ARTICLE
TITLE

Comparative Analysis of Data Mining Applications in Predicting the Quality of Employee Performance Using the C4.5 Algorithm Method

SUMMARY

 This study was conducted to measure and compare the values ??of accuracy, precision, and recall, from the rapid miner and weka data mining applications by comparing the value of the confusion matrix, the application of the confusion matrix method was carried out by testing the training data obtained from the performance data of company employees engaged in the Internet. Service Providers. Testing the data is carried out to predict the quality of employee performance with the C4.5 algorithm. The approach taken in this research is carried out with a qualitative approach and uses library research research techniques, the results of which are analyzed using the analytical method of comparing the results of the confusion matrix value. From the results of the comparative analysis that has been carried out, the results of the rapid miner application are superior in terms of Accuracy of 94.12% and Recall of 95.6%, while the Weka application is better only in terms of Recall by 95.6%. The test was carried out using the rapid miner data mining application version 7.6.0.0.1 and the Weka application version 3.8.1.

 Articles related

(1) Azri Azrul Azmer (Faculty of Computer Science & Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (2) Norlida Hassan (Faculty of Computer Science & Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (3) Shihab Hamad Khaleefah (Faculty of Computer Science, Al Maarif University College, Iraq) (4) Salama A Mostafa (Faculty of Computer Science & Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (5) Azizul Azhar Ramli (Faculty of Computer Science & Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia)    

The texture is the object’s appearance with different surfaces and sizes. It is mainly helpful for different applications, including object recognition, fingerprinting, and surface analysis. The goal of this research is to investigate the best classifica... see more


Novriadi Antonius Siagian    

To see whether the proposed research model is able to improve the performance of the classification of the Glass Type Identification data using the K-Nearest Neighbor (K-NN) method then the results will be compared with the C4.5 method and the Naïve Baye... see more


(1) Zuhaira Muhammad Zain (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (2) Mona Alshenaifi (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (3) Abeer Aljaloud (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (4) Tamadhur Albednah (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (5) Reham Alghanim (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (6) Alanoud Alqifari (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia) (7) Amal Alqahtani (College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia)    

Breast cancer recurrence is among the most noteworthy fears faced by women. Nevertheless, with modern innovations in data mining technology, early recurrence prediction can help provide relief from these fears. Although medical information is typically c... see more


Jelena Zdravkovic,Janis Stirna,Janis Grabis    

The notion of capability has been gaining a growing attention in the business and information system (IS) engineering community due to a number of reasons: it facilitates focus on business investments, it can be used as a baseline for business planning, ... see more


Donatas Vitkus,Žilvinas Steckevicius,Nikolaj Goranin,Diana Kalibatiene,Antanas Cenys    

Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for process automation, but this app... see more