You are on page 1of 9

Industrial Management & Data Systems

A review of data mining techniques


Sang Jun Lee Keng Siau

Article information:
To cite this document:
Sang Jun Lee Keng Siau, (2001),"A review of data mining techniques", Industrial Management & Data Systems, Vol. 101 Iss
1 pp. 41 - 46
Permanent link to this document:
http://dx.doi.org/10.1108/02635570110365989
Downloaded on: 26 May 2015, At: 20:15 (PT)
References: this document contains references to 17 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 7812 times since 2006*

Users who downloaded this article also downloaded:


Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Ahmed Elragal, Nada El-Gendy, (2013),"Trajectory data mining: integrating semantics", Journal of Enterprise Information
Management, Vol. 26 Iss 5 pp. 516-535 http://dx.doi.org/10.1108/JEIM-07-2013-0038
(2008),"Data Mining and Knowledge Discovery Technologies20081. Data Mining and Knowledge Discovery Technologies.
Hershey, PA: IGI Publishing 2008. 369 pp. US$99.00 hard cover, ISBN: 9781599049601", Online Information Review, Vol. 32
Iss 6 pp. 866-867 http://dx.doi.org/10.1108/14684520810923980
Marvin L. Brown, John F. Kros, (2003),"Data mining and the impact of missing data", Industrial Management & Data
Systems, Vol. 103 Iss 8 pp. 611-621 http://dx.doi.org/10.1108/02635570310497657

Access to this document was granted through an Emerald subscription provided by 460696 []

For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service
information about how to choose which publication to write for and submission guidelines are available for all. Please
visit www.emeraldinsight.com/authors for more information.

About Emerald www.emeraldinsight.com


Emerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of
more than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of online
products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on Publication
Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.
*Related content and download information correct at time of download.

A review of data mining techniques

Sang Jun Lee


University of Nebraska-Lincoln, Lincoln, Nebraska, USA
Keng Siau
University of Nebraska-Lincoln, Lincoln, Nebraska, USA

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Keywords

Data mining,
Artificial intelligence, Algorithms,
Decision trees

Abstract

Terabytes of data are generated


everyday in many organizations.
To extract hidden predictive
information from large volumes of
data, data mining (DM)
techniques are needed.
Organizations are starting to
realize the importance of data
mining in their strategic planning
and successful application of DM
techniques can be an enormous
payoff for the organizations. This
paper discusses the requirements
and challenges of DM, and
describes major DM techniques
such as statistics, artificial
intelligence, decision tree
approach, genetic algorithm, and
visualization.

Introduction
The technologies for generating and
collecting data have been advancing rapidly.
At the current stage, lack of data is no longer
a problem; the inability to generate useful
information from data is! The explosive
growth in data and database results in the
need to develop new technologies and tools to
process data into useful information and
knowledge intelligently and automatically.
Data mining (DM), therefore, has become a
research area with increasing importance
(Weiss and Indurkhya, 1998; Technology
Forecast, 1997; Fayyad et al., 1996; PiatetskyShapiro and Frawley, 1991).
DM is the search for valuable information
in large volumes of data (Weiss and
Indurkhya, 1998). It is the process of
nontrivial extraction of implicit, previously
unknown and potentially useful information
such as knowledge rules, constraints, and
regularities from data stored in repositories
using pattern recognition technologies as
well as statistical and mathematical
techniques (Technology Forecast, 1997;
Piatetsky-Shapiro and Frawley, 1991). Many
companies have recognized DM as an
important technique that will have an impact
on the performance of the companies.
DM is an active research area and research
is ongoing to bring statistical analysis and
artificial intelligence (AI) techniques
together to address the issues.

Current trends on data mining

Industrial Management &


Data Systems
101/1 [2001] 4146
# MCB University Press
[ISSN 0263-5577]

Just five years ago, only 50 researchers took


part in the knowledge discovery and data
mining conference workshop. Today,
however, knowledge discovery nuggets, the
well-known monthly electronic newsletter by
Gregory Piatetsky-Shapiro, has more than
The current issue and full text archive of this journal is available at
http://www.emerald-library.com/ft

4,000 readers. Moreover, data mining


continues to attract more and more attention
in the business and scientific communities.
In a 1997 report, Stamford, Conneticut-based
Gartner Group mentioned: ``Data mining and
artificial intelligence are at the top of the five
key technology areas that will clearly have a
major impact across a wide range of
industries within the next three to five
years.'' Many companies currently use
computers to capture details of business
transactions such as banking and credit card
records, retail sales, manufacturing
warranty, telecommunications, and myriad
other transactions. Data mining tools are
then used to uncover useful patterns and
relationships from the data captured.
Currently, data mining techniques, tools,
and researches are being expanded to the
various fields. For example, the DM tool,
intelligent text-mining system, extracts text
fragments relevant to user queries,
automatically creates and processes a series
of new queries, and assembles a new text.
The output enables the user to see the new
aspects of a given theme. This tool is a rulebased system using complex heuristics.
Data warehousing is one of the most
important research areas related to DM. A
data warehouse is a read-only database
developed for analyzing business situations
and supporting decision makers. The data
warehouse includes large volumes of subjectoriented data, where all levels of an
organization can find the information in a
timely manner. DM goes together with the
data warehousing which is necessary to
organize historical information gathered
from large-scale client/server-based
applications. In other words, DM can add
values to the information assets of
organizations in different sectors, through
effective induction of large corporate data
warehouses into a client-server. Therefore,
developing an advanced client-server
induction system capable of supporting
efficient and effective data mining of large

[ 41 ]

Sang Jun Lee and Keng Siau


A review of data mining
techniques
Industrial Management &
Data Systems
101/1 [2001] 4146

databases in business environment is one of


the active research areas.

Requirements and challenges of


DM
DM is a relatively new field and there are
many challenges to be faced. Extracting
useful information from data can be a
complicated and sometimes a difficult
process. In this section, we look at some of
the requirements and challenges of data
mining (adapted from Chen et al., 1996).

Ability to handle different types of data


Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Many database systems have complex data


types, such as hypertext, multimedia data,
and spatial data. If a DM technique is robust
and powerful, it should be able to perform
effective DM on various types of data
structures. Though ideal, it is impractical to
expect a DM technique to handle all kinds of
data and to perform different goals of DM
effectively. In general, a specific DM system
is built for mining knowledge from a specific
kind of data.

Graceful degeneration of DM algorithms

The DM algorithms should be efficient and


scaleable. The performance of the algorithm
should degenerate gracefully. In other words,
the searching, mining, or analyzing time of a
DM algorithm should be predictable and
acceptable as the size of the database
increases.

Mining at different abstraction levels

It is very difficult to specify exactly what to


look for in a database or how to extract useful
information from a database. Besides, the
value of a piece of information is in the eyes
of the beholder one person's ``gold mine''
could easily be another person's garbage. To
facilitate the mining process, the systems
should allow the users to mine at different
abstraction levels. For example, a high-level
query might disclose an interesting trace
that warrants further exploration. Thus, it is
important for DM tools to support mining at
different levels of granularity.

Mining information from different sources


of data

In the ages of the Internet, Intranets,


Extranets, and data warehouses, many
different sources of data in different formats
are available. Mining information from
heterogeneous database and new data
formats can be challenges in DM. The DM
algorithms should be flexible enough to
handle data from different sources.

Protection of privacy and data security

DM is a threat to privacy and data security


because when data can be viewed from many
different angles at different abstraction
levels, it threatens the goal of keeping data
secured and guarding against the intrusion
on privacy. For example, it is relatively easy
to compose a profile of an individual (e.g.
personality, interests, spending habits, etc.)
with data from various sources.

Valuable DM results

DM system should be able to handle noise


and exceptional data efficiently. The
discovered information must precisely depict
the contents of the database and be beneficial
for certain applications. Also, the quality of
the discovered information should be
interesting and reliable.

Representation of DM requests and results

DM identifies facts or conclusions based on


sifting through the data to discover patterns
or anomalies (Technology Forecast, 1997). To
be effective, the systems should allow users
to discover information from their own
perspectives and the information should be
presented to the users in forms that are
comfortable and easy to understand. Highlevel query languages or graphical user
interface is required to express the DM
requests and the discovered information.
End users should be able to specify task
commands for the DM system and the results
from the DM system should be
understandable and usable.

[ 42 ]

Data mining steps


In general, there are three main steps in DM:
preparing the data, reducing the data and,
finally, looking for valuable information. The
specific approaches, however, differ from
companies to companies and researchers to
researchers. For example, IBM (reported in
Technology Forecast, 1997) defined four major
operations for DM:
1 Predictive modeling: using inductive
reasoning techniques such as neural
networks and inductive reasoning
algorithms to create predictive models.
2 Database segmentation: using statistical
clustering techniques to partition data
into clusters.
3 Link analysis: identifying useful
associations between data.
4 Deviation detection: detecting and
explaining why certain records cannot be
put into specific segments.
Fayyad et al. (1996), on the other hand,
proposed the following steps:

Sang Jun Lee and Keng Siau


A review of data mining
techniques
Industrial Management &
Data Systems
101/1 [2001] 4146

1 Retrieving the data from a large database.


2 Selecting the relevant subset to work
with.
3 Deciding on the appropriate sampling
system, cleaning the data and dealing with
missing fields and records.
4 Applying the appropriate
transformations, dimensionality
reduction, and projections.
5 Fitting models to the preprocessed data.

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Classifying DM techniques
Many DM techniques and systems have been
developed and designed. These techniques
can be classified based on the database, the
knowledge to be discovered, and the
techniques to be utilized. In this section, we
review one of the classification schemes
proposed by Chen et al. (1996).

Based on the database

There are many database systems that are


used in organizations, such as relational
database, transaction database, objectoriented database, spatial database,
multimedia database, legacy database, and
Web database. A DM system can be
classified based on the type of database it is
designed for. For example, it is a relational
DM system if the system discovers
knowledge from relational database and it is
an object-oriented DM system if the system
finds knowledge from object-oriented
database.

Major DM techniques
In this section, we review and discuss the
major DM techniques.

Statistics

Statistics is an indispensable component in


data selection, sampling, DM, and extracted
knowledge evaluation. It is used to evaluate
the results of DM to separate the good from
the bad. In data cleaning process, statistics
offer the techniques to detect ``outliers'', to
smooth data when necessary, and to estimate
noise. Statistics can also deal with missing
data using estimation techniques.
Techniques in clustering and designing of
experiments come into play for exploratory
data analysis. Work in statistics, however,
has emphasized generally on theoretical
aspects of techniques and models. As a result,
search, which is crucial in DM, has received
little attention. In addition, interface to
database, techniques to deal with massive
data sets, and techniques for efficient data
management are very important issues in
DM. These issues, however, have only begun
to receive attention in statistics (Kettenring
and Pregibon, 1996).

Techniques for mining transactional/


relational database

DM systems can discover various types of


knowledge, including association rules,
characteristic rules, classification rules,
clustering, evolution, and deviation
analysis. DM systems can also be classified
according to the abstraction level of the
discovered knowledge. The knowledge may
be classified into general knowledge,
primitive-level knowledge, and multiplelevel knowledge.

Mining association rules in transactional or


relational database has been the most
attractive topics in database field (Agrawal et
al., 1993; Han and Fu, 1995; Mannila et al., 1994;
Savasere et al., 1995; Srikant and Agrawal,
1995). The task is to derive a set of strong
association rules in the form of
``A1 ^ . . . ^ Am )B1 ^ . . . ^ Bn ,'' where
Ai for i 2 f1; . . . ; mg and Bj for j 2 f1; . . . ; ng)
are attribute-value sets, from the associated
data sets in a database. For example, one may
find the association rule: if a customer buys
one brand of beer, he/she usually buys
another brand of chips in the same
transaction. Because mining association rules
might require scanning through a massive
transaction database repeatedly, the required
processing power could be enormous.

Based on the techniques

Artificial intelligence (AI) techniques

Based on the knowledge

DM systems can also be categorized by DM


techniques. For example, a DM system can be
categorized according to the driven method,
such as autonomous knowledge mining, datadriven mining, query-driven mining, and
interactive DM techniques. Alternatively, it
can be classified according to its underlying
mining approach, such as generalizationbased mining, pattern-based mining,
statistical- or mathematical-based mining
and integrated approaches.

AI techniques are widely used in DM.


Techniques such as pattern recognition,
machine learning, and neural networks have
received much attention. Other techniques in
AI such as knowledge acquisition, knowledge
representation, and search, are relevant to
the various process steps in DM.
Classification is one of the major DM
problems. Classification is the process of
dividing a data set into mutually exclusive
groups such that the members of each group

[ 43 ]

Sang Jun Lee and Keng Siau


A review of data mining
techniques

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Industrial Management &


Data Systems
101/1 [2001] 4146

are as ``close'' as possible to one another, and


the members of different groups are as ``far''
as possible from one another. For example, a
typical classification problem is to divide a
database of customers into groups that are as
homogeneous as possible with respect to a
variable such as creditworthiness. One
solution to the classification problem is to
use neural network. According to Lu et al.
(1996), neural network-based DM approach
consists of three major phases:
1 Network construction and training: in this
phase, a layered neural network based on
the number of attributes, number of
classes, and chosen input coding method
are trained and constructed.
2 Network pruning: in this phase, redundant
links and units are removed without
increasing the classification error rate of
the network.
3 Rule extraction: classification rules are
extracted in this phase.
Other AI techniques that can be used for DM
include case-based reasoning and intelligent
agents. Case-based reasoning uses historical
cases to recognize patterns and the intelligent
agent approach employs a computer program
(i.e. an agent) to sift through data.

Decision tree approach

Decision trees are tree-shaped structures that


represent sets of decisions. The decision tree
approach can generate rules for the
classification of a data set. Specific decision
tree methods include Classification and
Regression Trees (CART) and Chi Square
Automatic Interaction Detection (CHAID).
CART and CHAID are decision tree
techniques used for classification of a data
set. They provide a set of rules that can be
applied to a new (unclassified) data set to
predict which records will have a given
outcome. CART typically requires less data
preparation than CHAID.

Genetic algorithm

Genetic algorithm is a relatively new


software paradigm inspired by Darwin's
theory of evolution. A population of rules,
each representing a possible solution to a
problem, is initially created at random. Then
pairs of rules (usually the strongest rules are
selected as parents) are combined to produce
offspring for the next generation. A mutation
process is used to randomly modify the
genetic structures of some members of each
new generation. The system runs for dozens
or hundreds of generations. The process is
terminated when an acceptable or optimum
solution is found, or after some fixed time
limit. Genetic algorithms are appropriate for

[ 44 ]

problems that require optimization with


respect to some computable criterion. This
paradigm can be applied to DM problems.
The quantity to be minimized is often the
number of classification errors on a training
set. Large and complex problems require a
fast computer in order to obtain appropriate
solutions in a reasonable amount of time.
Mining large data sets by genetic algorithms
has become practical only recently due to the
availability of affordable high-speed
computers.

Visualization

A picture is worth thousands of numbers!


Visual DM techniques have proven the value
in exploratory data analysis, and they also
have a good potential for mining large
database. This approach requires the
integration of human in the DM process.
Tufte (1983, 1990) provided many examples of
visualization techniques that have been
extended to work on large data sets and
produce interactive displays. There are
several well-known techniques for
visualizing multidimensional data sets:
scatterplot matrices, coplots, prosection
matrices, parallel coordinates, projection
matrices, and other geometric projection
techniques such as icon-based techniques,
hierarchical techniques, graph-based
techniques, and dynamic techniques.

Managerial implications, directions


and strategies
The real question is what DM can do in real
business field? DM can give solutions for
banking and credit industry such as credit
scoring, fraud detection, and customer
segmentation. In today's competitive
environment, maintaining widely-used
bureau based tools may not be an effective
long-term strategy. However, DM can develop
proprietary bureau scores for general risk,
bankruptcy, revenue and response, among
others, that are not available to competitors
and are optimized for the business needs.
Tools adapting DM techniques provide credit
managers and underwriters for rapidly
building and analyzing credit application
scorecards allowing increased acceptances
and reduced bad debt. When provided with a
history of fraudulent and genuine credit
applications, DM tools learn the patterns of
fraud and subsequently identify fraud
successfully.
Nowadays, the Internet is one of the most
important markets and channels in the
business environment. It is so important to
deliver the right message at the right time to

Sang Jun Lee and Keng Siau


A review of data mining
techniques

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Industrial Management &


Data Systems
101/1 [2001] 4146

the right people. In fact, the Internet


environment, especially, World Wide Web
(WWW) has very unstructured data format
from a DM point of view. DM has been applied
to the structured databases. However, the
potential of Web mining to help people
navigate, search, and visualize the contents of
Web is enormous, and the Web mining is
feasible in practice (Etzioni, 1996). DM tools
adapting the Internet technology can provide a
targeted banner campaign, rich media, a
storefront, a promotion, or direct e-mail.
Different services are provided to different
people. DM tools anticipate customers' needs
before, during, and after running a campaign.
It reports behavioral data about Web visitors,
such as who is visiting, what content they
access, where they came from, and why they
purchase. The knowledge gained from the tool
can be used to measure return on investment
(ROI) of marketing campaigns and make better
online business decisions. One second can turn
a browser into a buyer. The key is making the
right suggestion to the right buyer at the right
time. It is called suggestive selling, and DM
tools can do the job in this Internet arena.
DM has been recognized as one of the most
important techniques in e-commerce market
especially in providing filtering techniques
that are key to success of today's top Internet
marketers. They drive the personalized
recommendations that turn more site
browsers into buyers, increase cross-selling
and up-selling, and deepen customers' loyalty
with every purchase. In e-commerce
marketing, most of the market analysis tools
rely on data mining and data warehousing.
These technologies are used to uncover
relationships among products ``product
affinities'' and between customers and
products ``market segmentation''.
DM techniques are even used for sports
and entertainment solutions. IBM has
prototyped leading DM technology to help
National Basketball Association (NBA)
coaches and league officials organize and
interpret the mountains of data amassed at
every game. Using DM software called
Advanced Scout to prepare for a game, a
coach can quickly review countless statistics:
shots attempted, shots blocked, assists made,
and personal fouls. The tool can also detect
patterns in these statistics that a coach may
not know about. For example, the tool may
uncover information such as this player is
most effective with these players and under
these circumstances.
Nowadays, the use of DM technology is
widespread in any industry. A large multinational retailer uses DM technique to refine
inventory stocking levels, by store and by
item, to dramatically reduce out-of-stock or

overstocking situations and thereby improve


revenues and reduce forced markdowns. A
health maintenance group uses DM
technique to predict which of its members
are most at risk of specific major illnesses.
This presents opportunities for timely
medical intervention and preventative
treatment to promote the patients' well-being
and reduce the healthcare provider's costs.

Conclusion
Having the right information at the right
time is crucial for making the right decision.
The problem of collecting data, which used to
be a major concern for most organizations, is
almost resolved. In the millennium,
organizations will be competing in
generating information from data and not in
collecting data. Industry surveys indicated
that over 80 percent of Fortune 500 companies
believe that data mining would be a critical
factor for business success by the year 2000
(Baker and Baker, 1998). Obviously, DM will
be one of the main competitive focuses of
organizations. Although progresses are
continuously been made in the DM field,
many issues remain to be resolved and much
research has to be done.

References

Agrawal, R., Imielinski, T. and Swami, A. (1993).


Mining Association Rules between Sets of Items
in Large Databases, Paper presented at the
ACM SIGMOD, May.
Baker, S. and Baker, K. (1998), ``Mine over matter'',
Journal of Business Strategy, Vol. 19 No. 4,
pp. 22-7.
Chen, M.S., Han, J. and Yu, P. (1996), ``Data mining:
an overview from a database perspective'',
IEEE Transactions on Knowledge and Data
Engineering, Vol. 8 No. 6, pp. 866-83.
Etzioni, O. (1996), ``The World-Wide Web:
quagmire or gold mine?'', Communication of
the ACM, Vol. 39 No. 11, pp. 65-8.
Fayyad, U., Djorgovski, S.G. and Weir, N. (1996),
``Automating the analysis and cataloging of sky
surveys'', in Fayyad, U., Piatetsky-Shapiro, G.,
Smyth, P. and Uthurusamy, R. (Eds), Advances
in Knowledge Discovery and Data Mining, MIT
Press, Cambridge, MA, pp. 471-94.
Fayyad, U., Piatetsky-Shapiro, G. and Smyth, P.
(1996), ``From data mining to knowledge
discovery: an overview'', in Fayyad, U.,
Piatestsky-Shapiro, G., Smyth, P. and
Uthurusamy, R. (Eds), Advances in Knowledge
Discovery and Data Mining, MIT Press,
Cambridge, MA.
Han, J. and Fu, Y. (1995), Discovery of MultipleLevel Association Rules form Large Databases,
Paper presented at the 21st Int'l Conf. Very
Large Data Bases, September.

[ 45 ]

Sang Jun Lee and Keng Siau


A review of data mining
techniques

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

Industrial Management &


Data Systems
101/1 [2001] 4146

[ 46 ]

Kettenring, J. and Pregibon, D. (1996), Committee


on Applied and Theoretical Statistics:
Workshop on Massive Data Sets, Paper
presented at the National Research Council,
Washington, D.C.
Lu, H., Setiono, R. and Liu, H. (1996), ``Effective
Data Mining Using Neural Networks'', IEEE
Transactions on Knowledge and Data
Engineering, Vol. 8 No. 6, pp. 957-61.
Mannila, H., Toivonen, H. and Verkamo, A.I.
(1994), Effective Algorithms for Discovering
Association Rules, paper presented at the
AAAI Workshop, Knowledge Discovering in
Databases, July.
Piatetsky-Shapiro, G. and Frawley, W.J. (1991),
Knowledge Discovery in Database, AAAI/MIT
Press.
Savasere, A., Omiecinski, E. and Navathe, S.
(1995), An Effective Algorithm for Mining

Association Rules in Large Databases, paper


presented at the 21st International
Conference, Very Large Data Bases,
September.
Srikant, R. and Agrawal, R. (1995), Mining
Generalized Association Rules. Paper
presented at the 21st International Conference,
Very Large Data Bases, September.
Technology Forecast: 1997 (1997), Price
Waterhouse World Technology Center, Menlo
Park, CA
Tufte, E.R. (1983), The Visual Display of
Quantitative Information, Graphics Press,
Cheshire, CN.
Tufte, E.R. (1990), Envisioning Information,
Graphics Press, Cheshire, CN.
Weiss, S.H. and Indurkhya, N. (1998), Predictive
Data Mining: A Practical Guide, Morgan
Kaufmann Publishers, San Francisco, CA.

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

This article has been cited by:


1. T. Vafeiadis, K.I. Diamantaras, G. Sarigiannidis, K.Ch. Chatzisavvas. 2015. A comparison of machine learning techniques for
customer churn prediction. Simulation Modelling Practice and Theory 55, 1-9. [CrossRef]
2. Ali Tamaddoni Jahromi, Stanislav Stakhovych, Michael Ewing. 2014. Managing B2B customer churn, retention and
profitability. Industrial Marketing Management 43, 1258-1268. [CrossRef]
3. H.Y. Lam, G.T.S. Ho, C.H. Wu, K.L. Choy. 2014. Customer relationship mining system for effective strategies formulation.
Industrial Management & Data Systems 114:5, 711-733. [Abstract] [Full Text] [PDF]
4. A. Garg, K. Tai, M.M. Savalani. 2014. State-of-the-art in empirical modelling of rapid prototyping processes. Rapid
Prototyping Journal 20:2, 164-178. [Abstract] [Full Text] [PDF]
5. Zheng Zuo, Yu Hu, Qingbin Li, Liyuan Zhang. 2014. Data Mining of the Thermal Performance of Cool-Pipes in Massive
Concrete via In Situ Monitoring. Mathematical Problems in Engineering 2014, 1-15. [CrossRef]
6. Jo-Ting Wei, Ming-Chun Lee, Hsuan-Kai Chen, Hsin-Hung Wu. 2013. Customer relationship management in the
hairdressing industry: An application of data mining techniques. Expert Systems with Applications 40, 7513-7518. [CrossRef]
7. Dario Marra, Marco Sorrentino, Cesare Pianese, Boris Iwanschitz. 2013. A neural network estimator of Solid Oxide Fuel Cell
performance for on-field diagnostics and prognostics applications. Journal of Power Sources 241, 320-329. [CrossRef]
8. Stephen Fox, Tuan Do. 2013. Getting real about Big Data: applying critical realism to analyse Big Data hype. International
Journal of Managing Projects in Business 6:4, 739-760. [Abstract] [Full Text] [PDF]
9. Sung Ho Ha, Jeongwon Yang. 2013. Classification of switching intentions toward internet telephony services: a quantitative
analysis. Information Technology and Management 14, 91-104. [CrossRef]
10. Pantelis Longinidis, Panagiotis Symeonidis. 2013. CORPORATE DIVIDEND POLICY DETERMINANTS:
INTELLIGENT VERSUS A TRADITIONAL APPROACH. Intelligent Systems in Accounting, Finance and Management
20:10.1002/isaf.v20.2, 111-139. [CrossRef]
11. Ali Serhan Koyuncugil, Nermin Ozgulbas. 2012. Financial early warning system model and data mining application for risk
detection. Expert Systems with Applications 39, 6238-6253. [CrossRef]
12. Subhagata Chattopadhyay, Preetisha Kaur, Fethi RabhiAutomatic Grading of Adult Depression Using a Backpropagation
Neural Network Classifier 191-225. [CrossRef]
13. Tiago Miranda, Antnio Gomes Correia, Manuel Santos, Lus Ribeiro e Sousa, Paulo Cortez. 2011. New Models for
Strength and Deformability Parameter Calculation in Rock Masses Using Data-Mining Techniques. International Journal
of Geomechanics 11, 44-58. [CrossRef]
14. Waleed Zaghloul, Sang M. Lee, Silvana Trimi. 2009. Text classification: neural networks vs support vector machines.
Industrial Management & Data Systems 109:5, 708-717. [Abstract] [Full Text] [PDF]
15. James H. Harrison. 2008. Introduction to the Mining of Clinical Data. Clinics in Laboratory Medicine 28, 1-7. [CrossRef]
16. S. Maguire, S.C.L. Koh, C. Huang. 2007. Identifying the range of customer listening tools: a logical precursor to CRM?.
Industrial Management & Data Systems 107:4, 567-586. [Abstract] [Full Text] [PDF]
17. T Miranda, A Correia, I Nogueira, M Santos, P Cortez, L SousaAlternative models for the calculation of the RMR and Q
indexes for granite rock masses . [CrossRef]
18. Sally Mckechnie. 2006. Integrating intelligent systems into marketing to support market segmentation decisions. Intelligent
Systems in Accounting, Finance and Management 14:10.1002/isaf.v14:3, 117-127. [CrossRef]
19. Scott Solomon, Hang Nguyen, Jay Liebowitz, William Agresti. 2006. Using data mining to improve traffic safety programs.
Industrial Management & Data Systems 106:5, 621-643. [Abstract] [Full Text] [PDF]
20. Junaid M. Shaikh. 2005. Ecommerce impact: emerging technology electronic auditing. Managerial Auditing Journal 20:4,
408-421. [Abstract] [Full Text] [PDF]
21. Keng Siau, Yuan Long. 2005. Synthesizing egovernment stage models a metasynthesis based on metaethnography
approach. Industrial Management & Data Systems 105:4, 443-458. [Abstract] [Full Text] [PDF]
22. G.T.S. Ho, H.C.W. Lau, C.K.M Lee, A.W.H. Ip. 2005. An intelligent forward quality enhancement system to achieve product
customization. Industrial Management & Data Systems 105:3, 384-406. [Abstract] [Full Text] [PDF]
23. Kyun Jick Lee. 2005. A Practical Method of Predicting Client Revisit Intention in a Hospital Setting. Health Care Management
Review 30, 157-167. [CrossRef]
24. A.D. Lloyd. 2005. The Grid and CRM: from if to when?. Telecommunications Policy 29, 153-172. [CrossRef]
25. Eugenia Y. Huang, ChiaYu Lin. 2005. Customeroriented financial service personalization. Industrial Management & Data
Systems 105:1, 26-44. [Abstract] [Full Text] [PDF]

Downloaded by Grand Canyon University At 20:15 26 May 2015 (PT)

26. Pedro Gago, Manuel Filipe Santos, Alvaro Silva, Paulo Cortez, Jos Neves, Lopes Gomes. 2005. INTCare: a Knowledge
Discovery Based Intelligent Decision Support System for Intensive Care Medicine. Journal of Decision Systems 14, 241-259.
[CrossRef]
27. Asai Asaithambi, Ventzeslav Valev. 2004. Construction of all non-reducible descriptors. Pattern Recognition 37, 1817-1823.
[CrossRef]
28. H.C.W. Lau, F.T.S. Chan, Richard Fung, Christina W.Y. Wong. 2004. An XMLbased realtime quality measurement
scheme. Industrial Management & Data Systems 104:6, 505-512. [Abstract] [Full Text] [PDF]
29. Marvin L. Brown, John F. Kros. 2003. Data mining and the impact of missing data. Industrial Management & Data Systems
103:8, 611-621. [Abstract] [Full Text] [PDF]
30. Jeong Yong Ahn, Seok Ki Kim, Kyung Soo Han. 2003. On the design concepts for CRM system. Industrial Management &
Data Systems 103:5, 324-331. [Abstract] [Full Text] [PDF]
31. Hamid R. Nemati, Christopher D. Barko. 2003. Key factors for achieving organizational datamining success. Industrial
Management & Data Systems 103:4, 282-292. [Abstract] [Full Text] [PDF]
32. Bassam Hassan. 2003. Examining data accuracy and authenticity with leading digit frequency analysis. Industrial Management
& Data Systems 103:2, 121-125. [Abstract] [Full Text] [PDF]
33. Abdulrahman R. Alazemi, Abdulaziz R. AlazemiOverview of Business Intelligence through Data Mining 272-295. [CrossRef]
34. Nermin Ozgulbas, Ali Serhan KoyuncugilFinancial Early Warning System for Risk Detection and Prevention from Financial
Crisis 1559-1590. [CrossRef]
35. Nermin Ozgulbas, Ali Serhan KoyuncugilFinancial Early Warning System for Risk Detection and Prevention from Financial
Crisis 76-108. [CrossRef]

You might also like