{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T13:11:35Z","timestamp":1648818695625},"reference-count":30,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Info. Tech. Dec. Mak."],"published-print":{"date-parts":[[2008,9]]},"abstract":"<jats:p> A quadratic programming model is developed for predicting the credit card holders' behaviors. This quadratic program is solved by a new algorithm. This algorithm optimizes the objective function along certain directions in the null space of the constraint equations. In this work, the results obtained from the model are compared with the results obtained from the other models for credit card holders' behavior problems. Due to solution algorithm and nature of the model the results are efficient and promising. <\/jats:p>","DOI":"10.1142\/s0219622008003083","type":"journal-article","created":{"date-parts":[[2008,9,8]],"date-time":"2008-09-08T05:10:44Z","timestamp":1220850644000},"page":"421-430","source":"Crossref","is-referenced-by-count":13,"title":["AN EFFICIENT ALGORITHM FOR SOLVING A QUADRATIC PROGRAMMING MODEL WITH APPLICATION IN CREDIT CARD HOLDERS' BEHAVIOR"],"prefix":"10.1142","volume":"07","author":[{"given":"K.-J.","family":"TSENG","sequence":"first","affiliation":[{"name":"Department of International Business, Hsuan Chuan University, Hsin Chu, Taiwan"}]},{"given":"Y.-H.","family":"LIU","sequence":"additional","affiliation":[{"name":"Department of International Business, Hsuan Chuan University, Hsin Chu, Taiwan"}]},{"given":"JOW-FEI","family":"HO","sequence":"additional","affiliation":[{"name":"Graduate Institute of Management Science and Decision Making, Tamkang University, Taipei, Taiwan"}]}],"member":"219","published-online":{"date-parts":[[2011,11,20]]},"reference":[{"key":"rf1","doi-asserted-by":"publisher","DOI":"10.1002\/mcda.327"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622005001775"},{"key":"rf4","volume-title":"Methods for Linear and Quadratic Programming","author":"de Panne C. V.","year":"1975"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1016\/0378-4266(78)90012-2"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(81)90048-5"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1986.tb00218.x"},{"key":"rf8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1986.tb00244.x"},{"key":"rf9","volume-title":"Practical Optimization","author":"Gill P. E.","year":"1981"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1990.tb01249.x"},{"key":"rf12","volume-title":"Data Mining: Concepts and Techniques","author":"Han J. W.","year":"2001"},{"key":"rf13","volume-title":"Multivariate Statistical Analysis: A Conceptual Introduction","author":"Kachigan S. K.","year":"1991"},{"key":"rf14","volume-title":"Multivariate Analysis","author":"Kendall M. G.","year":"1966"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.31.2.123"},{"key":"rf16","volume-title":"Linux Based Multiple Linear Programming Classification Program: version 1.0","author":"Kou G.","year":"2002"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1080\/10556780310001600953"},{"key":"rf19","volume-title":"Linear and Nonlinear Programming","author":"Luenberger D. G.","year":"1984"},{"key":"rf20","volume-title":"Multivariate Statistical Methods","author":"Morrison D. F.","year":"1976"},{"key":"rf21","volume-title":"Introduction to Business Data Mining","author":"Olson D.","year":"2007"},{"key":"rf22","first-page":"39","volume":"4","author":"Peng Y.","journal-title":"Advanced Modeling and Optimization"},{"key":"rf23","first-page":"81","volume":"1","author":"Quinlan J.","journal-title":"Machine Learning"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1287\/opre.42.4.589"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1142\/4000"},{"key":"rf26","unstructured":"Y.\u00a0Shi, IEBM Handbook of Information Technology in Business, ed. M.\u00a0Zeleny (International Thomson Publishing, Europe, 2000)\u00a0pp. 490\u2013495."},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1142\/S0219622002000038"},{"key":"rf28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56680-6_39"},{"key":"rf29","unstructured":"Y.\u00a0Shi and P. L.\u00a0Yu, Multiple Criteria Decision Making and Risk Analysis and Applications, eds. B.\u00a0Karpak and S.\u00a0Zionts (Springer-Verlag, Berlin, 1989)\u00a0pp. 165\u2013203."},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.38.7.926"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.19.8.936"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1080\/0020739970280204"},{"key":"rf34","first-page":"563","author":"Liu Y.","journal-title":"Computer and Industrial Engineering"}],"container-title":["International Journal of Information Technology &amp; Decision Making"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219622008003083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T19:02:42Z","timestamp":1565118162000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219622008003083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":30,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2011,11,20]]},"published-print":{"date-parts":[[2008,9]]}},"alternative-id":["10.1142\/S0219622008003083"],"URL":"https:\/\/doi.org\/10.1142\/s0219622008003083","relation":{},"ISSN":["0219-6220","1793-6845"],"issn-type":[{"value":"0219-6220","type":"print"},{"value":"1793-6845","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]}}}