Skip to main content

EXPLORE: A Novel Decision Tree Classification Algorithm

  • Conference paper
Data Security and Security Data (BNCOD 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6121))

Included in the following conference series:

Abstract

Decision tree algorithms such as See5 (or C5) are typically used in data mining for classification and prediction purposes. In this study we propose EXPLORE, a novel decision tree algorithm, which is a modification of See5. The modifications are made to improve the capability of a tree in extracting hidden patterns. Justification of the proposed modifications is also presented. We experimentally compare EXPLORE with some existing algorithms such as See5, REPTree and J48 on several issues including quality of extracted rules/patterns, simplicity, and classification accuracy of the trees. Our initial experimental results indicate advantages of EXPLORE over existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fukuda, T., Morimoto, Y., Morishita, S., Tokuyama, T.: Data mining using two-dimensional optimized association rules: Scheme, algorithms, and visualisation. ACM SIGMOD 25(2), 13–23 (1996)

    Article  Google Scholar 

  2. Han, J., Kamber, M.: Data Mining Concepts and Techniques. Morgan Kaufmann Publishers, San Diego (2001)

    MATH  Google Scholar 

  3. Islam, M.Z.: Privacy Preservation in Data Mining through Noise Addition. PhD thesis, School of Electrical Engineering and Computer Science, The University of Newcastle, Australia (June 2008)

    Google Scholar 

  4. Islam, M.Z., Brankovic, L.: Noise addition for protecting privacy in data mining. In: Proceedings of of the 6th Engineering Mathematics and Applications Conference (EMAC 2003), Sydney, Australia, vol. 2, pp. 85–90 (2003)

    Google Scholar 

  5. Kohavi, R.: Scaling up the accuracy of naive-bayes classifiers: a decision-tree hybrid. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (1996)

    Google Scholar 

  6. Kohavi, R., Quinlan, R.: Decision tree discovery. In: Handbook of Data Mining and Knowledge Discovery, pp. 267–276. University Press (1999)

    Google Scholar 

  7. WEKA:The University of Waikato. Weka 3: Data mining software in java, http://www.cs.waikato.ac.nz/ml/weka/ (visited on 12.08.09)

  8. Ross Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Mateo (1993)

    Google Scholar 

  9. Ross Quinlan, J.: Improved use of continuous attributes in c4.5. Journal of Artificial Intelligence Research 4, 77–90 (1996)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Islam, M.Z. (2012). EXPLORE: A Novel Decision Tree Classification Algorithm. In: MacKinnon, L.M. (eds) Data Security and Security Data. BNCOD 2010. Lecture Notes in Computer Science, vol 6121. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25704-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25704-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25703-2

  • Online ISBN: 978-3-642-25704-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics