ICIEMS 2015

International Conference on Information Engineering, Management and Security 2015

 


ICIEMS 2015 Kokula Krishna Hari K
Publication Meta Value
Short Title ICIEMS 2015
Publisher ASDF, India
ISBN 13 978-81-929742-7-9
ISBN 10 81-929742-7-8
Language English
Type Hard Bound - Printed Book
Copyrights ICIEMS Organizers / DCRC, London, UK
Editor-in-Chief Kokula Krishna Hari K
Conference Dates 13 - 14, August 2015
Venue Country IITM-RP, Chennai, India
Submitted Papers 410
Acceptance Rate 4.11%
Website www.iciems.in

Paper 024


Utilization of Rough Set Reduct Algorithm and Evolutionary Techniques for Medical Domain using Feature Selection

Utilization of Rough Set Reduct Algorithm and Evolutionary Techniques for Medical Domain using Feature Selection

T Keerthika1, K Premalatha2

1Assistant Professor, Department of Information Technology, Sri Krishna College of Engineering and Technology, Tamil Nadu, India, 2Professor, Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Tamil Nadu, India

Abstract

With the real time data, results in increasing in size. Feature selection (FS) has been considered as the problem of selecting these input features that are most predictive of a given outcome. Also current methods are inadequate. By considering this scenario, this paper proposes the incremental techniques; in fact this has found unsuccessful application in tasks that involve datasets contain huge number of features, which could be impossible to process further. For achieving this, these evolutionary techniques such as Genetic Algorithm, Particle Swarm Optimization Algorithm and Ant Colony Algorithm are considered for comparative performance analysis in which the experimental results shows that feature selection is best for minimal reductions.

Author's Profile

T Keerthika : Profile

K Premalatha : Profile

Cite this Article as Follows

T Keerthika, K Premalatha. "Utilization of Rough Set Reduct Algorithm and Evolutionary Techniques for Medical Domain using Feature Selection." International Conference on Information Engineering, Management and Security (2015): 144-151. Print.