Search results

1 – 10 of over 17000
Article
Publication date: 1 October 1995

Susan Coles and Jennifer Rowley

Explores, using appropriate examples, the ways in which decisiontrees can be used by the manager to assist in the longitudinaldecision‐making process. Since the mathematical…

3780

Abstract

Explores, using appropriate examples, the ways in which decision trees can be used by the manager to assist in the longitudinal decision‐making process. Since the mathematical concepts associated with decision trees are complex, managers can be reluctant to attempt to use decision tree models. A recognition that such models can be simply developed in a spreadsheet environment, and can then be used for sensitivity analysis using different decision criteria, demonstrates that decision trees can offer valuable insights into the structure of a strategic decision problem.

Details

Management Decision, vol. 33 no. 8
Type: Research Article
ISSN: 0025-1747

Keywords

Book part
Publication date: 15 March 2021

Jochen Hartmann

Across disciplines, researchers and practitioners employ decision tree ensembles such as random forests and XGBoost with great success. What explains their popularity? This…

Abstract

Across disciplines, researchers and practitioners employ decision tree ensembles such as random forests and XGBoost with great success. What explains their popularity? This chapter showcases how marketing scholars and decision-makers can harness the power of decision tree ensembles for academic and practical applications. The author discusses the origin of decision tree ensembles, explains their theoretical underpinnings, and illustrates them empirically using a real-world telemarketing case, with the objective of predicting customer conversions. Readers unfamiliar with decision tree ensembles will learn to appreciate them for their versatility, competitive accuracy, ease of application, and computational efficiency and will gain a comprehensive understanding why decision tree ensembles contribute to every data scientist's methodological toolbox.

Details

The Machine Age of Customer Insight
Type: Book
ISBN: 978-1-83909-697-6

Keywords

Book part
Publication date: 31 January 2015

Davy Janssens and Geert Wets

Several activity-based transportation models are now becoming operational and are entering the stage of application for the modelling of travel demand. In our application, we will…

Abstract

Several activity-based transportation models are now becoming operational and are entering the stage of application for the modelling of travel demand. In our application, we will use decision rules to support the decision-making of the model instead of principles of utility maximization, which means our work can be interpreted as an application of the concept of bounded rationality in the transportation domain. In this chapter we explored a novel idea of combining decision trees and Bayesian networks to improve decision-making in order to maintain the potential advantages of both techniques. The results of this study suggest that integrated Bayesian networks and decision trees can be used for modelling the different choice facets of a travel demand model with better predictive power than CHAID decision trees. Another conclusion is that there are initial indications that the new way of integrating decision trees and Bayesian networks has produced a decision tree that is structurally more stable.

Details

Bounded Rational Choice Behaviour: Applications in Transport
Type: Book
ISBN: 978-1-78441-071-1

Keywords

Abstract

Details

Machine Learning and Artificial Intelligence in Marketing and Sales
Type: Book
ISBN: 978-1-80043-881-1

Article
Publication date: 30 October 2018

Shrawan Kumar Trivedi and Prabin Kumar Panigrahi

Email spam classification is now becoming a challenging area in the domain of text classification. Precise and robust classifiers are not only judged by classification accuracy…

Abstract

Purpose

Email spam classification is now becoming a challenging area in the domain of text classification. Precise and robust classifiers are not only judged by classification accuracy but also by sensitivity (correctly classified legitimate emails) and specificity (correctly classified unsolicited emails) towards the accurate classification, captured by both false positive and false negative rates. This paper aims to present a comparative study between various decision tree classifiers (such as AD tree, decision stump and REP tree) with/without different boosting algorithms (bagging, boosting with re-sample and AdaBoost).

Design/methodology/approach

Artificial intelligence and text mining approaches have been incorporated in this study. Each decision tree classifier in this study is tested on informative words/features selected from the two publically available data sets (SpamAssassin and LingSpam) using a greedy step-wise feature search method.

Findings

Outcomes of this study show that without boosting, the REP tree provides high performance accuracy with the AD tree ranking as the second-best performer. Decision stump is found to be the under-performing classifier of this study. However, with boosting, the combination of REP tree and AdaBoost compares favourably with other classification models. If the metrics false positive rate and performance accuracy are taken together, AD tree and REP tree with AdaBoost were both found to carry out an effective classification task. Greedy stepwise has proven its worth in this study by selecting a subset of valuable features to identify the correct class of emails.

Research limitations/implications

This research is focussed on the classification of those email spams that are written in the English language only. The proposed models work with content (words/features) of email data that is mostly found in the body of the mail. Image spam has not been included in this study. Other messages such as short message service or multi-media messaging service were not included in this study.

Practical implications

In this research, a boosted decision tree approach has been proposed and used to classify email spam and ham files; this is found to be a highly effective approach in comparison with other state-of-the-art modes used in other studies. This classifier may be tested for different applications and may provide new insights for developers and researchers.

Originality/value

A comparison of decision tree classifiers with/without ensemble has been presented for spam classification.

Details

Journal of Systems and Information Technology, vol. 20 no. 3
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 31 July 2019

Zhe Zhang and Yue Dai

For classification problems of customer relationship management (CRM), the purpose of this paper is to propose a method with interpretability of the classification results that…

Abstract

Purpose

For classification problems of customer relationship management (CRM), the purpose of this paper is to propose a method with interpretability of the classification results that combines multiple decision trees based on a genetic algorithm.

Design/methodology/approach

In the proposed method, multiple decision trees are combined in parallel. Subsequently, a genetic algorithm is used to optimize the weight matrix in the combination algorithm.

Findings

The method is applied to customer credit rating assessment and customer response behavior pattern recognition. The results demonstrate that compared to a single decision tree, the proposed combination method improves the predictive accuracy and optimizes the classification rules, while maintaining interpretability of the classification results.

Originality/value

The findings of this study contribute to research methodologies in CRM. It specifically focuses on a new method with interpretability by combining multiple decision trees based on genetic algorithms for customer classification.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 32 no. 5
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 20 March 2007

Jun‐Geol Baek

Condition‐based maintenance (CBM) has increasingly drawn attention in industry because of its many benefits. The CBM problem is a kind of state‐dependent scheduling problem, and…

1656

Abstract

Purpose

Condition‐based maintenance (CBM) has increasingly drawn attention in industry because of its many benefits. The CBM problem is a kind of state‐dependent scheduling problem, and is very hard to solve within the conventional Markov decision process framework. The purpose of this paper is to present an intelligent CBM scheduling model for which incremental decision tree learning as an evolutionary system identification model and dynamic programming as a control model are developed.

Design/methodology/approach

To fully exploit the merits of CBM, this paper models CBM scheduling as a state‐dependent, sequential decision‐making problem. The objective function is formulated as the minimization of the total maintenance cost. Instead of interpreting the problem within the widely used Markovian framework, this paper proposes an intelligent maintenance scheduling approach that integrates an incremental decision tree learning method and deterministic dynamic programming techniques.

Findings

Although the intelligent maintenance scheduling approach proposed in this paper does not guarantee an optimal scheduling policy from a mathematical viewpoint, it is verified through a simulation‐based experiment that the intelligent maintenance scheduler is capable of providing a good scheduling policy that can be used in practice.

Originality/value

This paper presents an intelligent maintenance scheduler. As a system identification model, we devise a new incremental decision tree learning method by which interaction patterns among attributes and machine condition are disclosed in an evolutionary manner. A deterministic dynamic programming technique is then applied to select the best safe state in terms of the total maintenance cost.

Details

International Journal of Quality & Reliability Management, vol. 24 no. 3
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 1 October 2006

Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield and James B. Michael

This paper aims to assist investigators and attorneys addressing the legal aspects of cyber incidents, and allow them to determine the legality of a response to cyber attacks by…

1276

Abstract

Purpose

This paper aims to assist investigators and attorneys addressing the legal aspects of cyber incidents, and allow them to determine the legality of a response to cyber attacks by using the Worldwide web securely.

Design/methodology/approach

Develop a decision support legal whiteboard that graphically constructs legal arguments as a decision tree. The tree is constructed using a tree of questions and appending legal documents to substantiate the answers that are known to hold in anticipated legal challenges.

Findings

The tool allows participating group of attorneys to meet in cyberspace in real time and construct a legal argument graphically by using a decision tree. They can construct sub‐parts of the tree from their own legal domains. Because diverse legal domains use different nomenclatures, this tool provides the user the capability to index and search legal documents using a complex international legal ontology that goes beyond the traditional LexisNexis‐like legal databases. This ontology itself can be created using the tool from distributed locations.

Originality/value

This tool has been fine‐tuned through numerous interviews with attorneys teaching and practicing in the area of cyber crime, cyber espionage, and military operations in cyberspace. It can be used to guide forensic experts and law enforcement personnel during their active responses and off‐line examinations.

Details

Internet Research, vol. 16 no. 5
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 21 December 2023

Majid Rahi, Ali Ebrahimnejad and Homayun Motameni

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is…

Abstract

Purpose

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is important. Unfortunately, the traditional use of water by humans for agricultural purposes contradicts the concept of optimal consumption. Therefore, designing and implementing a mechanized irrigation system is of the highest importance. This system includes hardware equipment such as liquid altimeter sensors, valves and pumps which have a failure phenomenon as an integral part, causing faults in the system. Naturally, these faults occur at probable time intervals, and the probability function with exponential distribution is used to simulate this interval. Thus, before the implementation of such high-cost systems, its evaluation is essential during the design phase.

Design/methodology/approach

The proposed approach included two main steps: offline and online. The offline phase included the simulation of the studied system (i.e. the irrigation system of paddy fields) and the acquisition of a data set for training machine learning algorithms such as decision trees to detect, locate (classification) and evaluate faults. In the online phase, C5.0 decision trees trained in the offline phase were used on a stream of data generated by the system.

Findings

The proposed approach is a comprehensive online component-oriented method, which is a combination of supervised machine learning methods to investigate system faults. Each of these methods is considered a component determined by the dimensions and complexity of the case study (to discover, classify and evaluate fault tolerance). These components are placed together in the form of a process framework so that the appropriate method for each component is obtained based on comparison with other machine learning methods. As a result, depending on the conditions under study, the most efficient method is selected in the components. Before the system implementation phase, its reliability is checked by evaluating the predicted faults (in the system design phase). Therefore, this approach avoids the construction of a high-risk system. Compared to existing methods, the proposed approach is more comprehensive and has greater flexibility.

Research limitations/implications

By expanding the dimensions of the problem, the model verification space grows exponentially using automata.

Originality/value

Unlike the existing methods that only examine one or two aspects of fault analysis such as fault detection, classification and fault-tolerance evaluation, this paper proposes a comprehensive process-oriented approach that investigates all three aspects of fault analysis concurrently.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 26 July 2011

Erick T. Byrd and Larry Gustke

The purpose of this paper is to investigate the use of decision tree analysis in the identification of stakeholders based on their participation in tourism and political…

2217

Abstract

Purpose

The purpose of this paper is to investigate the use of decision tree analysis in the identification of stakeholders based on their participation in tourism and political activities in a community.

Design/methodology/approach

A survey was sent to tourism stakeholders in two rural counties. Responses were collected and analyzed using the exhaustive chi‐square automatic interaction detection decision tree analysis.

Findings

Based on the results of the decision tree analysis four tourism stakeholder groups were identified based on their participation in tourism and political activities in a community: high participants, high‐moderate participants, low‐moderate participants, and low participants.

Research limitations/implications

Owing to a low response rate, an issue of non‐response bias could exist, but the information from the respondents can give insight on stakeholders in these communities. Also, the specific results of this study can only be applied to eastern North Carolina and are not generalizable to other areas.

Practical implications

Results from this study demonstrate the use of decision tree analysis in identifying community stakeholders. Using decision tree analysis tourism planners can identify stakeholder groups that will participate in tourism and political activities. With this knowledge, tourism planners can identify which stakeholder groups will be the most influential and vocal in a community with regard to tourism development.

Originality/value

Decision tree analysis is a tool for partitioning a data set based on the relationships between a set of independent variables and a dependent variable. The research reported here tests the application of decision tree analysis, an analytical technique that is not traditionally used to segment stakeholders in tourism.

Details

Journal of Place Management and Development, vol. 4 no. 2
Type: Research Article
ISSN: 1753-8335

Keywords

1 – 10 of over 17000