2015
DOI: 10.3233/ifs-141357
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy method for discovering cost-effective actions from data

Abstract: Data mining techniques are often confined to the delivery of frequent patterns and stop short of suggesting how to act on these patterns for business decision-making. They require human experts to post-process the discovered patterns manually. Therefore a significant need exists for techniques and tools with the ability to assist users in analyzing a large number of patterns to find usable knowledge. Action mining is one of these techniques which intelligently and automatically suggests some changes in the sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…The sharp behavior of the methods results in unreal estimation about the profit of actions. In [14], [15] Kalanat et al utilized Fuzzy Decision Tree (FDT) to overcome this problem.…”
Section: Related Workmentioning
confidence: 99%
“…The sharp behavior of the methods results in unreal estimation about the profit of actions. In [14], [15] Kalanat et al utilized Fuzzy Decision Tree (FDT) to overcome this problem.…”
Section: Related Workmentioning
confidence: 99%
“…Instead of class probabilities, Nasrin Kalanat et al introduced [10,11] fuzzy based methods which makes use of fuzzy membership to mine the profitable actions from the data. Their methods build the fuzzy decision tree and postprocess the tree to mine the actions to improvise the fuzzy profit by taking fuzzy costs into account.…”
Section: Literature Survey and Related Workmentioning
confidence: 99%
“…Fixed size bit patterns vector for the path from the root to leaf L3 is formed as: Attribute values to reach L3 shall be Gender=NULL, Service Level=medium, Call Charges=low. Thus, bit patterns vector of the path of L3 is (11,010,10). Similarly, bit pattern vectors of the other potential Candidates L3 and L5 are also formed.…”
Section: Bit Patterns Matrix Representation Of the Petmentioning
confidence: 99%
See 1 more Smart Citation
“…Generality is referred to as on how many objects an action can be applied, based on this definition there are two categories of action mining methods. The first category covers those actions which can be applied on multiple groups of objects called action rules [9]- [11] and the second category finds separate action for each object [12]- [14]. Among these, the second category discovers the best actions.…”
Section: ) Actionable Rulesmentioning
confidence: 99%