Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education 2017
DOI: 10.1145/3017680.3017821
|View full text |Cite
|
Sign up to set email alerts
|

An Introduction to the Weka Data Mining System (Abstract Only)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 0 publications
0
11
0
2
Order By: Relevance
“…However, advancement in technology has made available machine learning software repositories which are a collection of various machine learning algorithms, pre-programmed, that enables a complete and effective implementation of learning problems without necessarily involving the technicality of writing any single line of code. These provisions include Waikato Environment for Knowledge Analysis (WEKA) [2,50], Mallet, MatLab, SciKit-Learn, RapidMiner (formerly known as YALE), R-Programming, Orange, KNIME, NLTK etc. However, for the purpose of this study, WEKA Version 3.8.2, which is one of the leading open source and widely used data mining tool [51,52] was chosen and deployed for all the experiments conducted.…”
Section: The Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, advancement in technology has made available machine learning software repositories which are a collection of various machine learning algorithms, pre-programmed, that enables a complete and effective implementation of learning problems without necessarily involving the technicality of writing any single line of code. These provisions include Waikato Environment for Knowledge Analysis (WEKA) [2,50], Mallet, MatLab, SciKit-Learn, RapidMiner (formerly known as YALE), R-Programming, Orange, KNIME, NLTK etc. However, for the purpose of this study, WEKA Version 3.8.2, which is one of the leading open source and widely used data mining tool [51,52] was chosen and deployed for all the experiments conducted.…”
Section: The Experimentsmentioning
confidence: 99%
“…The adoption of machine learning methods for Android malware detection has removed the daunting task associated with having to continuously update detection engines with new patterns manually [1]. Learning processes involve the analysis of data using designed algorithms to develop models that can be used to find patterns and regularities in any future set of data [2]. The algorithms are made to learn from data that exist to become intelligent enough to predict future events or instances of data.…”
Section: Introductionmentioning
confidence: 99%
“…For the sentiment analyzer, the author considered the TextBlob [9], a customized Word Sense Disambiguation (W-WSD) [10] and The SentiWordNet [11] for comparison. For the classifier, the author leverages the Waikato Environment for Knowledge Analysis (WEKA) [12] software to deliver the classification based on the calculated polarity and subjectivity, using Naïve Bayes Classifier (NBC) [13] and Support Vector Machine (SVM) [14]. The experiment results show that TextBlob and W-WSD are able to achieve better sentiment analysis results than SentiWordNet could under their experiment settings, with accuracies of 76%, 79% and 55% respectively where NBC is the classifier, and 63%, 62% and 53% when SVM is used.…”
Section: Related Work Regarding Twitter Sentiment Analysismentioning
confidence: 99%
“…According to Section 2.1, the EMAP features with four attributes were constructed containing 1104 filtered images to represent the spatial information of the Sentinel-2 dataset. To realize the dimensionality reduction of EMAPs, the information gain-based method [78] was used for feature selection, and a ranked list was generated to show superior attributes. This step was conducted using the well-known software Weka [68].…”
Section: Design Of Experimentsmentioning
confidence: 99%