منابع مشابه
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated through the use of different information systems. The results of data mining can be used for getting a better understanding of the underlying educational processes, for generating recommendations and advice to students, for...
متن کاملassessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
Towards Data Quality Assessment in Online Advertising
In online advertising, our aim is to match the advertisers with the most relevant users to optimize the campaign performance. In the pursuit of achieving this goal, multiple data sources provided by the advertisers or third-party data providers are utilized to choose the set of users according to the advertisers’ targeting criteria. In this paper, we present a framework that can be applied to a...
متن کاملAn Assessment of Online Reviews of Hand Surgeons
Background: The purpose of this study is to evaluate the number of reviews and scores for active members of the American Society for Surgery of the Hand (ASSH) in popular physician rating websites (Healthgrades.com and Vitals.com). Methods: A total of 433 ASSH active members were searched in two popular rating websites for a total of 866 web searches. Demographic data, overall and subcategory ...
متن کاملVeracity, Plausibility, and Reputation
The canonical IT security properties are geared towards infrastructure security. The task of an infrastructure security service is completed once data has been delivered to the application. When false data is submitted to the infrastructure, false data will be delivered securely. To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechani...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Decision Support Systems
سال: 2020
ISSN: 0167-9236
DOI: 10.1016/j.dss.2019.113132