They created the problem in a time–space network and used the weighting method for the objective functions and a heuristic algorithm to solve the problem considering an error tolerance in order to cope with the
Li He 1* & Guoping Zhang 1 This paper presents a normalized standard error-based statistical data binning method, termed "bin size index" (BSI), which yields an optimized, objective bin size for constructing a rational histogram to facilitate subsequent deconvolution of multimodal datas...
In these rules, the two sets TX and D−TX exhibit different distributions of the quantitative variables J. Note that summary statistics can still be obtained post-hoc via the empirical distribution. 3.1. Generating association rules We demonstrate our method with quantitative variables on the ...
5,6]. Each of the models explored during this line of research were investigated in order to determine its feasibility for answering a specific research question. Exploratory factor analysis (EFA) was examined as a method to be able
DNA methylation data have become a valuable source of information for biomarker development, because, unlike static genetic risk estimates, DNA methylation varies dynamically in relation to diverse exogenous and endogenous factors, including environmenta
For this reason, we have seen considerable advances over the past few years in statistical methods in data mining. This paper is a comprehensive and systematic review of these recent developments in the area of data mining.doi:10.3390/math10060993Joaquim Fernando Pinto da Costa...
Some of the studies on debris flow susceptibility in Malaysia [113] have adopted Horton open-source Flow-R software for the identification of debris-flow source area. However, the Horton (Flo-R) method lacks flexibility in the selection of the conditioning factors used and was developed for a...
鉴于之前已经在豆瓣上发布了部分本书第一版相关读书笔记,因此这次笔记的内容将会有针对性的对一些之前没有搞懂的问题进行详细陈述。如果涉及到代码编程方面的内容,避免单纯调用R语言或者matlab中现有函数,而尽量再挖掘一层,分析一下源码。是以作为提高的动力。下面开始: 第三章Linear Method...(12回应)...
To enter the shell in Scala, type ./bin/smile Similar to the shell in Java, all major Smile packages are pre-imported. Besides, all high-level Smile operators are predefined in the shell. By default, the shell uses up to 75% memory. If you need more memory to handle large data, use...
A Bayesian method for the induction of probabilistic networks from data. Technical Report SMI-91-1, Section on Medical Informatics, Stanford University. Dawid, A. & Lauritzen, S. (1993). Hyper Markov laws in the statistical analysis of decomposable graphical models.Annals of Statistics 21:1272–...