122 research outputs found

    Development of a database and decision support system for performance evaluation of soccer players

    Get PDF
    In this study, we investigate the general parameters to evaluate the performance of soccer players and develop a database for performance evaluation of soccer players and a relevant decision support system (DSS) to help people such as technical director. In the proposed DSS, the data is collected by Data Collectors by using a proposed database. It helps the technical director to realize the performances of soccer players quickly with real-time during games

    Augmented neural networks and problem-structure based heuristics for the bin-packing problem

    Get PDF
    In this paper, we apply the Augmented-neural-networks (AugNN) approach for solving the classical bin-packing problem (BPP). AugNN is a metaheuristic that combines a priority- rule heuristic with the iterative search approach of neural networks to generate good solutions fast. This is the first time this approach has been applied to the BPP. We also propose a decomposition approach for solving harder BPP, in which sub problems are solved using a combination of AugNN approach and heuristics that exploit the problem structure. We discuss the characteristics of problems on which such problem-structure based heuristics could be applied. We empirically show the effectiveness of the AugNN and the decomposition approach on many benchmark problems in the literature. For the 1210 benchmark problems tested, 917 problems were solved to optimality and the average gap between the obtained solution and the upper bound for all the problems was reduced to under 0.66% and computation time averaged below 33 seconds per problem. We also discuss the computational complexity of our approach

    Time and volume based optimal pricing strategies for telecommunication networks

    Get PDF
    In the recent past, there have been several initiatives by major network providers such as Turk Telekom lead the industry towards network capacity distribution in Turkey. In this study, we use a monopoly pricing model to examine the optimal pricing strategies for “pay-per-volume” and “pay-per-time” based leasing of data networks. Traditionally, network capacity distribution includes short/long term bandwidth and/or usage time leasing. Each consumer has a choice to select volume based pricing or connection time based pricing. When customers choose connection time based pricing, their optimal behavior would be utilizing the bandwidth capacity fully therefore it can cause network to burst. Also, offering pay-per-volume scheme to the consumer provides the advantage of leasing the excess capacity for other potential customers for network provider. We examine the following issues in this study: (i) What are the extra benefits to the network provider for providing the volume based pricing scheme? and (ii) Does the amount of demand (number of customers enter the market) change? The contribution of this paper is to show that pay-per-volume is a viable alternative for a large number of customers, and that judicious pricing for pay-per-volume is profitable for the network provider

    A sector analysis for RFID technologies: fundamental and technical analysis for financial decision making problems

    Get PDF
    Automatic identification technologies have been used in a wide range of applications for reducing the amount of time and labor needed to input data and improving data accuracy. As an important automatic identification technology, radio frequency identification (RFID) technologies allow contactless reading and these technologies are particularly successful in manufacturing and other environments where traditional identification technologies such as bar codes can not perform well. By integrating the RFID technology into their business models, companies may save time, lower labor cost, improve products quality and provide better service. RFID is the wireless technology that uses RF communication to identify, track and manage objects and collect and store data. RFID technology enables companies to develop applications that create value by tracking and identifying objects, animals or people. Business applications of RFID technology can be seen in areas such as manufacturing, supply chain management, software integration, security systems, asset tracking and many others. RFID technology was predicted to be one of the “top ten” technologies in 2004 by CNN. Although, the RFID market is less than five years old, it has been applied to many different industries, from retail industry to logistics, or from healthcare to service business industry – and it is still growing. Particularly, RFID has fundamental influences on today's retailing and supply chain management for applications like asset tracking the inventory control and management. RFID technology also finds major application in mobile phones and is widely used in toll collection of highways, for payments in restaurants, vending machines, retail and parking lots. There are a wide range of RFID systems currently being used or being developed. Examples to these systems include but not limited to the following; automatic vehicle and personnel access control for security (Simpson, 2006), airport passenger and baggage tracking (Ferguson, 2006), tracing blood for cutting down errors such as giving patients wrong blood types (Ranger, 2006), payment process systems (Ramachandran, 2006), production control in manufacturing (Liu & Miao, 2006), transfusion medicine (Knels, 2006) real-time inventory control by automated identification of items in warehouses, tracking and management of physical files, tracking of books in the libraries (Shadid, 2005). For some other applications, interested reader is referred to (Finkenzeller, 2003; Smith, 2004). RFID solution providers claim that their technology and solutions bring significant benefits and have valuable advantages in practice. As new RFID solutions being developed and more RFID tags and equipments being used, these solutions will become more cost effective and RFID businesses are expected to grow rapidly. Since RFID is fairly new, it’s difficult to measure resulting sales increases or heightened customer satisfaction quotients. On the other hand, according to IDC estimation (IDC is a subsidiary of International Data Group, a leading technology media, research, and events company and provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets), companies in the retail sector will spend nearly 1.3billiononRFIDintheirsupplychainoperationsin2008,comparedtoabout1.3 billion on RFID in their supply chain operations in 2008, compared to about 91.5 million in 2003 which corresponds to annual growth rate of 70 percent. In a similar look; the Wireless Data Research Group projected that the global market for RFID increased from 1billionin2003to1 billion in 2003 to 3 billion in 2007 (Asif & Mandviwalla, 2005). There are two major drivers of this growth. The first one is the adoption of RFID technology by major retailers and government agencies. The second one is the reduction in the price of RFID tags, readers, and IT systems required to deploy RFID. Given the huge potential of RFID technology, there has been a huge emergence of RFID specialty companies and the development of RFID practices within many market-leading companies. Due to huge emergence, it is desirable to make a sector analysis. In this study, we perform a sector analysis for RFID technologies for researchers and analysts. We investigate public RFID companies traded on the stock exchange markets, summarize their financial performance, describe their RF products, services, and applications, and perform fundamental and technical analysis

    A critical assessment of imbalanced class distribution problem: the case of predicting freshmen student attrition

    Get PDF
    Predicting student attrition is an intriguing yet challenging problem for any academic institution. Class-imbalanced data is a common in the field of student retention, mainly because a lot of students register but fewer students drop out. Classification techniques for imbalanced dataset can yield deceivingly high prediction accuracy where the overall predictive accuracy is usually driven by the majority class at the expense of having very poor performance on the crucial minority class. In this study, we compared different data balancing techniques to improve the predictive accuracy in minority class while maintaining satisfactory overall classification performance. Specifically, we tested three balancing techniques—oversampling, under-sampling and synthetic minority over-sampling (SMOTE)—along with four popular classification methods—logistic regression, decision trees, neuron networks and support vector machines. We used a large and feature rich institutional student data (between the years 2005 and 2011) to assess the efficacy of both balancing techniques as well as prediction methods. The results indicated that the support vector machine combined with SMOTE data-balancing technique achieved the best classification performance with a 90.24% overall accuracy on the 10-fold holdout sample. All three data-balancing techniques improved the prediction accuracy for the minority class. Applying sensitivity analyses on developed models, we also identified the most important variables for accurate prediction of student attrition. Application of these models has the potential to accurately predict at-risk students and help reduce student dropout rates

    Bilişim teknolojilerindeki değişimlerin yönetsel sonuçlarının değerlendirmesi için kavramsal bir model

    Get PDF
    Information Technologies (IT) and business processes should be considered together to get the best results in business life. Therefore their integration and reflections on each other are very important in managing institutional changes due to changes in the IT world. Change is a very sensitive concept that must be managed very carefully. In this article, a framework for managing IT based changes by protecting the business leverage and through all levels of hierarchy in the company is proposed.İş dünyasında en iyi sonuçları elde etmek için bilişim teknolojileri (BT) ve işletme süreçleri birlikte göz önünde bulundurulmalıdır. Dolayısıyla ikisinin entegrasyonu ve birbirleri üzerindeki yansımaları, BT dünyasındaki değişimler sonucu oluşan kurumsal değişimlerin yönetilmesinde çok önemlidir. Değişim, çok iyi şekilde yönetilmesi gereken çok hassas bir kavramdır. Bu makalede, BT tabanlı değişimlerin yönetilmesi için bir şirkette hem işin niteliğini ve gelişimini hem de bütün yönetim kademelerindeki hiyerarşiyi koruyan bir çerçeve önerilmiştir

    A Conceptual Model for Assessing Managerial Implications of Changes in Information Technologies

    Get PDF
    İş dünyasında en iyi sonuçları elde etmek için bilişim teknolojileri (BT) ve işletme süreçleri birlikte göz önünde bulundurulmalıdır. Dolayısıyla ikisinin entegrasyonu ve birbirleri üzerindeki yansımaları, BT dünyasındaki değişimler sonucu oluşan kurumsal değişimlerin yönetilmesinde çok önemlidir. Değişim, çok iyi şekilde yönetilmesi gereken çok hassas bir kavramdır. Bu makalede, BT tabanlı değişimlerin yönetilmesi için bir şirkette hem işin niteliğini ve gelişimini hem de bütün yönetim kademelerindeki hiyerarşiyi koruyan bir çerçeve önerilmiştir.Information Technologies (IT) and business processes should be considered together to get the best results in business life. Therefore their integration and reflections on each other are very important in managing institutional changes due to changes in the IT world. Change is a very sensitive concept that must be managed very carefully. In this article, a framework for managing IT based changes by protecting the business leverage and through all levels of hierarchy in the company is proposed

    A Conceptual Model for Assessing Managerial Implications of Changes in Information Technologies

    Get PDF
    İş dünyasında en iyi sonuçları elde etmek için bilişim teknolojileri (BT) ve işletme süreçleri birlikte göz önünde bulundurulmalıdır. Dolayısıyla ikisinin entegrasyonu ve birbirleri üzerindeki yansımaları, BT dünyasındaki değişimler sonucu oluşan kurumsal değişimlerin yönetilmesinde çok önemlidir. Değişim, çok iyi şekilde yönetilmesi gereken çok hassas bir kavramdır. Bu makalede, BT tabanlı değişimlerin yönetilmesi için bir şirkette hem işin niteliğini ve gelişimini hem de bütün yönetim kademelerindeki hiyerarşiyi koruyan bir çerçeve önerilmiştir.Information Technologies (IT) and business processes should be considered together to get the best results in business life. Therefore their integration and reflections on each other are very important in managing institutional changes due to changes in the IT world. Change is a very sensitive concept that must be managed very carefully. In this article, a framework for managing IT based changes by protecting the business leverage and through all levels of hierarchy in the company is proposed
    corecore