Solution of HW5, Data Mining

ثبت نشده
چکیده

sotu=list() clinton1994=scan("SOTU/clinton4.txt",what=’c’); sotu[[1]]=clinton1994 clinton1995=scan("SOTU/clinton5.txt",what=’c’); sotu[[2]]=clinton1995 clinton1996=scan("SOTU/clinton6.txt",what=’c’); sotu[[3]]=clinton1996 clinton1997=scan("SOTU/clinton7.txt",what=’c’); sotu[[4]]=clinton1997 clinton1998=scan("SOTU/clinton8.txt",what=’c’); sotu[[5]]=clinton1998 clinton1999=scan("SOTU/clinton9.txt",what=’c’); sotu[[6]]=clinton1999 clinton2000=scan("SOTU/clinton0.txt",what=’c’); sotu[[7]]=clinton2000 bush2002=scan("SOTU/bush2.txt",what=’c’); sotu[[8]]=bush2002 bush2003=scan("SOTU/bush3.txt",what=’c’); sotu[[9]]=bush2003 bush2004=scan("SOTU/bush4.txt",what=’c’); sotu[[10]]=bush2004 bush2005=scan("SOTU/bush5.txt",what=’c’); sotu[[11]]=bush2005 bush2006=scan("SOTU/bush6.txt",what=’c’); sotu[[12]]=bush2006 bush2007=scan("SOTU/bush7.txt",what=’c’); sotu[[13]]=bush2007 bush2008=scan("SOTU/bush8.txt",what=’c’); sotu[[14]]=bush2008 obama2010=scan("SOTU/obama10.txt",what=’c’); sotu[[15]]=obama2010 obama2011=scan("SOTU/obama11.txt",what=’c’); sotu[[16]]=obama2011

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A new approach based on data envelopment analysis with double frontiers for ranking the discovered rules from data mining

Data envelopment analysis (DEA) is a relatively new data oriented approach to evaluate performance of a set of peer entities called decision-making units (DMUs) that convert multiple inputs into multiple outputs. Within a relative limited period, DEA has been converted into a strong quantitative and analytical tool to measure and evaluate performance. In an article written by Toloo et al. (2009...

متن کامل

Leaching of gold ores with high cyanicides: a physico-chemical modeling approach

Processing of gold ores with high sulfide minerals is problematic as they consume cyanide and reduce gold leaching. Optimization of gold leaching and cyanide consumption requires a methodology to estimate the amount of exposed cyanicides, their leaching kinetics, and speciation of cyanide complexes that consume the free cyanide and compete with gold. In this paper, a physico-chemical approach i...

متن کامل

Evaluation of Groundwater Vulnerability Using Data Mining Technique in Hashtgerd Plain

Groundwater vulnerability assessment would be one of the effective informative methods to provide a basis for determining source of pollution. Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. A common way to develop groundwater vulnerability map is DRASTIC. Meanwhile, application of the method is not easy for any aquifer due to...

متن کامل

Application of non-linear regression and soft computing techniques for modeling process of pollutant adsorption from industrial wastewaters

The process of pollutant adsorption from industrial wastewaters is a multivariate problem. This process is affected by many factors including the contact time (T), pH, adsorbent weight (m), and solution concentration (ppm). The main target of this work is to model and evaluate the process of pollutant adsorption from industrial wastewaters using the non-linear multivariate regression and intell...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011