ID3 Derived Fuzzy Rules for Predicting the Students AcedemicPerformance
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: This paper presents a technique to use ID3 decision rules to produce fuzzy rules to get the optimizeprediction of the students academic performance. In this paper, a the student administrative data for a class isused in order to classify the students final year marks in fuzzy logic prediction . This paper is using the machinelearning approach to generate the rules so as to overcome the difficulties in a conventional approach likederiving fuzzy rules base from expert experience. This research provides us with: a way to producemeaningful and simple fuzzy rules; a method to fuzzify ID3-derived rules to deal with many inputs variables;and a de-fuzzification system to get the output in human understandable form. The Id3 tree is generated by theWEKA software and is utilized by the Fuzzy Inference System . A Fuzzy inference system was constructed to givethe final crisp output. The ID3 was generated on 300 training data to get the better output. The output of ourFuzzy Student Performance Predictor was then tested on 50 test data to check for the accuracy.
Authors and Affiliations
Anita Chaware , Dr. U. A. Lanjewar
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
Using Aspect Ratio to Classify Red Blood Images
In automated medical diagnosis, shape plays a key role in image processing and pattern matching. In particular, microscopic visual examination, as used in this paper, extensively uses shape to diagnose anemia u...
“Software Theft Detection for JavaScript programs based ondynamic birthmark extracted from runtime heap graph”
Abstract: Software’s, programs are valuable assets to developer companies. However, the source code ofprograms can be theft and JavaScript programs whose code is easily available which is a serious threat to theind...
The impact of the attachment implementation in the healthcaredomain
Abstract: An “attachment” is any supplemental health documentation needed from a provider to support aspecific business process in the Healthcare domain while using electronic exchange within the organization orbet...
Audio Denoising, Recognition and Retrieval by Using Feature Vectors
In this paper, we present the study of audio signal denoising, recognizing its audio type and retrieving similar signals from the database. Primarily the signal is denoised to remove any noise present in the,unknown sign...