Results for ' data mining techniques'

959 found
Order:
  1. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. A Comparative Analysis of Data Mining Techniques on Breast Cancer Diagnosis Data using WEKA Toolbox.Majdah Alshammari & Mohammad Mezher - 2020 - (IJACSA) International Journal of Advanced Computer Science and Applications 8:224-229.
    Abstract—Breast cancer is considered the second most common cancer in women compared to all other cancers. It is fatal in less than half of all cases and is the main cause of mortality in women. It accounts for 16% of all cancer mortalities worldwide. Early diagnosis of breast cancer increases the chance of recovery. Data mining techniques can be utilized in the early diagnosis of breast cancer. In this paper, an academic experimental breast cancer dataset is used (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Data Mining the Brain to Decode the Mind.Daniel Weiskopf - 2020 - In Fabrizio Calzavarini & Marco Viola (eds.), Neural Mechanisms: New Challenges in the Philosophy of Neuroscience. Springer.
    In recent years, neuroscience has begun to transform itself into a “big data” enterprise with the importation of computational and statistical techniques from machine learning and informatics. In addition to their translational applications such as brain-computer interfaces and early diagnosis of neuropathology, these tools promise to advance new solutions to longstanding theoretical quandaries. Here I critically assess whether these promises will pay off, focusing on the application of multivariate pattern analysis (MVPA) to the problem of reverse inference. I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  4. A Survey on Idea Mining: Techniques and Application.Nicholaus J. Gati & Lusekelo Kibona - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 2 (3):1-4.
    Abstract: Idea mining is an interesting field in the area of information retrieval and it is increasingly becoming important asset for decision makers. Huge volumes of high quality data from various sources such as scanners, mobile phones, loyalty cards, the web, and social media platforms presents enormous opportunity for organization to achieve success in their businesses. It is possible to achieve this by properly analysing data to reveal feature patterns; hence decision makers can capitalize upon the resulting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Restful Web Services for Scalable Data Mining.Solar Cesc - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. NEUTROSOPHIC THEORY AND SENTIMENT ANALYSIS TECHNIQUE FOR MINING AND RANKING BIG DATA FROM ONLINE EVALUATION.C. Manju Priya - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):124-142.
    A huge amount of data is being generated everyday through different transactions in industries, social networking, communication systems etc. Big data is a term that represents vast volumes of high speed, complex and variable data that require advanced procedures and technologies to enable the capture, storage, management, and analysis of the data. Big data analysis is the capacity of representing useful information from these large datasets. Due to characteristics like volume, veracity, and velocity, big (...) analysis is becoming one of the most challenging research problems. Semantic analysis is method to better understand the implied or practical meaning of the input dataset. It is mostly applied with ontology to analyze content mainly in web resources. This field of research combines text analysis and Semantic Web technologies. The use semantic knowledge is to aid sentiment analysis of queries like emotion mining, popularity analysis, recommendation systems, user profiling, etc. A new method has been proposed to extract semantic relationships between different data attributes of big data which can be applied to a decision system. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  8. A Review Paper on Scope of Big Data Analysis in Heath Informatics.Kazi Md Shahiduzzaman, Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):1-8.
    Abstract— The term Health Informatics represent a huge volume of data that is collected from different source of health sector. Because of its’ diversity in nature, quite a big number of attributes, numerous amount data, health informatics can be considered as Big Data. Therefore, different techniques used for analyzing Big Data will also fit for Health Informatics. In recent years, implementation of Data Mining on Health Informatics brings a lot of fruitful outcomes that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. On the application of formal principles to life science data: A case study in the Gene Ontology.Jacob Köhler, Anand Kumar & Barry Smith - 2004 - In Köhler Jacob, Kumar Anand & Smith Barry (eds.), Proceedings of DILS 2004 (Data Integration in the Life Sciences), (Lecture Notes in Bioinformatics 2994). Springer. pp. 79-94.
    Formal principles governing best practices in classification and definition have for too long been neglected in the construction of biomedical ontologies, in ways which have important negative consequences for data integration and ontology alignment. We argue that the use of such principles in ontology construction can serve as a valuable tool in error-detection and also in supporting reliable manual curation. We argue also that such principles are a prerequisite for the successful application of advanced data integration techniques (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  11.  53
    Visualizing Values.Mark Alfano, Andrew Higgins, Jacob Levernier & Veronica Alfano - forthcoming - In David Rheams, Tai Neilson & Lewis Levenberg (eds.), Handbook of Methods in the Digital Humanities. Rowman & Littlefield.
    Digital humanities research has developed haphazardly, with substantive contributions in some disciplines and only superficial uses in others. It has made almost no inroads in philosophy; for example, of the nearly two million articles, chapters, and books housed at philpapers.org, only sixteen pop up when one searches for ‘digital humanities’. In order to make progress in this field, we demonstrate that a hypothesis-driven method, applied by experts in data-collection, -aggregation, -analysis, and -visualization, yields philosophical fruits. “Call no one happy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Data Mining in the Context of Legality, Privacy, and Ethics.Amos Okomayin, Tosin Ige & Abosede Kolade - 2023 - International Journal of Research and Innovation in Applied Science 10 (Vll):10-15.
    Data mining possess a significant threat to ethics, privacy, and legality, especially when we consider the fact that data mining makes it difficult for an individual or consumer (in the case of a company) to control accessibility and usage of his data. Individuals should be able to control how his/ her data in the data warehouse is being access and utilize while at the same time providing enabling environment which enforces legality, privacy and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. NeutroAlgebra Theory, volume I.Florentin Smarandache, Memet Şahin, Derya Bakbak, Vakkas Uluçay & Abdullah Kargın - 2021 - Grandview Heights, OH, USA: Educational Publisher.
    Neutrosophic theory and its applications have been expanding in all directions at an astonishing rate especially after of the introduction the journal entitled “Neutrosophic Sets and Systems”. New theories, techniques, algorithms have been rapidly developed. One of the most striking trends in the neutrosophic theory is the hybridization of neutrosophic set with other potential sets such as rough set, bipolar set, soft set, hesitant fuzzy set, etc. The different hybrid structures such as rough neutrosophic set, single valued neutrosophic rough (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Retractions Data Mining #1.Quan-Hoang Vuong & Viet-Phuong La - 2019 - Open Science Framework 2019 (2):1-3.
    Motivation: • Breaking barriers in publishing demands a proactive attitude • Open data, open review and open dialogue in making social sciences plausible .
    Download  
     
    Export citation  
     
    Bookmark  
  15. Data Mining & Big Data: Strategic Anticipation & Decision-making support, SciencesPo, 24h, 2018.Marc-Olivier Boisset & Jean Langlois-Berthelot - unknown
    In the end of the course the student will be able to: • Understand the functioning of data mining tools and their contributions to managerial professions • Master the use of dynamic search tools on the open web and on the dark web. • Use the proper tools according to the objectives sought • Master the latest trends and innovations in Business Analytics • Analyze the opportunities offered in terms of data mining by artificial intelligence and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Data is the new gold, but efficiently mining it requires a philosophy of data.Data Thinkerr - 2023 - Data Thinking.
    Fixing the problem won’t be easy, but humans’ sharpened focus on an emerging philosophy of data might give us some clue about where we will be heading for.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Neutrosophic Algebraic Structures and Their Applications.Florentin Smarandache, Memet Şahin, Derya Bakbak, Vakkas Uluçay & Abdullah Kargın - 2022 - Gallup, NM, USA: NSIA Publishing House.
    Neutrosophic theory and its applications have been expanding in all directions at an astonishing rate especially after of the introduction the journal entitled “Neutrosophic Sets and Systems”. New theories, techniques, algorithms have been rapidly developed. One of the most striking trends in the neutrosophic theory is the hybridization of neutrosophic set with other potential sets such as rough set, bipolar set, soft set, hesitant fuzzy set, etc. The different hybrid structures such as rough neutrosophic set, single valued neutrosophic rough (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  19. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia (eds.), ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Ontology-based knowledge representation of experiment metadata in biological data mining.Scheuermann Richard, Kong Megan, Dahlke Carl, Cai Jennifer, Lee Jamie, Qian Yu, Squires Burke, Dunn Patrick, Wiser Jeff, Hagler Herb, Herb Hagler, Barry Smith & David Karp - 2009 - In Chen Jake & Lonardi Stefano (eds.), Biological Data Mining. Chapman Hall / Taylor and Francis. pp. 529-559.
    According to the PubMed resource from the U.S. National Library of Medicine, over 750,000 scientific articles have been published in the ~5000 biomedical journals worldwide in the year 2007 alone. The vast majority of these publications include results from hypothesis-driven experimentation in overlapping biomedical research domains. Unfortunately, the sheer volume of information being generated by the biomedical research enterprise has made it virtually impossible for investigators to stay aware of the latest findings in their domain of interest, let alone to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. (1 other version)Ontology-assisted database integration to support natural language processing and biomedical data-mining.Jean-Luc Verschelde, Marianna C. Santos, Tom Deray, Barry Smith & Werner Ceusters - 2004 - Journal of Integrative Bioinformatics. Repr. In: Yearbook of Bioinformatics , 39–48 1:1-10.
    Successful biomedical data mining and information extraction require a complete picture of biological phenomena such as genes, biological processes, and diseases; as these exist on different levels of granularity. To realize this goal, several freely available heterogeneous databases as well as proprietary structured datasets have to be integrated into a single global customizable scheme. We will present a tool to integrate different biological data sources by mapping them to a proprietary biomedical ontology that has been developed for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23.  91
    (1 other version)Mapping Human Values: Enhancing Social Marketing through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - forthcoming - In Lynn Kahle & Eda Atay (eds.), Social and Cultural Values in a Global and Digital Age.
    Download  
     
    Export citation  
     
    Bookmark  
  24. Identifying Virtues and Values Through Obituary Data-Mining.Mark Alfano, Andrew Higgins & Jacob Levernier - 2018 - Journal of Value Inquiry 52 (1).
    Because obituaries are succinct and explicitly intended to summarize their subjects’ lives, they may be expected to include only the features that the author finds most salient but also to signal to others in the community the socially-recognized aspects of the deceased’s character. We begin by reviewing studies 1 and 2, in which obituaries were carefully read and labeled. We then report study 3, which further develops these results with a semi-automated, large-scale semantic analysis of several thousand obituaries. Geography, gender, (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  25. Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets.
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and competence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. A matter of trust: : Higher education institutions as information fiduciaries in an age of educational data mining and learning analytics.Kyle M. L. Jones, Alan Rubel & Ellen LeClere - forthcoming - JASIST: Journal of the Association for Information Science and Technology.
    Higher education institutions are mining and analyzing student data to effect educational, political, and managerial outcomes. Done under the banner of “learning analytics,” this work can—and often does—surface sensitive data and information about, inter alia, a student’s demographics, academic performance, offline and online movements, physical fitness, mental wellbeing, and social network. With these data, institutions and third parties are able to describe student life, predict future behaviors, and intervene to address academic or other barriers to student (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Methodological Advances in Experimental Philosophy.Eugen Fischer & Mark Curtis (eds.) - 2019 - London: Bloomsbury Press.
    Until recently, experimental philosophy has been associated with the questionnaire-based study of intuitions; however, experimental philosophers now adapt a wide range of empirical methods for new philosophical purposes. New methods include paradigms for behavioural experiments from across the social sciences as well as computational methods from the digital humanities that can process large bodies of text and evidence. This book offers an accessible overview of these exciting innovations. The volume brings together established and emerging research leaders from several areas of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  28. (1 other version)Ethical issues of 'morality mining': When the moral identity of individuals becomes a focus of data-mining.Markus Christen, Mark Alfano, Endre Bangerter & Daniel Lapsley - 2013 - In Hakikur Rahman & Isabel Ramos (eds.), Ethical Data Mining Applications for Socio-Economic Development. IGI Global. pp. 1-21.
    Download  
     
    Export citation  
     
    Bookmark  
  29. Neutrosophic Association Rule Mining Algorithm for Big Data Analysis.Mohamed Abdel-Basset, Mai Mohamed, Florentin Smarandache & Victor Chang - 2018 - Symmetry 10 (4):1-19.
    Big Data is a large-sized and complex dataset, which cannot be managed using traditional data processing tools. Mining process of big data is the ability to extract valuable information from these large datasets. Association rule mining is a type of data mining process, which is indented to determine interesting associations between items and to establish a set of association rules whose support is greater than a specific threshold. The classical association rules can only (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  50
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Experiences in Mining Educational Data to Analyze Teacher's Performance: A Case Study with High Educational Teachers.Abdelbaset Almasri - 2017 - International Journal of Hybrid Information Technology 10 (12):1-12.
    Educational Data Mining (EDM) is a new paradigm aiming to mine and extract knowledge necessary to optimize the effectiveness of teaching process. With normal educational system work it’s often unlikely to accomplish fine system optimizing due to large amount of data being collected and tangled throughout the system. EDM resolves this problem by its capability to mine and explore these raw data and as a consequence of extracting knowledge. This paper describes several experiments on real educational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. THE USE OF UNIQUE BOUND MORPHEMES IN MALAY LANGUAGE OF MAKASSAR DIALECT.Kaharuddin Andi - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (8):59-74.
    All languages have unique morphemes as distinguishing features from other languages. Unique morpheme is a morpheme with typical features divergent from other morphemes or language morpheme in general. This study aims to explain the unique morphemes in Malay Language of Makassar dialect. The finding is useful for linguistic studies especially morphological studies of morphemes. This study used descriptive method data collection method used was listening method. The techniques were listening and engaged in conversation and notes-taking. The role of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. THE USE OF UNIQUE BOUND MORPHEMES IN MALAY LANGUAGE OF MAKASSAR DIALECT.Muhammad Hasyim - 2020 - Palarch’s Journal Of Archaeology Of Egypt/Egyptology 17 (8):59-74.
    All languages have unique morphemes as distinguishing features from other languages. Unique morpheme is a morpheme with typical features divergent from other morphemes or language morpheme in general. This study aims to explain the unique morphemes in Malay Language of Makassar dialect. The finding is useful for linguistic studies especially morphological studies of morphemes. This study used descriptive method data collection method used was listening method. The techniques were listening and engaged in conversation and notes-taking. The role of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  48
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Mineness without Minimal Selves.M. V. P. Slors & F. Jongepier - 2014 - Journal of Consciousness Studies 21 (7-8):193-219.
    In this paper we focus on what is referred to as the ‘mineness’ of experience, that is, the intimate familiarity we have with our own thoughts, perceptions, and emotions. Most accounts characterize mineness in terms of an experiential dimension, the first-person givenness of experience, that is subsumed under the notion of minimal self-consciousness or a ‘minimal self’. We argue that this account faces problems and develop an alternative account of mineness in terms of the coherence of experiences with what we (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  37. Producing a robust body of data with a single technique.Gregory Stephen Gandenberger - 2010 - Philosophy of Science 77 (3):381-399.
    When a technique purports to provide information that is not available to the unaided senses, it is natural to think that the only way to validate that technique is by appealing to a theory of the processes that lead from the object of study to the raw data. In fact, scientists have a variety of strategies for validating their techniques. Those strategies can yield multiple independent arguments that support the validity of the technique. Thus, it is possible to (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  45
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Comparative study of manual and computerized software techniques of data management and analysis in educational research.Valentine Joseph Owan & Bassey Asuquo Bassey - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):35-45.
    The study was conducted to compare manual and computerized software techniques of data management and analysis in educational research. Specifically, the study investigated whether there was a significant difference in the results of Pearson correlation, independent t-test and ANOVA obtained from using manual and computerized software technique of data analyses. Three null hypotheses were formulated accordingly to guide the study. The study adopted a quasi-experimental research design where several data were generated by the researchers and analyzed (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Ethical Issues in Text Mining for Mental Health.Joshua Skorburg & Phoebe Friesen - forthcoming - In Morteza Dehghani & Ryan Boyd (eds.), The Atlas of Language Analysis in Psychology. Guilford Press.
    A recent systematic review of Machine Learning (ML) approaches to health data, containing over 100 studies, found that the most investigated problem was mental health (Yin et al., 2019). Relatedly, recent estimates suggest that between 165,000 and 325,000 health and wellness apps are now commercially available, with over 10,000 of those designed specifically for mental health (Carlo et al., 2019). In light of these trends, the present chapter has three aims: (1) provide an informative overview of some of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. A conceptual framework for data-driven sustainable finance in green energy transition.Omotayo Bukola Adeoye, Ani Emmanuel Chigozie, Ninduwesuor-Ehiobu Nwakamma, Jose Montero Danny, Favour Oluwadamilare Usman & Kehinde Andrew Olu-Lawal - 2024 - World Journal of Advanced Research and Reviews 21 (2):1791–1801.
    As the world grapples with the urgent need for sustainable development, the transition towards green energy stands as a critical imperative. Financing this transition poses significant challenges, requiring innovative approaches that align financial objectives with environmental sustainability goals. This review presents a conceptual framework for leveraging data-driven techniques in sustainable finance to facilitate the transition towards green energy. The proposed framework integrates principles of sustainable finance with advanced data analytics to enhance decision-making processes across the financial ecosystem. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  34
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can significantly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Predicting Students' end-of-term Performances using ML Techniques and Environmental Data.Ahmed Mohammed Husien, Osama Hussam Eljamala, Waleed Bahgat Alwadia & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):19-25.
    Abstract: This study introduces a machine learning-based model for predicting student performance using a comprehensive dataset derived from educational sources, encompassing 15 key features and comprising 62,631 student samples. Our five-layer neural network demonstrated remarkable performance, achieving an accuracy of 89.14% and an average error of 0.000715, underscoring its effectiveness in predicting student outcomes. Crucially, this research identifies pivotal determinants of student success, including factors such as socio-economic background, prior academic history, study habits, and attendance patterns, shedding light on the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. Questões Epistemológicas em Mineração de Dados Educacionais.Esdras L. Bispo Jr - 2019 - Brazilian Symposium on Computers in Education.
    Educational Data Mining (EDM) shows interesting scientific results lately. However, little has been discussed about philosophical questions regarding the type of knowledge produced in this area. This paper aims to present two epistemological issues in EDM: (i) a question of ontological nature about the content of the knowledge obtained; and (ii) a question of deontological nature, about the guidelines and principles adopted by the researcher in education, to the detriment of the results of his own research. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. 'Who put that on there … why why why?' Power games and participatory techniques of visual data production.Dawn Mannay - 2013 - Visual Studies 28 (2):136-146.
    The use of participant-led visual data production is often seen as advantageous because data can be directed, constructed and created away from the influence of the researcher. The case for employing the visual to engender participatory research, and specifically to limit the intrusive presence of the researcher, is well versed and in vogue within the field of social science; however, although participatory techniques offer an opportunity to disrupt power relations, they are unable to transcend familial practices. Drawing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. Small-scale mining in South Africa: an assessment of the success factors and support structures for entrepreneurs.Zandisile Mkubukeli & Robertson K. Tengeh - 2015 - Environmental Economics 6 (4):15-24.
    One of the negative legacies of the apartheid era is a markedly skewed mining sector that favours the established companies, and almost completely neglects small-scale mining enterprises. Though a major source of revenue for South Africa(SA), the current state of the mining sector does not directly benefit the previously disadvantaged who dominate small-scale mining. The aim of this study is to explore the support structures and success factors relevant to small scale mining entrepreneurs in South (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  78
    Using Linguistics Corpus Data Analysis to Combat PRC's Cognitive Infiltration.Jr-Jiun Lian - 2024 - 2024 Annual Conference of the Communication Association: International Academic Conference on Communication and Democratic Resilience.
    In light of Taiwan's extensive exposure to the Chinese Communist Party's "cognitive domain infiltration warfare," this paper proposes new response mechanisms and strategies for cybersecurity and national defense. The focus is primarily on assessing the CCP's cognitive infiltration tactics to develop policy recommendations in cybersecurity linguistics. These recommendations are intended to serve as a reference for future national defense and information security policies. Within the constraints of limited resources, this study attempts to provide an integrated analysis method combining qualitative and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Using models to correct data: paleodiversity and the fossil record.Alisa Bokulich - 2018 - Synthese 198 (Suppl 24):5919-5940.
    Despite an enormous philosophical literature on models in science, surprisingly little has been written about data models and how they are constructed. In this paper, I examine the case of how paleodiversity data models are constructed from the fossil data. In particular, I show how paleontologists are using various model-based techniques to correct the data. Drawing on this research, I argue for the following related theses: first, the ‘purity’ of a data model is not (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  49.  83
    ADVANCE DATA SECURITY IN CLOUD NETWORK SYSTEMS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):29-36.
    This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Superluminal Data Transmission supported in Quantum Entanglement.Alfonso Leon Guillen Gomez - manuscript
    A bit classical technique, supported by quantum entanglement, is presented for superluminal data teleportation, from a transmitter to a receiver, theoretically placed at any distance.
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 959