Predictive data mining of chronic diseases using decision tree: A case study of health insurance company in Indonesia
This study aims to identify the potential benefits that data mining can bring to the health sector, using Indonesian Health Insurance company data as case study. The most commonly data mining technique, decision tree, was used to generate the prediction model by visualizing the...
| Main Authors: | Qudsi, Dini Hidayatul, Kartiwi, Mira, Saleh, Nurliyana |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Research India Publication
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/57292/ http://irep.iium.edu.my/57292/1/ijaerv12n7_34.pdf http://irep.iium.edu.my/57292/2/57292-Predictive%20Data%20Mining%20of%20Chronic%20Diseases%20Using%20Decision%20Tree_SCOPUS.pdf |
Similar Items
Quality rating of islamic websites features : A single user evaluation
by: Mahmud, Murni, et al.
Published: (2010)
by: Mahmud, Murni, et al.
Published: (2010)
Mobile phone appropriation of students and staff at an institution of higher learning
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
by: Abdul Karim, Nor Shariza, et al.
Published: (2010)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Design and evaluation of network mobility protocol to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
by: Zakaria, Omar, et al.
Published: (2014)
by: Zakaria, Omar, et al.
Published: (2014)
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Application of GIS-planning decision support system in predicting development impact assessment
by: Asmawi, M. Zainora, et al.
Published: (2011)
by: Asmawi, M. Zainora, et al.
Published: (2011)
User experience in mobile application design: utility defined context of use
by: Lubis, Muharman, et al.
Published: (2019)
by: Lubis, Muharman, et al.
Published: (2019)
Readability of COVID-19 information by the Malaysian Ministry of Health
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
by: Ab Hamid, Ahmad Rauyani, et al.
Published: (2020)
Proposed new standard of procedures (SOPs) for announcement in New IIUM/KAED website
by: Yaali, Syarel Azill, et al.
Published: (2018)
by: Yaali, Syarel Azill, et al.
Published: (2018)
Report of KAED website assessment
by: Yaali, Syarel Azill, et al.
Published: (2016)
by: Yaali, Syarel Azill, et al.
Published: (2016)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Review on Natural Language Processing (NLP) and its toolkits for opinion mining and sentiment analysis
by: Solangi, Yasir Ali, et al.
Published: (2019)
by: Solangi, Yasir Ali, et al.
Published: (2019)
The relationship between personality and decision-making: a systematic literature review
by: Mendes, Fabiana Freitas, et al.
Published: (2019)
by: Mendes, Fabiana Freitas, et al.
Published: (2019)
Sentiment analysis for Malay language: systematic literature review
by: Handayani, Dini, et al.
Published: (2018)
by: Handayani, Dini, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Similar Items
-
Quality rating of islamic websites features : A single user evaluation
by: Mahmud, Murni, et al.
Published: (2010) -
Mobile phone appropriation of students and staff at an institution of higher learning
by: Abdul Karim, Nor Shariza, et al.
Published: (2010) -
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013) -
Design and evaluation of network mobility protocol to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha
Published: (2012) -
Spam e-mail: how Malaysian e-mail users deal with it?
by: Bujang, Yanti Rosmunie, et al.
Published: (2010)