Ara
Toplam kayıt 19, listelenen: 1-10
Parallel univariate decision trees
(Elsevier B.V., 2007-05-01)
Univariate decision tree algorithms are widely used in data mining because (i) they are easy to learn (ii) when trained they can be expressed in rule based manner. In several applications mainly including data mining, the ...
Mobile applications discovery: a subscriber-centric approach
(Wiley Periodicals, 2011-03)
Rapid adoption of smartphones and the business success of the Apple App Store have resulted in the rampant growth of mobile applications. Seeking new revenue opportunities from application development has created a gold ...
Generative and discriminative methods using morphological information for sentence segmentation of Turkish
(IEEE-INST Electrical Electronics Engineers Inc, 2009-07)
This paper presents novel methods for generative, discriminative, and hybrid sequence classification for segmentation of Turkish word sequences into sentences. In the literature, this task is generally solved using statistical ...
Re-mining item associations: Methodology and a case study in apparel retailing
(Elsevier Science BV, 2011-12)
Association mining is the conventional data mining technique for analyzing market basket data and it reveals the positive and negative associations between items. While being an integral part of transaction data, pricing ...
On the extraction of the channel allocation information in spectrum pooling systems
(IEEE, 2007-04)
The spectrum pooling strategy allows a license owner to share a part of his licensed spectrum with a secondary wireless system (the rental system, RS) during its idle times. The coexistence of two mobile systems on the ...
Regularizing soft decision trees
(Springer, 2013)
Recently, we have proposed a new decision tree family called soft decision trees where a node chooses both its left and right children with different probabilities as given by a gating function, different from a hard ...
The role of information technology in responding to terrorism
(IOS Press, 2013)
The use of cutting-edge information technologies has the ability to help us battle terrorists by assisting with identification, predictive analysis and prioritization processes. This article describes some of those applications.
Müşterilerin GSP analizi kullanarak kümelenmesi
(Institute of Electrical and Electronics Engineers Inc., 2018-07-05)
Bu çalışma ile mevcut misafir ve rezervasyon verisi kullanılarak doğal öbeklenmeleri tespit ederek misafir davranışları tespit ettik. Ayrıca verilen hizmetleri ve satış stratejilerini bu davranışlara göre özelleştirdik. ...
Data mining techniques customer relationship management : a case study for Doğuş Otomotiv
(Işık Üniversitesi, 2003-10)
Customer Relationship Managment has recently become a very important investment for many companies. The value of the customer is expressed more clearly with this new concept and it's demonstrated through its applications. ...
Evcil hayvanlar için eylem tanıma ve izleme sistemi
(Institute of Electrical and Electronics Engineers Inc, 2018-07-05)
Ülkemizde dünyada olduğu gibi evcil hayvan sahiplenme oranı gün geçtikçe artmaktadır. Evcil hayvan sahipleri hayvanlarının sağlıklarını takip etmek için çeşitli araçlar ve yöntemler kullanmaktadırlar. Hayvan sağlığının ...