您好,欢迎访问上海市农业科学院 机构知识库!

Building a Model in Discovering Multivariate Causal Rules for Exploratory Analyses

文献类型: 会议论文

第一作者: Shkurte Luma-Osmani

作者: Shkurte Luma-Osmani 1 ; Florije Ismaili 2 ; Parashu Ram Pal 3 ;

作者机构: 1.Faculty of Contemporary Sciences and Technologies, South East European University & Faculty of Natural Sciences and Mathematics, University of Tetova, Tetovo, North Macedonia

2.Faculty of Contemporary Sciences and Technologies, South East European University, Tetovo, North Macedonia

3.SAGE University, Bhopal, Madhya Pradesh, India

关键词: Industries;Analytical models;Philosophical considerations;Data analysis;Data models;History;Logistics

会议名称: International Conference on Data Analytics for Business and Industry

主办单位:

页码: 272-276

摘要: Causality as a phenomenon still seems to be an old and open issue as the philosophy itself. Discovering such relationships among data, in most of cases results in unsuccessfully effort. Taking in consideration the fact that the research community mostly focuses on the discovery of causal association rules with a single cause factor, but however, sometimes a single variable might not cause any effect, since the problem in most cases is affected by not a single, but by the combination of two or more factors or variables. Anyway, considering the literature located on the web, it is obvious the poor elaboration of causality in cyberstalking, albeit through the history of humanity, stalking was a big issue for the human race. However, it is more prevalent at younger ages. In compliance to this, the empirical approach of cyberstalking has received less attention from worldwide researchers. Consequently, main goal in this manuscript was to perceive and establish the causes that lead to cyberstalking on high school youngsters. Accordingly, a logistic model was built and evaluated by utilizing the confusion matrix. The effort resulted in exogenous model, meaning that beside the factors from our observation, cyberstalking causality is likewise dependent from external factors.

分类号: tp3-53

  • 相关文献

[1]Detecting Vehicular Networking Node Misbehaviour Using Machine Learning. Saleha Saudagar,Rekha Ranawat. 2023

[2]Research, Justice, and Our Opportunity to Cultivate a Political Future Outside the Workforce. Stacey Sexton. 2021

[3]Fraud Detection in IoT-Based Financial Transactions Using Anomaly Detection Techniques. Kafila,Mohammad Hassan,Ch Veena,Atul Singla,Amit Joshi,Melanie Lourens. 2024

[4]Machine Learning-Based Fraud Detection System for Insurance Claims in IoT Environment. Bediga Sharan,Mohammad Hassan,V Divya Vani,Vijilius Helena Raj,GinniNijhawan,Priyanka Prabhakar Pawar. 2024

[5]Building Common Ground: An Inter-Institutional Computing & Engineering Education Transfer Learning Community. Danyelle Tauryce Ireland,Rebecca Zarch,Ilana Hipshman,Ashley Clark. 2021

[6]A Comparative Study of Various Learning Models for Object Detection in Contextual Scene Interpretation. Taranpreet Singh,Dr.Hemang Shrivastava. 2023

[7]Quantification of the impact of cover crops on Net Ecosystem Exchange using AgriCarbon-EOv0.1. Soussana J-F,H. Gibrin,M. Ferlicop,Dejoux J-F,E. Ceschia,A. Al Bitar,T. Wijmer,L. Arnaud,R. Fieuzal. 2022

[8]Revolutionizing Healthcare with Federated Learning: A Comprehensive Review. Snehlata Mishra,Ritu Tondon,Narendra Pal Singh Rathore. 2024

[9]Hybrid Confidentiality Framework for Secured Cloud Computing. Gaurav Shrivastava,Sachin Patel. 2022

作者其他论文 更多>>