Filters








1,180 Hits in 2.9 sec

A Semi-Automatic Framework for Mining ERP Patterns

Jiawei Rong, Dejing Dou, Gwen Frishkoff, Robert Frank, Allen Malony, Don Tucker
2007 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)  
In this paper, we propose a semi-automatic framework for mining ERP data, which includes the following steps: PCA decomposition, extraction of summary metrics, unsupervised learning (clustering) of patterns  ...  Event-related potentials (ERP) are brain electrophysiological patterns created by averaging electroencephalographic (EEG) data, time-locking to events of interest (e.g., stimulus or response onset).  ...  Conclusion In this paper, we have introduced a semi-automatic framework for mining ERP patterns.  ... 
doi:10.1109/ainaw.2007.55 dblp:conf/aina/RongDFFMT07 fatcat:azqomoqo7vbatlwkw43qvnetqa

Development of NeuroElectroMagnetic ontologies(NEMO)

Dejing Dou, Gwen Frishkoff, Jiawei Rong, Robert Frank, Allen Malony, Don Tucker
2007 Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '07  
In this paper, we propose a generic framework for mining and developing domain ontologies and especially its application to ERP data.  ...  OBJECTIVE Event-related potentials (ERP) are brain electrophysiological patterns created by averaging electroencephalographic (EEG) data, timelocking to events of interest.  ...  Figure 3 .Figure 1 . 31 A semi-automatic framework for mining domain ontologies A. 128-channel ERP data showing brain electrical response to word and nonword stimuli. B.  ... 
doi:10.1145/1281192.1281224 dblp:conf/kdd/DouFRFMT07 fatcat:7sve2qpnnrekzmxxd6b234mybm

Enriching Process Models for Business Process Compliance Checking in ERP Environments [chapter]

Martin Schultz
2013 Lecture Notes in Computer Science  
It utilizes two existing artefacts and combines them to provide a comprehensive basis for compliance checking.  ...  To address this gap this paper presents a method to automatically enrich process models with audit relevant information about ACs.  ...  Control Pattern: The control ensures that a check routine is automatically executed in conjunction with a certain process activity.  ... 
doi:10.1007/978-3-642-38827-9_9 fatcat:oe3x2cse2fdn3ezyawak3fhsqe

Enterprise Resource Planning und Transformation von ERP-Systemen: An Approach for Real-Time Control of Enterprise Processes in Manufacturing using a Rule-Based System [chapter]

Manfred Grauer, Sachin Karadgi, Daniel Metz, Walteräfer Sch
2010 Multikonferenz Wirtschaftsinformatik 2010  
Here, an attempt is made to realize the IT-framework for a batch manufacturing enterprise -casting.  ...  Data Mining is a particular process of KDD and is utilized to extract patterns from data, which needs to be further evaluated by domain experts to identify knowledge (e.g., production rules).  ... 
doi:10.17875/gup2010-1403 fatcat:rx7xlxntkzazfp67boeevffdem

Ontology-Based Mining of Brainwaves: A Sequence Similarity Technique for Mapping Alternative Features in Event-Related Potentials (ERP) Data [chapter]

Haishan Liu, Gwen Frishkoff, Robert Frank, Dejing Dou
2010 Lecture Notes in Computer Science  
neural patterns that are linked to concepts in a set of ERP ontologies, called NEMO (Neural ElectroMagnetic Ontologies) [3, 6] .  ...  In this paper, we present a method for identifying correspondences, or mappings, between alternative features of brainwave activity in eventrelated potentials (ERP) data.  ...  To address these challenges, we propose a novel method that explores sequence similarity search techniques and the NEMO ontologies, resulting in a framework for ontology-based mining of ERP data.  ... 
doi:10.1007/978-3-642-13672-6_5 fatcat:3sa35i4omvfsbma6giher6ttrm

Ontology-Based Data Access for Extracting Event Logs from Legacy Data: The onprom Tool and Methodology [chapter]

Diego Calvanese, Tahir Emre Kalayci, Marco Montali, Stefano Tinella
2017 Lecture Notes in Business Information Processing  
In this work, we exploit a framework and associated methodology for the extraction of XES event logs from relational data sources that we have recently introduced.  ...  We also present a set of tools that we have developed and that support the OBDA-based log extraction framework. The tools are integrated as plugins of the ProM process mining suite.  ...  We thank Ario Santoso for the development of the log extraction plug-in of onprom, and Wil van der Aalst for the interesting discussions and insights on the problem of extracting event logs from legacy  ... 
doi:10.1007/978-3-319-59336-4_16 fatcat:tdzof6b6znbv3n2ctmwekmcxba

Augmenting Advanced Analytics into Enterprise Systems: A Focus on Post-Implementation Activities

Ahmed Elragal, Hossam El-Din Hassanien
2019 Systems  
process) problems, find and recommend a solution to them, and confirm the solution.  ...  On the other hand, advanced analytics techniques such as machine learning and data mining have been strongly present in academic as well as industrial arenas through robust classification and prediction  ...  Acknowledgments: The research team would like to acknowledge Rapidminer for providing the necessary Rapidminer educational licenses.  ... 
doi:10.3390/systems7020031 fatcat:mfvgpj2v4bhmdmrigyn6xozifq

BIIIG: Enabling business intelligence with integrated instance graphs

Andre Petermann, Martin Junghanns, Robert Muller, Erhard Rahm
2014 2014 IEEE 30th International Conference on Data Engineering Workshops  
We propose a new graph-based framework for business intelligence called BIIIG supporting the flexible evaluation of relationships between data instances.  ...  We also present initial results from an evaluation with real ERP data.  ...  We are grateful to Web Notes Technologies for providing us with the data for the ERPNext use case.  ... 
doi:10.1109/icdew.2014.6818294 dblp:conf/icde/PetermannJMR14 fatcat:4rry6p6il5bnzbsvaryql3jwla

ESEM19_Supplementary_Materials [article]

Nitish Patkar
2019 Figshare  
Supplementary material published for ESEM19  ...  2014 S61 Towards Collaborative Requirements Engineering Tool for ERP Product Customization T81 AUTOANNOTATOR 2014 S64 From requirements to UML models and back: how automatic processing  ...  T72 UMLet-REUBI 2013 S49 REUBI: A Requirements Engineering method for ubiquitous systems T73 reqT 2013 S4 reqT.org -Towards a Semi-Formal, Open and Scalable Requirements Modeling Tool  ... 
doi:10.6084/m9.figshare.8307089 fatcat:yqiavc3lcjgnrpqiaqvevlirtu

Regulatory supervision with computational audit in international supply chains

Yuxin Wang, Joris Hulstijn, Yao-hua Tan
2018 Proceedings of the 19th Annual International Conference on Digital Government Research Governance in the Data Age - dgo '18  
Compliance monitoring ensures data quality for information exchange and audit purpose.  ...  In order to reduce repetitive and redundant supervisory controls and promote automatic administration procedures, electronic data interchange (EDI) 1 and other forms of information sharing are introduced  ...  These patterns start with a work order and with movement type 261 in ERP (meaning "Goods issue for a work order") followed by parallel movements and loops.  ... 
doi:10.1145/3209281.3209319 dblp:conf/dgo/WangHT18 fatcat:72iyhwuffnajpblxcmtfxdsp7i

Innovative planning synergies between manufacturing processes and microgrids

C. Gamarra, M. Ortega, E. Montero, J.M. Guerrero
2016 The Renewable Energies and Power Quality Journal (RE&PQJ)  
Thus, a suitable approach to MG planning for manufacturing companies from a Knowledge Discovery in Databases (KDD) point of view is described.  ...  But a complete optimization of a manufacturing process requires a holistic approach, and adopting microgrid architectures can actually empower the optimization of a manufacturing process.  ...  A framework for the analysis of process mining algorithms is described in [28] .  ... 
doi:10.24084/repqj14.526 fatcat:kil2atzh4bezfbzgbuc5qvqa7a

Integrated Education Management System via Cloud Computing

Samir Abou El-Seoud, Eslam Ahmed AboGamie, Mostafa Salama
2017 International Journal of Interactive Mobile Technologies  
<p>In this work, we present a framework to integrate the functionalities of the Enterprise Resource Planning (ERP) with the University academic and management functionalities at the British University  ...  With a single system for all your data needs—and a single digital record for each student—any department on campus can find the student information they need.</li><li>Engage faculty.  ...  For the Integrated Education Management system, implementation will be quite complex, each of the University's systems will convert into a module derived from the ERP framework, provided when needed.  ... 
doi:10.3991/ijim.v11i2.6560 fatcat:uohij4p3vrflbgugtnklxz2ggy

Rapid Generation of Emergency Response Plans for Unconventional Emergencies

Weijian Ni, Tong Liu, Siyuan Chen
2020 IEEE Access  
To derive such a semi-structured representation of ERPs, we develop a number of regular expression rules to split a textual ERP into segments according to the discourse patterns.  ...  frameworks for guiding emergency responses.  ... 
doi:10.1109/access.2020.3025224 fatcat:s52uei5l5vh2zj3gjvp22bnzue

Pattern Recognition in Time Series [chapter]

JESSICA LIN, SHERI WILLIAMSON, KIRK BORNE, AND DEBARR
2012 Advances in Machine Learning and Data Mining for Astronomy  
As a result, time series data mining has attracted enormous amount of attention in the past two decades.  ...  Approaches to pattern recognition tasks vary by representation for the input data, similarity/distance measurement function, and pattern recognition technique.  ...  A simple generic framework for time series data mining has thus emerged [Lin07] .  ... 
doi:10.1201/b11822-36 fatcat:yfcgyog5cvg6dcopfv2sq6jsvy

Adaptive identity and access management—contextual data based policies

Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul
2016 EURASIP Journal on Information Security  
This paper closes the existing gap by proposing a dynamic policy management process which structures the activities required for policy management in identity and access management environments.  ...  As a result, policies outdate over time, leading to security vulnerabilities and inefficiencies.  ...  Patterns of normal and outlier behavior are automatically extracted for investigated subjects.  ... 
doi:10.1186/s13635-016-0043-2 fatcat:jfb5vqudwndihgc56wyvhtuvky
« Previous Showing results 1 — 15 out of 1,180 results