Method for forecasting the volume of applications using probabilistic classifier based on Bayesian theorem for recruitment in the government organizations
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 12
Abstract
In this paper, we propose a practical method to estimate or forecast the volume of applications based on Bayesian classifier which is a probability method that makes optimal decision based on known probability distribution and recently observed data. By using the Bays estimate method, which selects spectrum analysis, the weight of forecasting model is obtained by carefully analyzing the sample space (various recruitments in the government organizations of Punjab, India). The sample calculation shows that the proposed method is highly reliable and improves the precision with a prior and likelihoods post probabilities of defined sample space. i.e. (i) development of an approximate distribution of likely volume of applications, (ii) prior probabilities of the volume of applications in various mutually exclusive events and (iii) likelihoods relating the confidence of forecast results for obtaining the Bayesian forecast of volume of applications. Earlier the forecasts are available, better will be their utility for government i.e. provides valuable information with regard to procedure fixation, improve service delivery, reduce costs, redefine administrative processes.
Authors and Affiliations
Sunil Kumar Chhillar , Baljit Singh Khehra
A new approach for improvement of fractal image encoding
In this paper, we propose, in a first part, an approach to reduce the computational complexity of fractal image ncoding by using the Shannon entropy (APENT). A speedup factor of 8 is obtained while image quality is stil...
CLASSIFICATION OF LAND USE LAND COVER CHANGE DETECTION USING REMOTELY SENSED DATA
Image classification is perhaps the most important part of digital image analysis. With supervised classification, the information classes of interest like land cover type image. These are called “training sites”. The im...
Generation of a pool of variable size symmetric keys through Image
This paper introduces a new concept of the generation of a unending pool of keys through an image leaving behind the idea of sending keys every time for encryption and decryption. This can help in avoiding the problem of...
Trust-based Routing Security in MANETS
The advantage of Mobile Ad-hoc Networks (MANETs) is to orm a wireless network in the absence of fixed infrastructure. arly stages of routing protocols of MANETs were, incapable of handling security issues but by the in...
Automated Transformation of Distributed Software Architectural Models to Finite State Process
Software Performance Engineering (SPE) represents the collection of software engineering activities with the purpose of identification, prediction and also improvement of software performance parameters in the early stag...