Predicting Students' Performance using Modified ID3 Algorithm

L., Ramanathan; Dhanda, Saksham; D., Suresh Kumar
June 2013
International Journal of Engineering & Technology (0975-4024);Jun/Jul2013, Vol. 5 Issue 3, p2491
Academic Journal
The ability to predict performance of students is very crucial in our present education system. We can use data mining concepts for this purpose. ID3 algorithm is one of the famous algorithms present today to generate decision trees. But this algorithm has a shortcoming that it is inclined to attributes with many values. So , this research aims to overcome this shortcoming of the algorithm by using gain ratio(instead of information gain) as well as by giving weights to each attribute at every decision making point. Several other algorithms like J48 and Naive Bayes classification algorithm are also applied on the dataset. The WEKA tool was used for the analysis of J48 and Naive Bayes algorithms. The results are compared and presented. The dataset used in our study is taken from the School of Computing Sciences and Engineering (SCSE), VIT University.


Related Articles

  • Firefly and BAYES Classifier for Email Spam Classification in a Distributed Environment. Dhanaraj, Karthika Renuka; Palaniswami, Visalakshi // Australian Journal of Basic & Applied Sciences;Nov2014, Vol. 8 Issue 17, p118 

    Background: In today's computer world, Internet plays a main role. Internet mail system is a store and forward mechanism used for the purpose of exchanging documents across computer network through Internet. Unsolicited Bulk E-mail(UBE) known as spam mail is considered to be a major threat....

  • FEATURE SELECTION USING RANDOM FOREST IN INTRUSION DETECTION SYSTEM. Pundir, Sneh Lata; Amrita // International Journal of Advances in Engineering & Technology;Jul2013, Vol. 6 Issue 3, p1319 

    Intrusions are very common problem in the present scenario. To get rid of the intrusions we have the intrusion detection systems but we need to maintain the performance of the intrusion detection systems. For the intrusion detection system to be fast and effective an optimal feature subset...

  • An Entropy-based Adaptive Genetic Algorithm Approach on Data Mining for Classification Problems. Ghosh, Dipayan Kumar; Ghosh, Namita // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p3203 

    Genetic algorithm is one of the commonly used approaches on data mining. In this paper, we put forward a genetic algorithm approach for classification problems. Binary coding is adopted in which an individual in a population consists of a fixed number of rules that stand for a solution...

  • Statistical Measures to Determine Optimal Structure of Decision Tree: One versus One Support Vector Machine. Bala, Manju; Agrawal, R. K. // Defence Science Journal;2010, Vol. 60 Issue 4, p399 

    In this paper, one versus one optimal decision tree support vector machine (OvO-ODT SVM) framework is proposed to solve multi-class problems where the optimal structure of decision tree is determined using statistical measures, i.e., information gain, gini index, and chi-square. The performance...

  • A hybrid Evolutionary Functional Link Artificial Neural Network for Data mining and Classification. MILI, Faissal; HAMDI, Manel // International Journal of Advanced Computer Science & Application;Aug2012, Vol. 3 Issue 8, p89 

    This paper presents a specific structure of neural network as the functional link artificial neural network (FLANN). This technique has been employed for classification tasks of data mining. In fact, there are a few studies that used this tool for solving classification problems. In this present...

  • Data Mining Techniques in Customer Churn Prediction. Tsai, Chih-Fong; Lu, Yu-Hsin // Recent Patents on Computer Science;2010, Vol. 3 Issue 1, p28 

    Customer churn prediction is one of the most important problems in customer relationship management (CRM). Its aim is to retain valuable customers to maximize the profit of a company. To predict whether a customer will be a churner or non-churner, there are a number of data mining techniques...

  • Predicting the Severity of Breast Masses with Data Mining Methods. Mokhtar, Sahar A.; Elsayad, Alaa. M. // International Journal of Computer Science Issues (IJCSI);Mar2013, Vol. 10 Issue 2, p160 

    Mammography is the most effective and available tool for breast cancer screening. However, the low positive predictive value of breast biopsy resulting from mammogram interpretation leads to approximately 70% unnecessary biopsies with benign outcomes. Data mining algorithms could be used to help...

  • Investigation of Data Mining Techniques in Fraud Detection: Credit Card. Gayathri, R.; Malathi, A. // International Journal of Computer Applications;Nov2013, Vol. 82, p12 

    In recent times the more secure data transfer takes place almost by means of internet. Apart from the corporate companies, publics also started using the network media. At the same time the risk also increases in secure data transfer. One of the major issue among them is credit card fraud...

  • PARM: A NOVEL POSITIVE ASSOCIATION RULE MINING ALGORITHM FOR DISCOVERING MALEVOLENT APPLICATIONS IN WINDOWS OPERATING SYSTEMS. R, Chandrasekar; Deepa, N. // International Journal of Engineering & Technology (0975-4024);Jun/Jul2013, Vol. 5 Issue 3, p2461 

    The most important vulnerability to the current World Wide Web is the malevolent applications. Generally, these applications are used for interrupting the normal functioning of a system and accessing unprivileged and confidential data and other wicked activities. Malevolent applications were...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics