposed work, we investigated the factors that reduced the time complexity of document classification. The proposed approach overcomes the limitation of traditional K-nearest neighbor by incorporating neighbor weighted and dynamically picking K to provide best result, this proposed work also use the bootstrap sampling technique which is the method for assigning measure of accuracy to sample estimate. We have measured accuracy of the proposed approach with the standard K-nearest neighbor on 20,000 newsgroup documents dataset downloaded from [13] and accuracy of the classifier increases by 11.32 % ( on average ) in comparison to the earlier approach. REFERENCES 
[1] Berry Michael W., (2004), ―Automatic Discovery of Similar Words‖, in ―Survey of Text Mining: Clustering, Classification and Retrieval‖, Springer Verlag, New York, LLC, 24-43. 
[2] Navathe, Shamkant B., and Elmasri Ramez, (2000), ―Data Warehousing and Data Mining‖, in ―Fundamentals of Database Systems‖, Pearson Education pvt Inc, Singapore, 841-872. 
[3] Haralampos Karanikas and Babis Theodoulidis Manchester, (2001), ―Knowledge Discovery in Text and Text Mining Software‖, Centre for Research in Information Management, UK Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd. 
[4] Weiguo Fan, Linda Wallace, Stephanie Rich, and Zhongju Zhang, (2005), ―Tapping into 
the Power of Text Mining‖, Journal of ACM, Blacksburg. 
[5] Mita K. Dalal, Mukesh A. Zaveri (2011), ―Automatic Text Classification: A Technical Review‖, International Journalof Computer Applications (0975 – 8887), Volume 28– No.2. 
[6] Mohammed Abdul Wajeed (PhD), Dr.T.Adilakshmi, ―Text Classification Using Machine Learning‖, Journal of Theoretical and Applied Information Technology, 2005 - 2009 JATIT. 
[7] Jiang L., Cai Z., Wang D., and Jiang S (2007), ―Survey of Improving K-Nearest- Neighbor for Classification‖. In Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD ’07), vol. 1, pp. 679-683. 
[8] Efron B. Bootstrap methods: another look at the jackknife. Ann Statist 1979;7:1–26. 
[9] Varian, H.(2005). "Bootstrap Tutorial". Mathematica Journal, 9, 768-775. 
[10] Weisstein, Eric W. "Bootstrap Methods." From MathWorld--A Wolfram Web Resource. http://mathworld.wolfram.com/BootstrapMethods.html 
[11] K-nearest neighbor algorithm http://en.wikipedia.org/wiki/K- earest_neighbor_algorithm. 
[12] Jia Wu, Zhihua Cai, Zhechao, Gao (2010), ―Dynamic K-Nearest-Neighbor with Distance and Attribute Weighted for Classification,‖ International Conference on Electronics and Information Engineering (ICEIE), 978-1- 4244-7681 IEEE 2010. 
[13] http://web.ist.utl.pt/acardoso/datasets/ ( Visited before 2 Month before)

More Related Content

What's hot

AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERINGAN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
International Journal of Technical Research & Application
 
Tdm recent trends
Tdm recent trendsTdm recent trends
Tdm recent trendsKU Leuven
 
Sentimental classification analysis of polarity multi-view textual data using...
Sentimental classification analysis of polarity multi-view textual data using...Sentimental classification analysis of polarity multi-view textual data using...
Sentimental classification analysis of polarity multi-view textual data using...
IJECEIAES
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_Habib
El Habib NFAOUI
 
A Text Mining Research Based on LDA Topic Modelling
A Text Mining Research Based on LDA Topic ModellingA Text Mining Research Based on LDA Topic Modelling
A Text Mining Research Based on LDA Topic Modelling
csandit
 
Text mining
Text miningText mining
Text mining
Pankaj Thakur
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Aggregation for searching complex information spaces
Aggregation for searching complex information spacesAggregation for searching complex information spaces
Aggregation for searching complex information spaces
Mounia Lalmas-Roelleke
 
A Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia ArticlesA Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia Articles
ijma
 
Structured and Unstructured Information Extraction Using Text Mining and Natu...
Structured and Unstructured Information Extraction Using Text Mining and Natu...Structured and Unstructured Information Extraction Using Text Mining and Natu...
Structured and Unstructured Information Extraction Using Text Mining and Natu...
rahulmonikasharma
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_Habib
El Habib NFAOUI
 
An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3
prj_publication
 
Automatic Text Classification using Supervised Learning
Automatic Text Classification using Supervised LearningAutomatic Text Classification using Supervised Learning
Automatic Text Classification using Supervised Learning
dbpublications
 
Exploiting Wikipedia and Twitter for Text Mining Applications
Exploiting Wikipedia and Twitter for Text Mining ApplicationsExploiting Wikipedia and Twitter for Text Mining Applications
Exploiting Wikipedia and Twitter for Text Mining Applications
IRJET Journal
 
Algorithm for calculating relevance of documents in information retrieval sys...
Algorithm for calculating relevance of documents in information retrieval sys...Algorithm for calculating relevance of documents in information retrieval sys...
Algorithm for calculating relevance of documents in information retrieval sys...
IRJET Journal
 
Hc3612711275
Hc3612711275Hc3612711275
Hc3612711275
IJERA Editor
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
 

What's hot (17)

AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERINGAN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
AN IMPROVED TECHNIQUE FOR DOCUMENT CLUSTERING
 
Tdm recent trends
Tdm recent trendsTdm recent trends
Tdm recent trends
 
Sentimental classification analysis of polarity multi-view textual data using...
Sentimental classification analysis of polarity multi-view textual data using...Sentimental classification analysis of polarity multi-view textual data using...
Sentimental classification analysis of polarity multi-view textual data using...
 
Web_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_HabibWeb_Mining_Overview_Nfaoui_El_Habib
Web_Mining_Overview_Nfaoui_El_Habib
 
A Text Mining Research Based on LDA Topic Modelling
A Text Mining Research Based on LDA Topic ModellingA Text Mining Research Based on LDA Topic Modelling
A Text Mining Research Based on LDA Topic Modelling
 
Text mining
Text miningText mining
Text mining
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Aggregation for searching complex information spaces
Aggregation for searching complex information spacesAggregation for searching complex information spaces
Aggregation for searching complex information spaces
 
A Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia ArticlesA Document Exploring System on LDA Topic Model for Wikipedia Articles
A Document Exploring System on LDA Topic Model for Wikipedia Articles
 
Structured and Unstructured Information Extraction Using Text Mining and Natu...
Structured and Unstructured Information Extraction Using Text Mining and Natu...Structured and Unstructured Information Extraction Using Text Mining and Natu...
Structured and Unstructured Information Extraction Using Text Mining and Natu...
 
Information_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_HabibInformation_Retrieval_Models_Nfaoui_El_Habib
Information_Retrieval_Models_Nfaoui_El_Habib
 
An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3
 
Automatic Text Classification using Supervised Learning
Automatic Text Classification using Supervised LearningAutomatic Text Classification using Supervised Learning
Automatic Text Classification using Supervised Learning
 
Exploiting Wikipedia and Twitter for Text Mining Applications
Exploiting Wikipedia and Twitter for Text Mining ApplicationsExploiting Wikipedia and Twitter for Text Mining Applications
Exploiting Wikipedia and Twitter for Text Mining Applications
 
Algorithm for calculating relevance of documents in information retrieval sys...
Algorithm for calculating relevance of documents in information retrieval sys...Algorithm for calculating relevance of documents in information retrieval sys...
Algorithm for calculating relevance of documents in information retrieval sys...
 
Hc3612711275
Hc3612711275Hc3612711275
Hc3612711275
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
 

Viewers also liked

Application of code composer studio in digital signal processing
Application of code composer studio in digital signal processingApplication of code composer studio in digital signal processing
Application of code composer studio in digital signal processing
IAEME Publication
 
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
Devino Telecom
 
поети шістдесятники
поети шістдесятникипоети шістдесятники
поети шістдесятники
metod_1
 
De ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditionalDe ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditional
Pavel Cristian Ionita
 
Liste invitations des épreuves orales du concours externe d'admission de cons...
Liste invitations des épreuves orales du concours externe d'admission de cons...Liste invitations des épreuves orales du concours externe d'admission de cons...
Liste invitations des épreuves orales du concours externe d'admission de cons...
Ministère des Domaines de l'Etat et des Affaires Foncières
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
Service life prediction of rubber compound by accelerated ageing and mechanic...
Service life prediction of rubber compound by accelerated ageing and mechanic...Service life prediction of rubber compound by accelerated ageing and mechanic...
Service life prediction of rubber compound by accelerated ageing and mechanic...
IAEME Publication
 
Food beyond the farm gate: environmental change, adaptation and mitigation - ...
Food beyond the farm gate: environmental change, adaptation and mitigation - ...Food beyond the farm gate: environmental change, adaptation and mitigation - ...
Food beyond the farm gate: environmental change, adaptation and mitigation - ...
CCAFS | CGIAR Research Program on Climate Change, Agriculture and Food Security
 
Travelogue of nasir khusrow safarnama
Travelogue of nasir khusrow   safarnamaTravelogue of nasir khusrow   safarnama
Travelogue of nasir khusrow safarnama
Saleem Khanani
 
متغیرهای
متغیرهایمتغیرهای
متغیرهایHazar Mir
 
채용공고 소개서
채용공고 소개서채용공고 소개서
채용공고 소개서Gwang woo CHOI
 
Нагорная проповедь
Нагорная проповедьНагорная проповедь
Нагорная проповедь
Denis Smirnov
 
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
أمنية وجدى
 
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
Vasiliki Resvani
 
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
zhmekapanova
 
Community services training and development a panacea for employment generati...
Community services training and development a panacea for employment generati...Community services training and development a panacea for employment generati...
Community services training and development a panacea for employment generati...
IAEME Publication
 

Viewers also liked (19)

Application of code composer studio in digital signal processing
Application of code composer studio in digital signal processingApplication of code composer studio in digital signal processing
Application of code composer studio in digital signal processing
 
311 2001 zz_v20150101
311 2001 zz_v20150101311 2001 zz_v20150101
311 2001 zz_v20150101
 
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
Контроль операторами сотовой связи наличия согласий абонентов на получение SM...
 
поети шістдесятники
поети шістдесятникипоети шістдесятники
поети шістдесятники
 
De ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditionalDe ce sa apreciem craciunul traditional
De ce sa apreciem craciunul traditional
 
Liste invitations des épreuves orales du concours externe d'admission de cons...
Liste invitations des épreuves orales du concours externe d'admission de cons...Liste invitations des épreuves orales du concours externe d'admission de cons...
Liste invitations des épreuves orales du concours externe d'admission de cons...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Service life prediction of rubber compound by accelerated ageing and mechanic...
Service life prediction of rubber compound by accelerated ageing and mechanic...Service life prediction of rubber compound by accelerated ageing and mechanic...
Service life prediction of rubber compound by accelerated ageing and mechanic...
 
Food beyond the farm gate: environmental change, adaptation and mitigation - ...
Food beyond the farm gate: environmental change, adaptation and mitigation - ...Food beyond the farm gate: environmental change, adaptation and mitigation - ...
Food beyond the farm gate: environmental change, adaptation and mitigation - ...
 
Reflection Paper
Reflection PaperReflection Paper
Reflection Paper
 
Travelogue of nasir khusrow safarnama
Travelogue of nasir khusrow   safarnamaTravelogue of nasir khusrow   safarnama
Travelogue of nasir khusrow safarnama
 
متغیرهای
متغیرهایمتغیرهای
متغیرهای
 
채용공고 소개서
채용공고 소개서채용공고 소개서
채용공고 소개서
 
Нагорная проповедь
Нагорная проповедьНагорная проповедь
Нагорная проповедь
 
Travail 2
Travail 2Travail 2
Travail 2
 
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
إعلان وزارة التربية والتعليم للقيادات الإدارية بالديوان العام
 
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
6ο Δημοτικό Σχολείο Πατρών Συνάντηση με τον συγγραφέα Μάνο Κοντολέων
 
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
Сутність заходів Ю. Пілсудського в межах політики "санації" та суспільне житт...
 
Community services training and development a panacea for employment generati...
Community services training and development a panacea for employment generati...Community services training and development a panacea for employment generati...
Community services training and development a panacea for employment generati...
 

Similar to Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling

"Analysis of Different Text Classification Algorithms: An Assessment "
"Analysis of Different Text Classification Algorithms: An Assessment ""Analysis of Different Text Classification Algorithms: An Assessment "
"Analysis of Different Text Classification Algorithms: An Assessment "
ijtsrd
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
Decision Support for E-Governance: A Text Mining Approach
Decision Support for E-Governance: A Text Mining ApproachDecision Support for E-Governance: A Text Mining Approach
Decision Support for E-Governance: A Text Mining Approach
IJMIT JOURNAL
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
eSAT Journals
 
Text Mining at Feature Level: A Review
Text Mining at Feature Level: A ReviewText Mining at Feature Level: A Review
Text Mining at Feature Level: A Review
INFOGAIN PUBLICATION
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for file
eSAT Publishing House
 
A rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationA rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationNinad Samel
 
Text mining
Text miningText mining
Text mining
ThejeswiniChivukula
 
Research on ontology based information retrieval techniques
Research on ontology based information retrieval techniquesResearch on ontology based information retrieval techniques
Research on ontology based information retrieval techniques
Kausar Mukadam
 
Paper id 26201475
Paper id 26201475Paper id 26201475
Paper id 26201475
IJRAT
 
Bx044461467
Bx044461467Bx044461467
Bx044461467
IJERA Editor
 
Frequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social MediaFrequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social Media
IJERA Editor
 
Frequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social MediaFrequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social Media
IJERA Editor
 
Survey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document ClassificationSurvey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document Classification
IOSR Journals
 
Post 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docxPost 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docx
stilliegeorgiana
 
Post 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text miniPost 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text mini
anhcrowley
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
IOSR Journals
 
O017148084
O017148084O017148084
O017148084
IOSR Journals
 
A novel approach for text extraction using effective pattern matching technique
A novel approach for text extraction using effective pattern matching techniqueA novel approach for text extraction using effective pattern matching technique
A novel approach for text extraction using effective pattern matching technique
eSAT Journals
 
Great model a model for the automatic generation of semantic relations betwee...
Great model a model for the automatic generation of semantic relations betwee...Great model a model for the automatic generation of semantic relations betwee...
Great model a model for the automatic generation of semantic relations betwee...
ijcsity
 

Similar to Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling (20)

"Analysis of Different Text Classification Algorithms: An Assessment "
"Analysis of Different Text Classification Algorithms: An Assessment ""Analysis of Different Text Classification Algorithms: An Assessment "
"Analysis of Different Text Classification Algorithms: An Assessment "
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
Decision Support for E-Governance: A Text Mining Approach
Decision Support for E-Governance: A Text Mining ApproachDecision Support for E-Governance: A Text Mining Approach
Decision Support for E-Governance: A Text Mining Approach
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
 
Text Mining at Feature Level: A Review
Text Mining at Feature Level: A ReviewText Mining at Feature Level: A Review
Text Mining at Feature Level: A Review
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for file
 
A rough set based hybrid method to text categorization
A rough set based hybrid method to text categorizationA rough set based hybrid method to text categorization
A rough set based hybrid method to text categorization
 
Text mining
Text miningText mining
Text mining
 
Research on ontology based information retrieval techniques
Research on ontology based information retrieval techniquesResearch on ontology based information retrieval techniques
Research on ontology based information retrieval techniques
 
Paper id 26201475
Paper id 26201475Paper id 26201475
Paper id 26201475
 
Bx044461467
Bx044461467Bx044461467
Bx044461467
 
Frequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social MediaFrequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social Media
 
Frequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social MediaFrequent Item set Mining of Big Data for Social Media
Frequent Item set Mining of Big Data for Social Media
 
Survey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document ClassificationSurvey of Machine Learning Techniques in Textual Document Classification
Survey of Machine Learning Techniques in Textual Document Classification
 
Post 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docxPost 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docx
 
Post 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text miniPost 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text mini
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
O017148084
O017148084O017148084
O017148084
 
A novel approach for text extraction using effective pattern matching technique
A novel approach for text extraction using effective pattern matching techniqueA novel approach for text extraction using effective pattern matching technique
A novel approach for text extraction using effective pattern matching technique
 
Great model a model for the automatic generation of semantic relations betwee...
Great model a model for the automatic generation of semantic relations betwee...Great model a model for the automatic generation of semantic relations betwee...
Great model a model for the automatic generation of semantic relations betwee...
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 

Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling

  • 1. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 30 | P a g e Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling Dharmendra S Panwar, Kshitij Pathak Mahakal Institute of Technology Ujjain Abstract— Although publicly accessible databases containing speech documents. It requires a great deal of time and effort required to keep them up to date is often burdensome. In an effort to help identify speaker of speech if text is available, text-mining tools, from the machine learning discipline, it can be applied to help in this process also. Here, we describe and evaluate document classification algorithms i.e. a combo pack of text mining and classification. This task asked participants to design classifiers for identifying documents containing speech related information in the main literature, and evaluated them against one another. Expected systems utilizes a novel approach of k -nearest neighbour classification and compare its performance by taking different values of k. Keywords— Data Mining, Text Mining, Classification, K-nearest neighbour, KNN I. INTRODUCTION Text mining is a prosper new field that attempts to extract meaningful information from natural language text. It can be characterized as the process of analysing unstructured text to extract or retrieve information that is useful for particular purposes. Compared with other type of data stored in databases, algorithmically dealing with text is very difficult because text is irregular and unstructured. In modern or recent culture, text is the most and common way for the formal exchange of information. Emphasis in text mining is to find hidden patterns or opinions and extraction of information related to communication from an individual or parties. Mining the text is fruitful even if it provides partial success. II. TEXT MINING Recently text mining has become an important research area. Text can be placed in organization files, mails, online chats, product reviews, newspaper articles, journal and SMS. Text mining can also be called as text data mining, intelligent text analysis or knowledge discovery in text (KDT) refers to extracting the useful information from the natural language text. Text mining extracts the new pieces of knowledge from textual data. Fundamentally text mining is used to joint countless pages of plain-language digitized text to calculate useful information that has been hiding in plain sight (Gary Belsky: 2012). Approximately 80% of the world’s data is in not structured format. Data are stored in most of the government sectors, organization, industries and institutes in electronic form. These all data are stored in text database format. Text database is semi structured format which contains many structured fields and few unstructured fields. For example students name, roll no, class, semester are the structured fields and Address, remarks are unstructured fields in an educational institution. Text mining is very essential for an organization or institution because most of the information in the organizations is in text format. Text Mining [1] is the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. Figure 2.1 Text Mining Basic A main element is linking to together to form new facts or new conclusion to be research further by conventional means of experimentation. Text mining is different from the web search. In web search, the user is looking for something that is already known and which has been written by someone. The problem is pushing aside all the material that currently is not relevant to your needs in order to find the relevant information. In text mining, the aim is to discover unknown information from the RESEARCH ARTICLE OPEN ACCESS
  • 2. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 31 | P a g e datasets that no one yet knows and so could not have yet written down. Text mining is a part of data mining [2] that tries to find interesting patterns from large databases and data warehouse. Text mining can also be known as Knowledge-Discovery in Text (KDT), Text Data Mining or Intelligent Text Analysis is the process of extracting interesting and valuable information and knowledge from unstructured text. Text mining is a new and young interdisciplinary field which draws on data mining, information retrieval, machine learning, computational and statistics linguistics. As per the study, 80% information is stored as text form, text mining is considered to have a big commercial potential value. Knowledge may be discovered from many or multiple sources of information but unstructured text remains the largest readily available source of knowledge. The problem of Knowledge Discovery from Text (KDT) [3] is to extract explicit and implicit concepts and semantic relations between concepts using Natural Language Processing techniques (NLP). Its purpose to get insights into large quantities of text data. Knowledge Discovery from Text, while deeply rooted in Natural Language Processing, draws on methods from statistics, information extraction, machine learning, reasoning, knowledge management, and others for its discovery process. KDT plays an important and increasingly significant role in emerging applications for example Text Understanding. Text mining [1] is just like of data mining, except that data mining tools [2] are designed to work with structured data from databases, but text mining can apply with unstructured, semi-structured and structured data sets such as Internet files (HTML), emails and full text files etc. As a result, text mining is a better solution for companies. To date, however, most research and development efforts have centered on data mining efforts using structured data. The problem introduced by text mining is obvious: natural language was developed for humans to communicate with one another and to record and save information, and computers are a large way from comprehending natural language. Figure 2.2 An Example of Text Mining Humans have the ability to distinguish and apply linguistic patterns to text and humans can easily overcome obstacles that computers cannot easily handle such as contextual meaning slang and spelling variations. However, although our language capabilities allow us to comprehend unstructured data and lacking of the computer’s ability to process unstructured text in large volumes or at high speeds. Figure 2.2 shows a generic process model [4] for a text mining application. Starting with a collection of documents and a text mining tool would be retrieve a specific document and pre-process it by checking character sets and format. Then it would be go through by a text analysis phase and repeating techniques of mining until information is extracted. The final resulting information would be placed in a management information system and that helps to yielding an abundant amount of knowledge that is very useful for the user of that system. III. CLASSIFICATION All Classification, which is the task of assigning objects to one of several predefined categories or class, is a pervasive problem that encloses many diverse applications. Examples that include classifying galaxies based upon their shapes, categorizing cells as malignant or benign based upon the results of MRI scans and detecting spam email messages based upon the message content and header. Figure 3.1 Classification as the task of mapping an input attribute set x into its class label y The input data for a classification task is a set of records. Every record also know as instance or can characterized by a tuble(x,y),where x is attribute set and y is a unique attribute as class label also know as target or category attribute. Mainly Classification is the task of learning a target function f that Assign each attribute of set x to one of the predefined class labels y. The target function is also known informally as a classification model. A classification model is useful for the following purposes:- Descriptive Modeling: It is a classification model that serves as an informing tool to distinguish between objects of different classes. Predictive Modeling: It is a classification model that also be used to predict the class label of unknown records. Classification techniques are most suited for predicting or describing or defining data sets with nominal or binary categories. They are less effective for ordinal categories (e.g., to classify a person in terms of their income group like high, medium or low income group) because they do not consider the implicit order among the categories. Other forms of
  • 3. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 32 | P a g e relationships, such as the subclass–super class relationships among categories (e.g., apes and humans are primates which is a subclass of mammals) are also ignored. Following are the general Approach to Solving a Classification Problem A classification technique (or classifier) is a systematic approach to building classification models from an input data set. Examples include decision neural networks, naıve Bayes classifiers, rule-based classifiers, tree classifiers, support vector machines. Each technique uses learning algorithm to identify a model that best fits the relationship between class label and the attributes set of the input datasets. The algorithm generated model should both fit the input data and correctly predict the class labels of records it hasn’t seen before. That’s why a main objective of the learning algorithm is to build models with good generalization capability; that is to say, models that accurately predict the class labels of previously unknown records. Figure 3.2 shows a general approach for solving classification problems. First, a training set containing the records whose class labels are known must be given. Figure 3.2 General approach for building a classification model. Table 3.1 Confusion matrix for a 2-class problem The training set is used to generate a classification model that is applied to the test dataset, which consist unknown class labels records. The performance and evaluation of the model is based on correctly or incorrectly predict the counts of the test records. These counts are tabulated in a table known as a confusion matrix. Table 3.1 depicts the confusion matrix for a binary classification problem. Each entry fij in this table shows the number of records from class i predicted to be of class j. Here f01 is the number of records from class 0 incorrectly predicted as class 1. On the basis of the entries in the confusion matrix and the total number of correct predictions made by the model is (f11+f00) and the total number of incorrect predictions is (f10+f01). Confusion matrix provides the useful information that determine how well model perform or work and its summarized this information with single number that it more convenient to compare with different models performance. This can also be done using a performance metric like that accuracy, which is defined as follows:
  • 4. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 33 | P a g e Likewise, the performance of a model can be calculated in terms of its error rate, using the following equation: Most of the classification algorithms seek models that attain the highest accuracy, or equivalently, the lowest error rate when applied to the test set. K-Nearest Neighbors (KNN) One of the various classifier, 'KNN classifier' is a case based learning algorithm which is based on a distance or similarity function for various pairs of observation such as the Euclidean distance function. It is tried for many applications because of its effectiveness, non-parametric & easy to implementation properties. However, under this method, the classification time is very long & it is difficult to find optimal value of K. Generally, the best alternative of k to be chosen depends on the data. Also, the effect of noise on the classification is reduced by the larger values of k but make boundaries between classes less distinct. By using various heuristic techniques, a good 'k' can be selected. In order to overcome the above said drawback, modify traditional KNN with different K values for different classes rather than fixed value for all classes. How KNN Algorithm Works KNN algorithm is used to classify instances based on nearest training examples in the frame space. KNN algorithm is known as lazy learning algorithm in which function is approximated locally & computations are delayed until classification. A majority of instances is used for classification process. Object is classified into the particular class which has maximum number of nearest instances. Fig 3.3 Example of k- nearest neighbor [11] In above figure the test instance (green circle) should be classified either into blue square class or into red triangle class. If k = 3 (solid line circle) test object (green circle) is classified into red triangle class because there are 2 triangle instances and only 1 square instance in the inner circle. If k = 5 (dashed line circle) test object (green circle) is classified into blue square class because there are 3 blue square instances and only 2 red triangle instances in the inner circle. SCOPE OF KNN Improvement of KNN can be done on following parameters. [12] A. Distance or similarity Function: The distance or similarity function is used for measuring the difference or similarity between two instances is the standard Euclidean distance. B. Selection of K Value: It represents neighbourhood size, which is artificially assigned as an input parameter. C. Calculating Class Probability: The class probability assumption, based on a simple voting.
  • 5. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 34 | P a g e IV. BOOTSTRAP SAMPLING Bootstrap methods are more than 30 years old [8], but they are computer-intensive and have only recently become widely available in statistical programs. Powerful and widely available computing capability is transforming statistics. Originally, computers just speeded up data handling and statistical computations. Now they enable exploratory analysis of gigantic data sets (data mining), creating neural network algorithms, analysing complex genomic data records, and supplementing traditional statistical methods using large numbers of data simulations. As per statistics, bootstrapping is a method for assigning measures of accuracy to sample estimates. This technique also allows estimation of the sampling distribution of almost any statistic using only very simple methods.[9,10] Generally, it falls in the broader class of resampling methods. Bootstrapping is the process of estimating properties of an estimator (like variance) by measuring those properties when sampling from an approximating distribution. To understand bootstrap, suppose it were possible to draw repeated samples (of the same size) from the population of interest, a large and more number of times. Then one would obtain a fairly good idea about the sampling distribution of a particular statistic from the collection of its values arising from these repeated samples. But, that does not mean that it would be too expensive and defeat the purpose of a sample study. The aim of a sample study is to collect information cheaply in a timely fashion. The main idea behind bootstrap sampling is to use the data of a sample study at hand as a ―surrogate population‖, for the aim of approximating the sampling distribution of a statistic; i.e. to resample (with replacement) from the sample data at hand and create a large number of ―phantom samples‖ known as bootstrap samples. The summary of the sample is then computed on each of the bootstrap samples (usually a few or more thousand). A histogram of the set of these computed values is referred to as the bootstrap distribution of the statistic. V. TEXT CLASSIFICATION The Text classification is a supervised learning algorithm whose approach is to classify a text documents into pre-defined categories [5]. Classification has basic four types as per applications – Binary Hard, Multiclass single label, Multi-class Multi label hard and multi-class multi label soft classification [6]. Figure -5.1 General model of text classification Multi-class means multi categories are allowed like sport, jokes, and business in news data. Multi –label means document belong to more than one category like any documents belong to business and sport categories. Hard classification means document has Boolean membership into classes and soft means fuzzy membership into all classes. In this paper, our approach is regarding multi-class single label classification.
  • 6. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 35 | P a g e For classification, general model is represented in figure -5.1. There are two phases - training and testing phase. In training phase, training documents that are pre-labeled are used to build a model using its feature vectors which are generated by pre-processing. Actual class assignment process performed in test phase. Whenever a new test document come for classification, then feature vector of test document is applied in model and class label assigned. In our literature research we found that most methods and developments can be divided into following distinct steps. The steps are: 1. Text gathering, 2. Text pre-processing, i. Stopword ii. Stemming iii. Pruning 3. Document Indexing, 4. Pattern Mining and Result Evaluation i. Categorization a. Sentiment Classification b. Authorship identification c. Web classification ii. Information Retrieval VI. PROPOSED WORK The simplicity and robustness of k-NN has been evident, and has been discussed already. This work target on one of the most vital factors of k-NN, namely, the selection of the value of k. Various experiments using different adaptations of the traditional k-NN to both improve its accuracy, and address its shortcomings have been researched in [7]. With the increasing variety of document, and the complex nature displayed by these document pages, a dynamic value of k is of ever increasing importance. In this work value of k is set dynamically and classify the document using dynamic weighted K-nearest neighbor classifier using bootstrap sampling. In the proposed work, first set the value of k which is dynamically and classify the document using dynamic weighted K-nearest neighbour classifier using bootstrap sampling. Algorithm 6.1 Dynamic & Attribute Weighted KNN for Document Classification Using Bootstrap Sampling (DAWk-nn) Phase-I 1. Clean Corpus by // Corpus: Collection of documents. i. Removing Punctuation ii. Removing White space iii. Converting text to either upper or lower case iv. Removing Stopwords 2. Make Term document matrix. 3. Remove sparse terms. 4. Let r=maximum expected value of K For i=1 to r i. Take a bootstrap sample ii. Evaluate the performance by simple distance based KNN iii. Stored in performance matrix (performance[i]) 5. Select the best value from performance array & store it in K. Phase-2 1. Again apply bootstrap sampling on original dataset, divide dataset into training & testing module. 2. Clean Corpus by i. Punctuation ii. White space iii. Either select upper or lower case iv. Stopwords 3. Make document matrix 4. Remove sparse terms 5. Assign the Weight to training dataset by using following equation:- Wr= 1/ [d (xi, xq)2 + 0.001] 6. Calculate Distance using K-NN algorithm with the help of K Picked in Step 5.
  • 7. Dharmendra S Panwar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 11(Version - 6), November 2014, pp.30-36 www.ijera.com 36 | P a g e 7. Return the class label. In this algorithm, in Phase-1, first step we have to clean the raw data or unstructured text that is called clean corpus by removing punctuation, removing white space, converting text to either upper or lower case, removing stopwords. In the next step make the document matrix and remove the sparse terms. In the fourth step calculate the value of K for proposed work using bootstrap sampling and performance calculation and after the select the best K in performance matrix. When get the value of K from Phase-1, use it in Phase-2 for calculating beast nearest neighbor. Now Phas-2, again we apply the bootstrap sampling but in this time work on original dataset and clean that original data sets using clean corpus, make document matrix, remove sparse terms. In fifth step Find the best K nearest neighbor to meet training dataset by using following equation:- Wr= 1/ [d (xi, xq)2 + 0.001] After calculate the weight return the class label. VII. CONCLUSION In this proposed work, we investigated the factors that reduced the time complexity of document classification. The proposed approach overcomes the limitation of traditional K-nearest neighbor by incorporating neighbor weighted and dynamically picking K to provide best result, this proposed work also use the bootstrap sampling technique which is the method for assigning measure of accuracy to sample estimate. We have measured accuracy of the proposed approach with the standard K-nearest neighbor on 20,000 newsgroup documents dataset downloaded from [13] and accuracy of the classifier increases by 11.32 % ( on average ) in comparison to the earlier approach. REFERENCES [1] Berry Michael W., (2004), ―Automatic Discovery of Similar Words‖, in ―Survey of Text Mining: Clustering, Classification and Retrieval‖, Springer Verlag, New York, LLC, 24-43. [2] Navathe, Shamkant B., and Elmasri Ramez, (2000), ―Data Warehousing and Data Mining‖, in ―Fundamentals of Database Systems‖, Pearson Education pvt Inc, Singapore, 841-872. [3] Haralampos Karanikas and Babis Theodoulidis Manchester, (2001), ―Knowledge Discovery in Text and Text Mining Software‖, Centre for Research in Information Management, UK Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd. [4] Weiguo Fan, Linda Wallace, Stephanie Rich, and Zhongju Zhang, (2005), ―Tapping into the Power of Text Mining‖, Journal of ACM, Blacksburg. [5] Mita K. Dalal, Mukesh A. Zaveri (2011), ―Automatic Text Classification: A Technical Review‖, International Journalof Computer Applications (0975 – 8887), Volume 28– No.2. [6] Mohammed Abdul Wajeed (PhD), Dr.T.Adilakshmi, ―Text Classification Using Machine Learning‖, Journal of Theoretical and Applied Information Technology, 2005 - 2009 JATIT. [7] Jiang L., Cai Z., Wang D., and Jiang S (2007), ―Survey of Improving K-Nearest- Neighbor for Classification‖. In Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD ’07), vol. 1, pp. 679-683. [8] Efron B. Bootstrap methods: another look at the jackknife. Ann Statist 1979;7:1–26. [9] Varian, H.(2005). "Bootstrap Tutorial". Mathematica Journal, 9, 768-775. [10] Weisstein, Eric W. "Bootstrap Methods." From MathWorld--A Wolfram Web Resource. http://mathworld.wolfram.com/BootstrapMethods.html [11] K-nearest neighbor algorithm http://en.wikipedia.org/wiki/K- earest_neighbor_algorithm. [12] Jia Wu, Zhihua Cai, Zhechao, Gao (2010), ―Dynamic K-Nearest-Neighbor with Distance and Attribute Weighted for Classification,‖ International Conference on Electronics and Information Engineering (ICEIE), 978-1- 4244-7681 IEEE 2010. [13] http://web.ist.utl.pt/acardoso/datasets/ ( Visited before 2 Month before)