Search all articles

+ Advanced search
Search articles within:
121591 articles

The Conceptual Model of Mobile TV Service Adoption: A Triangulational Perspective

Rong Chen, Xin Luo, Heng Xu, Wei Zhang
Mobile TV is a fledgling industry which has high profit expectations while with low adoption rates. To advance this line of research, this paper presents a comprehensive review on literatures related to mobile TV adoption, including traditional adoption theories, uses and gratification research, domestication...

Towards the Next Generation of Recommender Systems

Alexander Tuzhilin
The field of recommender systems has reached an important milestone in Fall 2009 when the $1,000,000 Netflix Prize Competition has successfully completed its course. Since then, there has been an attempt made in the recommender systems community to access what has been accomplished and identify new promising...

Orthogonality of Imprecise Matrices

Madhumangal Pal, Anita Pal, Gobinda Murmu
In this paper, we have studied some properties of imprecise numbers, namely, interval numbers and triangular fuzzy numbers. Also we studied the imprecise matrices of different kinds. Using the operations defined on them, we have proposed the orthogonality of such matrices and some theorem for those type...

The Limits of Public Clouds for Business Applications --An overly simplistic reliance on the utility model risks blinding us to the real opportunities and challenges of cloud computing

Paul Hofmann
Descriptions of cloud computing often emphasize the silver lining more than the chances of getting wet. Utility computing offers many benefits, but will the cloud ¡ª especially the public cloud ¡ª lead to the extinction of CIOs because IT will be consumed as simply as electricity? No doubt, cloud computing...

COSI-: Identification of Cosine Interesting Patterns Based on FP-tree

Xiaojing Huang, Junjie Wu, Shiwei Zhu, Hui Xiong
The cosine similarity, also known as uncentered Pearson Correlation, has been widely used for mining association patterns, which contain objects strongly related to each other. However, it is often used as a post-evaluation measure and is computationally prohibitive for large data. To this end, we develop...

The Effect of CRM System on Sales Man-agement Control: A Case Study

Liang Li, Ji-Ye Mao
Whereas prior research has paid little attention to the effect of CRM system on internal process control, this case study illustrates control-related CRM usage by investigating how effective sales management control through CRM and why. Results show that the CRM application can strengthen formal control...

A Semantic Analysis Method for Concept Map-based Knowledge Modeling

Jin-Xing Hao, Angela Yan, Ron Chi-Wai
Semantic analysis of a concept map plays an important role in translating human knowledge in the form of concept maps into rigorous and unambiguous representations for further processing by computers. However, recent research limits in the literal analysis of concept labels and concept relatedness that...

Mining Maximal Frequent Patterns With Similarity Matrices of Data Records

Hua Yuan, Junjie Wu
In this paper, we proposed a similarity matrix based method to mining maximal frequent patterns from large database. The study is very different from the previous Apriori-liked method. Especially, the method can be performed directly on the original data in database without various format transformation....

Domain Ontology Mapping Based Semantic Web Mining Models Research

Jiaojie Cai, Yufeng Zhang, Feng Hu, Jianfeng Dong
This paper proposes two models about semantic web mining based on domain ontology mapping and gives domain ontology mapping rules. In the first model we semantic annotate web resources based on domain ontology mapping rules, and then implement web mining to get semantic knowledge rules; In the second...

Integrating OLAP/SOLAP With E-Business: A New Conceptual Platform

Oualid, Samar Mouakket
E-business domains, such as e-commerce, e-government, e-learning, e-banking, have been considered for long time as killer domains for several data analysis techniques in order to analyze the data stored in their websites¡¯ databases. Most of the researchers have been focusing on using the Data Mining...

Empirical Analysis on the Correlation between Chinese Stock Markets and Developed Oversea Markets

Feng Liu, Qiang Ye, Yi-jun Li
Through the Johansen Co-integration test and the Granger-causality test, we found that the volatility in Chinese stock markets has been affected by the the volatility in United States stock market, however, we have not found that Chinese stock markets would co-move along with the United States market...

Advanced Informatics for Business Intelligence 2.0

Hsinchun Chen
Business Intelligence (BI), a term coined in 1989, has gained much traction in the IT practitioner community and academia over the past two decades. According to Wikipedia, BI refers to the ¡°skills, technologies, applications, and practices used to help a business acquire a better understanding of its...

Effect of information asymmetry and embeddedness on organizational learning

Liefa Liao, Kanliang Wang
Using simulation research method, this research considers how information asymmetry and embeddedness influence organizational learning performance. The results indicate that, low embeddedness facilitate exploration learning while high embeddedness facilitate exploitation learning in information symmetry...

The Analysis of the Business Pattern of Online Community and Its Value

Zhiyuan Ge, Shuping Mao, Lili Sun
With the number of Chinese Internet users is growing rapidly, Internet is building an extensive network of community, and people begin to find their homogeneous groups through a variety of ways on the network, under the context, online communities formed. So the business pattern of online community is...

Daily Budget Optimization Basedon the Newsboy Model for Advertisers in the SSA Markets

Linjing Li, Daniel Zeng, Yanwu Yang
This paper provides a method for planing the optimal daily budget in the online sponsored search advertising market, which is now the most important marketing place. The proposed method is mainly based the well-known newsboy model, which has been widely applied in single period inventory management settings....

Monitoring of the Changes in the Global Forest Cover Using Data Mining

Vipin Kumar
Assessing change in forest cover is of critical importance in studying natural and anthropogenic impacts on natural ecosystems. In particular, forest degradation accounts for almost 20% of anthropogenic greenhouse gas emissions (GHG) and thus is a significant driver of climate change, which, in turn...

Feature Ranking for Total Ordering Ranking Problems

Yongqing Wang, Daniel Zeng
In this paper, we first introduce the development of learning to rank and discuss the problems existing in this field especially the ignorance of total ordering ranking. For dealing with the total ordering ranking problem, we assume a method ¡°feature ranking¡±. Based the assumption, we design two algorithms:...

Marketing Communication Strategy and Marketing ROI under Cross-Media Envi-ronment

Akihiro Inoue
Marketing managers have to build their effective communication strategy under cross-media environment. Also, they have to achieve a same level performance even under the decrease in marketing budget. In this research, we re-consider the inherent task of marketing communication and propose the concept...

Research on Metadata-driven Enterprise Data Modeling System

Hong Miao, Jingsheng Sun, Shilun Ge, Nianxin Wang
Since the existing mass data resource in enterprises has never generated any reuse-value, this paper proposes a framework for enterprise data modeling, verification and management driven by metadata. It starts from the building-up of metadata base, and then checks and verifies the metadata at different...

A Bibliometric Research of Social Net-work Theory and Its Applications in MIS Domain

Yili Liu, Bing Wu
An overview of why and how the social network approach might be useful for research of information related issues is presented. Background of social network theory and social network analysis are provided firstly. Then a literature review is made involving a content analysis of 373 articles retrieved...

Software Defect Prediction Based on As-sociation Rule Classification

Baojun Ma, Karel Dejaeger, Jan Vanthienen, Bart Baesens
In software defect prediction, predictive models are estimated based on various code attributes to assess the likelihood of software modules containing errors. Many classification methods have been suggested to accomplish this task. However, association based classification methods have not been investigated...

Consumer Categorization of Hybrid Products: The Applicability of Fuzzy-based Approach for Managing the Technology Convergence

Akihiro Nishimoto
The central issue in this research is the product management. Especially, hybrid products are focused. It is the one that is integrated more than two category technologies into one product. It has been getting a lot of attention as the new approach of the product development. However, there is the category...

Making Item Predictions through Tag Recommendations

Jing Peng, Daniel Zeng
As opposed to the search engine, social tagging can be considered an alternative technique tapping into the wisdom of the crowd for organizing and discovering information on the Web. Effective tagbased recommendation of information items is a critical aspect of this social information discovery mechanism....

VAR model Analysis on Japan's OFDI and Industrial Structural Upgrading

Liang Ren, Bing Li
This paper employs the VAR model to analyze Japan¡¯s outward foreign direct investment and its domestic industrial structural upgrading. Vector Error Correction estimates shows that there is a long term relationship between Japan¡¯s outward FDI and its industrial structural upgrading, and there is a...

Models of Pricing and Coordination in Dual-channel Supply Chain with Business Reputation

Hui Ma, De-Li Yang, Jian-Jun Wang
In order to meet the needs of different customer, manufacturer opened online direct channel based on retail channel. In the case of co-existence of dual-channel distribution, a model is built to analyze pricing competitions between one manufacturer and one retailer under the manufacturer providing business...

Finding Topics in News Web Pages by Parameter-free Clustering

Ji Xiang, Neng Gao, Jiwu Jing
Topic detection is a novel technology which structures news stories into several topics. Present topic detection approaches are mainly based on clustering algorithms such as single pass or agglomerative clustering, and all these algorithms need at least one input parameter. We proposed a novel clustering...

Updating Approximations Dynamically in Dominance-based Rough Sets

Shaoyong Li, Tianrui Li, Junbo Zhang
Dominance-based rough set (DBRS) approach is dedicated to analysis of data with ordinal properties by the dominance relation. Incrementally updating knowledge is a hot topic in data mining and granular computing. This paper presents algorithms for updating approximations dynamically in DBRS when adding...

Renewable Energy System Selection Based On Computing With Words

Cengiz Kahraman, Selçuk Cebi, Ihsan Kaya
Pages: 461 - 473
Renewable energy is the energy generated from natural resources such as sunlight, wind, rain, tides and geothermal heat. Turkey has a great renewable energy potential with its natural resources such as biomass, geothermal, hydropower, solar, and wind. Selection among energy alternatives is a multicriteria...

A Ranking Method of Triangular Intuitionistic Fuzzy Numbers and Application to Decision Making

Deng Feng Li, Juang Xia Nan, Mao Jun Zhang
Pages: 522 - 541
Ranking of triangular intuitionistic fuzzy numbers (TIFNs) is an important problem, which is solved by the value and ambiguity based ranking method developed in this paper. Firstly, the concept of TIFNs is introduced. Arithmetic operations and cut sets over TIFNs are investigated. Then, the values and...

Computing with Words in Risk Assessment

Jun Liu, Luis Martinez, Hui Wang, Rosa M. Rodriguez, Vasily Novozhilov
Pages: 396 - 419
This paper presents a comprehensive overview of currently known applications of computing with words (CWW) in risk assessment. It is largely grouped into the following 5 categories: (1) fuzzy number based risk assessment; (2) fuzzy rule-based risk assessment; (3) fuzzy extension of typical probabilistic...

A Social Choice Analysis of the Borda Rule in a General Linguistic Framework

José Luis Garcia-Lapresta, Bonifacio Llamazares, Miguel Martinez-Panero
Pages: 501 - 513
In this paper the Borda rule is extended by allowing the voters to show their preferences among alternatives through linguistic labels. To this aim, we need to add them up for assigning a qualification to each alternative and then to compare such qualifications. Theoretically, all these assessments and...

A new GA based solution for capacitated multi source Weber problem Nazila Mohammadi

Nazila Mohammadi, Mohammad Reza Malek, Ali Asghar Alesheikh
Pages: 514 - 521
The main purpose of any facility location is to select the optimal places that satisfy project's goals. In location problems, the object is usually to optimize a function - objective function - that defines the problem conditions and efficient decision parameters. Numerous methods are proposed to challenge...

An Extended Hierarchical Linguistic Model for Managing Integral Evaluation

Rocio de Andres, Macarena Espinilla, Luis Martinez
Pages: 486 - 500
Performance appraisal is a process used by companies in order to evaluate their employees' efficiency and productivity for planning their Human Resource policies. Traditionally this process has just been carried out by the executive staff but recently it has started to be based on opinions of different...

Behavior-aware Trustworthiness Study of Networked Software Xianwen Fang

Xianwen Fang, Changjun Jiang, Xiaoqin Fan
Pages: 542 - 552
The essence characteristics of software trustworthiness are software execution effect and behavior can be anticipated, which is an important index of software quality. Under the open and dynamic environments, some uncertainty factors cause the behavior of software to be uncontrolled, uncertainty and...

Computing with Words in Decision support Systems: An overview on Models and Applications

Luis Martinez, Da Ruan, Francisco Herrera
Pages: 382 - 395
Decision making is inherent to mankind, as human beings daily face situations in which they should choose among different alternatives by means of reasoning and mental processes. Many of these decision problems are under uncertain environments with vague and imprecise information. This type of information...

Multiattribute Supplier Selection Using Fuzzy Analytic Hierarchy Process

Serhat Aydin, Cengiz Kahraman
Pages: 553 - 565
Supplier selection is a multiattribute decision making (MADM) problem which contains both qualitative and quantitative factors. Supplier selection has vital importance for most companies. The aim of this paper is to provide an AHP based analytical tool for decision support enabling an effective multicriteria...

Characterization of Fashion Themes Using Fuzzy Techniques for Designing New Human Centered Products

Y. Zhu, D. Ruan, X. Zeng, L.N. Koehl, C. Chaigneau
Pages: 452 - 460
Fabric selection plays an important role in fashion garment design. Designers often use both physical and normalized linguistic criteria for fabric selection. Perception and preference of consumers in their specific sociocultural context, expressed by fashion themes or emotional linguistic criteria,...

An Integrated Methodology using Linguistic PROMETHEE and Maximum Deviation Method for Third-party Logistics Supplier Selection

Chen-Tung Chen, Ping-Feng Pai, Wei-Zhang Hung
Pages: 438 - 451
The purpose of this paper is to present a framework and a suitable method for selecting the best logistics supplier. In general, many quantitative and qualitative criteria should be considered simultaneously for making the decision of logistics supplier selection. The information about judging the performance...

A Review on Information Accessing Systems Based on Fuzzy Linguistic Modelling

E. Herrera-Viedma, A.G. Lopez-Herrera
Pages: 420 - 437
This paper presents a survey of some fuzzy linguistic information access systems. The review shows information retrieval systems, filtering systems, recommender systems, and web quality evaluation tools, which are based on tools of fuzzy linguistic modelling. The fuzzy linguistic modelling allows us...

Power Distribution System Planning Evaluation by a Fuzzy Multi-Criteria Group Decision Support System

Tiefeng Zhang, Guangquan Zhang, Jun Ma, Jie Lu
Pages: 474 - 485
The evaluation of solutions is an important phase in power distribution system planning (PDSP) which allows issues such as quality of supply, cost, social service and environmental implications to be considered and usually involves the judgments of a group of experts. The planning problem is thus suitable...

A Framework for Function Allocation in Intelligent Driver Interface Design for Comfort and Safety

Wuhong Wang, Fuguo Huo, Huachun Tan, Heiner Bubb
Pages: 531 - 541
This paper presents a conceptual framework for ecological function allocation and optimization matching solution for a human-machine interface with intelligent characteristics by “who does what and when and how” consideration. As a highlighted example in nature-social system, intelligent transportation...

Parallel Sequential Pattern Mining of Massive Trajectory Data

Shaojie Qiao, Tianrui Li, Jing Peng
Pages: 343 - 356
The trajectory pattern mining problem has recently attracted much attention due to the rapid development of location-acquisition technologies, and parallel computing essentially provides an alternative method for handling this problem. This study precisely addresses the problem of parallel mining of...

Improving the Reliability of Case-Based Reasoning Systems

Xu Xu, Ke Wang, Weimin Ma, Jie Lin
Pages: 256 - 265
Case-based reasoning (CBR) infers a solution to a new problem by searching a collection of previously solved problems for cases which are similar to the new problem. The collection of previous problems and their associated solutions represents the CBR system’s realm of expertise. A CBR system helps...

A Lexicographic Method for Matrix Games with Payoffs of Triangular Intuitionistic Fuzzy Numbers

Jiang-Xia Nan, Deng-Feng Li, Mao-Jun Zhang
Pages: 280 - 289
The intuitionistic fuzzy set (IF-set) has not been applied to matrix game problems yet since it was introduced by K.T.Atanassov. The aim of this paper is to develop a methodology for solving matrix games with payoffs of triangular intuitionistic fuzzy numbers (TIFNs). Firstly the concept of TIFNs and...

Multiple Criteria Human Performance Evaluation Using Choquet Integral

Tuncay Gürbüz
Pages: 290 - 300
It is a critical issue for the continuity of an organization to efficiently evaluate the performance of its employees. The evaluation process has to guarantee a sufficient level of objectivity and a limited level of subjectivity in order to answer the employees' expectancies. In this study, a multi-criteria...

Integrated total cost and Tolerance Optimization with Genetic Algorithm

R.Sampath Kumar, N. Alagumurthi
Pages: 325 - 333
The tolerance allocation problem has been studied in the literature for decades, usually using mathematical programming (or) heuristic optimization approaches. Elegant tools for minimum cost tolerance allocation have been developed over several decades but still there is no specified tool to find the...

Fuzzy Classifier Design using Modified Genetic Algorithm

P.Ganesh Kumar
Pages: 334 - 342
Development of fuzzy if- then rules and formation of membership functions are the important consideration in designing a fuzzy classifier system. This paper presents a Modified Genetic Algorithm (ModGA) approach to obtain the optimal rule set and the membership function for a fuzzy classifier. In the...

Reliability Growth Predication based on an Improved Grey Predicton Model

Yuhong Wang, Yaoguo Dang, Sifeng Liu
Pages: 266 - 273
As limits of time, labors and expenses, observed data usually have the characteristic of small sample sizes in development test program. Redesigns or corrective actions can result in changes of reliability for equipments. We propose an improved GM(1,1) model to predict reliability growth in this paper....