ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
A two-stage feature selection method for text
categorization by using information gain, principal
component analysis and genetic algorithm
Presented by
Project scope
? The application will serve the two-stage feature selection
method for text categorization by using information
gain, principal component analysis and genetic
algorithm. Due to the increasing number of documents in
digital form, automated text categorization has become
more promising in the decades.
? A two-stage feature selection and feature extraction
is used to reduce the high dimensionality of a
feature space composing of a large number of
terms, remove redundant and irrelevant features
from the feature space and thereby improve the
performance of text categorization
User classes & characteristics
There are two user module viz. decision tree and KNN
classifier.
? Decision tree: The first phase is tree growing where a
tree is built by greedily splitting each tree node. Because
the tree can over fit the training data, in the second
phase, the over fitted branches of the tree are removed.
? KNN classifier: The KNN classifier ranks the document¡¯s
neighbors among the training documents and uses the
class labels of the k most similar neighbors. Similarity
type between two documents may be measured by the
Euclidean distance, cosine measure, etc.
Operating environment
This application is developed in java platform and will be hosted by a
system using Java JDK and tomcat server. The system will
primarily be developed and tested on Windows Operating Systems.
But our goal is to make it a platform independent solution. The target
platforms are:
Linux
Microsoft Windows &
Solaris.
Design and Implementation
Constraints
All designing and coding will be done on Java
Platform. However application can be
implemented in C#.NET.
Assumptions and Dependencies
Since the application is based on Java platform. Hence we assume that user
system must installed JVM to run this application.
SYSTEM FEATURE
Functional requirements
Hard disk 80 GB
RAM 1GB
Processor Intel Pentium IV
Technology Java
Tools Net beans
Operating System Windows
EXTERNAL INTERFACE REQUIREMENTS
User Interfaces: The application is accessible through web browser. It will interact
with its users with web components interface. There are two types of user for this
system retail manager or analyst and customer each can interact with the system with
the following UIs.
Main screen: On this interface there are some options shown as per the user type
For the analysts there are some options related to what type of analysis they want to
do.
Method wise analysis
Decision tree analysis
KNN classifier analysis
For each of the above analysis there is separate new screen showing advanced
options for that analysis that is something like stated below:
There are buttons for ¡®In which format output should be displayed Graphical formats
like pie charts , Bar graphs, Tabular format.
Output screen:
On this screen output will be produced in graphical format with proper description
and some options like save result for further use or compare it with old results or
you may discard it if it is of no use.
Software Interfaces
? Name: Java
Version Number: Version 6.0
? Name: Mysql
Version Number: Version 7.0.1
The system must use My SQL server as its database
? Name: NetBeans
Version Number: Version 6 onward
Communications Interfaces
The system will use Apache/tomcat server as the main
communication protocol trough internet/network.
NON-FUNCTIONAL REQUIREMENTS
Performance Requirements
? System can produce results faster on 4GB RAM.
? It may take more time for peak loads at main node
? The system will be available 100% of the time. Once
there is a fatal error, the system will provide
understandable feedback to the user.
Safety and Security Requirements
? All data will be backed-up everyday automatically and also the
system administrator can back- up the data as a function for
him.
? The system is designed in modules where errors can be
detected and fixed easily. This makes it easier to install and
updates new functionality if required.
Software Quality Attributes
? Usability : The application seem to user friendly since the GUI is
interactive.
? Maintainability : This application is maintained for long period of
time since it will be implemented under java platform .
? Reusability : The application can be reusable by expanding it to the
new modules. Performance: The application seems to be
performing faster under 4 GB of RAM. However, the basic
requirement to run the application is 1GB.
? Security: Since the application is developed on JAVA .It is much
more secure than the other environment.
Data flow diagram
UML Activity diagram
UML State transition diagram
UML Sequence diagram
TECHNICAL SPECIFICATION
ADVANTAGES
? The application is platform independent since it is
developed in JAVA.
? The behavior of the application is user friendly since the
GUI is compatible with all operating environment.
Disadvantage
? Since the application performs several task at same
time, It seems to generate output at long interval of time.
Applications
? Spam filtering, a process which tries to discern E-mail
spam messages from legitimate emails
? Email routing, sending an email sent to a general address to a
specific address or mailbox depending on topic.
? Language identification, automatically determining the language of a
text
? Genre classification, automatically determining the genre of a text
? Readability assessment, automatically determining the degree of
readability of a text, either to find suitable materials for different age
groups or reader types or as part of a larger text
simplification system.

More Related Content

Similar to A two stage feature selection method for text categorization (20)

2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment system
Parag Tamhane
?
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Nikhil Jain
?
Chat application through client server management system project.pdf
Chat application through client server management system project.pdfChat application through client server management system project.pdf
Chat application through client server management system project.pdf
Kamal Acharya
?
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
Abhay Ananda Shukla
?
Online airline reservation system project report.pdf
Online airline reservation system project report.pdfOnline airline reservation system project report.pdf
Online airline reservation system project report.pdf
Kamal Acharya
?
Onine exam 1
Onine exam 1Onine exam 1
Onine exam 1
priyadharshini murugan
?
travel portal for flights booking trave
travel portal for flights booking  travetravel portal for flights booking  trave
travel portal for flights booking trave
GNaveenKanth
?
ghgh.pdf travel portal for flights booking right
ghgh.pdf travel portal for flights booking rightghgh.pdf travel portal for flights booking right
ghgh.pdf travel portal for flights booking right
GNaveenKanth
?
project report on for travel portal for flights booking site
project report on for travel portal for flights booking siteproject report on for travel portal for flights booking site
project report on for travel portal for flights booking site
GNaveenKanth
?
travel portal career flights booking site
travel portal career flights booking sitetravel portal career flights booking site
travel portal career flights booking site
GNaveenKanth
?
travel portal for flights bookingn sbite
travel portal for flights bookingn sbitetravel portal for flights bookingn sbite
travel portal for flights bookingn sbite
GNaveenKanth
?
Documentation
DocumentationDocumentation
Documentation
Rajesh Seendripu
?
SANJAY_SINGH
SANJAY_SINGHSANJAY_SINGH
SANJAY_SINGH
SANJAY SINGH
?
Performance comparison on java technologies a practical approach
Performance comparison on java technologies   a practical approachPerformance comparison on java technologies   a practical approach
Performance comparison on java technologies a practical approach
csandit
?
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACHPERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
cscpconf
?
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
?
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
?
Suspicious email detection project report.pdf
Suspicious email detection project report.pdfSuspicious email detection project report.pdf
Suspicious email detection project report.pdf
Kamal Acharya
?
quiz half ppt
quiz half pptquiz half ppt
quiz half ppt
mohit91
?
Scalable constrained spectral clustering
Scalable constrained spectral clusteringScalable constrained spectral clustering
Scalable constrained spectral clustering
Nishanth Harapanahalli
?
2 d barcode based mobile payment system
2 d barcode based mobile payment system2 d barcode based mobile payment system
2 d barcode based mobile payment system
Parag Tamhane
?
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Second phase report on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTIO...
Nikhil Jain
?
Chat application through client server management system project.pdf
Chat application through client server management system project.pdfChat application through client server management system project.pdf
Chat application through client server management system project.pdf
Kamal Acharya
?
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
Abhay Ananda Shukla
?
Online airline reservation system project report.pdf
Online airline reservation system project report.pdfOnline airline reservation system project report.pdf
Online airline reservation system project report.pdf
Kamal Acharya
?
travel portal for flights booking trave
travel portal for flights booking  travetravel portal for flights booking  trave
travel portal for flights booking trave
GNaveenKanth
?
ghgh.pdf travel portal for flights booking right
ghgh.pdf travel portal for flights booking rightghgh.pdf travel portal for flights booking right
ghgh.pdf travel portal for flights booking right
GNaveenKanth
?
project report on for travel portal for flights booking site
project report on for travel portal for flights booking siteproject report on for travel portal for flights booking site
project report on for travel portal for flights booking site
GNaveenKanth
?
travel portal career flights booking site
travel portal career flights booking sitetravel portal career flights booking site
travel portal career flights booking site
GNaveenKanth
?
travel portal for flights bookingn sbite
travel portal for flights bookingn sbitetravel portal for flights bookingn sbite
travel portal for flights bookingn sbite
GNaveenKanth
?
Performance comparison on java technologies a practical approach
Performance comparison on java technologies   a practical approachPerformance comparison on java technologies   a practical approach
Performance comparison on java technologies a practical approach
csandit
?
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACHPERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
PERFORMANCE COMPARISON ON JAVA TECHNOLOGIES - A PRACTICAL APPROACH
cscpconf
?
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
?
Suspicious email detection project report.pdf
Suspicious email detection project report.pdfSuspicious email detection project report.pdf
Suspicious email detection project report.pdf
Kamal Acharya
?
quiz half ppt
quiz half pptquiz half ppt
quiz half ppt
mohit91
?

More from Parag Tamhane (6)

Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
?
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secret
Parag Tamhane
?
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptography
Parag Tamhane
?
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognition
Parag Tamhane
?
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
?
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
Parag Tamhane
?
Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
?
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secret
Parag Tamhane
?
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptography
Parag Tamhane
?
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognition
Parag Tamhane
?
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
?
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
Parag Tamhane
?

Recently uploaded (20)

From native code gems to Java treasures with jextract
From native code gems to Java treasures with jextractFrom native code gems to Java treasures with jextract
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
?
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No KubernetesJava on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
VictorSzoltysek
?
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
BookNet Canada
?
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptxModern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Dash Technologies Inc
?
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥ÈDragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
CRI Japan, Inc.
?
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered NepalDigital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
ICT Frame Magazine Pvt. Ltd.
?
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio WebUiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
DianaGray10
?
Windows Client Privilege Escalation-Shared.pptx
Windows Client Privilege Escalation-Shared.pptxWindows Client Privilege Escalation-Shared.pptx
Windows Client Privilege Escalation-Shared.pptx
Oddvar Moe
?
How Air Coil Inductors Work By Cet Technology
How Air Coil Inductors Work By Cet TechnologyHow Air Coil Inductors Work By Cet Technology
How Air Coil Inductors Work By Cet Technology
CET Technology
?
Graphs & GraphRAG - Essential Ingredients for GenAI
Graphs & GraphRAG - Essential Ingredients for GenAIGraphs & GraphRAG - Essential Ingredients for GenAI
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j
?
How to manage technology risk and corporate growth
How to manage technology risk and corporate growthHow to manage technology risk and corporate growth
How to manage technology risk and corporate growth
Arlen Meyers, MD, MBA
?
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
DianaGray10
?
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
ScyllaDB
?
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
202408_JAWSPANKRATION_Introduction_of_Minaden.pdf
NTTDOCOMO-ServiceInnovation
?
Dev Dives: Unleash the power of macOS Automation with UiPath
Dev Dives: Unleash the power of macOS Automation with UiPathDev Dives: Unleash the power of macOS Automation with UiPath
Dev Dives: Unleash the power of macOS Automation with UiPath
UiPathCommunity
?
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You NeededSafer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safe Software
?
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
IBsolution GmbH
?
Achieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
Achieving Extreme Scale with ScyllaDB: Tips & TradeoffsAchieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
Achieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
ScyllaDB
?
AI Revolution unleashed with AI Foundry at AI Tour Brussels
AI Revolution unleashed with AI Foundry at AI Tour BrusselsAI Revolution unleashed with AI Foundry at AI Tour Brussels
AI Revolution unleashed with AI Foundry at AI Tour Brussels
Nathan Bijnens
?
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-WorldAll-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
Safe Software
?
From native code gems to Java treasures with jextract
From native code gems to Java treasures with jextractFrom native code gems to Java treasures with jextract
From native code gems to Java treasures with jextract
Ana-Maria Mihalceanu
?
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No KubernetesJava on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
Java on AWS Without the Headaches - Fast Builds, Cheap Deploys, No Kubernetes
VictorSzoltysek
?
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
New from BookNet Canada for 2025: BNC CataList - Tech Forum 2025
BookNet Canada
?
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptxModern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Modern Diagnostic Healthcare with Medical Imaging Solutions.pptx
Dash Technologies Inc
?
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥ÈDragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN  NB-IoT  LTE cat.M1ÉÌÆ·¥ê¥¹¥È
Dragino¥×¥í¥À¥¯¥È¥«¥¿¥í¥° LoRaWAN NB-IoT LTE cat.M1ÉÌÆ·¥ê¥¹¥È
CRI Japan, Inc.
?
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered NepalDigital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
Digital Nepal Framework 2.0: A Step Towards a Digitally Empowered Nepal
ICT Frame Magazine Pvt. Ltd.
?
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio WebUiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
UiPath NY AI Series: Session 4: UiPath AutoPilot for Developers using Studio Web
DianaGray10
?
Windows Client Privilege Escalation-Shared.pptx
Windows Client Privilege Escalation-Shared.pptxWindows Client Privilege Escalation-Shared.pptx
Windows Client Privilege Escalation-Shared.pptx
Oddvar Moe
?
How Air Coil Inductors Work By Cet Technology
How Air Coil Inductors Work By Cet TechnologyHow Air Coil Inductors Work By Cet Technology
How Air Coil Inductors Work By Cet Technology
CET Technology
?
Graphs & GraphRAG - Essential Ingredients for GenAI
Graphs & GraphRAG - Essential Ingredients for GenAIGraphs & GraphRAG - Essential Ingredients for GenAI
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j
?
How to manage technology risk and corporate growth
How to manage technology risk and corporate growthHow to manage technology risk and corporate growth
How to manage technology risk and corporate growth
Arlen Meyers, MD, MBA
?
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
SAP Automation with UiPath: SAP Test Automation - Part 5 of 8
DianaGray10
?
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
Securely Serving Millions of Boot Artifacts a Day by Joa?o Pedro Lima & Matt ...
ScyllaDB
?
Dev Dives: Unleash the power of macOS Automation with UiPath
Dev Dives: Unleash the power of macOS Automation with UiPathDev Dives: Unleash the power of macOS Automation with UiPath
Dev Dives: Unleash the power of macOS Automation with UiPath
UiPathCommunity
?
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You NeededSafer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safer¡¯s Picks: The 6 FME Transformers You Didn¡¯t Know You Needed
Safe Software
?
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
SAP Business Data Cloud: Was die neue SAP-L?sung f¨¹r Unternehmen und ihre Dat...
IBsolution GmbH
?
Achieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
Achieving Extreme Scale with ScyllaDB: Tips & TradeoffsAchieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
Achieving Extreme Scale with ScyllaDB: Tips & Tradeoffs
ScyllaDB
?
AI Revolution unleashed with AI Foundry at AI Tour Brussels
AI Revolution unleashed with AI Foundry at AI Tour BrusselsAI Revolution unleashed with AI Foundry at AI Tour Brussels
AI Revolution unleashed with AI Foundry at AI Tour Brussels
Nathan Bijnens
?
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-WorldAll-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
All-Data, Any-AI Integration: FME & Amazon Bedrock in the Real-World
Safe Software
?

A two stage feature selection method for text categorization

  • 1. A two-stage feature selection method for text categorization by using information gain, principal component analysis and genetic algorithm Presented by
  • 2. Project scope ? The application will serve the two-stage feature selection method for text categorization by using information gain, principal component analysis and genetic algorithm. Due to the increasing number of documents in digital form, automated text categorization has become more promising in the decades. ? A two-stage feature selection and feature extraction is used to reduce the high dimensionality of a feature space composing of a large number of terms, remove redundant and irrelevant features from the feature space and thereby improve the performance of text categorization
  • 3. User classes & characteristics There are two user module viz. decision tree and KNN classifier. ? Decision tree: The first phase is tree growing where a tree is built by greedily splitting each tree node. Because the tree can over fit the training data, in the second phase, the over fitted branches of the tree are removed. ? KNN classifier: The KNN classifier ranks the document¡¯s neighbors among the training documents and uses the class labels of the k most similar neighbors. Similarity type between two documents may be measured by the Euclidean distance, cosine measure, etc.
  • 4. Operating environment This application is developed in java platform and will be hosted by a system using Java JDK and tomcat server. The system will primarily be developed and tested on Windows Operating Systems. But our goal is to make it a platform independent solution. The target platforms are: Linux Microsoft Windows & Solaris.
  • 5. Design and Implementation Constraints All designing and coding will be done on Java Platform. However application can be implemented in C#.NET.
  • 6. Assumptions and Dependencies Since the application is based on Java platform. Hence we assume that user system must installed JVM to run this application.
  • 7. SYSTEM FEATURE Functional requirements Hard disk 80 GB RAM 1GB Processor Intel Pentium IV Technology Java Tools Net beans Operating System Windows
  • 8. EXTERNAL INTERFACE REQUIREMENTS User Interfaces: The application is accessible through web browser. It will interact with its users with web components interface. There are two types of user for this system retail manager or analyst and customer each can interact with the system with the following UIs. Main screen: On this interface there are some options shown as per the user type For the analysts there are some options related to what type of analysis they want to do. Method wise analysis Decision tree analysis KNN classifier analysis For each of the above analysis there is separate new screen showing advanced options for that analysis that is something like stated below: There are buttons for ¡®In which format output should be displayed Graphical formats like pie charts , Bar graphs, Tabular format. Output screen: On this screen output will be produced in graphical format with proper description and some options like save result for further use or compare it with old results or you may discard it if it is of no use.
  • 9. Software Interfaces ? Name: Java Version Number: Version 6.0 ? Name: Mysql Version Number: Version 7.0.1 The system must use My SQL server as its database ? Name: NetBeans Version Number: Version 6 onward
  • 10. Communications Interfaces The system will use Apache/tomcat server as the main communication protocol trough internet/network.
  • 11. NON-FUNCTIONAL REQUIREMENTS Performance Requirements ? System can produce results faster on 4GB RAM. ? It may take more time for peak loads at main node ? The system will be available 100% of the time. Once there is a fatal error, the system will provide understandable feedback to the user.
  • 12. Safety and Security Requirements ? All data will be backed-up everyday automatically and also the system administrator can back- up the data as a function for him. ? The system is designed in modules where errors can be detected and fixed easily. This makes it easier to install and updates new functionality if required.
  • 13. Software Quality Attributes ? Usability : The application seem to user friendly since the GUI is interactive. ? Maintainability : This application is maintained for long period of time since it will be implemented under java platform . ? Reusability : The application can be reusable by expanding it to the new modules. Performance: The application seems to be performing faster under 4 GB of RAM. However, the basic requirement to run the application is 1GB. ? Security: Since the application is developed on JAVA .It is much more secure than the other environment.
  • 18. TECHNICAL SPECIFICATION ADVANTAGES ? The application is platform independent since it is developed in JAVA. ? The behavior of the application is user friendly since the GUI is compatible with all operating environment. Disadvantage ? Since the application performs several task at same time, It seems to generate output at long interval of time.
  • 19. Applications ? Spam filtering, a process which tries to discern E-mail spam messages from legitimate emails ? Email routing, sending an email sent to a general address to a specific address or mailbox depending on topic. ? Language identification, automatically determining the language of a text ? Genre classification, automatically determining the genre of a text ? Readability assessment, automatically determining the degree of readability of a text, either to find suitable materials for different age groups or reader types or as part of a larger text simplification system.