Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (45)
- Computer Sciences (43)
- Electrical and Computer Engineering (27)
- Data Storage Systems (18)
- Other Computer Engineering (13)
-
- Digital Communications and Networking (12)
- Social and Behavioral Sciences (11)
- Numerical Analysis and Scientific Computing (10)
- Operations Research, Systems Engineering and Industrial Engineering (9)
- Artificial Intelligence and Robotics (8)
- Civil and Environmental Engineering (8)
- Computer and Systems Architecture (8)
- Civil Engineering (7)
- Systems Science (7)
- Databases and Information Systems (6)
- Library and Information Science (6)
- Business (5)
- Environmental Engineering (5)
- Hydraulic Engineering (5)
- Other Civil and Environmental Engineering (5)
- Communication (4)
- Management Information Systems (4)
- Management Sciences and Quantitative Methods (4)
- Medicine and Health Sciences (4)
- Science and Technology Studies (4)
- Business Intelligence (3)
- Communication Technology and New Media (3)
- Data Science (3)
- Institution
-
- TÜBİTAK (15)
- China Simulation Federation (7)
- Singapore Management University (7)
- Technological University Dublin (6)
- University of Nebraska - Lincoln (6)
-
- Brigham Young University (5)
- Marquette University (5)
- University of Louisville (5)
- California State University, San Bernardino (4)
- Embry-Riddle Aeronautical University (3)
- Louisiana Tech University (2)
- New Jersey Institute of Technology (2)
- Old Dominion University (2)
- Portland State University (2)
- Syracuse University (2)
- University of New Mexico (2)
- Air Force Institute of Technology (1)
- California Polytechnic State University, San Luis Obispo (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
- Clemson University (1)
- Institute of Business Administration (1)
- Louisiana State University (1)
- San Jose State University (1)
- Selected Works (1)
- Thomas Jefferson University (1)
- University of Massachusetts Amherst (1)
- University of Nevada, Las Vegas (1)
- University of South Carolina (1)
- University of Tennessee at Chattanooga (1)
- Publication Year
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (15)
- Journal of System Simulation (7)
- Dissertations (6)
- Research Collection School Of Computing and Information Systems (6)
- Electrical and Computer Engineering Faculty Research and Publications (5)
-
- Electronic Theses and Dissertations (5)
- International Congress on Environmental Modelling and Software (5)
- Journal of International Technology and Information Management (3)
- Library Philosophy and Practice (e-journal) (3)
- Publications (3)
- Articles (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Doctoral Dissertations (2)
- All Dissertations (1)
- Branch Mathematics and Statistics Faculty and Staff Publications (1)
- CSE Conference and Workshop Papers (1)
- Computational Medicine Center Faculty Papers (1)
- Computer Science ETDs (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Publications (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Department of English: Dissertations, Theses, and Student Research (1)
- Departmental Technical Reports (CS) (1)
- Dissertations and Theses Collection (Open Access) (1)
- Electrical Engineering and Computer Science - Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering Faculty Articles and Research (1)
- Engineering and Technology Management Faculty Publications and Presentations (1)
- English Language Institute (1)
- Faculty Publications (1)
- Publication Type
Articles 31 - 60 of 94
Full-Text Articles in Computer Engineering
Keyword-Based Patent Citation Prediction Via Information Theory, Farshad Madani, Martin Zwick, Tugrul U. Daim
Keyword-Based Patent Citation Prediction Via Information Theory, Farshad Madani, Martin Zwick, Tugrul U. Daim
Engineering and Technology Management Faculty Publications and Presentations
Patent citation shows how a technology impacts other inventions, so the number of patent citations (backward citations) is used in many technology prediction studies. Current prediction methods use patent citations, but since it may take a long time till a patent is cited by other inventors, identifying impactful patents based on their citations is not an effective way. The prediction method offered in this article predicts patent citations based on the content of patents. In this research, Reconstructability Analysis (RA), which is based on information theory and graph theory, is applied to predict patent citations based on keywords extracted from …
Domain-Specific Use Cases For Knowledge-Enabled Social Media Analysis, Soon Jye Kho, Swati Padhee, Goonmeet Bajaj, Krishnaprasad Thirunarayan, Amit Sheth
Domain-Specific Use Cases For Knowledge-Enabled Social Media Analysis, Soon Jye Kho, Swati Padhee, Goonmeet Bajaj, Krishnaprasad Thirunarayan, Amit Sheth
Publications
No abstract provided.
Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian
Clustering Method Based On Graph Data Model And Reliability Detection, Yanyun Cheng, Huisong Bian, Changsheng Bian
Journal of System Simulation
Abstract: For the data in feature space, traditional clustering algorithm can take clustering analysis directly. High-dimensional spatial data cannot achieve intuitive and effective graphical visualization of clustering results in 2D plane. Graph data can clearly reflect the similarity relationship between objects. According to the distance of the data objects, the feature space data are modeled as graph data by iteration. Cluster analysis based on modularity is carried out on the modeling graph data. The two-dimensional visualization of non-spherical-shape distribution data cluster and result is achieved. The concept of credibility of the clustering result is proposed, and a method is proposed, …
Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum
Horse Racing Prediction Using Graph-Based Features., Mehmet Akif Gulum
Electronic Theses and Dissertations
This thesis presents an applied horse racing prediction using graph based features on a set of horse races data. We used artificial neural network and logistic regression models to train then test to prediction without graph based features and with graph based features. This thesis can be explained in 4 main parts. Collect data from a horse racing website held from 2015 to 2017. Train data to using predictive models and make a prediction. Create a global directed graph of horses and extract graph-based features (Core Part) . Add graph based features to basic features and train to using same …
Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman
Maintainability Analysis Of Mining Trucks With Data Analytics., Abdulgani Kahraman
Electronic Theses and Dissertations
The mining industry is one of the biggest industries in need of a large budget, and current changes in global economic challenges force the industry to reduce its production expenses. One of the biggest expenditures is maintenance. Thanks to the data mining techniques, available historical records of machines’ alarms and signals might be used to predict machine failures. This is crucial because repairing machines after failures is not as efficient as utilizing predictive maintenance. In this case study, the reasons for failures seem to be related to the order of signals or alarms, called events, which come from trucks. The …
Real-Time Power System Dynamic Security Assessment Based On Advanced Feature Selection For Decision Tree Classifiers, Qusay Al-Gubri, Mohd Aifaa Mohd Ariff
Real-Time Power System Dynamic Security Assessment Based On Advanced Feature Selection For Decision Tree Classifiers, Qusay Al-Gubri, Mohd Aifaa Mohd Ariff
Turkish Journal of Electrical Engineering and Computer Sciences
This paper proposes a novel algorithm based on an advanced feature selection technique for the decision tree (DT) classifier to assess the dynamic security in a power system. The proposed methodology utilizes symmetrical uncertainty (SU) to reduce the data redundancy in a dataset for DT classifier-based dynamic security assessment (DSA) tools. The results show that SU reduces the dimension of the dataset used for DSA significantly. Subsequently, the approach improves the performance of the DT classifier. The effectiveness of the proposed technique is demonstrated on the modified IEEE 30-bus test system model. The results show that the DT classifier with …
Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos
Mintbase V2.0: A Comprehensive Database For Trna-Derived Fragments That Includes Nuclear And Mitochondrial Fragments From All The Cancer Genome Atlas Projects., Venetia Pliatsika, Phillipe Loher, Rogan Magee, Aristeidis G. Telonis, Eric R. Londin, Megumi Shigematsu, Yohei Kirino, Isidore Rigoutsos
Computational Medicine Center Faculty Papers
MINTbase is a repository that comprises nuclear and mitochondrial tRNA-derived fragments ('tRFs') found in multiple human tissues. The original version of MINTbase comprised tRFs obtained from 768 transcriptomic datasets. We used our deterministic and exhaustive tRF mining pipeline to process all of The Cancer Genome Atlas datasets (TCGA). We identified 23 413 tRFs with abundance of ≥ 1.0 reads-per-million (RPM). To facilitate further studies of tRFs by the community, we just released version 2.0 of MINTbase that contains information about 26 531 distinct human tRFs from 11 719 human datasets as of October 2017. Key new elements include: the ability …
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Distributed Knowledge Discovery For Diverse Data, Hossein Hamooni
Computer Science ETDs
In the era of new technologies, computer scientists deal with massive data of size hundreds of terabytes. Smart cities, social networks, health care systems, large sensor networks, etc. are constantly generating new data. It is non-trivial to extract knowledge from big datasets because traditional data mining algorithms run impractically on such big datasets. However, distributed systems have come to aid this problem while introducing new challenges in designing scalable algorithms. The transition from traditional algorithms to the ones that can be run on a distributed platform should be done carefully. Researchers should design the modern distributed algorithms based on the …
Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh
Mining Capstone Project Wikis For Knowledge Discovery, Swapna Gottipati, Venky Shankararaman, Melvrivk Goh
Research Collection School Of Computing and Information Systems
Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to understand the students learning and latest trends in industry. Mining Wikis is useful to educationists and academicians for decision-making about how to modify the educational environment to improve student's learning. The main challenge is that the content or data in project Wikis …
Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney
Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney
The ITB Journal
Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports on a research project that was concerned with the life cycle development for large scale data mining projects. The paper provides a detailed view of the design and development of a generic data mining life cycle called DMLC. The life cycle aims to support all members of data mining project teams as well as IT managers and academic researchers and may improve …
Peeking Into The Other Half Of The Glass : Handling Polarization In Recommender Systems., Mahsa Badami
Peeking Into The Other Half Of The Glass : Handling Polarization In Recommender Systems., Mahsa Badami
Electronic Theses and Dissertations
This dissertation is about filtering and discovering information online while using recommender systems. In the first part of our research, we study the phenomenon of polarization and its impact on filtering and discovering information. Polarization is a social phenomenon, with serious consequences, in real-life, particularly on social media. Thus it is important to understand how machine learning algorithms, especially recommender systems, behave in polarized environments. We study polarization within the context of the users' interactions with a space of items and how this affects recommender systems. We first formalize the concept of polarization based on item ratings and then relate …
Mining Sequences Of Developer Interactions In Visual Studio For Usage Smells, Kostadin Damevski, David C. Shepherd, Johannes Schneider, Lori Pollock
Mining Sequences Of Developer Interactions In Visual Studio For Usage Smells, Kostadin Damevski, David C. Shepherd, Johannes Schneider, Lori Pollock
Computer Science Publications
In this paper, we present a semi-automatic approach for mining a large-scale dataset of IDE interactions to extract usage smells, i.e., inefficient IDE usage patterns exhibited by developers in the field. The approach outlined in this paper first mines frequent IDE usage patterns, filtered via a set of thresholds and by the authors, that are subsequently supported (or disputed) using a developer survey, in order to form usage smells. In contrast with conventional mining of IDE usage data, our approach identifies time-ordered sequences of developer actions that are exhibited by many developers in the field. This pattern mining workflow is …
Dtreesim: A New Approach To Compute Decision Tree Similarity Using Re-Mining, Gözde Bakirli, Derya Bi̇rant
Dtreesim: A New Approach To Compute Decision Tree Similarity Using Re-Mining, Gözde Bakirli, Derya Bi̇rant
Turkish Journal of Electrical Engineering and Computer Sciences
A number of recent studies have used a decision tree approach as a data mining technique; some of them needed to evaluate the similarity of decision trees to compare the knowledge reflected in different trees or datasets. There have been multiple perspectives and multiple calculation techniques to measure the similarity of two decision trees, such as using a simple formula or an entropy measure. The main objective of this study is to compute the similarity of decision trees using data mining techniques. This study proposes DTreeSim, a new approach that applies multiple data mining techniques (classification, sequential pattern mining, and …
Discovering The Relationships Between Yarn And Fabric Properties Using Association Rule Mining, Peli̇n Yildirim, Derya Bi̇rant, Tuba Alpyildiz
Discovering The Relationships Between Yarn And Fabric Properties Using Association Rule Mining, Peli̇n Yildirim, Derya Bi̇rant, Tuba Alpyildiz
Turkish Journal of Electrical Engineering and Computer Sciences
Investigation of the effects of yarn parameters on fabric quality and finding important parameters to achieve desired fabric properties are important issues for the design process with the aim to meet the needs of the textile industry and the consumer for complex and specific requirements of functionality. Despite many statistical and mathematical studies that predict and reveal specific properties of utilized yarn and fabric materials, a number of challenges continue to exist when evaluated in many perspectives, such as discovering complex relationships among material properties in data. Data mining plays an important role in discovering hidden patterns from fabric data …
An Ant Colony Optimization Algorithm-Based Classification For The Diagnosis Of Primary Headaches Using A Website Questionnaire Expert System, Ufuk Çeli̇k, Ni̇lüfer Yurtay
An Ant Colony Optimization Algorithm-Based Classification For The Diagnosis Of Primary Headaches Using A Website Questionnaire Expert System, Ufuk Çeli̇k, Ni̇lüfer Yurtay
Turkish Journal of Electrical Engineering and Computer Sciences
The purpose of this research was to evaluate the classification accuracy of the ant colony optimization algorithm for the diagnosis of primary headaches using a website questionnaire expert system that was completed by patients. This cross-sectional study was conducted in 850 headache patients who randomly applied to hospital from three cities in Turkey with the assistance of a neurologist in each city. The patients filled in a detailed web-based headache questionnaire. Finally, neurologists' diagnosis results were compared with the classification results of an ant colony optimization-based classification algorithm. The ant colony algorithm for diagnosis classified patients with 96.9412% overall accuracy. …
Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi
Proposing A New Clustering Method To Detect Phishing Websites, Morteza Arab, Mohammad Karim Sohrabi
Turkish Journal of Electrical Engineering and Computer Sciences
Phishing websites are fake ones that are developed by ill-intentioned people to imitate real and legal websites. Most of these types of web pages have high visual similarities to hustle the victims. The victims of phishing websites may give their bank accounts, passwords, credit card numbers, and other important information to the designers and owners of phishing websites. The increasing number of phishing websites has become a great challenge in e-business in general and in electronic banking specifically. In the present study, a novel framework based on model-based clustering is introduced to fight against phishing websites. First, a model is …
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
Understanding The Relationships Between Sanitation And Health In Nicaragua And Honduras, Through Data Mining Tools, Ginevra Marina Lazerini, Josep Nualart, Sergio Ruiz-Cayuela, Maialen Urbina, Miquel Sànchez Marrè, Karina Gibert
Understanding The Relationships Between Sanitation And Health In Nicaragua And Honduras, Through Data Mining Tools, Ginevra Marina Lazerini, Josep Nualart, Sergio Ruiz-Cayuela, Maialen Urbina, Miquel Sànchez Marrè, Karina Gibert
International Congress on Environmental Modelling and Software
The aim of this work is to analyze water and sanitation supply data from Nicaragua and Honduras by using different data mining tools. The data has been provided by SIASAR (Rural Water and Sanitation Information System), which is a water and sanitation management and information platform created through the joint effort of different Central American Governments and the World Bank. In the study data from a survey performed in all the rural communities in Nicaragua and in a sample of the rural communities in Honduras from 2012 to 2015 is analyzed. Database contains 10206 communities described by 23 numerical variables …
Learning On The Relationships Between Respiratory Desease And The Use Of Traditional Stoves In Bangladesh Households, Camila Vergara, Iñigo Arregui, Alain Balaguer, Tamia Gómez, Carmen Sandoval, Miquel Sànchez Marrè, Karina Gibert
Learning On The Relationships Between Respiratory Desease And The Use Of Traditional Stoves In Bangladesh Households, Camila Vergara, Iñigo Arregui, Alain Balaguer, Tamia Gómez, Carmen Sandoval, Miquel Sànchez Marrè, Karina Gibert
International Congress on Environmental Modelling and Software
More than 4 million people die prematurely every year by deseases related to indoor air pollution produced by solid fuels used in cooking (WHO, 2016, Jones 1999), fifty thousand of them in Bangladesh (News Medical, 2012), being women and children the most affected. Risk of pneumonia is high due to the irritants, toxins and carcinogens realeased into air by the incomplete combustion of solid fuels (biomass) used in traditional stoves (WHO 2016), which produce PM10 (particulate matter, small enough (≤10μm) to get into lungs). An open data base from the World Bank (WHO, 2016) (Dasgutpa et al 2006) describing a …
Socio Environmental Conflicts In Ecuador. The Use Of Preprocessing And Data Mining To Detect Influencing Factors On Violence And Crisis (1985 - 2016), Lina Pita Merino, Martí Rosas-Casals, Karina Gibert
Socio Environmental Conflicts In Ecuador. The Use Of Preprocessing And Data Mining To Detect Influencing Factors On Violence And Crisis (1985 - 2016), Lina Pita Merino, Martí Rosas-Casals, Karina Gibert
International Congress on Environmental Modelling and Software
The main concern regarding the spread of Socio Environmental Conflicts (SEC) is the constant increase of extractive activities to support the economic system. Conflicts originated in the clash of interests between the extractive industries and local populations is the more visible outcome, but the complexity of this phenomenon may not be that obvious. Among South American countries, the highest murder rates of environmental activists corresponded to Brazil, Peru and Colombia, three of the four Amazonian countries along with Ecuador (Global Witness, 2015). In addition, all of them have similar characteristics such as high levels of inequality and the presence of …
A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur
A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur
Faculty Publications
In this paper we propose a novel cloud-based platform for building permit system that is efficient, user-friendly, transparent, and has quick turn-around time for homeowners. Compared to the existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of a) the end user experience, by analyzing explicit and implicit user feedback, and b) the permitting and urban planning process, allowing a gleaning of key insights for real estate development and city planning purposes, by analyzing how users interact with the system depending on …
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Evaluation Of Classification And Ensemble Algorithms For Bank Customer Marketing Response Prediction, Olatunji Apampa
Journal of International Technology and Information Management
This article attempts to improve the performance of classification algorithms used in the bank customer marketing response prediction of an unnamed Portuguese bank using the Random Forest ensemble. A thorough exploratory data analysis (EDA) was conducted on the data in order to ascertain the presence of anomalies such as outliers and extreme values. The EDA revealed that the bank data had 45, 211 instances and 17 features, with 11.7% positive responses. This was in addition to the detection of outliers and extreme values. Classification algorithms used for modelling the bank dataset include; Logistic Regression, Decision Tree, Naïve Bayes and the …
Novel Dynamic Partial Reconfiguration Implementations Of The Support Vector Machine Classifier On Fpga, Hanaa Hussain, Khaled Benkrid, Hüseyi̇n Şeker
Novel Dynamic Partial Reconfiguration Implementations Of The Support Vector Machine Classifier On Fpga, Hanaa Hussain, Khaled Benkrid, Hüseyi̇n Şeker
Turkish Journal of Electrical Engineering and Computer Sciences
The support vector machine (SVM) is one of the highly powerful classifiers that have been shown to be capable of dealing with high-dimensional data. However, its complexity increases requirements of computational power. Recent technologies including the postgenome data of high-dimensional nature add further complexity to the construction of SVM classifiers. In order to overcome this problem, hardware implementations of the SVM classifier have been proposed to benefit from parallelism to accelerate the SVM. On the other hand, those implementations offer limited flexibility in terms of changing parameters and require the reconfiguration of the whole device. The latter interrupts the operation …
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Research Collection School Of Computing and Information Systems
We espouse a vision of small data-based immersive retail analytics, where a combination of sensor data, from personal wearable-devices and store-deployed sensors & IoT devices, is used to create real-time, individualized services for in-store shoppers. Key challenges include (a) appropriate joint mining of sensor & wearable data to capture a shopper’s product level interactions, and (b) judicious triggering of power-hungry wearable sensors (e.g., camera) to capture only relevant portions of a shopper’s in-store activities. To explore the feasibility of our vision, we conducted experiments with 5 smartwatch-wearing users who interacted with objects placed on cupboard racks in our lab (to …
Network Analysis With Stochastic Grammars, Alan C. Lin
Network Analysis With Stochastic Grammars, Alan C. Lin
Theses and Dissertations
Digital forensics requires significant manual effort to identify items of evidentiary interest from the ever-increasing volume of data in modern computing systems. One of the tasks digital forensic examiners conduct is mentally extracting and constructing insights from unstructured sequences of events. This research assists examiners with the association and individualization analysis processes that make up this task with the development of a Stochastic Context -Free Grammars (SCFG) knowledge representation for digital forensics analysis of computer network traffic. SCFG is leveraged to provide context to the low-level data collected as evidence and to build behavior profiles. Upon discovering patterns, the analyst …
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
Predicting Cross-Gaming Propensity Using E-Chaid Analysis, Eunju Suh, Matt Alhaery
UNLV Gaming Research & Review Journal
Cross-selling different types of games could provide an opportunity for casino operators to generate additional time and money spent on gaming from existing patrons. One way to identify the patrons who are likely to cross-play is mining individual players’ gaming data using predictive analytics. Hence, this study aims to predict casino patrons’ propensity to play both slots and table games, also known as cross-gaming, by applying a data-mining algorithm to patrons’ gaming data. The Exhaustive Chi-squared Automatic Interaction Detector (E-CHAID) method was employed to predict cross-gaming propensity. The E-CHAID models based on the gaming-related behavioral data produced actionable model accuracy …
Automatic Classification Of Harmonic Data Using $K$-Means And Least Square Support Vector Machine, Hüseyi̇n Eri̇şti̇, Vedat Tümen, Özal Yildirim, Belkis Eri̇şti̇, Yakup Demi̇r
Automatic Classification Of Harmonic Data Using $K$-Means And Least Square Support Vector Machine, Hüseyi̇n Eri̇şti̇, Vedat Tümen, Özal Yildirim, Belkis Eri̇şti̇, Yakup Demi̇r
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, an effective classification approach to classify harmonic data has been proposed. In the proposed classifier approach, harmonic data obtained through a 3-phase system have been classified by using $k$-means and least square support vector machine (LS-SVM) models. In order to obtain class details regarding harmonic data, a $k$-means clustering algorithm has been applied to these data first. The training of the LS-SVM model has been realized with the class details obtained through the $k$-means algorithm. To increase the efficiency of the LS-SVM model, the regularization and kernel parameters of this model have been determined with a grid …
A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth
A Theory Of Name Resolution, Pierre Néron, Andrew Tolmach, Eelco Visser, Guido Wachsmuth
Computer Science Faculty Publications and Presentations
We describe a language-independent theory for name binding and resolution, suitable for programming languages with complex scoping rules including both lexical scoping and modules. We formulate name resolution as a two-stage problem. First a language-independent scope graph is constructed using language-specific rules from an abstract syntax tree. Then references in the scope graph are resolved to corresponding declarations using a language-independent resolution process. We introduce a resolution calculus as a concise, declarative, and language- independent specification of name resolution. We develop a resolution algorithm that is sound and complete with respect to the calculus. Based on the resolution calculus we …
Lifetime Lexical Variation In Social Media, Lizi Liao, Jing Jiang, Ying Ding, Heyan Huang, Ee-Peng Lim
Lifetime Lexical Variation In Social Media, Lizi Liao, Jing Jiang, Ying Ding, Heyan Huang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
As the rapid growth of online social media attracts a large number of Internet users, the large volume of content generated by these users also provides us with an opportunity to study the lexical variation of people of different ages. In this paper, we present a latent variable model that jointly models the lexical content of tweets and Twitter users' ages. Our model inherently assumes that a topic has not only a word distribution but also an age distribution. We propose a Gibbs-EM algorithm to perform inference on our model. Empirical evaluation shows that our model can learn meaningful age-specific …
Where Are We In Wastewater Treatment Plants Data Management? A Review And A Proposal, Manel Poch, Joaquim Comas, José Porro, Manel Garrido-Baserba, Lluis Corominas, Maite Pijuan
Where Are We In Wastewater Treatment Plants Data Management? A Review And A Proposal, Manel Poch, Joaquim Comas, José Porro, Manel Garrido-Baserba, Lluis Corominas, Maite Pijuan
International Congress on Environmental Modelling and Software
Wastewater treatment plants (WWTP) are comprised of complex processes that need to be optimally managed. To attain that, in the last years an impressive effort has been made to incorporate monitoring devices able to provide from several hundred to more than ten thousand signals. With the aim to take benefit of those data, different data mining techniques have been applied to transform them into information and knowledge in order to help WWTP's managers. Furthermore, several mathematical models have been developed intending to simulate process behaviour including biomass and pollutants transformation. However, it is recognized that this it is not enough …