40,375 Hits in 4.6 sec

Opinion analysis for business intelligence applications

Adam Funk, Yaoyong Li, Horacio Saggion, Kalina Bontcheva, Christian Leibold
2008 Proceedings of the first international workshop on Ontology-supported business intelligence - OBI '08  
More than ever before, business analysts have access to public forums in which opinions and sentiments about companies, products, and policies are expressed in unstructured form.  ...  This work will allow us to generate RDF statements to populate a knowledge base for BI.  ...  Table 1 : 1 Overall evaluation of thumbs-up/down classification n Token features used F1 % thumbs-down thumbs-up overall 1 string 85.0 51.7 78.9 1 root 85.1 50.0 78.9 1 string, category  ... 
doi:10.1145/1452567.1452570 dblp:conf/semweb/FunkLSBL08 fatcat:gluzrdihcrhxfghblyrwsdmhzm

Suggested Changes in Census Classifications of Retail Trade

Robert D. Entenberg
1960 Journal of Marketing  
the present retail- trade classifications, and to suggest changes that would improve the usefulness of the data.  ...  In effect, these data form the basic marketing tools used in de- termining the relative efficiency, produc- tivity, and sales trends of the many di- verse forms of enterprise making up the retail structure  ... 
doi:10.2307/1248705 fatcat:mcqk2ukqsnf7npnqg5ytpcwggq


Lai Lai Yee
2019 Zenodo  
Final step is C4.5 Algorithm Process, the training data is used to derive C4.5 algorithm. Classification Process, test data are used to estimate the accuracy of the classification rules.  ...  This paper is data mining system for classification system for University students' grade using C4.5.  ...  The higher managements can use such as classification model to improve students' performance according to the extracted knowledge.  ... 
doi:10.5281/zenodo.3377582 fatcat:svbtltxarrdiziz6wwm7in4xlm

String analysis technique for shopping path in a supermarket

Katsutoshi Yada
2009 Journal of Intelligent Information Systems  
In this paper, we were able to discover useful information by using the character string analysis technique EBONSAI, thereby illustrating the usability and usefulness of character string analysis techniques  ...  The information on the in-store behavior of customers obtained by using this technology, namely information on their shopping path, provides us with useful information concerning the customer's purchasing  ...  Universities": Matching Fund Subsidy from MEXT, 2009MEXT, -2013 Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use  ... 
doi:10.1007/s10844-009-0113-8 fatcat:yhmsy7oxvrarxkxaos4ogyofom

Page 39 of Journal of Marketing Vol. 24, Issue 3 [page]

1960 Journal of Marketing  
the present retail- trade classifications, and to suggest changes that would improve the usefulness of the data.  ...  In effect, these data form the basic marketing tools used in de- termining the relative efficiency, produc- tivity, and sales trends of the many di- verse forms of enterprise making up the retail structure  ... 

Empirical Investigation of Finding Person in Social network using Clustering

Trupti S. Indi, Raj B. Kulkarni, S.K. Dixit
2011 International Journal of Computer Applications  
We are trying to make use of clustering algorithms to uniquely identify people/person on social networks. An empirical analysis of the same is presented here.  ...  These networks can be formed by the people from same business community.  ...  Figure3: Business Network related features forming business profile CLUSTERING Clustering has been used in many application domains, including biology, medicine, anthropology, marketing, and economics  ... 
doi:10.5120/2356-3082 fatcat:e3mitfku7fbthpzfjih7pzy6ja

A Novel Secure Cloud SAAS Integration for User Authenticated Information

C. V. Satyanarayana, Dr. P. Suryanarayana Babu
2017 International Journal of Trend in Scientific Research and Development  
We performed real-time integration from SFDC to box with a business use case, we did bi-directional data synchronization between SFDC to box and vice versa. I.  ...  Organizations are spending a lot of money to maintain their business data using legacy Enterprise content management systems [1], tools, hardware support and maintenance, which are not satisfying the consumers  ...  ECM is useful for big enterprises (US Army have 1,500,000 user's data with around 100,000 forms) to return good ROI by optimizing/automate the legacy process illustrated in the fig.1 .  ... 
doi:10.31142/ijtsrd2227 fatcat:mshmr4ihczcihizhyxl4diccny

CRISMA Core Control and Communication Information Model Specification

Pascal Dihé
2014 Zenodo  
Thus, it leverages the development of generic Building Blocks that can be used in any CRISMA Federation with minimal or no configuration and development effort.  ...  The Core CCIM defines the information classes of the Conceptual Business Logic of CRISMA on an abstract and generic level.  ...  False GUID: {C648B407-A3D5-4131-AE4F-21A3B2DA3924} cd Categories Categories -key: String -classification: Classifications Classifications -key: String +id 1..* +classification 1 Complete  ... 
doi:10.5281/zenodo.1546795 fatcat:6tdrbtl7qvdvjltwdfbayu6koe

An Implicit Emotion Mining Method of User Consultants-oriented

Yan-ping ZHAO, Fang WANG, Wen-xing FAN
2020 DEStech Transactions on Social Science Education and Human Science  
Aiming at the characteristics of short texts which are sparse, nonstandard and ambiguous in subject, we present an effective classification method.  ...  This paper analyzes this kind of data, and utilize semi-supervised to select significant syntactic features (substring/subsequence), and then uses SVM for text categorization.  ...  strings of words that are formed by dividing statements into words.  ... 
doi:10.12783/dtssehs/ecemi2020/34672 fatcat:lw2yhz7mdnapxmergmvqsdhbgu

String Kernels for Polarity Classification: A Study Across Different Languages [chapter]

Rosa M. Giménez-Pérez, Marc Franco-Salvador, Paolo Rosso
2018 Lecture Notes in Computer Science  
Using a cross-domain setting implies the use of different domains for the training and testing.  ...  Recently, string kernels, a method which does not employ domain adaptation techniques has been proposed.  ...  We used for the first time the CLS dataset in mono-lingual polarity classification tasks.  ... 
doi:10.1007/978-3-319-91947-8_50 fatcat:yf4iinsysfbdneq2gzlpyyb7dm

Text Mining of Supreme Administrative Court Jurisdictions [chapter]

Ingo Feinerer, Kurt Hornik
2008 Studies in Classification, Data Analysis, and Knowledge Organization  
We analyze the law corpora using R with the new text mining package tm.  ...  ., extracting sensitive information from text corpora, has become a major factor in business intelligence.  ...  Acknowledgments We would like to thank Herbert Nagel for providing us with information and giving us feedback.  ... 
doi:10.1007/978-3-540-78246-9_67 fatcat:bllpmo3ibnaz5brf5ugbimlfji

Online Similarity Learning with Feedback for Invoice Line Item Matching [article]

Chandresh Kumar Maurya, Neelamadhav Gantayat, Sampath Dechu, Tomas Horvath
2020 arXiv   pre-print
If the agent's feedback is absolute such as match or no-match, we use classification similarity algorithm.  ...  If the agent's feedback is in the form of a relative ranking between descriptions, we use similarity ranking algorithm.  ...  If the agent labels pair (s, si) as dissimilar and the pair (s, sj) as similar, we form data for binary classification.  ... 
arXiv:2001.00288v2 fatcat:cbhjjk2sevbtraxbyeuo4jl6tu

Page 77 of Chautauquan Vol. 7, Issue 2 [page]

1886 Chautauquan  
An old envel- ope box will also be useful. Tie one end of the string to the back of a chair, and a book or other heavy weight to the other end.  ...  To-day we see the carpen- ter’s chalk line and the brick-layer’s string used in precisely the same way to make their work straight, or on a right line.  ... 

Numerical Evaluation of Algorithmic Complexity for Short Strings: A Glance into the Innermost Structure of Randomness [article]

Jean-Paul Delahaye, Hector Zenil
2011 arXiv   pre-print
describe an alternative method (to compression) that combines several theoretical and experimental results to numerically approximate the algorithmic (Kolmogorov-Chaitin) complexity of all ∑_n=1^82^n bit strings  ...  This is done by an exhaustive execution of all deterministic 2-symbol Turing machines with up to 4 states for which the halting times are known thanks to the Busy Beaver problem, that is 11019960576 machines  ...  −10 probability, i.e. an even smaller probability than for the Busy Beavers, and therefore the most random in the classification.• (4, 2) produces all strings up to length 8, then the number of strings  ... 
arXiv:1101.4795v5 fatcat:gkrlmym5gnayzc6g3h72omidyq

Using Web Meta-data to Discover Patterns of User Behaviour

Weiam S. Elsaghair
2019 Figshare  
So, using web data to discover user patterns by analyzing user behaviour is not only useful to infer and interpret the expected information about predictive patterns.  ...  Also, web metadata will describe the data which is used in pattern discovery.  ...  When Business analytics functions work effectively and efficiently will become a core competency for the organization in the form of valuable business intelligence that will support the strategic actions  ... 
doi:10.6084/m9.figshare.7565891.v1 fatcat:6li2o6lpcfa7vilxbnejjs3fju
« Previous Showing results 1 — 15 out of 40,375 results