Privacy Protection and Perfect Classification Nature of C4.5 Algorithm
-
2018-04-25 https://doi.org/10.14419/ijet.v7i2.24.12055 -
Decision Tree, C4.5, ID3, Random Decision Tree, classification. -
Abstract
C4.5 algorithm is developed by Ross Quinlan which is the extension of ID3 algorithm used for generating a decision trees.Since the tree generated by C4.5 can be used for classification, so it’s also referred to as statistical classifier.Even though the Random Decision Tree is used to avoid the information leakage there are some problems and issues related to privacy maintenance.When we try to instantiate more instances for one class it leads to ambiguity at the same time creating new classes more and more will increase the complexity in RDT. These problems can be resolved by using our C4.5 algorithm.We can have any number of nodes in a network, each node can create its own tree or class and each class can initiate many number of instances for a disseminated classification consuming secure amount or threshold homomorphic encryption. The main objective of this paper is to discuss the ideal nature of the C4.5 algorithm and how they support this algorithm to be utilized in various datamining process.
Â
Â
-
References
[1] Privacy Preserving Distributed Classification Using C4.5 Decision Tree
[2] Optimization of C4.5 Decision Tree Algorithm for Data Mining Application
[3] Application of Decision Tree Based on C4.5 in Analysis of Coal Logistics Customer
[4] Quinlan, J.R., “C4.5: Programs for Machine Learningâ€, Morgan Kaufmann Publishers, 1993.
[5] Agrawal R, Srikant R,“Privacy Preserving Data Miningâ€, Association for Computing Machinery Special Interest Group on Management of Data (ACM SIGMOD) Conference, 2000.
[6] Alhamza Munther et.al “Network Traffic Classification - A Comparative Study of TwoCommon Decision Tree Methods: C4.5 and Random Forest†2nd International Conference on Electronic Design (ICED), August 19-21, 2014, Penang, Malaysia.
[7] J. Park, H.-R. Tyan, and C.-C. Kuo, "Internet traffic classification for scalable qos provision," in Multimedia and Expo, 2006 IEEE International Conference on, 2006, pp. 1221-1224.
[8] Li Jun et.al “Internet Traffic Classification Using Machine Learning†CHINACOM '07. Second International Conference on 22-24 Aug. 2007, Page(s)-239 – 243.[9] Arbres de décision, Ingénierie des connaissances (Master 2 ISC).[10] Ihsan A. Kareem , Mehdi G. Duaimi “Improved Accuracy for Decision Tree Algorithm Based on Unsupervised Discretizationâ€, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 176-183[11] IanH. Witten, Eibe Frank, & Mark A. Hall, “Data Mining Practical Machine Learning Tools and Techniquesâ€, Third Edition, Morgan Kaufmann, 2011.[12] KrzysztofJ.Cios,WitoldPedrycz,RomanW.Swiniarski,&LukaszA.Kurgan,“DataMining AKnowledge Discovery Approachâ€, Springer Science Business Media, LLC, 2007.[13] Gaurav L. Agrawal, Prof. Hitesh Gupta, “Optimization of C4.5 Decision Tree Algorithm for Data Mining Application†Volume 3, Issue 3, March 2013.[14] S.MerlinJ.Jesu, Vedha Nayhi, “Privacy Preserving Distributed Classification Using C4.5 Decision Treeâ€, International Journal of Innovative Research in Computer andCommunication Engineering, Vol.3, Special Issue 3, April-2015.
[15] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018
[16] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.
[17] S.V. Manikanthan, T. Padmapriya, Relay Based Architecture For Energy Perceptive For Mobile Adhoc Networks, Advances and Applications in Mathematical Sciences, Volume 17, Issue 1, November 2017, Pages 165-179
-
Downloads
-
How to Cite
Chokkanathan, K., & Koteeswaran, S. (2018). Privacy Protection and Perfect Classification Nature of C4.5 Algorithm. International Journal of Engineering & Technology, 7(2.24), 235-238. https://doi.org/10.14419/ijet.v7i2.24.12055Received date: 2018-04-24
Accepted date: 2018-04-24
Published date: 2018-04-25