Algorithm Integration Behavior for Discovering Group Membership Rules
Information exploitation processes use different data mining algorithms for obtaining knowledge patterns from data obtained on the problem domain. One of the assumptions when working with these algorithms is that the complexity of the membership domain of the cases they use does not affect the quali...
- Autores:
-
silva d, jesus g
Rondón Rodriguez, Carlos Andres
Ospino Abuabara, Cesar
León Castro, Nadia Angélica Gisela
Perez Coronell, Leidy
Hernandez-P, Hugo
REDONDO BILBAO, OSMAN ENRIQUE
Cabrera, Danelys
- Tipo de recurso:
- http://purl.org/coar/resource_type/c_816b
- Fecha de publicación:
- 2019
- Institución:
- Corporación Universidad de la Costa
- Repositorio:
- REDICUC - Repositorio CUC
- Idioma:
- eng
- OAI Identifier:
- oai:repositorio.cuc.edu.co:11323/5577
- Acceso en línea:
- https://hdl.handle.net/11323/5577
https://repositorio.cuc.edu.co/
- Palabra clave:
- Information exploitation engineering
Information exploitation process
Complexity of domains
Clustering and induction algorithm performance
- Rights
- openAccess
- License
- CC0 1.0 Universal
Summary: | Information exploitation processes use different data mining algorithms for obtaining knowledge patterns from data obtained on the problem domain. One of the assumptions when working with these algorithms is that the complexity of the membership domain of the cases they use does not affect the quality of the obtained results. So, it is important to analyze the behavior of the information exploitation process through the discovery of group membership rules by using clustering and induction algorithms. This research characterizes the complexity of the domains in terms of the pieces of knowledge that describe them and information exploitation processes they seek to discover. The results of the experiments show that, in the case of the process for discovering group membership rules, the quality of the patterns differs depending on the algorithms used in the process and the complexity of the domains to which they are applied. |
---|