SlideShare ist ein Scribd-Unternehmen logo
1 von 19
ByAjaydeep
Abhishek kutiyal


Classification



Classification is the process of finding a model that
describes and distinguishes data classes or concept .
for the purpose of being able to use the model to
predict the class of objects whose class label is
unknown.



 predicts categorical class labels (discrete or

nominal)

 classifies data (constructs a model) based on the

training set and the values (class labels) in a
classifying attribute and uses it in classifying new
data
2
Classification
Algorithms

Training
Data

name

age

Mike
Mary
Bill
Jim
Dave
Anne

young

incomeloan decision

low
young
low
midage high
midage low
senior
low
senior medium

risky

Classifier
(Model)

risky
safe
risky
safe
safe

IF age=youth THEN loan_deci=risky
IF income=high then loan_deci=safe
IF age=mid AND income=low THEN
Loan_deci=risky
3
Classifier
Testing
Data

Unseen Data
(john,mid_age,low)

name age income loan_deci
Tom
low
Safe
senior
Mariya mid_age low
risky
George mid_age high
safe
......
.....
......
.......

Loan deci?




Genetic Algorithms
Rough Set Approach
Fuzzy set Approach





Genetic algorithms are examples of
evolutionary computing methods and are
optimization-type algorithms.
Given a population of potential problem
solutions (individuals).
evolutionary computing expands this
population with new and potentially
better solutions.




The basis for evolutionary computing
algorithms is biological evolution, where
over time evolution produces the best or
“fittest” individuals.
In Data mining, genetic algorithms may
be used for clustering, prediction, and
even association rules.


Individual (chromosome):

• feasible solution in an optimization problem



Population
• Set of individuals
• Should be maintained in each generation




The most important starting point to
develop a genetic algorithm
Each gene has its special meaning
Based on this representation, we can
define
• fitness evaluation function,
• crossover operator,
• mutation operator.
The fitness function takes a
single chromosome as input
and returns a measure of the
goodness of the
solution
represented
by
the
chromosome.


In genetic algorithms, reproduction is defined
by precise algorithms that indicate how to
combine the given set of individuals to produce
new ones. These are called “crossover
algorithms”.



Given two individuals; parents from a
population, the crossover technique generates
new individuals (offspring or children) by
switching subsequences of the string


Single-point Crossover

1 1 1 0 1 0 0 1 0 0 0
0 0 0



1 1 1 0 1 0 1 0 1 0 1
0 0 0

0 1

0 1 0 1 0 1

0 1

0 0 1 0 0 0

Two-point Crossover
1 1 1 0 1 0 0 1 0 0 0



1 1 0 0 1 0 1 1 0 0 0

0 0 0

0 0 1 0 1 0 0 0 1 0 1

0 1

0 1 0 1 0 1

Uniform Crossover

1 0 0 1 1 0 1 0 0 1 1

Crossover template
Crossover template

1 1 1 0 1 0 0 1 0 0 0

1 0 0 0 1 0 0 0 1 0 0

0 0

0 1 1 0 1 0 1 1 0 0 1

0 0 1

0 1 0 1 0 1



Usually change a single bit in a bit string
This operator should happen with very
low probability.
0

1

1

0

1
Mutation point
(random)

0

1

1

1

1
0 1 0 0 1
1 1 1 0 0
0 0 1 1 1
0 1 1 0 1
1 1 1 0 0
1 1 1 0 1

old generation

1 1

1 0 1

1 1

0 0 1

0 1

0 0 1

0 1

1 0 1

Crossover point
randomly selected

Probabilistically select individuals
Probabilistically select individuals


Crossover mates are probabilistically
selected based on their fitness value.

new generation

Mutation point
(random)
0 1

1 1 1

1 1 0
0 1 1

0 1
1 1

0 1 1 0 1
1 1 1 0 0
1 1 1 0 1




A rough set is a formal approximation of a
crisp set in terms of a pair of sets which give
the lower and the upper approximation of the
original set.
The tuple composed of the lower and upper
approximation is called a rough set.
•

A Rough Set Definition for a given class C is
approximated by two sets1. Lower Approximation of C consist of
all of
the data tuples that based on the
knowledge of the attributes, are certain
belong to C without ambiguity.
2. Upper Approximation of C consist of
all of the data tuples that based on the
knowledge of the attributes, cannot be
described as not belonging to
C.
One of the new data mining theories is the rough set
theories that can be used for
1.Classification to discover structured relationship within
noisy data.
2.Attributes subset selection.
3.Reduction of data set.
4.Finding hidden data patterns
5. Generation of decision rules








Fuzzy logic uses truth values between 0.0 and 1.0 to
represent the degree of membership (such as using
fuzzy membership graph)
Attribute values are converted to fuzzy values
• e.g., income is mapped into the discrete categories
{low, medium, high} with fuzzy values calculated
For a given new sample, more than one fuzzy value may
apply
Each applicable rule contributes a vote for
membership in the categories
Typically, the truth values for each predicted category
are summed, and these sums are combined
18
Other classification methods in data mining

Weitere ähnliche Inhalte

Was ist angesagt?

Discriminant analysis basicrelationships
Discriminant analysis basicrelationshipsDiscriminant analysis basicrelationships
Discriminant analysis basicrelationships
divyakalsi89
 
Irt 1 pl, 2pl, 3pl.pdf
Irt 1 pl, 2pl, 3pl.pdfIrt 1 pl, 2pl, 3pl.pdf
Irt 1 pl, 2pl, 3pl.pdf
Carlo Magno
 

Was ist angesagt? (20)

Java -lec-3
Java -lec-3Java -lec-3
Java -lec-3
 
Catching co occurrence information using word2vec-inspired matrix factorization
Catching co occurrence information using word2vec-inspired matrix factorizationCatching co occurrence information using word2vec-inspired matrix factorization
Catching co occurrence information using word2vec-inspired matrix factorization
 
Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)
 
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
 
Discriminant analysis
Discriminant analysisDiscriminant analysis
Discriminant analysis
 
Machine Learning Clustering
Machine Learning ClusteringMachine Learning Clustering
Machine Learning Clustering
 
Neural collaborative filtering-발표
Neural collaborative filtering-발표Neural collaborative filtering-발표
Neural collaborative filtering-발표
 
simple discriminant
simple discriminantsimple discriminant
simple discriminant
 
Selection Sort - Vipin Ramola
Selection Sort - Vipin RamolaSelection Sort - Vipin Ramola
Selection Sort - Vipin Ramola
 
Discriminant analysis basicrelationships
Discriminant analysis basicrelationshipsDiscriminant analysis basicrelationships
Discriminant analysis basicrelationships
 
Random Forest and KNN is fun
Random Forest and KNN is funRandom Forest and KNN is fun
Random Forest and KNN is fun
 
Unit 2(advanced class modeling & state diagram)
Unit  2(advanced class modeling & state diagram)Unit  2(advanced class modeling & state diagram)
Unit 2(advanced class modeling & state diagram)
 
Irt 1 pl, 2pl, 3pl.pdf
Irt 1 pl, 2pl, 3pl.pdfIrt 1 pl, 2pl, 3pl.pdf
Irt 1 pl, 2pl, 3pl.pdf
 
discriminant analysis
discriminant analysisdiscriminant analysis
discriminant analysis
 
class diagram
class diagramclass diagram
class diagram
 
Discriminant analysis
Discriminant analysisDiscriminant analysis
Discriminant analysis
 
PCA with princomp and prcomp
PCA with princomp and prcompPCA with princomp and prcomp
PCA with princomp and prcomp
 
Discriminant analysis
Discriminant analysisDiscriminant analysis
Discriminant analysis
 
Abstract classes
Abstract classesAbstract classes
Abstract classes
 
Neural Nets Deconstructed
Neural Nets DeconstructedNeural Nets Deconstructed
Neural Nets Deconstructed
 

Ähnlich wie Other classification methods in data mining

Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Simplilearn
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Harry Potter
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
James Wong
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Young Alista
 
Data miningmaximumlikelihood
Data miningmaximumlikelihoodData miningmaximumlikelihood
Data miningmaximumlikelihood
Fraboni Ec
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Tony Nguyen
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
Luis Goldster
 
Data Science Interview Questions | Data Science Interview Questions And Answe...
Data Science Interview Questions | Data Science Interview Questions And Answe...Data Science Interview Questions | Data Science Interview Questions And Answe...
Data Science Interview Questions | Data Science Interview Questions And Answe...
Simplilearn
 

Ähnlich wie Other classification methods in data mining (20)

Decision Trees for Classification: A Machine Learning Algorithm
Decision Trees for Classification: A Machine Learning AlgorithmDecision Trees for Classification: A Machine Learning Algorithm
Decision Trees for Classification: A Machine Learning Algorithm
 
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
Machine Learning Tutorial Part - 2 | Machine Learning Tutorial For Beginners ...
 
Supervised and unsupervised learning
Supervised and unsupervised learningSupervised and unsupervised learning
Supervised and unsupervised learning
 
Islamic University Pattern Recognition & Neural Network 2019
Islamic University Pattern Recognition & Neural Network 2019 Islamic University Pattern Recognition & Neural Network 2019
Islamic University Pattern Recognition & Neural Network 2019
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Data miningmaximumlikelihood
Data miningmaximumlikelihoodData miningmaximumlikelihood
Data miningmaximumlikelihood
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Data mining maximumlikelihood
Data mining maximumlikelihoodData mining maximumlikelihood
Data mining maximumlikelihood
 
Anomaly Detection for Real-World Systems
Anomaly Detection for Real-World SystemsAnomaly Detection for Real-World Systems
Anomaly Detection for Real-World Systems
 
Data Science Interview Questions | Data Science Interview Questions And Answe...
Data Science Interview Questions | Data Science Interview Questions And Answe...Data Science Interview Questions | Data Science Interview Questions And Answe...
Data Science Interview Questions | Data Science Interview Questions And Answe...
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkkOBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
OBJECTRECOGNITION1.pptxjjjkkkkjjjjkkkkkkk
 
Classifiers
ClassifiersClassifiers
Classifiers
 
Building classification model, tree model, confusion matrix and prediction ac...
Building classification model, tree model, confusion matrix and prediction ac...Building classification model, tree model, confusion matrix and prediction ac...
Building classification model, tree model, confusion matrix and prediction ac...
 
Clustering algorithm Machine Learning
Clustering algorithm Machine LearningClustering algorithm Machine Learning
Clustering algorithm Machine Learning
 
03 Data Mining Techniques
03 Data Mining Techniques03 Data Mining Techniques
03 Data Mining Techniques
 
Data Mining Lecture_8(a).pptx
Data Mining Lecture_8(a).pptxData Mining Lecture_8(a).pptx
Data Mining Lecture_8(a).pptx
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Other classification methods in data mining

  • 2.  Classification  Classification is the process of finding a model that describes and distinguishes data classes or concept . for the purpose of being able to use the model to predict the class of objects whose class label is unknown.   predicts categorical class labels (discrete or nominal)  classifies data (constructs a model) based on the training set and the values (class labels) in a classifying attribute and uses it in classifying new data 2
  • 3. Classification Algorithms Training Data name age Mike Mary Bill Jim Dave Anne young incomeloan decision low young low midage high midage low senior low senior medium risky Classifier (Model) risky safe risky safe safe IF age=youth THEN loan_deci=risky IF income=high then loan_deci=safe IF age=mid AND income=low THEN Loan_deci=risky 3
  • 4. Classifier Testing Data Unseen Data (john,mid_age,low) name age income loan_deci Tom low Safe senior Mariya mid_age low risky George mid_age high safe ...... ..... ...... ....... Loan deci?
  • 5.    Genetic Algorithms Rough Set Approach Fuzzy set Approach
  • 6.    Genetic algorithms are examples of evolutionary computing methods and are optimization-type algorithms. Given a population of potential problem solutions (individuals). evolutionary computing expands this population with new and potentially better solutions.
  • 7.   The basis for evolutionary computing algorithms is biological evolution, where over time evolution produces the best or “fittest” individuals. In Data mining, genetic algorithms may be used for clustering, prediction, and even association rules.
  • 8.  Individual (chromosome): • feasible solution in an optimization problem  Population • Set of individuals • Should be maintained in each generation
  • 9.    The most important starting point to develop a genetic algorithm Each gene has its special meaning Based on this representation, we can define • fitness evaluation function, • crossover operator, • mutation operator.
  • 10. The fitness function takes a single chromosome as input and returns a measure of the goodness of the solution represented by the chromosome.
  • 11.  In genetic algorithms, reproduction is defined by precise algorithms that indicate how to combine the given set of individuals to produce new ones. These are called “crossover algorithms”.  Given two individuals; parents from a population, the crossover technique generates new individuals (offspring or children) by switching subsequences of the string
  • 12.  Single-point Crossover 1 1 1 0 1 0 0 1 0 0 0 0 0 0  1 1 1 0 1 0 1 0 1 0 1 0 0 0 0 1 0 1 0 1 0 1 0 1 0 0 1 0 0 0 Two-point Crossover 1 1 1 0 1 0 0 1 0 0 0  1 1 0 0 1 0 1 1 0 0 0 0 0 0 0 0 1 0 1 0 0 0 1 0 1 0 1 0 1 0 1 0 1 Uniform Crossover 1 0 0 1 1 0 1 0 0 1 1 Crossover template Crossover template 1 1 1 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 1 1 0 1 0 1 1 0 0 1 0 0 1 0 1 0 1 0 1
  • 13.   Usually change a single bit in a bit string This operator should happen with very low probability. 0 1 1 0 1 Mutation point (random) 0 1 1 1 1
  • 14. 0 1 0 0 1 1 1 1 0 0 0 0 1 1 1 0 1 1 0 1 1 1 1 0 0 1 1 1 0 1 old generation 1 1 1 0 1 1 1 0 0 1 0 1 0 0 1 0 1 1 0 1 Crossover point randomly selected Probabilistically select individuals Probabilistically select individuals  Crossover mates are probabilistically selected based on their fitness value. new generation Mutation point (random) 0 1 1 1 1 1 1 0 0 1 1 0 1 1 1 0 1 1 0 1 1 1 1 0 0 1 1 1 0 1
  • 15.   A rough set is a formal approximation of a crisp set in terms of a pair of sets which give the lower and the upper approximation of the original set. The tuple composed of the lower and upper approximation is called a rough set.
  • 16. • A Rough Set Definition for a given class C is approximated by two sets1. Lower Approximation of C consist of all of the data tuples that based on the knowledge of the attributes, are certain belong to C without ambiguity. 2. Upper Approximation of C consist of all of the data tuples that based on the knowledge of the attributes, cannot be described as not belonging to C.
  • 17. One of the new data mining theories is the rough set theories that can be used for 1.Classification to discover structured relationship within noisy data. 2.Attributes subset selection. 3.Reduction of data set. 4.Finding hidden data patterns 5. Generation of decision rules
  • 18.      Fuzzy logic uses truth values between 0.0 and 1.0 to represent the degree of membership (such as using fuzzy membership graph) Attribute values are converted to fuzzy values • e.g., income is mapped into the discrete categories {low, medium, high} with fuzzy values calculated For a given new sample, more than one fuzzy value may apply Each applicable rule contributes a vote for membership in the categories Typically, the truth values for each predicted category are summed, and these sums are combined 18

Hinweis der Redaktion

  1. Genetic algorithms accept their input coded as a finite length string (or chromosome.) Each of the elements in the chromosome is a gene, and each gene has an allele value.