A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Predictive Analysis for Risk Reduction in Data Mining
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
so they can better understand the customer behavior or patterns and provide insights for business leaders to make the right decisions in the market place to keep them competitive and efficient by reducing ...
In this age of artificial Intelligence and machine learning, Business Intelligence is also gaining more significance as the organizations worldwide want to build intelligence into their business processes ...
Data Mining (DM) is a process supported by
algorithms to investigate and extract useful
information and automatically discovers hidden
sequential patterns and relationships from
information (data ...
doi:10.32628/cseit195417
fatcat:qxn2m32x6jd35dkumiwcaodyxa
Behavior Informatics and Analytics: Let Behavior Talk
2008
2008 IEEE International Conference on Data Mining Workshops
BIA can greatly complement the existing means for combined, more informative and social patterns and solutions for critical problem-solving in areas such as dealing with customer-officer interaction, counterterrorism ...
of Behavior Informatics and Analytics (BIA), to support explicit behavior involvement through a conversion from transactional data to behavioral data, and further genuine analysis of native behavior patterns ...
[15] , fraud detection [9] , event analysis [17] , outlier detection [11] , and group decisionmaking. ...
doi:10.1109/icdmw.2008.95
dblp:conf/icdm/Cao08a
fatcat:g35m7nuv5jgldab624nal3c7lu
Eye Tracking Data Acquisition and Preprocessing for Modeling of Manager Knowledge in Financial Report Analysis
2017
Communiation Papers of the 2017 Federated Conference on Computer Science and Information Systems
Research results will help design a mechanism for intelligent interpretation of economic information in Business Intelligence systems. ...
The article presents process of data acquisition and detection of pattern in the way of perceiving economic data. ...
The author would also like thank to Jaroslaw Jankowski for loaning eye tracker and for the support in experiment. ...
doi:10.15439/2017f440
dblp:conf/fedcsis/Kazmierczak17
fatcat:ywaskydqbjdchbvtq5nuccdkvm
An Architecture for Collaboration Patterns in Agile Event-Driven Environments
2009
2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
We also propose an event-driven architecture for modeling, recommending and enacting such Collaboration Patterns. ...
In this paper, we introduce Collaboration Patterns as a mechanism to facilitate knowledgebased collaborations. ...
Simple events arrive at the CEP, which maintains (partially detected) complex events in its pattern base. ...
doi:10.1109/wetice.2009.12
dblp:conf/wetice/VerginadisAPM09
fatcat:zp32zdww2bb65jbjrwzexnbtwq
A development of Business Intelligence Systems
2018
European Journal of Service Management
The first part of the article contains an overview of the definitions related to Business Intelligence components such as: BI objectives, development and innovation of IT concepts for BI software, maturity ...
In the end, the article presents analytics and business intelligence trends for next years, that firms should be aware of to build their competitive advantage. #0# ...
Table 1 . 1 Main techniques in business intelligenceTemporal and sequential patterns analysis Trend and deviation, sequential patterns, periodicity OLAP (OnLine Analytical Processing) OLAP tools enable ...
doi:10.18276/ejsm.2018.28/1-38
fatcat:koklqsrduvat7cctippb7ej45m
Opportunities and Benefits Implementation Business Intelligence Application on Health Center
2015
ComTech
Kata kunci: business intelligence, pusat kesehatan, decision support system ...
Unfortunately, health centers in Indonesia have not yet implemented business intelligence application. There are many public and private health centers do not apply automated operational system. ...
In this technique, the group wants to find a pattern of sequential events with another group of sequential events that are almost similar. For example, search for a product price movement of goods. ...
doi:10.21512/comtech.v6i1.2278
fatcat:a5aynv3vhngefebxriz47bhcme
AI in Finance: Challenges, Techniques and Opportunities
[article]
2021
arXiv
pre-print
AI in finance broadly refers to the applications of AI techniques in financial businesses. ...
The comparison, criticism and discussion of classic vs. modern AI techniques for finance are followed. ...
Typical methods include discovering frequent patterns, sequential patterns, graph patterns, network patterns, tree patterns, knot patterns, interactive patterns, combined patterns, and abnormal trading ...
arXiv:2107.09051v1
fatcat:g62cz4dqt5dcrbckn4lbveat3u
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
2017
IEEE Transactions on Emerging Topics in Computing
Moreover, we showed existence of distinctive frequent patterns within different ransomware families which can be used for identification of a ransomware sample family for building intelligence about threat ...
We utilize Sequential Pattern Mining to find Maximal Frequent Patterns (MFP) of activities within different ransomware families as candidate features for classification using J48, Random Forest, Bagging ...
As we will be using a sequential pattern mining technique (MG-FSM) to detect candidate features for classification task, we should convert our data into a sequential dataset which is a collection of sequences ...
doi:10.1109/tetc.2017.2756908
fatcat:4psba4vx4ndr7hecl6vznpp6mi
Ontology-Based Business Process Customization for Composite Web Services
2011
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Furthermore, we report a framework, built on OWL-BPC, for customizing service-based business processes, which supports customization detection and enactment. ...
Customization detection is enabled by a business-goal analysis, and customization enactment is enabled via event-condition-action rule inference. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their accurate and constructive comments, which have helped to improve this paper greatly. ...
doi:10.1109/tsmca.2011.2132710
fatcat:va4fn5euavbbfngsbe7w7t6tay
SWOT of Bigdata Security Using Machine Learning Techniques
2016
Zenodo
It also contains the what is importance of BigData security. The paper mostly covers all the main point that affect Big Data and Machine Learning. ...
This paper gives complete guidelines on BigData, Different Views of BigData, etc.How the BigData is useful to us and what are the factors affecting BigData all the things are covered under this paper. ...
Let's look at critical capabilities of effective security intelligence solutions. ...
doi:10.5281/zenodo.3637761
fatcat:hn7gckzzqjefnaypt5acqrj3om
SWOT of Bigdata Security Using Machine Learning Techniques
2016
International Journal of Information Sciences and Techniques
It also contains the what is importance of BigData security. The paper mostly covers all the main point that affect Big Data and Machine Learning. ...
This paper gives complete guidelines on BigData, Different Views of BigData, etc.How the BigData is useful to us and what are the factors affecting BigData all the things are covered under this paper. ...
Let's look at critical capabilities of effective security intelligence solutions. ...
doi:10.5121/ijist.2016.6213
fatcat:o3nvwgd3prh23lswl3bhuvybb4
Reviewing Data Mining as an enabling technology for BI
2020
Zenodo
The purpose of this paper is to review Data Mining as an enabling technology for Business Intelligence. ...
Data mining is a way to develop Business Intelligence (BI) from data that an organization collects, organizes, and stores. ...
For example, data can be mined to identify market segments or consumer endowments. d) Sequential patterns: Data is mined to assess behavioral patterns and trends. ...
doi:10.5281/zenodo.3908986
fatcat:v3oxnrbyerddvaaosjbepiwaju
Business Intelligence: A Rapidly Growing Option through Web Mining
2012
IOSR Journal of Computer Engineering
Web usage mining techniques are attempted to reason about different materialized issues of Business Intelligence which include marketing expertise as domain knowledge and are specifically designed for ...
To this end, the chapter provides an introduction to the field of Web mining and examines existing as well as potential Web mining applications applicable for different business function, like marketing ...
I hope I will make them proud of my achievements, as I am proud of them. ...
doi:10.9790/0661-0612229
fatcat:ot6sfu4nufbkxb6l2jsafk3pwm
Making Products Active With Intelligent Agents for Supporting Product Lifecycle Management
2010
Iberoamerican Journal of Industrial Engineering
Most previous works on PLM and currently available systems are usually focused on the use of additional information to support business processes, and integrate limited information of lower-level applications ...
However, little emphasis has been put on making products more intelligent during their complete lifecycle, in order to exploit PLM information for improving their development and management. ...
ACKNOWLEDGEMENTS This research was jointly developed by the School of Engineering (UNCuyo, Argentina) and ENSGSI (INPL, France), and partially financed by the PREMER F-599, ARFITEC ARF-08-04 programs, ...
doi:10.13084/2175-8018.v02n03a05
fatcat:zt5ckbcxujdlnfojcnnpqmcasq
Business Intelligence: A Rapidly Growing Option through Web Mining
[article]
2012
arXiv
pre-print
Web usage mining techniques are attempted to reason about different materialized issues of Business Intelligence which include marketing expertise as domain knowledge and are specifically designed for ...
To this end, the chapter provides an introduction to the field of Web mining and examines existing as well as potential Web mining applications applicable for different business function, like marketing ...
moral support. ...
arXiv:1208.5875v1
fatcat:6kmjryhdyfg5pinod4nvfgn3cy
« Previous
Showing results 1 — 15 out of 16,041 results