callback( { "result":{ "query":":facetid:toc:\"db/journals/ijdats/ijdats9.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.94" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"21", "@dc":"21", "@oc":"21", "@id":"43443836", "text":":facetid:toc:db/journals/ijdats/ijdats9.bht" } }, "hits":{ "@total":"21", "@computed":"21", "@sent":"21", "@first":"0", "hit":[{ "@score":"1", "@id":"2783964", "info":{"authors":{"author":[{"@pid":"202/4299","text":"Noppamas Akarachantachote"},{"@pid":"202/4232","text":"Seree Chadcham"},{"@pid":"202/4057","text":"Kidakan Saithanu"}]},"title":"Variable importance index based on the partial least squares and boxplot cutoff threshold for variable selection.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"34-45","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/Akarachantachote17","doi":"10.1504/IJDATS.2017.10003995","ee":"https://doi.org/10.1504/IJDATS.2017.10003995","url":"https://dblp.org/rec/journals/ijdats/Akarachantachote17"}, "url":"URL#2783964" }, { "@score":"1", "@id":"2783965", "info":{"authors":{"author":[{"@pid":"74/10027","text":"Mohammed Akour"},{"@pid":"79/2931","text":"Izzat Alsmadi"},{"@pid":"177/3756","text":"Iyad Alazzam"}]},"title":"Software fault proneness prediction: a comparative study between bagging, boosting, and stacking ensemble and base learner methods.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"1-16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/AkourAA17","doi":"10.1504/IJDATS.2017.10003991","ee":"https://doi.org/10.1504/IJDATS.2017.10003991","url":"https://dblp.org/rec/journals/ijdats/AkourAA17"}, "url":"URL#2783965" }, { "@score":"1", "@id":"2783966", "info":{"authors":{"author":[{"@pid":"86/3371","text":"Hansjörg Albrecher"},{"@pid":"222/6975","text":"Daily-Amir Dalit"}]},"title":"On effects of asymmetric information on non-life insurance prices under competition.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"287-299","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/AlbrecherD17","doi":"10.1504/IJDATS.2017.10009425","ee":"https://doi.org/10.1504/IJDATS.2017.10009425","url":"https://dblp.org/rec/journals/ijdats/AlbrecherD17"}, "url":"URL#2783966" }, { "@score":"1", "@id":"2783967", "info":{"authors":{"author":[{"@pid":"169/8731","text":"Mohammed Alweshah"},{"@pid":"177/6856","text":"Hasan Rashaideh"},{"@pid":"151/3779","text":"Abdelaziz I. Hammouri"},{"@pid":"208/9776","text":"Hanadi Tayyeb"},{"@pid":"208/9875","text":"Mohammed Ababneh"}]},"title":"Solving time series classification problems using support vector machine and neural network.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"3","pages":"237-247","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/AlweshahRHTA17","doi":"10.1504/IJDATS.2017.10007636","ee":"https://doi.org/10.1504/IJDATS.2017.10007636","url":"https://dblp.org/rec/journals/ijdats/AlweshahRHTA17"}, "url":"URL#2783967" }, { "@score":"1", "@id":"2783968", "info":{"authors":{"author":[{"@pid":"03/3902","text":"Rajiv Arora"},{"@pid":"27/10490","text":"Payal Pahwa"},{"@pid":"22/406","text":"Daya Gupta"}]},"title":"Data quality improvement in data warehouse: a framework.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"17-33","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/AroraPG17","doi":"10.1504/IJDATS.2017.083062","ee":"https://doi.org/10.1504/IJDATS.2017.083062","url":"https://dblp.org/rec/journals/ijdats/AroraPG17"}, "url":"URL#2783968" }, { "@score":"1", "@id":"2783969", "info":{"authors":{"author":{"@pid":"202/4193","text":"Esin Avci"}},"title":"Bayesian survival analysis: comparison of survival probability of hormone receptor status for breast cancer data.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"63-74","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/Avci17","doi":"10.1504/IJDATS.2017.10003994","ee":"https://doi.org/10.1504/IJDATS.2017.10003994","url":"https://dblp.org/rec/journals/ijdats/Avci17"}, "url":"URL#2783969" }, { "@score":"1", "@id":"2783970", "info":{"authors":{"author":[{"@pid":"22/8427","text":"Joan del Castillo"},{"@pid":"203/7292","text":"Maria Padilla"},{"@pid":"97/5544","text":"Jaume Abella 0001"},{"@pid":"52/1629","text":"Francisco J. Cazorla"}]},"title":"Execution time distributions in embedded safety-critical systems using extreme value theory.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"348-361","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/CastilloPAC17","doi":"10.1504/IJDATS.2017.10009428","ee":"https://doi.org/10.1504/IJDATS.2017.10009428","url":"https://dblp.org/rec/journals/ijdats/CastilloPAC17"}, "url":"URL#2783970" }, { "@score":"1", "@id":"2783971", "info":{"authors":{"author":[{"@pid":"51/11078","text":"Ritu Chauhan"},{"@pid":"31/1842","text":"Harleen Kaur"}]},"title":"A feature-based selection technique for reduction of large scale data.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"3","pages":"207-221","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/ChauhanK17","doi":"10.1504/IJDATS.2017.10007626","ee":"https://doi.org/10.1504/IJDATS.2017.10007626","url":"https://dblp.org/rec/journals/ijdats/ChauhanK17"}, "url":"URL#2783971" }, { "@score":"1", "@id":"2783972", "info":{"authors":{"author":[{"@pid":"208/9742","text":"King Chau Cheung"},{"@pid":"13/3643","text":"Tommy King-Yin Cheung"}]},"title":"Recommendation of hashtags in social Twitter network.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"3","pages":"222-236","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/CheungC17","doi":"10.1504/IJDATS.2017.10007629","ee":"https://doi.org/10.1504/IJDATS.2017.10007629","url":"https://dblp.org/rec/journals/ijdats/CheungC17"}, "url":"URL#2783972" }, { "@score":"1", "@id":"2783973", "info":{"authors":{"author":[{"@pid":"03/1523","text":"Joaquim Gabarró"},{"@pid":"s/MariaJSerna","text":"Maria J. Serna"}]},"title":"Uncertainty in basic short-term macroeconomic models with angel-daemon games.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"314-330","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/GabarroS17","doi":"10.1504/IJDATS.2017.10009422","ee":"https://doi.org/10.1504/IJDATS.2017.10009422","url":"https://dblp.org/rec/journals/ijdats/GabarroS17"}, "url":"URL#2783973" }, { "@score":"1", "@id":"2783974", "info":{"authors":{"author":[{"@pid":"208/9795","text":"Tejaswi S. Kamble"},{"@pid":"209/0005","text":"Dattatraya N. Kashid"}]},"title":"Variable selection in linear regression in the presence of outliers.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"2","pages":"167-188","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/KambleK17","doi":"10.1504/IJDATS.2017.10006961","ee":"https://doi.org/10.1504/IJDATS.2017.10006961","url":"https://dblp.org/rec/journals/ijdats/KambleK17"}, "url":"URL#2783974" }, { "@score":"1", "@id":"2783975", "info":{"authors":{"author":[{"@pid":"209/0052","text":"Geet Lahoti"},{"@pid":"38/2098","text":"Dilip Kumar Pratihar"}]},"title":"Recurrent neural networks to model input-output relationships of metal inert gas (MIG) welding process.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"3","pages":"248-282","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/LahotiP17","doi":"10.1504/IJDATS.2017.10007625","ee":"https://doi.org/10.1504/IJDATS.2017.10007625","url":"https://dblp.org/rec/journals/ijdats/LahotiP17"}, "url":"URL#2783975" }, { "@score":"1", "@id":"2783976", "info":{"authors":{"author":[{"@pid":"175/2740","text":"Vishal Mahajan"},{"@pid":"199/4593","text":"Richa Misra"},{"@pid":"53/2822","text":"Renuka Mahajan"}]},"title":"Review on factors affecting customer churn in telecom sector.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"2","pages":"122-144","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/MahajanMM17","doi":"10.1504/IJDATS.2017.10006960","ee":"https://doi.org/10.1504/IJDATS.2017.10006960","url":"https://dblp.org/rec/journals/ijdats/MahajanMM17"}, "url":"URL#2783976" }, { "@score":"1", "@id":"2783977", "info":{"authors":{"author":{"@pid":"32/5097","text":"Natalia M. Markovich"}},"title":"Clustering and hitting times of threshold exceedances and applications.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"331-347","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/Markovich17","doi":"10.1504/IJDATS.2017.10009424","ee":"https://doi.org/10.1504/IJDATS.2017.10009424","url":"https://dblp.org/rec/journals/ijdats/Markovich17"}, "url":"URL#2783977" }, { "@score":"1", "@id":"2783978", "info":{"authors":{"author":[{"@pid":"208/9739","text":"Courtney McKim"},{"@pid":"208/9908","text":"James A. Bovaird"},{"@pid":"209/0050","text":"Chaorong Wu"}]},"title":"Using graphical techniques from discriminant analysis to understand and interpret cluster solutions.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"3","pages":"189-206","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/McKimBW17","doi":"10.1504/IJDATS.2017.10007634","ee":"https://doi.org/10.1504/IJDATS.2017.10007634","url":"https://dblp.org/rec/journals/ijdats/McKimBW17"}, "url":"URL#2783978" }, { "@score":"1", "@id":"2783979", "info":{"authors":{"author":[{"@pid":"79/11512","text":"Ali Salmasnia"},{"@pid":"208/9922","text":"Mohsen Afsahi"},{"@pid":"66/10136","text":"Ali Ghorbanian"},{"@pid":"01/9718","text":"Hadi Mokhtari"}]},"title":"Solving a multi-objective redundancy allocation problem under opportunistic maintenance strategy.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"2","pages":"145-166","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/SalmasniaAGM17","doi":"10.1504/IJDATS.2017.10006959","ee":"https://doi.org/10.1504/IJDATS.2017.10006959","url":"https://dblp.org/rec/journals/ijdats/SalmasniaAGM17"}, "url":"URL#2783979" }, { "@score":"1", "@id":"2783980", "info":{"authors":{"author":[{"@pid":"181/8721","text":"R. Sarala 0001"},{"@pid":"67/314","text":"G. Zayaraz 0001"},{"@pid":"58/3626-1","text":"V. Vijayalakshmi 0001"}]},"title":"Risk aware intelligent system for insider threat detection.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"362-379","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/SaralaZV17","doi":"10.1504/IJDATS.2017.10009427","ee":"https://doi.org/10.1504/IJDATS.2017.10009427","url":"https://dblp.org/rec/journals/ijdats/SaralaZV17"}, "url":"URL#2783980" }, { "@score":"1", "@id":"2783981", "info":{"authors":{"author":{"@pid":"124/2473","text":"Archana Singh"}},"title":"Effects of customer perception and social interactions on brand equity: automobile sector.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"75-98","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/Singh17","doi":"10.1504/IJDATS.2017.10003992","ee":"https://doi.org/10.1504/IJDATS.2017.10003992","url":"https://dblp.org/rec/journals/ijdats/Singh17"}, "url":"URL#2783981" }, { "@score":"1", "@id":"2783982", "info":{"authors":{"author":[{"@pid":"20/4550","text":"Abderrahmane Sokri"},{"@pid":"34/1617","text":"Ahmed Ghanmi"}]},"title":"Cost risk analysis and learning curve in the military shipbuilding sector.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"4","pages":"300-313","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/SokriG17","doi":"10.1504/IJDATS.2017.10009426","ee":"https://doi.org/10.1504/IJDATS.2017.10009426","url":"https://dblp.org/rec/journals/ijdats/SokriG17"}, "url":"URL#2783982" }, { "@score":"1", "@id":"2783983", "info":{"authors":{"author":[{"@pid":"194/1838","text":"M. Jeya Sutha"},{"@pid":"194/1642","text":"F. Ramesh Dhanaseelan"}]},"title":"Mining frequent, maximal and closed frequent itemsets over data stream - a review.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"1","pages":"46-62","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/SuthaD17","doi":"10.1504/IJDATS.2017.10004000","ee":"https://doi.org/10.1504/IJDATS.2017.10004000","url":"https://dblp.org/rec/journals/ijdats/SuthaD17"}, "url":"URL#2783983" }, { "@score":"1", "@id":"2783984", "info":{"authors":{"author":[{"@pid":"03/6321","text":"Weiwen Yang"},{"@pid":"51/9208","text":"Linchi Kwok"}]},"title":"Improving blog spam filters via machine learning.","venue":"Int. J. Data Anal. Tech. Strateg.","volume":"9","number":"2","pages":"99-121","year":"2017","type":"Journal Articles","access":"closed","key":"journals/ijdats/YangK17","doi":"10.1504/IJDATS.2017.10006962","ee":"https://doi.org/10.1504/IJDATS.2017.10006962","url":"https://dblp.org/rec/journals/ijdats/YangK17"}, "url":"URL#2783984" } ] } } } )