نتایج جستجو برای: we used data mining techniques such as different classification and clustering approaches
تعداد نتایج: 17828933 فیلتر نتایج به سال:
rivers and runoff have always been of interest to human beings. in order to make use of the proper water resources, human societies, industrial and agricultural centers, etc. have usually been established near rivers. as the time goes on, these societies developed, and therefore water resources were extracted more and more. consequently, conditions of water quality of the rivers experienced rap...
the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...
Breast cancer has become a widespread disease around the world in young women. Expert systems, developed by data mining techniques, are valuable tools in diagnosis of breast cancer and can help physicians for decision making process. This paper presents a new hybrid data mining approach to classify two groups of breast cancer patients (malignant and benign). The proposed approach, AP-AMBFA, con...
the present study was carried on to investigate the use of face-keeping strategies in reaction to complaints by male and female in two different cultures, persian and american english. to see if apology strategies are affected by cultural, contextual preferences and gender of interlocutors in two distinct languages of persian and american english. the hypotheses to be tested were 1) ifids, acce...
abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...
any change in the refractive index of a laser active medium can lead to serious degradation of beam quality, laser beam modes, laser performance and variation in the intensity distribution. alteration in the refractive index of laser active medium is especially notable in high power lasers. it is clear that in the laser beam production, the pumping agent induces a great amount of heat which...
with rapid development in information gathering technologies and access to large amounts of data, we always require methods for data analyzing and extracting useful information from large raw dataset and data mining is an important method for solving this problem. clustering analysis as the most commonly used function of data mining, has attracted many researchers in computer science. because o...
abstract this research is about a longitudinal case study of english morpheme acquisition by a persian speaking child l2 learner of english (2 .9-3).the goal of this research has been discovery of the child ‘s ability in acquiring of english morphemes in a persian context while only one person (the child’ s father)has been talking to her.this child has also been exposed to english languag...
there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...
Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM) techniques aim at protecting the sensitive dat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید