Implementation of data mining method for classifying company application data

Herfian Setiawan*, Apol Pribadi Subriadi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Applications or software are necessary in undertaking a business company. The more advanced a company, the more applications are used. Therefore, these applications should be checked and analyzed every time to avoid stacking applications or providing information about the lack of existing applications. Data mining methods have been widely applied in companies especially to handle large data cases. In the classification problem, data mining method works very well. Algorithms that we use to classify and predict company applications are naive bayes, decision tree, random forest and k-nearest neighbors. From the research result, we found that decision tree method with J48 algorithm is the best method with the highest accuracy value and also has the fastest time compared to other methods. The accuracy value and the execution time of decision tree method are 99.92% and 0.71 seconds respectively.

Original languageEnglish
Title of host publicationProceedings - 2019 5th International Conference on Science and Technology, ICST 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728123691
DOIs
Publication statusPublished - Jul 2019
Event5th International Conference on Science and Technology, ICST 2019 - Yogyakarta, Indonesia
Duration: 30 Jul 201931 Jul 2019

Publication series

NameProceedings - 2019 5th International Conference on Science and Technology, ICST 2019

Conference

Conference5th International Conference on Science and Technology, ICST 2019
Country/TerritoryIndonesia
CityYogyakarta
Period30/07/1931/07/19

Keywords

  • Application
  • Data Mining
  • Deci-sion Tree
  • K-Nearest Neighbors
  • Naive Bayes
  • Random Forest

Fingerprint

Dive into the research topics of 'Implementation of data mining method for classifying company application data'. Together they form a unique fingerprint.

Cite this