A group formation tool in an e-learning context

CE Christodoulopoulos… - 19th IEEE international …, 2007 - ieeexplore.ieee.org
In this paper we present a Web-based group formation tool that supports the instructor to
automatically create both homogeneous and heterogeneous groups based on up to three …

[PDF][PDF] Investigation of group formation using low complexity algorithms

CE Christodoulopoulos… - Proc. of PING …, 2007 - researchgate.net
Designing tools that support group formation is a challenging goal for both the areas of
adaptive and collaborative e-learning environments. Group formation may be used for a …

[HTML][HTML] A K-Means Classification and Entropy Pooling Portfolio Strategy for Small and Large Capitalization Cryptocurrencies

JC Mba, ESEF Angaman - Entropy, 2023 - mdpi.com
In this study, we propose three portfolio strategies: allocation based on the normality
assumption, the skewed-Student t distribution, and the entropy pooling (EP) method for 14 …

An experimental comparison of clustering methods for content-based indexing of large image databases

HP Lai, M Visani, A Boucher, JM Ogier - Pattern Analysis and Applications, 2012 - Springer
In recent years, the expansion of acquisition devices such as digital cameras, the
development of storage and transmission techniques of multimedia documents and the …

Aspect mining using model-based clustering

RR McFadden, FJ Mitropoulos - 2012 Proceedings of IEEE …, 2012 - ieeexplore.ieee.org
Legacy systems contain critical and complex business code that has been in use for a long
time. This code is difficult to understand, maintain, and evolve, in large part due to …

Estimating of software quality with clustering techniques

D Gupta, VK Goyal, H Mittal - 2013 Third International …, 2013 - ieeexplore.ieee.org
Software faults are one of major criteria to estimate the software quality or the software
reliability. There is number of matrices defined that uses the software faults to estimate the …

Survey of aspect mining case study software and benchmarks

RR McFadden, FJ Mitropoulos - 2013 Proceedings of IEEE …, 2013 - ieeexplore.ieee.org
Aspect mining is a growing area of research investigating the effective ways of finding
crosscutting concerns in existing non-aspect oriented software. Once found, these concerns …

[PDF][PDF] Improving intrusion detection systems using data mining techniques

AZ Almutairi - 2016 - repository.lboro.ac.uk
Recent surveys and studies have shown that cyber-attacks have caused a lot of damage to
organisations, governments, and individuals around the world. Although developments are …

A robust fuzzy clustering method with outliers influence free

LJ Kao, YP Huang - … conference on Fuzzy Theory and Its …, 2012 - ieeexplore.ieee.org
Fuzzy C-means algorithm (FCM) is a method of clustering which allows a point data to
belong to two or more clusters. FCM algorithm suffers from outliers or noise because of the …

Ejecting outliers to enhance robustness of fuzzy cluster ensemble

LJ Kao, YP Huang - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
Clustering analysis provides significant contributions to healthcare or medical service.
However, relying only on one set of clusters obtained from employing a clustering algorithm …