Decision Table
29 Followers
Recent papers in Decision Table
Beispiele
- Analysetechniken
- Planungstechniken
- Entscheidungstechniken
- Kybernetischer Regelkreis
- Analysetechniken
- Planungstechniken
- Entscheidungstechniken
- Kybernetischer Regelkreis
Software effort estimations are based on prediction properties of system with attention to develop methodologies. Many organizations follow the risk management but the risk identification techniques will differ. In this paper, we focus on... more
article concerned with reorganize new Braille symbols to represent the vibra
Einleitung 3 Definition 4 Entscheidungskategorien 5 Entscheidungstechniken: 6 ➣ Pro & Contra-Listen 7 ➣ Der Entscheidungsbaum 9 ➣ Die Entscheidungstabelle 11 ➣ Die... more
In this thesis we describe an approach and introduce a new tool, called JDeTEx, to extract decision tables from Java programs in order to give the maintenance engineer a better understanding of the control flow of the program. Decision... more
Decision tables are a widely used knowledge management tool in the decision making process. Ambiguity and conceptual reasoning difficulties arise while designing large decision tables in a collaborative environment. We introduce the... more
Our study proposes several current data mining methods to predict bankruptcy after the Sarbanes-Oxley Act (2002) using 2007-2008 U.S. data. The Sarbanes-Oxley Act (SOX) of 2002 was introduced to improve the quality of financial reporting... more
The impact of information technology (IT) on the business value of a cooperation has been an active research area for more than two decades. Although it is widely agreed that IT has a positive impact on the business values of cooperations... more
In this study, the mathematical principles of rough sets theory are explained and a sample application about rule discovery from a decision table by using different algorithms in rough sets theory is presented.
Building and maintaining high quality knowledge based systems is not a trivial task. Decision tables have sometimes been recommended in this process, mainly in verification and validation. In this paper, however, it is shown how decision... more
An intrusion is defined as a violation of the security policy of the system, and hence, intrusion detection mainly refers to the mechanisms that are developed to detect violations of system security policy. Recently, data mining... more
Motto:The golden rule is that there are no golden rules. (G.B. Shaw)
Applying software defect esimation techniques and presenting this information in a compact and impactful decision table can clearly illustrate to collaborative groups how critical this position is in the overall development cycle. The... more
Most earthquake early warning systems (EEWS) developed so far are conceived as either 'regional' (network-based) or 'on-site' (stand-alone) systems. The recent implementation of nationwide, high dynamic range, dense accelerometer arrays... more
Forecasting applications on the stock market attract much interest from researchers in the artificial intelligence field. The problem tackled in this study concerns predicting the direction of change of stock price indices, formulated in... more
Design: Current guideline document models are limited in that they reflect the specific orientation of the stakeholder who created them; thus, developers and disseminators often provide few constructs for conceptualizing recommendations,... more
In supervised classi cation learning, one attempts to induce a classi er that correctly predicts the label of novel instances. We demonstrate that by choosing a useful subset of features for the indiscernibility relation, an induction... more
Managers of multiple projects with overly constrained resources face difficult decisions in how to allocate resources to minimize the average delay per project or the time to complete the whole set of projects. We address the static... more
Intrusion detection can be considered as a classification task that attempts to classify a request to access network services as safe or malicious. Data mining techniques are being used to extract valuable information that can help in... more
Most earthquake early warning systems (EEWS) developed so far are conceived as either `regional' (network-based) or `on-site' (stand-alone) systems. The recent implementation of nationwide, high dynamic range, dense accelerometer arrays... more
The do-it-yourself (DIY) culture has been continuously articulated since mid-1920s. The DIY spirit gets gradually spread because people realize that DIY activities are a way to confirm their personal creativities, outsource results, and... more
Today Blood donation is a global interest for world to be survival lives when people are in trouble because of natural disaster. The system provides the ability how to decide to donate the blood according to the rules for blood donation... more
This paper proposes a comparison of the two most advanced algorithms for connected components labeling, highlighting how they perform on a soft core SoC architecture based on FPGA. In particular we test our block based connected... more
The article is a study of probabilistic dependencies between attribute-defined partitions of a universe in hierarchies of probabilistic decision tables. The dependencies are expressed through two measures: the probabilistic generalization... more
This study uses the variable precision rough set (VPRS) model as a tool to support group decision-making (GDM) in credit risk management. We consider the case that the classification in decision tables consisting of risk exposure (RE) may... more
The problem of credit-risk evaluation is a very challenging and important financial analysis problem. Recently, researchers have found that neural networks perform very well for this complex and unstructured problem when compared to more... more
Managers of multiple projects with overly constrained resources face difficult decisions in how to allocate resources to minimize the average delay per project or the time to complete the whole set of projects. We address the static... more
This research examines which method is better for programming rule-based expert systems: IF-THEN rules or decision tables. Thirty undergraduate MIS students served as experimental subjects in an eight week study. After four weeks,... more
Rough Set Theory (RST) is an induction based decision-making technique, which can extract useful information from attribute-value (decision) table. This study introduces RST into pavement management system (PMS) for maintenance and... more
This paper presents work on generation of specificationdriven test cases based on quasirandom (low-discrepancy) sequences instead of pseudorandom numbers. This approach is novel in software testing. This enhanced uniformity of quasirandom... more
A service-oriented architecture (SOA) for web applications is often implemented using web services (WSs) and consists of different operations the executions of which are perceived as events. The order and time-appropriateness of... more
This paper deals with knowledge acquisition in incomplete information systems using rough set theory. The concept of similarity classes in incomplete information systems is first proposed. Two kinds of partitions, lower and upper... more
This study presents ten modeling techniques within data mining process for the prediction of thermophysical properties of refrigerants (R134a, R404a, R407c and R410a). These are linear regression (LR), multi layer perception (MLP), pace... more
Iris Rose Narcisse Table Decor, is a set of 3 magnificent 100% acrylic roses from the French Brand Acrila. A modern look to any living area Marriage table decorations are an important part of the form. Still, further than one type of... more
The starting point of rough set theory is an information system. The information system contains data about objects of interest characterized in terms of some attributes. If we distinguish condition and decision attributes in the... more
A three-phased framework for learning dynamic system control is presented. A genetic algorithm is employed to derive control rules encoded as decision tables. Next, the rules are automatically transformed into comprehensible form by means... more
Dominance-based Rough Set Approach (DRSA) has been introduced to deal with multiple criteria classification (also called multiple criteria sorting, or ordinal classification with monotonicity constraints), where assignments of objects may... more