Skip to main content

Showing 1–3 of 3 results for author: Chauhan, R K

.
  1. Automated Content Grading Using Machine Learning

    Authors: Rahul Kr Chauhan, Ravinder Saharan, Siddhartha Singh, Priti Sharma

    Abstract: Grading of examination papers is a hectic, time-labor intensive task and is often subjected to inefficiency and bias in checking. This research project is a primitive experiment in the automation of grading of theoretical answers written in exams by students in technical courses which yet had continued to be human graded. In this paper, we show how the algorithmic approach in machine learning can… ▽ More

    Submitted 8 April, 2020; originally announced April 2020.

    Comments: 7 pages, 6 figures

  2. arXiv:1108.5592  [pdf

    cs.DB

    A Performance Study of Data Mining Techniques: Multiple Linear Regression vs. Factor Analysis

    Authors: Abhishek Taneja, R. K. Chauhan

    Abstract: The growing volume of data usually creates an interesting challenge for the need of data analysis tools that discover regularities in these data. Data mining has emerged as disciplines that contribute tools for data analysis, discovery of hidden knowledge, and autonomous decision making in many application domains. The purpose of this study is to compare the performance of two data mining techniqu… ▽ More

    Submitted 26 August, 2011; originally announced August 2011.

    Comments: Data mining, Multiple Linear Regression, Factor Analysis, Principal Component Regression, Maximum Liklihood Regression, Generalized Least Square Regression

  3. A Low Overhead Minimum Process Global Snapshop Collection Algorithm for Mobile Distributed System

    Authors: Surender Kumar, R. K. Chauhan, Parveen Kumar

    Abstract: Coordinated checkpointing is an effective fault tolerant technique in distributed system as it avoids the domino effect and require minimum storage requirement. Most of the earlier coordinated checkpoint algorithms block their computation during checkpointing and forces minimum-process or non-blocking but forces all nodes to takes checkpoint even though many of them may not be necessary or non-blo… ▽ More

    Submitted 29 May, 2010; originally announced May 2010.

    Comments: 19 Pages, IJMA

    Journal ref: International journal of Multimedia & Its Applications 2.2 (2010) 12-30