Výsledky vyhledávání - "Decision-tree algorithm analysis"

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Zdroj: JREEC : Journal of Renewable Energy, Electronics and Control; Vol 4, No 2 (2024): JURNAL JREEC; 57-65 ; Journal Renewable Energy, Electronics and Control; Vol 4, No 2 (2024): JURNAL JREEC; 57-65 ; 2807-2189

    Popis souboru: application/pdf

  15. 15
  16. 16

    Alternate Title: Türkiye'de Fertlerin E-Ticaret Kullanım Sürelerinin Tahmininde Destek Vektör Makineleri ve Karar Ağacı Yöntemlerinin Karşılaştırmalı Analizi. (Turkish)

    Zdroj: Turkish Studies - Economics, Finance, Politics; Jun22023, Vol. 18 Issue 2, p529-550, 22p

  17. 17
  18. 18
  19. 19
  20. 20

    Geografické téma: 11 - 1

    Popis souboru: 66-74; application/pdf

    Relation: https://revistas.udes.edu.co/aibi/article/view/information_technology_governance_in_colombian_small_and_medium_companies/2788; Aibi revista de investigación, administración eingeniería; J. I. R. Molano, E. J. R. Saavedra, and Y. P. M. Villalobos, “Metodology integration between IT governance and balanced scorecard: Design based on companies in collection services,” in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), Jun. 2014, pp. 1–6, doi:10.1109/CISTI.2014.6876932.; P. Zhang, K. Zhao, and R. L. Kumar, “Impact of IT Governance and IT Capability on Firm Performance,” Inf. Syst. Manag., vol. 33, no. 4, pp. 357–373, Oct. 2016, doi:10.1080/10580530.2016.1220218.; F. Bergeron, A. M. Croteau, S. Uwizeyemungu, and L. Raymond, “IT governance theories and the reality of SMEs: Bridging the gap,” in Proceedings of the Annual Hawaii International Conference on System Sciences, Mar. 2015, vol. 2015-March, pp. 4544–4553, doi:10.1109/HICSS.2015.542.; T. DuMoulin, “Governance of enterprise IT missing in action,” COBIT Focus, 2015. www.pinkelephant.com (accessed Nov. 26, 2020).; M. Simonsson, P. Johnson, and M. Ekstedt, “The Effect of IT Governance Maturity on IT Governance Performance,” Inf. Syst. Manag., vol. 27, no. 1, pp. 10–24, Jan. 2010, doi:10.1080/10580530903455106; S. Héroux and A. Fortin, “Exploring IT Dependence and IT Governance,” Inf. Syst. Manag., vol. 31, no. 2, pp. 143–166, Apr. 2014, doi:10.1080/10580530.2014.890440; P. Ariza, “Gobierno de TI en Pymes Colombianas. ¿Mito o Realidad? IT Government in Colombians SMEs. Myth or Reality?,” 2017. Accessed: Mar. 08, 2020.[Online]. Available: https://www.researchgate.net/publication/322552206.; W. Van Grembergen and S. De Haes, Enterprise governance of information technology: Achieving strategic alignment and value. Springer, 2009.; A. López Salazar, “La planeación estratégica en la pequeña y mediana empresa: Una revisión bibliográfica,” econoquantum, vol.2, no. 1, pp. 141–164, Dec. 2005, doi:10.18381/eq.v2i1.171.; C. E. Marulanda Echeverry, M. López Trujillo, and F. J. Valencia Duque, “Gobierno y gestión de ti en las entidades públicas,” AD-minister, no. 31, pp. 75–92, Nov. 2017, doi: http://dx.doi.org/10.17230/ad-minister.31.5.; LEZAMA-Valeria, “Revista de Tecnologías de la Información El Gobierno TI es el único camino posible para asegurar que las áreas de sistemas contribuyen al éxito de las empresas,” Diciembre, vol. 1, pp. 9–14, 2014.; P. Ajibade and S. M. Mutula, “Promoting SMEs effectiveness through innovative communication strategies and business-IT alignment,” Probl. Perspect. Manag., vol. 18, no. 3, pp. 233–244, Sep. 2020, doi:10.21511/ppm.18(3).2020.20.; R. F. Frogeri, D. J. Pardini, A. M. P. Cardoso, L. Á. Prado, F. P. Piurcosky, and P. dos S. P. Junior, “IT Governance in SMEs,” Int. J. It/bus. Alignment Gov., vol. 10, no. 1, pp. 55–73, Jul. 2019, doi:10.4018/ijitbag.2019010104.; K. Kasemsap, “The roles of international entrepreneurship and organizational innovation in SMEs,” in International Business: Concepts, Methodologies, Tools, and Applications, IGI global, 2016, pp. 1318–1346.; L. Aversano, C. Grasso, and M. Tortorella, “Evolving enterprise information system in Small and Medium enterprise: An opportunistic approach and a case study,” in Proceedings -13th IEEE International Conference on Commerce and Enterprise Computing, CEC 2011, 2011, pp. 407–414, doi:10.1109/CEC.2011.66.; O. Olutoyin and S. Flowerday, “Successful IT governance in SMES: An application of the Technology–Organisation–Environment theory,” SA J. Inf. Manag., vol. 18, no. 1, May 2016, doi:10.4102/sajim.v18i1.696; M. Al-Ruithe, E. Benkhelifa, and K. Hameed, “A systematic literature review of data governance and cloud data governance,” Pers. Ubiquitous Comput., vol. 23, no. 5–6, pp. 839–859, Nov. 2019, doi:10.1007/s00779-017-1104-3; Á. Moreno, M. P. Vicente-Galindo, and M. P. Galindo-Villardón, “Aprendizaje basado en árboles de decisión: un estudio crítico desde Weka, RapidMiner y SPSS Modeler,” 2016. Accessed: Sep. 19, 2020. [Online]. Available: http://gfnun.unal.edu.co/fileadmin/content/eventos/simposioestadistica/documentos/memorias/Memorias_2016/Comunicaciones/Mineria_de_Datos/Aprendizaje_Arboles_WekaRapidMinerSPSS_Moreno_Salazar_Vicente___Galindo.pdf.; M. G. Jiménez and A. Á. Sierra, “Análisis de Datos en WEKA–Pruebas de Selectividad,” It.Uc3M.Es, pp. 1–9, 2003, Accessed: Sep. 19, 2020. [Online].Available: http://www.it.uc3m.es/jvillena/irc/practicas/06-07/28.pdf; J. L. V. Villardón, “Introduccion Al Analisis De Cluster,” p. 22, 2011, Accessed: Jan. 16, 2021. [Online]. Available: http://benjamindespensa.tripod.com/spss/AC.pdf.[25]K. Azoumana, “Análisis de la deserción estudiantil en la Universidad Simón Bolívar, facultad Ingeniería de Sistemas, con técnicas de minería de datos,” publicaciones.americana.edu.co, vol. 6, pp. 41–51, 2013, Accessed: Sep. 19, 2020. [Online]. Available: http://publicaciones.americana.edu.co/index.php/pensamientoamericano/article/view/133/151.; C. L. Corso, “Aplicación de algoritmos de clasificación supervisada usando Weka,” Univ. Tecnológica Nac. Fac. Reg. Córdoba, p. 11, 2009, Accessed: Sep. 19, 2020. [Online]. Available: http://www.investigacion.frc.utn.edu.ar/labsis/Publicaciones/congresos_labsis/cynthia/CNIT_2009_Aplicacion_Algoritmos_Weka.pdf.; A. Fillbrunn, C. Dietz, J. Pfeuffer, R. Rahn, G. A. Landrum, and M. R. Berthold, “KNIME for reproducible cross-domain analysis of life science data,” Journal of Biotechnology, vol. 261. Elsevier B.V., pp. 149–156, Nov. 10, 2017, doi:10.1016/j.jbiotec.2017.07.028; P. W. Dewanti, I. A. Purnama, Sukirno, and K. Parthasarathy, “Subjective norms and academic dishonesty: A decision tree algorithm analysis,” Int. J. Informatics Vis., vol. 5, no. 1, pp. 46–50, Mar. 2021,doi:10.30630/joiv.5.1.423; M. Deepa and P. Sumitra, “Intrusion detection system using k-means based on cuckoo search optimization,” in IOP Conference Series: Materials Science and Engineering, 2020, vol. 993, no. 1, doi:10.1088/1757-899X/993/1/012049; https://doi.org/10.15649/2346030X.3083; https://hdl.handle.net/20.500.12494/51614