BLOOD DONATION SYSTEM FOR ONLINE USERS



Similar documents
Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making.

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

Mining for Web Engineering

The University of Jordan

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Predictive Dynamix Inc

Master of Science in Health Information Technology Degree Curriculum

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.

USABILITY OF A FILIPINO LANGUAGE TOOLS WEBSITE

Towards Rule-based System for the Assembly of 3D Bricks

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

Merging learner performance with browsing behavior in video lectures

The Design and Development of a Web-Based Virtual Closet: The Smart Closet Project

Patent Big Data Analysis by R Data Language for Technology Management

Meta-learning. Synonyms. Definition. Characteristics

The Data Mining Process

Creating a Database. Frank Friedenberg, MD

Modeling and Design of Intelligent Agent System

A Survey of Customer Relationship Management

A SOFTWARE SYSTEM FOR ONLINE LEARNING APPLIED IN THE FIELD OF COMPUTER SCIENCE

DATA WAREHOUSE AND DATA MINING NECCESSITY OR USELESS INVESTMENT

Research of Postal Data mining system based on big data

Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe

Electronic Funds Transfer (EFT) Guide

SYSTEM DEVELOPMENT AND IMPLEMENTATION

Bank of America Community Volunteers Step-by-step instructions for requesting a Volunteer Grant to match your volunteer hours

Volume 4, Issue 1, January 2016 International Journal of Advance Research in Computer Science and Management Studies

Explorer's Guide to the Semantic Web

German Funding Ranking as a Tool for Self-Management. Jürgen Güdler. Jürgen Güdler is head of the group Information Management at the Deutsche

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Fast and Easy Delivery of Data Mining Insights to Reporting Systems

Managing Healthcare Records via Mobile Applications

ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises

.LRN - Course Management System at AUBG

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

Facilitating Business Process Discovery using Analysis

A Survey on Web Mining From Web Server Log

Experiments in Web Page Classification for Semantic Web

How To Get A Computer Engineering Degree

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Development of Content Management System with Animated Graph

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Knowledge Discovery from patents using KMX Text Analytics

MC EDT Designee Maintenance Procedure Summary. Ministry of Health and Long-Term Care

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

CLOUD COMPUTING AN EFFICIENT WAY TO PROVIDE FOR IT SERVICE IN IRAN METEOROLOGICAL ORGANIZATION

Ontological Model of Educational Programs in Computer Science (Bachelor and Master Degrees)

Intrusion Detection System using Log Files and Reinforcement Learning

Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM

2. A typical business process

An Ontology-based e-learning System for Network Security

RISK ASSESSMENT BASED UPON FUZZY SET THEORY

Intelligent interoperable application for employment exchange system using ontology

ISSN: A Review: Image Retrieval Using Web Multimedia Mining

ProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Test Design Strategies

ANALYTICS IN BIG DATA ERA

Bisecting K-Means for Clustering Web Log data

Recovering Business Rules from Legacy Source Code for System Modernization

SuperViz: An Interactive Visualization of Super-Peer P2P Network

Artificial Intelligence & Knowledge Management

Pattern Insight Clone Detection

DATA MINING IN FINANCE

Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data mining techniques: decision trees

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

ISSUES IN RULE BASED KNOWLEDGE DISCOVERING PROCESS

HELP DESK SYSTEMS. Using CaseBased Reasoning

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

Association rules for improving website effectiveness: case analysis

Dimension: Data Handling Module: Organization and Representation of data Unit: Construction and Interpretation of Simple Diagrams and Graphs

The Predictive Data Mining Revolution in Scorecards:

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

Analysis and Design of Knowledge Management Systems for School of Information System at XYZ University (A Case Study Approach)

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER

The 2006 IEEE / WIC / ACM International Conference on Web Intelligence Hong Kong, China

STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and

The Implementation of Wiki-based Knowledge Management Systems for Small Research Groups

2 SYSTEM DESCRIPTION TECHNIQUES

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making

Data Mining Applications in Fund Raising

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100

Data Mining III: Numeric Estimation

Ontology for Home Energy Management Domain

ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION

Towards applying Data Mining Techniques for Talent Mangement

Transcription:

BLOOD DONATION SYSTEM FOR ONLINE USERS San San Tint 1 and Htoi Mai 2 1 Department of Research and Development II, University of Computer Studies, Mandalay, Myanmar 2 Master of Computer Science, University of computer Studies Mandalay, Myanmar Abstract Most of people desire to know about online blood donation to the patients at once. Patients want to get blood to live at emergency time. At present people are needed to know how to contact blood donors online. This system provides how to get blood at their serious time to be longer life time. Matcher system is implemented with Decision Tree and Decision Table by rules. This matcher applies the rules based on Blood Donation in Blood Bank in Myanmar. Information about donors and patients has been reserved in the system so that it is ready to donate blood instantly. Keywords Decision, Major, Matcher, Minor, Patient 1. Introduction The development of a Blood Donation System depends on web-based application. System has web-based matcher which acts as server to match donors and patient pair compatibly by using rule-based knowledge. All Clinic System should have patient and donor information control matcher system. Nowadays, computers are the most useful for all fields; they can also stand for information distributing, catching, matching, etc. All doctors who are system s members can see donors and patients data and matching information. The health systems using web based application were aided human beings. In this system, blood matcher can help donors and patients to get the best matcher. The establishment of web-based matcher for blood donation system is to encourage blood donor society. Current knowledge applications mainly focus on the discovery, creation, preservation, sharing and direct use of information. Web-based matcher is Web-based application by using knowledge rules, will help the cost of living and saving lives. 2. Background Theory 2.1. Web-based Application A web application is any application that uses a web browser as a client. Web based applications make effectiveness for our organization to take good profit. Opportunities come up from Web based application that can be accessed the information from anywhere in the world. It is also providing user to save time and money and making the interactivity better with customers and partners. It permits the administrative plan for staff to be better working from any location. Moreover, users can find to meet their purposes in time and they proceed ultimate aims without wasting valuable things like energy, time, even clothes. DOI : 10.5121/caij.2015.2103 29

2.2. Rule-based Knowledge Methods frequently used for knowledge representation are: Rule-based Knowledge, Frame-based Knowledge, Semantic Network, Logic theory and Ontology theory. All of these, Rule-based Knowledge is the most usual use expressive method. Rules are used to support decision making in classification, regression and association tasks. Different types of rules are used to express different types of knowledge [1] [2] [3]. There are many types of rules as following: o Classical prepositional logic rules (C-rules), o Association rules (A-rules), o Fuzzy logic rules (F-rules), o M-of-N or threshold rules (T-rules), o Similarity or prototype-based rules (P-rules). 2.3. Decision Branch for Tree Decision points typically have two or three branches [5]. At the ends of the branches are the outcomes of the decision process. The branch arrangement of a decision tree is as below. 2.4. Decision Tree Classifier for C Rule Figure 1. General Branch Arrangement of Decision Tree In general expressive power of C-rules is limited. Three other types of rules are fuzzy, threshold and prototype-based rules. Decision trees represent rules in a hierarchical structure with each path/branch giving single rule. Algorithms that simplify such rules converting it into logical rules are known, for example the C4 rules for the C4.5 decision trees [1] [6]. 2.5. Decision Table for System A decision table is a non-graphical way of representing the steps involved in making a decision [7]. 30

Issue area SYSTEM CONDITION SET SYSTEM ACTION SET SYSTEM CONDITION SPACE SYSTEM ACTION SPACE Figure 2. General Flow of a System's Decision Table The decision table is divided into three main areas: o System's Conditions o System's Actions o System's Rules 2.5.1. Decision Table Development for Example There are five stages may be distinguished. o Definition of conditions, condition states, actions and action states for the specific choice issue; o Specification of the issue in terms of decision rules; o Building of the decision table on the basis of the decision rules; o Check for completeness, contradictions and correctness; o Simplification, optimization and depiction of the decision table. (a) Full table (b) Table contraction C 1 Y N C 2 Y N Y N C 3 Y N Y N Y N Y N A 1 X - X - - - - - A 2 - X - X - X - X A 3 X - - - X - X - R R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 (c) Row order optimization C 1 Y N C 2 Y N - C 3 Y N Y N Y N A 1 X - X - - - A 2 - X - X - X A 3 X - - - X - R R 1 R 2 R 3 R 4 R 5 R 6 C 3 Y N C 1 Y N - C 2 Y N - - A 1 X X - - A 2 - - - X A 3 X - X - R R 1 R 2 R 3 R 4 Figure 3. Optimization of a Decision Table using Two Different Transformations for Example 31

Yes/No questions Conditions RULES Car is in good Y Y Y Y N N N N condition Its price is Y Y N N Y Y N N under $7500 Its registration Y N Y N Y N Y N is current Actions Purchase the X X X car Reject the car X X X X X Possible outcomes Y= Condition is true N= Condition is false X=This action matches the given rules Figure 4. Decision Table for Purchase Car with Conditions for Example 1. Identify conditions and their alternative values. o Gender s alternative values are: F and M. o City dweller s alternative values are: Y and N. o Age group s alternative values are: A, B, and C. 2. Compute max. number of rules. o 2 x 2 x 3 = 12. o Rule 4 corresponds to M, N, and A. Rule 5 corresponds to F, Y, and B. Rule 6 corresponds to M, Y, and B and so on. 3. Identify possible actions o Market product W, X, Y, or Z. 4. Match each of the actions to take given each rule. Table 1. Decision Table with Possible Actions 1 2 3 4 5 6 7 8 9 10 11 12 Gender F M F M F M F M F M F M City Y Y N N Y Y N N Y Y N N Age A A A A B B B B C C C C MarketW X X X MarketX X X MarketY MarketZ X X X X X X X X X X X 32

5. Check that the actions given to each rule are correct. 6. Simplify the table. o o If so, remove those columns. In the example scenario, columns 2, 4, 6, 7, 10, and 12 have the same action. For rules 2, 6, and 10; the age group is a don t care. Table 2. Decision Table with Optimize Actions 1 2 3 4 5 6 7 8 9 10 Gender F M F M F M F M F M City Y Y N N Y N N Y N N Age A A A B B B C C C MarketW X X X MarketX X X MarketY X MarketZ X X X X X X X X 3. Our System Figure 5. System Architecture of Blood Matcher 33

The system is designed to process as follows: two types of users are allowed in this system, the donor type and the patient type. For donor account, as input, the donor needs to enter the information needed for patient to inquire necessary blood. Then the matcher decided to accept the donation of donor or not by using their rules based knowledge. The architecture for Blood Donation System is as shown in Figure 5. There are three main roles and three main processes. The three main roles are donor, patient and matcher. The three main processes are record the memberships of donors and patients, acquire to get the donor s purification blood and matching the patient with related donors. It needs main database for requirements like specific rules for donors. Main rules are divided into two classes in which man and woman. In donation for blood, specifications for man are not same for woman. The system has three level specifications like major, minor and serious. Patients can search on this page for their needs when they want the blood seriously. Figure 6. Home Page of the Blood Donation System First of all, the system shows the home page Figure 6. The blood match table is shown on the left side of the page. And the right side of the page is included Donor Login!, Donor SignUp! for donors, Patient Login!, Patient Blood Request for patients, Donated List!, Home and About System for all. 34

Figure 7 (a). Major Facts Page Figure 7(b). Major Facts Page with Woman Sections 35

The Major Facts acquisition woman case will be answered for blood donor is a woman. Therefore, the questions for the woman are no need to answer for a man. But a man who is a blood donor makes a mistake that he fills the questions for the woman blood donor. Then the system automatically understands and these answers will be taken as don t care condition and operate the acquisition action as shown in Figure 7(a) and 7 (b). 4. Conclusion This system provides communication between the Blood Donors and Patients compatibly. Webbased matcher draws up acceptable Blood Donors information for Patient by using Knowledgebased Rules. Moreover, the Web-based system provides more suitable application for health care and life saving processes. This system can be extended to other welfare societies and health organizations. Acknowledgements Our heartfelt thanks go to all people, who support us at the University of Computer Studies, Mandalay, Myanmar. This paper is dedicated to our parents. Our special thanks go to all respectable persons who support for valuable suggestion in this paper. References [1] W. Duch, " Rule-Based Methods,Department of Informatics", Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore wduch@is.umk.pl. [2] Lecture 2 Rule-based Expert Systems, Negnevitsky, Person Education, 2002. [3] D. Partridge and K. M. Hussain, "Knowledge Based Information Systems", Mc-Graw Hill, 1994. [4] S. R. Safavian and D. Landgrebe, A Survey of Decision Tree Classifier Methodology, School of Electrical Engineering Purdue University, West Lafayette, landgreb@ecn.purdue.edu. [5] M. Verhelst, and De praktijk, "van beslissingstabellen. Deventer and Antwerp", Kluwer, 1980. [6] J. Vanthienen, "Automatiseringsaspecten van de specificatie, constructie en manipulatie van beslissingstabellen", Katholieke Universiteit Leuven, Departement Toegeapste Economische Wetenschappen, Ph.D. thesis, 1986. [7] J. Vanthienen, and G. Wets, "From decision tables to expert system shells ", Data & Knowledge Engineering, 13, 265-282, 1994. Authors She is Associate Professor, Head of Department of Research and Development II in University of Computer Studies, Mandalay, Myanmar. Her research areas include Information Retrieval, Cryptography and Network Security, Web Mining and Networking. She received her B. Sc. (Physics), M.Sc.(Physics) from Yangon University, Myanmar and M.A.Sc.(Computer Engineering) and Ph.D.( Information Technology) from University of Computer Studies, Yangon, Myanmar. Author studied computer science at the University of Computer Studies, lasho, Myanmar where she received her B.C.Sc Degree in 2011. She received B.C.Sc(Hons:) in computer science from the University of Computer Studies, Lasho, Myanmar in 2012. Since 2012, Au thor has studied computer science at the University of Computer Studies, Mandalay, Myanmar where her primary interests include web mining, graph clustering, grouping and web log analysis. 36