{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:02Z","timestamp":1750221122640,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T00:00:00Z","timestamp":1550534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,19]]},"DOI":"10.1145\/3316615.3316693","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"101-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community"],"prefix":"10.1145","author":[{"given":"Melidiossa V.","family":"Pagudpud","sequence":"first","affiliation":[{"name":"Quirino State University, Cabarroguis, Quirino, Philippines"}]},{"given":"Thelma D.","family":"Palaoag","sequence":"additional","affiliation":[{"name":"University of the Cordilleras, Baguio City, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2019,2,19]]},"reference":[{"volume-title":"The future of food and agriculture -- Trends and challenges","unstructured":"FAO. 2017. The future of food and agriculture -- Trends and challenges . Rome . ISBN 978-92-5-109551-5 FAO. 2017. The future of food and agriculture -- Trends and challenges. Rome. ISBN 978-92-5-109551-5","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1038\/nature01014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1126\/science.1106049"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.4236\/oje.2018.81003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1098\/rstb.2012.0273"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1155\/2015\/195308"},{"unstructured":"Chhachhar A. and Hassan S. 2013. The Use of Mobile Phone Among Farmers for Agriculture Development. International Journal of Scientific Research. Volume: 2 | Issue: 6 | June 2013 \u2022 ISSN No 2277-8179.  Chhachhar A. and Hassan S. 2013. The Use of Mobile Phone Among Farmers for Agriculture Development. International Journal of Scientific Research. Volume: 2 | Issue: 6 | June 2013 \u2022 ISSN No 2277-8179.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.sbspro.2013.10.240"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"2012","article-title":"Analysis on algorithm and application of cluster in data mining","volume":"46","author":"Feng Y.","year":"2012","unstructured":"Feng , Y. ( 2012 ). Analysis on algorithm and application of cluster in data mining . Journal of Theoretical and Applied Information Technology , Volume 46 , no. 1 , 2012 . Feng, Y. (2012). Analysis on algorithm and application of cluster in data mining. Journal of Theoretical and Applied Information Technology, Volume 46, no. 1, 2012.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"267","article-title":"A survey on different clustering algorithms in data","volume":"3","author":"IndiraPriya P.","year":"2013","unstructured":"IndiraPriya , P. and Ghosh , D. K. ( 2013 ). A survey on different clustering algorithms in data . International Journal of Modern Engineering Research. Vol. 3 , no. 1 , pp. 267 -- 274 , 2013. IndiraPriya, P. and Ghosh, D. K. (2013). A survey on different clustering algorithms in data. International Journal of Modern Engineering Research. Vol. 3, no. 1, pp. 267--274, 2013.","journal-title":"International Journal of Modern Engineering Research."},{"key":"e_1_3_2_1_11_1","volume-title":"Comparison of the various clustering algorithms of Weka\/ International Journal of Emerging Technology and Advanced Engineering","author":"Sharma N.","year":"2012","unstructured":"Sharma , N. , Bajpai , A. and Lito R . ( 2012 ). Comparison of the various clustering algorithms of Weka\/ International Journal of Emerging Technology and Advanced Engineering , vol. 2 , no. 5, 2012. Sharma, N., Bajpai, A. and Lito R. (2012). Comparison of the various clustering algorithms of Weka\/ International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 5, 2012."},{"key":"e_1_3_2_1_12_1","first-page":"910","article-title":"Analysis and application of clustering techniques in data mining","volume":"03","author":"Roseline R.","year":"2014","unstructured":"Roseline , R. , Jenitha , G. , and Amirhtaraj , H. ( 2014 ). Analysis and application of clustering techniques in data mining . International Journal of Computing Algorithm , vol. 03 , pp. 910 -- 912 , May 2014. Roseline, R., Jenitha, G., and Amirhtaraj, H. (2014). Analysis and application of clustering techniques in data mining. International Journal of Computing Algorithm, vol. 03, pp. 910--912, May 2014.","journal-title":"International Journal of Computing Algorithm"},{"issue":"5","key":"e_1_3_2_1_13_1","first-page":"2014","article-title":"Pattern recognition: possible research areas and issues","volume":"3","author":"Prasad J. R.","year":"2014","unstructured":"Prasad , J. R. ( 2014 ). Pattern recognition: possible research areas and issues . International Journal of Computer Science and Network , vol. 3 , no. 5 , October 2014 . Prasad, J. R. (2014). Pattern recognition: possible research areas and issues. International Journal of Computer Science and Network, vol. 3, no. 5, October 2014.","journal-title":"International Journal of Computer Science and Network"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"2015","article-title":"Clustering algorithms applied in educational data mining","volume":"5","author":"Dutt A.","year":"2015","unstructured":"Dutt , A. , Aghabozrgi , S. , Ismail M. A. B. and Mahroeian , H. ( 2015 ). Clustering algorithms applied in educational data mining . International Journal of Information and Electronics Engineering , vol. 5 , no. 2 , March 2015 . Dutt, A., Aghabozrgi, S., Ismail M. A. B. and Mahroeian, H. (2015). Clustering algorithms applied in educational data mining. International Journal of Information and Electronics Engineering, vol. 5, no. 2, March 2015.","journal-title":"International Journal of Information and Electronics Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.websem.2016.01.001"},{"key":"e_1_3_2_1_16_1","volume-title":"American Society for Engineering Education, 2017","author":"Roy D.","year":"2018","unstructured":"Roy , D. et al. (2017). Synthesis of clustering techniques in educational data mining . American Society for Engineering Education, 2017 . Retrieved on September 10, 2018 . Retrieved from file:\/\/\/C:\/Users\/Acer_Acer\/Downloads\/synthesis-of-clustering-techniques-in-educational-data-mining.pdf Roy, D. et al. (2017). Synthesis of clustering techniques in educational data mining. American Society for Engineering Education, 2017. Retrieved on September 10, 2018. Retrieved from file:\/\/\/C:\/Users\/Acer_Acer\/Downloads\/synthesis-of-clustering-techniques-in-educational-data-mining.pdf"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"2010","article-title":"Application of k-Means Clustering algorithm for prediction of Students' Academic Performance","volume":"7","author":"Oyelade O. J.","year":"2010","unstructured":"Oyelade , O. J. , Oladipupo , O. O. and Obagbuwa , I. C. ( 2010 ). Application of k-Means Clustering algorithm for prediction of Students' Academic Performance . International Journal of Computer Science and Information Security , Vol. 7 , No. 1 , 2010 . Oyelade, O. J., Oladipupo, O. O. and Obagbuwa, I. C. (2010). Application of k-Means Clustering algorithm for prediction of Students' Academic Performance. International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010.","journal-title":"International Journal of Computer Science and Information Security"}],"event":{"sponsor":["University of New Brunswick University of New Brunswick"],"acronym":"ICSCA '19","name":"ICSCA '19: 2019 8th International Conference on Software and Computer Applications","location":"Penang Malaysia"},"container-title":["Proceedings of the 2019 8th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316615.3316693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:12Z","timestamp":1750208532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316615.3316693"}},"subtitle":["A Step for Risk Analysis"],"short-title":[],"issued":{"date-parts":[[2019,2,19]]},"references-count":17,"alternative-id":["10.1145\/3316615.3316693","10.1145\/3316615"],"URL":"https:\/\/doi.org\/10.1145\/3316615.3316693","relation":{},"subject":[],"published":{"date-parts":[[2019,2,19]]},"assertion":[{"value":"2019-02-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}