


default search action
International Journal of Data Analysis Techniques and Strategies, Volume 2
Volume 2, Number 1, 2010
- Yoones Asgharzadeh Sekhavat
, Mohammad Fathian, Mohammad Reza Gholamian
, Somayeh Alizadeh
:
Mining important association rules based on the RFMD technique. 1-21 - Sotiris B. Kotsiantis
:
Rotation-based model trees for classification. 22-37 - N. R. Sakthivel, V. Sugumaran, Binoy B. Nair:
Application of Support Vector Machine (SVM) and Proximal Support Vector Machine (PSVM) for fault classification of monoblock centrifugal pump. 38-61 - Sebastian Fuchs, Marko Sarstedt
:
Is there a tacit acceptance of student samples in marketing and management research? 62-72 - Robert Yeh, Ruiliang Yan:
An applied logistic model for online purchase decision via web-building experiments. 73-84 - Prasun Das, Saddam Hossain, Abhijit Gupta:
A meta-heuristic approach to car allocation problem to reduce transportation cost over a fixed number of routes. 85-102
Volume 2, Number 2, 2010
- Jon E. Anderson, David M. Hoppe:
Malformed frogs: Bayesian and random-effect model analyses. 103-121 - Anthony Scime, Gregg R. Murray
, Lance Y. Hunter:
Testing terrorism theory with data mining. 122-139 - Meiqiang Wang, Yongjun Li:
Enhanced Russell measure in fuzzy DEA. 140-154 - Bhupesh Kumar Lad, Makarand S. Kulkarni:
A parameter estimation method for machine tool reliability analysis using expert judgement. 155-169 - Nitin Upadhyay
, Bharat M. Deshpande:
SDCS: six-dimensional classification strategy framework for COTS products. 170-180 - May Anne E. Mata:
Rao DISC-based similarity coefficient: a measure of similarity with respect to feature differences. 181-198
Volume 2, Number 3, 2010
- Ahmet K. Süerdem:
Bridging qualitative and quantitative methods for classifying policy actors into policy discourse communities: thematic analysis and formal concept analysis approaches. 199-216 - Sanjay Sharma, Narayan Agrawal:
Application of analytic hierarchy process in just-in-time manufacturing systems: a review. 217-242 - Quinn C. Taylor, Christophe G. Giraud-Carrier
, Charles D. Knutson:
Applications of data mining in software engineering. 243-257 - William P. Fox:
Teaching the applications of optimisation in game theory's zero sum and non-zero sum games. 258-284 - Steven A. Samaras:
The measurement of stakeholder salience: a strategy for the exploration of stakeholder theories. 285-306
Volume 2, Number 4, 2010
- Rashmi Malhotra:
Using a meta-modelling knowledge management layer - a new approach to designing the enterprise information architecture. 307-335 - Kenneth W. Jackson, Mahmood Tabaddor:
Correlation modelling of complex data - physics, statistics and heuristics. 336-355 - Lev V. Utkin
:
Regression analysis using the imprecise Bayesian normal model. 356-372 - Mirjam Southwell, Will Thomas
:
"It's not true": learning to learn from rejection. 373-384 - Harshad B. Prajapati
, Vipul K. Dabhi:
XML based architectures for documents comparison, categorisation, and scrutinisation. 385-410 - José Luis López Cuadrado, Ricardo Colomo Palacios, Israel González-Carrasco, Ángel García-Crespo:
Book Review: Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects by Farid Meziane and Sunil Vadera. 402-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.