IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Particle Swarm Optimization Algorithm as a Tool for Profiling from Predictive Data Mining Models

Particle Swarm Optimization Algorithm as a Tool for Profiling from Predictive Data Mining Models
View Sample PDF
Author(s): Goran Klepac (Raiffeisenbank Austria Zagreb, Croatia)
Copyright: 2015
Pages: 29
Source title: Handbook of Research on Swarm Intelligence in Engineering
Source Author(s)/Editor(s): Siddhartha Bhattacharyya (RCC Institute of Information Technology, India) and Paramartha Dutta (Visva-Bharati University, India)
DOI: 10.4018/978-1-4666-8291-7.ch013

Purchase

View Particle Swarm Optimization Algorithm as a Tool for Profiling from Predictive Data Mining Models on the publisher's website for pricing and purchasing information.

Abstract

This chapter introduces the methodology of particle swarm optimization algorithm usage as a tool for finding customer profiles based on a previously developed predictive model that predicts events like selection of some products or services with some probabilities. Particle swarm optimization algorithm is used as a tool that finds optimal values of input variables within developed predictive models as referent values for maximization value of probability that customers select/buy a product or service. Recognized results are used as a base for finding similar profiles between customers. The presented methodology has practical value for decision support in business, where information about customer profiles are valuable information for campaign planning and customer portfolio management.

Related Content

Review on Intelligent Algorithms for Cyber Security
P. Subashini, M. Krishnaveni, T. T. Dhivyaprabha, R. Shanmugavalli. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms
Thiyagarajan P.. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Review on Machine and Deep Learning Applications for Cyber Security
Thangavel M., Abiramie Shree T. G. R., Priyadharshini P., Saranya T.. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security Domain
Sailesh Suryanarayan Iyer, Sridaran Rajagopal. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security
Charu Virmani, Tanu Choudhary, Anuradha Pillai, Manisha Rani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods
Valliammal Narayan, Barani Shaju. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Threats Detection and Mitigation Using Machine Learning
Vaishnavi Ambalavanan, Shanthi Bala P.. © 2020. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom