This is an attempt at evaluation of Open Source Data mining tools. Initially the paper deliberates on what can be and what cannot be the focus of inquiry, for the evaluation. Then it outlines the framework under which the evaluation is to be done. Next it defines the performance criteria to be measured. The tool selection strategy for the study is framed using various online resources and tools selected based on it. A table lists the different set of criteria and the findings of each tool against it. After capturing the findings of the study in a tabular fashion, a framework implementation strategy is made. This details the relative scaling for the evaluation. Based on the scorings, a conclusion remark with some suggestions summarizes the findings of the study. Lastly some assumptions/Limitations are discussed.
Methodology and Campaign Design for the Evaluation of Semantic Search ToolsStuart Wrigley
The main problem with the state of the art in the semantic search domain is the lack of comprehensive evaluations. There exist only a few efforts to evaluate semantic search tools and to compare the results with other evaluations of their kind.
In this paper, we present a systematic approach for testing and benchmarking semantic search tools that was developed within the SEALS project. Unlike other semantic web evaluations our methodology tests search tools both automatically and interactively with a human user in the loop. This allows us to test not only functional performance measures, such as precision and recall, but also usability issues, such as ease of use and comprehensibility of the query language.
The paper describes the evaluation goals and assumptions; the criteria and metrics; the type of experiments we will conduct as well as the datasets required to conduct the evaluation in the context of the SEALS initiative. To our knowledge it is the first effort to present a comprehensive evaluation methodology for Semantic Web search tools.
[2015/2016] AADL (Architecture Analysis and Design Language)Ivano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
G code based data receiving and control systemeSAT Journals
Abstract Today in engineering field technical research among the students are increased. To design and develop such hardware projects we may need to collect real time data from Data Acquisition System. These Systems are manufactured by very few companies in India. These systems are very expensive for the students. Hence students are in need of low cost data acquisition system to perform their research work. In this paper we have explained and implemented a Data Acquisition system (DAQ) using ATmega16 microcontroller. The GUI and data processing for DAQ system has been designed on LabVIEW and the system has been tested for different tasks. Keywords : Data Acquisition; LabVIEW; G-code; AVR ATmega-16;
Retail Analytics, with Oracle Data Integrator 11G.
Points about ODI Objects, Interfaces, Variables, Packages, Scenarios, Load Plans, Scheduling.
Batch Scheduling with RA 14.2, UAF in 14.2, Error Managment in RA 14.2
Methodology and Campaign Design for the Evaluation of Semantic Search ToolsStuart Wrigley
The main problem with the state of the art in the semantic search domain is the lack of comprehensive evaluations. There exist only a few efforts to evaluate semantic search tools and to compare the results with other evaluations of their kind.
In this paper, we present a systematic approach for testing and benchmarking semantic search tools that was developed within the SEALS project. Unlike other semantic web evaluations our methodology tests search tools both automatically and interactively with a human user in the loop. This allows us to test not only functional performance measures, such as precision and recall, but also usability issues, such as ease of use and comprehensibility of the query language.
The paper describes the evaluation goals and assumptions; the criteria and metrics; the type of experiments we will conduct as well as the datasets required to conduct the evaluation in the context of the SEALS initiative. To our knowledge it is the first effort to present a comprehensive evaluation methodology for Semantic Web search tools.
[2015/2016] AADL (Architecture Analysis and Design Language)Ivano Malavolta
This presentation is about a lecture I gave within the "Software systems and services" immigration course at the Gran Sasso Science Institute, L'Aquila (Italy): http://cs.gssi.infn.it/.
http://www.ivanomalavolta.com
G code based data receiving and control systemeSAT Journals
Abstract Today in engineering field technical research among the students are increased. To design and develop such hardware projects we may need to collect real time data from Data Acquisition System. These Systems are manufactured by very few companies in India. These systems are very expensive for the students. Hence students are in need of low cost data acquisition system to perform their research work. In this paper we have explained and implemented a Data Acquisition system (DAQ) using ATmega16 microcontroller. The GUI and data processing for DAQ system has been designed on LabVIEW and the system has been tested for different tasks. Keywords : Data Acquisition; LabVIEW; G-code; AVR ATmega-16;
Retail Analytics, with Oracle Data Integrator 11G.
Points about ODI Objects, Interfaces, Variables, Packages, Scenarios, Load Plans, Scheduling.
Batch Scheduling with RA 14.2, UAF in 14.2, Error Managment in RA 14.2
This presentation aims to bring into your knowledge, the various open source ERPs available in the market. I have compared various ERPs to choose best for required business model. Note: Different model may require different type of ERPs.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
There are many ways to ruin a performance testing project, there is just a handful of ways to do it right. This publication analyses the most widespread performance testing blunders. It is impossible in one article to expose all the varieties of testing wrongdoings; as such, this publication is definitely an open-ended.
Issues in Query Processing and OptimizationEditor IJMTER
The paper identifies the various issues in query processing and optimization while
choosing the best database plan. It is unlike preceding query optimization techniques that uses only a
single approach for identifying best query plan by extracting data from database. Our approach takes
into account various phases of query processing and optimization, heuristic estimation techniques
and cost function for identifying the best execution plan. A review report on various phases of query
processing, goals of optimizer, various rules for heuristic optimization and cost components involved
are presented in this paper.
Quick overview on Visual Studio 2012 Profiler & Profiling tools : the importance of the profiling methods (sampling, instrumentation, memory, concurrency, … ), how to run a profiling session, how to profile unit test/load test, how to use API and a few samples
Hudup - A Framework of E-commercial Recommendation AlgorithmsLoc Nguyen
Recommendation algorithm is very important to e-commercial websites when it can provide favorite products to online customers, which results out an increase in sale revenue. I propose the infrastructure for e-commercial recommendation solutions. It is a middleware framework of e-commercial recommendation software, which supports scientists and software developers to build up their own recommendation algorithms with low cost, high achievement and fast speed. This report is a full description of proposed framework, which begins with general architectures and then concentrates on programming classes. Finally, a tutorial will help readers to comprehend the framework.
This presentation aims to bring into your knowledge, the various open source ERPs available in the market. I have compared various ERPs to choose best for required business model. Note: Different model may require different type of ERPs.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
There are many ways to ruin a performance testing project, there is just a handful of ways to do it right. This publication analyses the most widespread performance testing blunders. It is impossible in one article to expose all the varieties of testing wrongdoings; as such, this publication is definitely an open-ended.
Issues in Query Processing and OptimizationEditor IJMTER
The paper identifies the various issues in query processing and optimization while
choosing the best database plan. It is unlike preceding query optimization techniques that uses only a
single approach for identifying best query plan by extracting data from database. Our approach takes
into account various phases of query processing and optimization, heuristic estimation techniques
and cost function for identifying the best execution plan. A review report on various phases of query
processing, goals of optimizer, various rules for heuristic optimization and cost components involved
are presented in this paper.
Quick overview on Visual Studio 2012 Profiler & Profiling tools : the importance of the profiling methods (sampling, instrumentation, memory, concurrency, … ), how to run a profiling session, how to profile unit test/load test, how to use API and a few samples
Hudup - A Framework of E-commercial Recommendation AlgorithmsLoc Nguyen
Recommendation algorithm is very important to e-commercial websites when it can provide favorite products to online customers, which results out an increase in sale revenue. I propose the infrastructure for e-commercial recommendation solutions. It is a middleware framework of e-commercial recommendation software, which supports scientists and software developers to build up their own recommendation algorithms with low cost, high achievement and fast speed. This report is a full description of proposed framework, which begins with general architectures and then concentrates on programming classes. Finally, a tutorial will help readers to comprehend the framework.
Given the wide range of Source Code Analysis Tools, security professionals, auditors and developers alike are faced with the same developers alike are faced with the question: What is the best way to assess a Static Application Security Testing (SAST) tool for deployment?
Choosing the right tool requires different considerations during each stage of the SAST tool evaluation process.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Performance Evaluation of Open Source Data Mining Tools
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 176
Performance Evaluation of Open Source Data Mining Tools
Syeda Saba Siddiqua1
Mohd Sameer2
Ashfaq Ahmed Khan3
1,2,3
Computer Engineering
Abstract— This is an attempt at evaluation of Open Source
Data mining tools. Initially the paper deliberates on what
can be and what cannot be the focus of inquiry, for the
evaluation. Then it outlines the framework under which the
evaluation is to be done. Next it defines the performance
criteria to be measured. The tool selection strategy for the
study is framed using various online resources and tools
selected based on it. A table lists the different set of criteria
and the findings of each tool against it. After capturing the
findings of the study in a tabular fashion, a framework
implementation strategy is made. This details the relative
scaling for the evaluation. Based on the scorings, a
conclusion remark with some suggestions summarizes the
findings of the study. Lastly some assumptions/Limitations
are discussed.
Key words: Evaluation Framework, Rapid Miner, Knime
I. INTRODUCTION
There has been an explosion of Data Mining tools in the
market. On the Technical forums, there are all the claims,
arguments and counters that create a lot of noise about the
―best tool‖ in the market. Therefore, there is need that there
has to be some clarity about this. Hence, this study tries to
clear the air from academic perspective.
There are different ways in which different tools
read, handle and tweak the data before displaying the results
for the requested task. To try to measure execution times for
benchmarking the tool on a standard Data Set was not the
correct approach to analyze performance. The tool is not to
be seen as a data cruncher. It is rather a platform that
implements the mining process. Hence, the job execution
times would reflect just not implementation of algorithm but
also account for input/output times, intermediate results
calculation times and garbage collection and cleansing.
The focus of our inquiry should be the
implementation of process of ―data mining‖ by tool rather
than abstract trial to measure execution time for jobs
running in these environment. And hence, new Frame work
is proposed to select the best tool for Academic Use. The
tools were analyzed from a beginner’s perspective. To come
up with benchmarking parameters, the literature study of
many journal articles was done. These all resources are
listed in the citations at the end of this report.
II. AN EVALUATION FRAMEWORK
At the core of this tool evaluation methodology is a scoring
framework. The literature review was done to understand
the context in which the tools are evaluated. After a detailed
review of these frameworks, the mixed approach was
preceded that encompasses both frameworks and carefully
draws into considerations only the striking elements that
broadly define ―open source‖. On each of the features from
the above frame work, a decision was made either to include
it or to narrow its scope before inclusion or to drop it all
together.
III. TOOL SELECTION STRATEGY & FAMILIARITY
Some initial online review of the most popular Open Source
Tools available was done. The decision was based on easy
installation and access to documentation and popularity of
the tools. After installation of the elected tools, A quick scan
through video tutorials was done to become familiar with
the tools. Basic hands-on exercise with each one of the tools
was also done. So as to get the feel of the User Interfaces,
This step greatly helped in the assessments.
IV. DIFFERENT CRITERIA: ASSESSMENT OF TOOLS
The below table consists of different set of criteria and
findings on each tool. These include the four groups
represented by the framework (performance, functionality,
usability, and ancillary task support) plus an additional
group of Open Source System specific criteria.
A. Performance
This category focuses on the qualitative aspects of a tool’s
ability to easily handle data under a variety of circumstances
rather than on performance variables that are driven by
hardware configurations and/or inherent algorithmic
characteristics.
B. Functionality
Software functionality helps assess how well the tool will
adapt to different data mining problem domains.
C. Usability
One problem with easy-to-use mining tools is their potential
misuse. Not only should a tool be easily learned, it should
help guide the user toward proper data mining rather than
―data dredging‖. KDD is a highly iterative process.
Practitioners typically adjust modeling variables to generate
more valid models. A good tool will provide meaningful
diagnostics to help debug problems and improve the output.
D. Ancillary Task Support
These tasks include data selection, cleansing, enrichment,
value substitution, data filtering, binning of continuous data,
generating derived variables, randomizing, deleting records,
etc. Since it is rare that a data set is truly clean and ready for
mining, the practitioner must be able to easily fine-tune the
data for the model building phase of the KDD process.
Criteria Weka Rapid Miner Knime
2. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 177
Performance Criteria
Platform Variety
Weka was initially written in C,
later converted to Java, which
makes it run on almost every
Platform.
Rapid Miner is completely
written in Java, which makes
it run on almost every
Platform.
Knime is offered for Linux
and windows platforms.
Experimental KNIME version
for Mac OSX with Java 1.6
Software
Architecture
Weka’s modular, extensible
architecture allows sophisticated
data mining processes to be built
up from the wide collection of
algorithms and tools. Extending
the toolkit is easy with simple
API, plugin mechanisms and
facilities in automating the
integration of new learning
algorithms. Graphical user
interfaces.
Rapid Miner can be used as
stand-alone program on the
desktop with its graphical
user interface, on a server
via its command line
version, or as data mining
engine for your own
products and Java library
for developers.
KNIME is a bundle
containing Eclipse Software
licensed under the Eclipse
Public License and separate
KNIME plug-ins licensed
under the General Public
License.
Robustness
Results are logged only after
completion of job. For Crash
during job runs alternative
suggestion is to use databases as
intermediate/backup storage.
Users report of Crashes due to
large data structures, too long
file names and temporary
directories getting filled.
However, there are
workarounds available to
resolve these crashes.
User reports of crashes due to
Flow layouts, work space
settings after upgrades.
However, these are usually
fixed by the module owners/
developers community.
Performance aspects of Data
Heterogeneous Data
Access
Data can be imported from a
file in various formats: ARFF,
CSV, C4.5, binary. Data can
also be read from a URL or
from an SQL database (using
JDBC)
Support of several file formats
including arff, C4.5, csv,
bibtex, dBase, and reading
directly from databases.
KNIME can only read data
from three sources: ARFF files
(which are Weka files), text-
delimited files (which include
csv files), and from a database
Data Size
It can handle millions of data
sets
Can handle several 100
million data sets
KNIME allows analysis of 300
million customer addresses, 20
million cell images and 10
million molecular structures
Performance aspects of Integration
Interoperability
Weka frame work acts like a
Plug-in where utilities can be
integrated using APIs
It’s fully integrated with weka
through APIs
It’s fully integrated with weka,
the statistical toolkit R, and
JFree Chart through APIs
TABLE 1
Functionality
3. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 178
Algorithmic
Variety
Large number of
algorithms covering
Classification, regression.
Predictive modeling,
association rules and
clustering
Large Number of Built-in
Data Mining Operators for
Preprocessing, selecting
algorithms, optimization
schemes
It incorporates over 100 processing
nodes for data I/O, preprocessing and
cleansing, modeling, analysis and data
mining as well as various interactive
views, such as scatter plots, parallel
coordinates and others
Algorithm
Modifiability
In explorer, it is easy to
optimize (the Workflow)
by tweaking parameters of
algorithms
Rapid Miner provides flexible
operators for data input and
data output
This is provided by a number of
parameters within each operator
Model
Validation
Explorer interface provides
many model evaluation
means like ROC curves,
Cross-validation schemes
Model validation is available
through GUI Operators like
Cross-validation
Many model evaluation schemes
available
Functional aspects of Data
Data Type
Flexibility
Explorer has rich features
that can select Attributes
based on results from
search criteria’s and
attribute evaluations
A combination of Attribute
selection operator and
attribute type will allow for
data type flexibility during
reads by a particular operator
Data Read Operators are Less flexible
and will not tolerate missing values
Data
Sampling
Weka-filters-unsupervised
instance packages allow for
random sampling of data
sets
Richness in sampling
provided by Absolute-
Sampling, Absolute-
Stratified-Sampling
It provides binning operators from
Data manipulation class
Functional aspects of Reporting
Reporting
Data can be inspected
visually by plotting
attribute values against the
class, or against other
attribute values
The richness of reporting is
captured in a Results
Perspective. Also, the results
can be stored physically on
repositories
Offers data visualization components
to present results
Model
Exporting
Model objects can be
serialized and stored as
binary files, which can be
exported
Model Writer, Model Loader
and Model Applier. Deal with
model files(.mod) to achieve
import and export of models
Models, processes can be wrapped into
a node and then can be exported to
other users
TABLE 2
Usability
User
Interface
Rich User Interfaces tailor
made for user friendly
experience
GUI is like any traditional
development platforms
GUI is like any traditional
development platforms
Learning
Curve
It took 25 person hours for a
quick study and case study
exercise on Decision Trees,
Clustering and Association
Rules for a new learner
It took 25 person hours for a
quick study and case study
exercise on Decision Trees,
Clustering and Association
Rules for a new learner
It took 25 person hours for a quick
study and case study exercise on
Decision Trees, Clustering and
Association Rules for a new
learner
User Types Well Categorized user types
exists such as explorer,
experimenter, knowledge flow,
Command Line Interface
No tailor made modes
available. Though, broadly
categorized into Command line
interface and GUI
Standard and Command line.
4. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 179
Action
History
With Log button, As we
perform actions in WEKA, the
log keeps a record of what has
happened
Though Associated with a
Process chain in GUIs. It is
not available for sessions
Provides a listing of Most recently
used operator nodes
Usability aspects of Data
Data
Visualization
Visualization aides for data
analysis exist for generic plots
to specialized entities such as
dendo-grams
Visualization operators take
care of simple charts, tabular
views to complex
visualizations such as SOMs
Views can range from simple table
views to more complex views on
the underlying data or the
generated model.
Error
Reporting
With WEKA 3.6 error logging
had improved, to include all
error information while
executing in GUI
Messages are precisely
available for attribute level or
row level or process level
issues
Console takes care of warnings
and error messages. This can be
logged in by configuring Level
settings at /KNIME/KNIME GUI
TABLE 3
Ancillary Tasks Support
Task Support for Data Handling
Binning
Yes it allows binning and
the decision to use binning
lies with the user
Yes it allows binning and the decision to
use binning lies with the user
Yes it allows binning
and the decision to use
binning lies with the
user
Deriving
Attributes
Integration with the
pentagon
bi suite, allows for etl
operations
Together with the hundreds of operators
for data pre-processing, Rapid-Miner can
therefore also be used, apart from data
analysis, for data integration and
transformation with outstanding results
ETL operations on data
achieved using Data
transformation
Components
Randomization
WEKA offers two
possibilities for
randomizing a dataset:
randomize and Randomize
filter
Offered through Data Sampling
Components
Offered through Data
Manipulation
Components
Record
Deletion
Possible through Data Read
Operators
Possible through Data Read Operators
The addition of data sets
and the deletion of
unused data sets is
Possible through Report
Operator
Handling
Blanks
Filter Operators can do
global substitutions for
missing values
But substitution is handled separately by
data processing operators. There are no
direct substitution symbols for
replacement of undesired data. This tool is
not synched up with latest formats for
office excel sheets
No options to tolerate
blanks from input data
Task Support for Data Manipulation
Metadata
Manipulation
Though Metadata can be
referenced by the tool, it
cannot be manipulated.
Though, Rapid Miner has a flexible
interactive design which lets user to
additional meta data on the available data
sets to enable automated search and
optimized preprocessing with are both
needed for an effective data mining
processes.
Though Metadata can be
referenced by the tool, it
cannot be manipulated.
5. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 180
Data Cleansing
WEKA provides a filter
that substitutes the mean
(for numeric attributes) or
the mode (for nominal
attributes) for each missing
value
Has a host of preprocessing operators to
choose from. Attribute selection is done
through attribute selection operator. No
Missing value substitutions. Such rows are
omitted altogether
Very primitive.
Not room for flexibility
in component behavior
Result
Feedback
The Explorer save the built
classifier in the model file,
but also the header
information of the dataset
the classifier was built with.
The results can be exported and reused
The results can be
exported and reused
TABLE 4
Open Source Features
Scenario: Use OSS for becoming independent of proprietary solutions and providers. (The OSS helps to reduce dependence
on software product companies with big market power and low customer orientation.)
AND
Use OSS for research purposes (The OSS is used to support research activities.)
Feature 1.1 Functional: Required
functionality covered, clear direction of
product evolution recognizable
Yes Yes Yes
Feature 1.2 Technical: Reliability
Stabilized development over
a period of 2 decades
Stabilized
development
New features are
into beta stages
Feature1.3 Organizational: Sufficient
support available
Professional support available
& its backed by university of
Weka to
Professional
support available
Professional
support available
Feature1.4 Economical: Flexible
maintenance according to individual needs
Yes Yes Yes
Feature 1.5 Political: Possibility for
influencing further development with
respect to individual needs
Large User Community Big User Community
Small User
community
TABLE 5
V. METHODICAL APPLICATION OF FRAMEWORK FOR
SCORING
The criteria within each category are assigned weights so that
the total weight within each category equals 1.00 or 100%.
This weighting must be conducted with respect to the
intended use of the software. Consider an organization whose
data warehouse is centrally located on a Windows NT server,
and whose local area network consists exclusively of
Windows NT workstations. Such an organization will
probably assign a low weight to platform support since any
other platforms on which the tool is supported do not matter.
Relative Performance Rating
Much worse than the reference
tool 1
Worse than the reference tool 2
Same as the reference tool 3
Better than the reference tool 4
Excellent than the reference tool 5
VI. SCORING GUIDELINES
Once the criteria have been weighted with respect to a set of
targeted needs, the tools can now be scored for comparison.
Scoring is done relative to a ―reference tool‖. Generally the
evaluator is predisposed toward a favorite tool based on his
experience. This ―favorite‖ should be selected as the
6. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 181
reference tool. Any tool may be selected in the absence of a
favorite. The reference tool receives a rating of 3 for each
criterion. Other tools are then rated against the reference
tool for each criterion.
Using this scheme a score is calculated for every
criterion for each tool. These scores are then totaled to
produce a score for each category. Finally, the categorical
scores are combined in a weighted-average to calculate an
overall tool score. By default each criteria category receives
a weight of .20. However, some adjustment was done to
these weights to allow emphasizing or de -emphasize
particular categories of criteria.
Criteria Weight Tool A Tool B Tool C
Performance (.25) Rating Score Rating Score Rating Score
Platform Variety 0.1 3 0.3 3 0.3 3 0.3
Software Architecture 0.1 3 0.3 3 0.3 4 0.4
Heterogeneous Data
Access
0.15 4 0.6 3 0.45 2 0.3
Data Size 0.3 3 0.9 3 0.9 3 0.9
Interoperability 0.15 2 0.3 3 0.45 3 0.45
Robustness 0.2 3 0.6 3 0.6 3 0.6
Performance Score 3.00 3.00 2.95
Functionality (.30) Rating Score Rating Score Rating Score
Algorithmic Variety 0.1 4 0.4 3 0.3 2 0.2
Model Validation 0.15 4 0.6 3 0.45 3 0.45
Data Type Flexibility 0.15 5 0.75 3 0.45 2 0.3
Algorithmic Modifiability 0.15 5 0.75 3 0.45 3 0.45
Data Sampling 0.15 3 0.45 3 0.45 3 0.45
Reporting 0.15 3 0.45 3 0.45 3 0.45
Model Exporting 0.15 3 0.45 3 0.45 3 0.45
Functionality Score 3.85 3.00 2.75
Usability (.20) Rating Score Rating Score Rating Score
User Interface 0.15 5 0.75 3 0.45 3 0.45
Learning Curve 0.2 3 0.6 3 0.6 3 0.6
User Types 0.2 5 1 3 0.6 2 0.4
Data Visualization 0.05 3 0.15 3 0.15 3 0.15
Error Reporting 0.15 4 0.6 3 0.45 2 0.3
Action History 0.05 5 0.25 3 0.15 3 0.15
Domain Variety 0.2 3 0.6 3 0.6 2 0.4
Usability Score 3.95 3.00 2.45
7. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 182
Ancillary Support Task (.05) Rating Score Rating Score Rating Score
Data Cleansing 0.05 4 0.2 3 0.15 2 0.1
Binning 0.25 3 0.75 3 0.75 3 0.75
Deriving Attributes 0.05 3 0.15 3 0.15 4 0.2
Randomization 0.2 3 0.6 3 0.6 3 0.6
Record Deletion 0.05 3 0.15 3 0.15 3 0.15
Handling Blanks 0.1 4 0.4 3 0.3 2 0.2
Meta Data Manipulation 0.1 2 0.2 3 0.3 2 0.2
Result Feedback 0.2 3 0.6 3 0.6 3 0.6
Ancillary Support Task Score 3.05 3.00 2.80
OSS Feature 1 (.20) Rating Score Rating Score Rating Score
Feature 1.1 0.25 3 0.75 3 0.75 2 0.5
Feature 1.2 0.25 3 0.75 3 0.75 2 0.5
Feature 1.3 0.2 4 0.8 3 0.6 3 0.6
Feature 1.4 0.2 4 0.8 3 0.6 2 0.4
Feature 1.5 0.1 4 0.4 3 0.3 1 0.1
OSS Feature 1 Score 3.50 3.00 2.10
Weighted Average 3.47 3.00 2.61
The Scores Table: Tool A – Weka; Tool B – Rapid Miner; Tool C – Knime
VII. CONCLUSION
In the light of the findings of this evaluation a clear picture
starts to emerge. The tool ―Weka‖ is the clear winner mainly
because of the tool’s functionality and usability superiority.
The excellent use of User-Centric Interface design and great
flexibility in application of algorithms are the bench marks
for any good Open Source data mining tool in an academic
setting. A steady and dedicated development team backed
by a corporate sponsor makes Weka a promising OSS
model.
But Weka has to be on its toes as a relatively new
comer Rapid-Miner is challenging it. Rapid Miner has well
developed and stabilized system software and its user base is
catching up fast. It’s functionality is as good as Weka’s and
in fact it can neatly be integrated with Weka to take
advantage of both the software. The business model built
around Rapid-Miner and its geographical location is
attracting finances and sponsorships through its Partners
Program. This tool certainly has a promising feature.
Knime is in its primitive stages. Many of the
interoperability and exporting modules are in beta stages of
development. It has a Long way to go!
VIII. ASSUMPTIONS
The scoring system is based on a reference tool. And my
familiarity with the reference tool is something that cannot
be measured and is abstracted as a rating of ―3‖. Now, It is
assumed that my understanding and familiarity with the
reference tool i.e.; Rapid- Miner broadly represents with that
of an average Data Mining professional. And hence it
should be taken with caution. If a data mining expert is to
replace me as an evaluator, that person could rate the Rapid-
Miner according to his experience, which could in turn
make the total evaluation entirely different.
BIBLIOGRAPHY
[1] Retrieved from WEKA:
http://weka.wikispaces.com/Related+Projects
8. Performance Evaluation of Open Source Data Mining Tools
(IJSRD/Vol. 2/Issue 09/2014/040)
All rights reserved by www.ijsrd.com 183
[2] Adriaans, P. a. (1996). Data Mining. Addison-
Wesley Longman.
[3] Berthold, M. R., Cebron, N., Dill, F., Fatta, G. D.,
Gabriel, T. R., Georg, F., et al. Knime: The
Konstanz Information Miner. Konstanz: Atlanta
Chair of Bioinformatics and Information Mining.
[4] Bouckaert, R. R., Frank, E., Hall, M. A., Holmes,
G., Pfahringer, B., Reutemann, P., et al. (2010).
WEKA—Experiences with a Java Open-Source
Project. Journal of Machine Learning Research,
2533-2541.
[5] Collier, K., Sautter, D., Medidi, M., Morgan, J.,
Ratliff, M., Marjaniemi, C., et al. (2010). A
methodology for evaluating and selecting DATA
MINING software. Point of Reference, Center for
Data Insight; KPMG Peat Marwick LLP, FlagStaff.
[6] Cruz, D., Wieland, T., & Ziegler, A. (2006).
Evaluation Criteria for Free/Open Source Software
Products Based on Project Analysis. Software
Process Improvement and Practice, 107-122.
[7] Hall, M., Frank, E., Holmes, G., Pfahringer, B.,
Reutemann, P., & Witten, I. H. (VOL 11, ISSUE 1,
2009). The WEKA Data Mining Software: An
Update. ACM SIGKDD Explorations, 01-18.
[8] http://rapid-i.com/content/view/8/56/lang,en/.
(n.d.). Retrieved from Rapid I - References:
http://rapid-i.com/content/view/8/56/lang,en/
[9] KNIME. (n.d.). Retrieved from
http://www.knime.org/downloads/license
[10]KNIME. (n.d.). Features. Retrieved December 12,
2010, from http://www.knime.org/features
[11]Knime Forums. (n.d.). Retrieved december 15,
2010, from Knime:
http://tech.knime.org/node/20737
[12]KNIME. (2010). KNIME Report Designer Quick
Start Guide.
[13]Machine Learning Group. (n.d.). Retrieved
december 12, 2010, from Machine Learning Group
at University of Waikato.:
http://www.cs.waikato.ac.nz/~ml/
[14]MOA Massive Online Analysis Details. (n.d.).
Retrieved December 14, 2010, from MOA Massive
Online Analysis:
http://moa.cs.waikato.ac.nz/details/classification/
[15]Rapid-I. (2010). Rapid Miner 5.0 Manual. Rapid-I.
[16]Rapid Miner. (n.d.). Retrieved december 14, 2010,
from it. toolbox:
http://it.toolbox.com/wiki/index.php/RapidMiner
Performance Evaluation of Open Source Data
Mining Tools 24 Rapid Miner. (2010). Retrieved
December 14, 2010, from Enterprise Edition:
Comparison: http://rapid-
i.com/content/view/181/190/lang,en/#enterprise
[17]Rapid Miner Forums. (n.d.). Retrieved December
15, 2010, from Rapid Miner Forums: http://rapid-
i.com/rapidforum/index.php/topic,17.0.html
[18]Salient features of Rapid Miner. (n.d.). Retrieved
December 14, 2010, from http://it.toolbox.com:
http://it.toolbox.com/wiki/index.php/RapidMiner#S
alient_features_of_RapidMiner
[19]The Wekalist Archives. (n.d.). Retrieved December
14, 2010, from The Wekalist Archives:
https://list.scms.waikato.ac.nz/pipermail/wekalist/2
006-May/007026.html
[20]University of Wakaito. (2010). Weka Manual 3.7.2.
[21]Weka. (n.d.). Weka---Machine Learning Software
in Java. Retrieved December 12, 2010, from
Weka---Machine Learning Software in Java:
http://sourceforge.net/projects/weka/files/
[22]wiki. (n.d.). Retrieved from
http://en.wikipedia.org/wiki/KNIME