Search Results - (( using competency model algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- using competency »
- competency model »
- java application »
- mining algorithm »
- model algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…Managing employee’s competency is considered as the top challenge for human resource professional especially in the process to determine the right person for the right job that is based on their competency.As an alternative approach, this article attempts to propose academic leadership bio-inspired classification model using negative selection algorithm to handle this issue.This study consists of three phases; data preparation, model development and model analysis. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Statistical process control for failure crushing time data using competing risks model.
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
9
Statistical process control for failure crushing time data using competing risks model
Published 2011“…EM algorithm method is used to estimate the parameter of the model. …”
Get full text
Get full text
Get full text
Article -
10
Competing risks for reliability analysis using Cox’s model
Published 2007“…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. Design/methodology/approach – The parameters of the models have been estimated by method of maximum likelihood based on EM algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
-
13
Cutpoint determination methods in competing risks subdistribution model
Published 2009“…In the analysis involving clinical and psychological data, by transforming a continuous predictor variable into a categorical variable, usually binary, a more interpretable model can be established. Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
Get full text
Get full text
Article -
14
Cutpoint determination methods in competing risks subdistribution model
Published 2009“…In the analysis involving clinical and psychological data, by transforming a continuous predictor variable into a categorical variable, usually binary, a more interpretable model can be established. Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
Get full text
Get full text
Get full text
Article -
15
Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm
Published 2024“…Afterward, a mathematical version is used to symbolize the layout preference problems, and the layout scheme selection method is simulated. …”
Get full text
Get full text
Get full text
Article -
16
Multiple equations model selection algorithm with iterative estimation method
Published 2016“…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
Get full text
Get full text
Get full text
Article -
17
Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih
Published 2001“…Data containing eleven predictive variables was used to train and test neural network model. The research procedures chosen were the multi-layered perceptron with back propagation algorithmic learning. …”
Get full text
Get full text
Get full text
Thesis -
18
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…Residual-based approaches are used to assess the validity of the two models (MW, CC) assumptions. …”
Get full text
Get full text
Thesis -
19
Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model
Published 2000“…In a conventional competing risk s model, the time to failure of a particular experimental unit might be censored and the cause of failure can be known or unknown. …”
Get full text
Get full text
Thesis -
20
Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications
Published 2018“…The most powerful features of this method is the ability to model irregular or randomly shaped data and to be applied to any algorithms that estimating models using frequency-domain data to provide state-space or transfer function for the model.…”
Get full text
Get full text
Get full text
Article
