Solution of HW5, Data Mining
ثبت نشده
چکیده
sotu=list() clinton1994=scan("SOTU/clinton4.txt",what=’c’); sotu[[1]]=clinton1994 clinton1995=scan("SOTU/clinton5.txt",what=’c’); sotu[[2]]=clinton1995 clinton1996=scan("SOTU/clinton6.txt",what=’c’); sotu[[3]]=clinton1996 clinton1997=scan("SOTU/clinton7.txt",what=’c’); sotu[[4]]=clinton1997 clinton1998=scan("SOTU/clinton8.txt",what=’c’); sotu[[5]]=clinton1998 clinton1999=scan("SOTU/clinton9.txt",what=’c’); sotu[[6]]=clinton1999 clinton2000=scan("SOTU/clinton0.txt",what=’c’); sotu[[7]]=clinton2000 bush2002=scan("SOTU/bush2.txt",what=’c’); sotu[[8]]=bush2002 bush2003=scan("SOTU/bush3.txt",what=’c’); sotu[[9]]=bush2003 bush2004=scan("SOTU/bush4.txt",what=’c’); sotu[[10]]=bush2004 bush2005=scan("SOTU/bush5.txt",what=’c’); sotu[[11]]=bush2005 bush2006=scan("SOTU/bush6.txt",what=’c’); sotu[[12]]=bush2006 bush2007=scan("SOTU/bush7.txt",what=’c’); sotu[[13]]=bush2007 bush2008=scan("SOTU/bush8.txt",what=’c’); sotu[[14]]=bush2008 obama2010=scan("SOTU/obama10.txt",what=’c’); sotu[[15]]=obama2010 obama2011=scan("SOTU/obama11.txt",what=’c’); sotu[[16]]=obama2011
منابع مشابه
A new approach based on data envelopment analysis with double frontiers for ranking the discovered rules from data mining
Data envelopment analysis (DEA) is a relatively new data oriented approach to evaluate performance of a set of peer entities called decision-making units (DMUs) that convert multiple inputs into multiple outputs. Within a relative limited period, DEA has been converted into a strong quantitative and analytical tool to measure and evaluate performance. In an article written by Toloo et al. (2009...
متن کاملLeaching of gold ores with high cyanicides: a physico-chemical modeling approach
Processing of gold ores with high sulfide minerals is problematic as they consume cyanide and reduce gold leaching. Optimization of gold leaching and cyanide consumption requires a methodology to estimate the amount of exposed cyanicides, their leaching kinetics, and speciation of cyanide complexes that consume the free cyanide and compete with gold. In this paper, a physico-chemical approach i...
متن کاملEvaluation of Groundwater Vulnerability Using Data Mining Technique in Hashtgerd Plain
Groundwater vulnerability assessment would be one of the effective informative methods to provide a basis for determining source of pollution. Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. A common way to develop groundwater vulnerability map is DRASTIC. Meanwhile, application of the method is not easy for any aquifer due to...
متن کاملApplication of non-linear regression and soft computing techniques for modeling process of pollutant adsorption from industrial wastewaters
The process of pollutant adsorption from industrial wastewaters is a multivariate problem. This process is affected by many factors including the contact time (T), pH, adsorbent weight (m), and solution concentration (ppm). The main target of this work is to model and evaluate the process of pollutant adsorption from industrial wastewaters using the non-linear multivariate regression and intell...
متن کامل