Your search for 52434 returns 3616 document(s) |
Data mining for business intelligence: concepts, techniques, and applications in microsoft office excel with XLMiner |
Author: Shmueli, Galit; | Call Number: 005.54 Shm d | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining techniques for processing artificial neural network based systems, HAL. 8 - 22 |
Author: K.S. Madhavan; T.S.R. Murthy; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of data mining techniques in financial sector fo profitable Customer Relationship Management, HAL. 368-379 |
Author: Jayanthi Ranjan; Vishal Bhatnagar; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Data mining as driven by knowledge management in higher education-persistence clustering and predictionm, HAL. 57-64 |
Author: Senkamalavalli; R; Avinash J.; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Penerapan data mining untuk menggali tingkat resiko calon pemegang polis: studi kasus pada PT. Car, Hal. 536- 561 |
Author: Henry Wijaya Purwa Tanuwijaya; Yudho Giri Sucahyo; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pemodelan data webhouse sebagai tahap preprocessing web usage mining untuk business inteligene, Hal. 211-214 |
Author: Abdurrahman, Bambang Riyanto T; Rila Mandala; | Call Number: SEM-268 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Studi banding kinerja aplikasi data mining untuk pendektsian intrusi dengan metode induksi aturan menggunakan ripper dan C4-5, Hal. 170-175 |
Author: Iwan Syarif; Arif Junaedy; Febriliyan Samopa; | Call Number: SEM-277 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perangkat lunak data mining pengektraksi kaidah asosiasi menggunakan dekomposisi lattice dan metode pencarian bottom-up |
Author: Arif Djunaidy; Rully Soelaiman, Hera H. Evianti; | Call Number: SEM-273 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618 |
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ImplementasI Algoritma-Algoritma Association Rules Sebagai Bagian Dari Pengembangan Data Mining Algorithms Collection (hal 244-248) |
Author: Yova Ruldeviyani, Muhammad Fahrian; | Call Number: SEM-370 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|