RapidMiner
3,663 Followers
Recent papers in RapidMiner
In this paper the authors proposed different Multilayer Perceptron Models (MLP) of artificial neural networks (ANN) suitable for visual merchandising in Global Distribution (GDO) applications involving supermarket product facing. The... more
Research on the performance of workers based on the determination of standard working hours for absences conducted by workers in a certain period. In disciplinary supervision, workers are expected to be able to provide the best... more
RapidMiner is a software for machine learning, data mining, predictive analytics, and business analytics. The server will record large web log files when user visits the website. Extracting knowledge from such huge data demands for new... more
By applying RapidMiner workflows has been processed a dataset originated from different data files, and containing information about the sales over three years of a large chain of retail stores. Subsequently, has been constructed a Deep... more
This paper analyses the use of data mining techniques in evaluating job readiness of unemployed population in Ireland. To effectively help a jobseeker to enter or return to employment, it is necessary to develop a personal plan and... more
Internet usage has become intensive during the last few decades; this has given rise to the use of email which is one of the fastest yet cheap modes of communication. The growing demand of email communication has given rise to the spam... more
Apple adalah perusahaan teknologi multinasional yang berpusat di Cupertino, California, yang merancang, mengembangkan, dan menjual barang elektronik konsumen, perangkat lunak komputer, dan layanan daring. Sumber pendapatan Apple secara... more
Abstrak: Feature Extraction adalah teknik pengambilan ciri / feature dari suatu bentuk yang nantinya nilai yang didapatkan akan dianalisis untuk proses selanjutnya. Klasifikasi adalah proses untuk menyatakan suatu objek ke dalam salah... more
This paper introduces a three-step methodology of identifying skills demand on labour markets. By accessing publicly available vacancy data, with web and text mining tools, we are able to extract valuable facts about competences and... more
According to World Health Organization (WHO), breast cancer is the top cancer in women both in the developed and the developing world. Increased life expectancy, urbanization and adoption of western lifestyles trigger the occurrence of... more
Peningkatan kualitas karyawan yang bekerja didalam sebuah perusahaan merupakan hal penting yang harus dilakukan salah satunya dengan cara penilaian kinerja karyawan serta memberikan apresiasi terhadap karyawan yang berprestasi agar dapat... more
The internet world expands day by day as well as threats related to it. Nowadays, Cyber-attacks often happen more than a decade ago. Intrusion detection is one of the most popular search area that provides various technologies and... more
Abstract. The experiments aimed to compare machine learning algorithms to create models for the valuation of residential premises, implemented in popular data mining systems KEEL, RapidMiner and WEKA, were carried out. Six common methods... more
Accounting databases with fraudulent transactions inside was used to detect fraud patterns by data mining tool. The object was accomplished by the following method: first, inside data, fraudulent transactions according to three fraud... more
Intrusion detection system dealing with the huge amount of data that include repeated irrelevant cause slow process of testing, training and higher learning resource consumption as well as the vulnerability of the detection rate. Data... more
Using the descriptive and developmental design, the study developed and evaluated an eHealth application for women using decision tree classifiers. It focuses on the development of an eHealth application system using open-access datasets... more
Research on the performance of workers based on the determination of standard working hours for absences conducted by workers in a certain period. In disciplinary supervision, workers are expected to be able to provide the best... more
According to World Health Organization (WHO), breast cancer is the top cancer in women both in the developed and the developing world. Increased life expectancy, urbanization and adoption of western lifestyles trigger the occurrence of... more
This paper is presented in the conference which is named as Digital Democracy: Critical Perspectives in the Age of Big Data. Conference is held in Södertörn University, Stockholm, Sweden.
In this paper the authors proposed different Multilayer Perceptron Models (MLP) of artificial neural networks (ANN) suitable for visual merchandising in Global Distribution (GDO) applications involving supermarket product facing. The... more
Floor coverings are required to be non-slip so that people can move freely in public and closed areas. Within the scope of this study, dry and wet environment Dynamic Friction Coefficients of floor coverings DCOF (µ) are measured in 5... more
Accounting databases with fraudulent transactions inside was used to detect fraud patterns by data mining tool. The object was accomplished by the following method: first, inside data, fraudulent transactions according to three fraud... more
Abstract. This paper presents a study about three software tools for data mining which are commonly utilized as for commercial as for scientific purposes. Due to the existence of a variety of tools, many novice researchers in the subfield... more
By applying RapidMiner workflows has been processed a dataset originated from different data files, and containing information about the sales over three years of a large chain of retail stores. Subsequently, has been constructed a Deep... more
Internet usage has become intensive during the last few decades; this has given rise to the use of email which is one of the fastest yet cheap modes of communication. The growing demand of email communication has given rise to the spam... more
Smart Watches, mobile computers in the format of a wristwatch and worn on the wrist, are generally estimated as the next mega trend of mobile computing. Meanwhile, »wearables« are available in the mass market1, IP67 certified, which... more