Filters








16,041 Hits in 6.2 sec

Predictive Analysis for Risk Reduction in Data Mining

Ridhi Thakur
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
so they can better understand the customer behavior or patterns and provide insights for business leaders to make the right decisions in the market place to keep them competitive and efficient by reducing  ...  In this age of artificial Intelligence and machine learning, Business Intelligence is also gaining more significance as the organizations worldwide want to build intelligence into their business processes  ...  Data Mining (DM) is a process supported by algorithms to investigate and extract useful information and automatically discovers hidden sequential patterns and relationships from information (data  ... 
doi:10.32628/cseit195417 fatcat:qxn2m32x6jd35dkumiwcaodyxa

Behavior Informatics and Analytics: Let Behavior Talk

Longbing Cao
2008 2008 IEEE International Conference on Data Mining Workshops  
BIA can greatly complement the existing means for combined, more informative and social patterns and solutions for critical problem-solving in areas such as dealing with customer-officer interaction, counterterrorism  ...  of Behavior Informatics and Analytics (BIA), to support explicit behavior involvement through a conversion from transactional data to behavioral data, and further genuine analysis of native behavior patterns  ...  [15] , fraud detection [9] , event analysis [17] , outlier detection [11] , and group decisionmaking.  ... 
doi:10.1109/icdmw.2008.95 dblp:conf/icdm/Cao08a fatcat:g35m7nuv5jgldab624nal3c7lu

Eye Tracking Data Acquisition and Preprocessing for Modeling of Manager Knowledge in Financial Report Analysis

Adrian Kaźmierczak
2017 Communiation Papers of the 2017 Federated Conference on Computer Science and Information Systems  
Research results will help design a mechanism for intelligent interpretation of economic information in Business Intelligence systems.  ...  The article presents process of data acquisition and detection of pattern in the way of perceiving economic data.  ...  The author would also like thank to Jaroslaw Jankowski for loaning eye tracker and for the support in experiment.  ... 
doi:10.15439/2017f440 dblp:conf/fedcsis/Kazmierczak17 fatcat:ywaskydqbjdchbvtq5nuccdkvm

An Architecture for Collaboration Patterns in Agile Event-Driven Environments

Yiannis Verginadis, Dimitris Apostolou, Nikos Papageorgiou, Gregoris Mentzas
2009 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises  
We also propose an event-driven architecture for modeling, recommending and enacting such Collaboration Patterns.  ...  In this paper, we introduce Collaboration Patterns as a mechanism to facilitate knowledgebased collaborations.  ...  Simple events arrive at the CEP, which maintains (partially detected) complex events in its pattern base.  ... 
doi:10.1109/wetice.2009.12 dblp:conf/wetice/VerginadisAPM09 fatcat:zp32zdww2bb65jbjrwzexnbtwq

A development of Business Intelligence Systems

Adam Stecyk
2018 European Journal of Service Management  
The first part of the article contains an overview of the definitions related to Business Intelligence components such as: BI objectives, development and innovation of IT concepts for BI software, maturity  ...  In the end, the article presents analytics and business intelligence trends for next years, that firms should be aware of to build their competitive advantage. #0#  ...  Table 1 . 1 Main techniques in business intelligenceTemporal and sequential patterns analysis Trend and deviation, sequential patterns, periodicity OLAP (OnLine Analytical Processing) OLAP tools enable  ... 
doi:10.18276/ejsm.2018.28/1-38 fatcat:koklqsrduvat7cctippb7ej45m

Opportunities and Benefits Implementation Business Intelligence Application on Health Center

Hady Pranoto
2015 ComTech  
Kata kunci: business intelligence, pusat kesehatan, decision support system  ...  Unfortunately, health centers in Indonesia have not yet implemented business intelligence application. There are many public and private health centers do not apply automated operational system.  ...  In this technique, the group wants to find a pattern of sequential events with another group of sequential events that are almost similar. For example, search for a product price movement of goods.  ... 
doi:10.21512/comtech.v6i1.2278 fatcat:a5aynv3vhngefebxriz47bhcme

AI in Finance: Challenges, Techniques and Opportunities [article]

Longbing Cao
2021 arXiv   pre-print
AI in finance broadly refers to the applications of AI techniques in financial businesses.  ...  The comparison, criticism and discussion of classic vs. modern AI techniques for finance are followed.  ...  Typical methods include discovering frequent patterns, sequential patterns, graph patterns, network patterns, tree patterns, knot patterns, interactive patterns, combined patterns, and abnormal trading  ... 
arXiv:2107.09051v1 fatcat:g62cz4dqt5dcrbckn4lbveat3u

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

Sajad Homayoun, Ali Dehghantanha, Marzieh Ahmadzadeh, Sattar Hashemi, Raouf Khayami
2017 IEEE Transactions on Emerging Topics in Computing  
Moreover, we showed existence of distinctive frequent patterns within different ransomware families which can be used for identification of a ransomware sample family for building intelligence about threat  ...  We utilize Sequential Pattern Mining to find Maximal Frequent Patterns (MFP) of activities within different ransomware families as candidate features for classification using J48, Random Forest, Bagging  ...  As we will be using a sequential pattern mining technique (MG-FSM) to detect candidate features for classification task, we should convert our data into a sequential dataset which is a collection of sequences  ... 
doi:10.1109/tetc.2017.2756908 fatcat:4psba4vx4ndr7hecl6vznpp6mi

Ontology-Based Business Process Customization for Composite Web Services

Qianhui Liang, Xindong Wu, E. K. Park, Taghi M. Khoshgoftaar, Chi-Hung Chi
2011 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Furthermore, we report a framework, built on OWL-BPC, for customizing service-based business processes, which supports customization detection and enactment.  ...  Customization detection is enabled by a business-goal analysis, and customization enactment is enabled via event-condition-action rule inference.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their accurate and constructive comments, which have helped to improve this paper greatly.  ... 
doi:10.1109/tsmca.2011.2132710 fatcat:va4fn5euavbbfngsbe7w7t6tay

SWOT of Bigdata Security Using Machine Learning Techniques

Ravikumar Muljibhai Rohit
2016 Zenodo  
It also contains the what is importance of BigData security. The paper mostly covers all the main point that affect Big Data and Machine Learning.  ...  This paper gives complete guidelines on BigData, Different Views of BigData, etc.How the BigData is useful to us and what are the factors affecting BigData all the things are covered under this paper.  ...  Let's look at critical capabilities of effective security intelligence solutions.  ... 
doi:10.5281/zenodo.3637761 fatcat:hn7gckzzqjefnaypt5acqrj3om

SWOT of Bigdata Security Using Machine Learning Techniques

Ravikumar Muljibhai Rohit
2016 International Journal of Information Sciences and Techniques  
It also contains the what is importance of BigData security. The paper mostly covers all the main point that affect Big Data and Machine Learning.  ...  This paper gives complete guidelines on BigData, Different Views of BigData, etc.How the BigData is useful to us and what are the factors affecting BigData all the things are covered under this paper.  ...  Let's look at critical capabilities of effective security intelligence solutions.  ... 
doi:10.5121/ijist.2016.6213 fatcat:o3nvwgd3prh23lswl3bhuvybb4

Reviewing Data Mining as an enabling technology for BI

Mustafa Nizamul Aziz, A.K.M. Monzurul Islam
2020 Zenodo  
The purpose of this paper is to review Data Mining as an enabling technology for Business Intelligence.  ...  Data mining is a way to develop Business Intelligence (BI) from data that an organization collects, organizes, and stores.  ...  For example, data can be mined to identify market segments or consumer endowments. d) Sequential patterns: Data is mined to assess behavioral patterns and trends.  ... 
doi:10.5281/zenodo.3908986 fatcat:v3oxnrbyerddvaaosjbepiwaju

Business Intelligence: A Rapidly Growing Option through Web Mining

Priyanka Rahi
2012 IOSR Journal of Computer Engineering  
Web usage mining techniques are attempted to reason about different materialized issues of Business Intelligence which include marketing expertise as domain knowledge and are specifically designed for  ...  To this end, the chapter provides an introduction to the field of Web mining and examines existing as well as potential Web mining applications applicable for different business function, like marketing  ...  I hope I will make them proud of my achievements, as I am proud of them.  ... 
doi:10.9790/0661-0612229 fatcat:ot6sfu4nufbkxb6l2jsafk3pwm

Making Products Active With Intelligent Agents for Supporting Product Lifecycle Management

R. Forradellas
2010 Iberoamerican Journal of Industrial Engineering  
Most previous works on PLM and currently available systems are usually focused on the use of additional information to support business processes, and integrate limited information of lower-level applications  ...  However, little emphasis has been put on making products more intelligent during their complete lifecycle, in order to exploit PLM information for improving their development and management.  ...  ACKNOWLEDGEMENTS This research was jointly developed by the School of Engineering (UNCuyo, Argentina) and ENSGSI (INPL, France), and partially financed by the PREMER F-599, ARFITEC ARF-08-04 programs,  ... 
doi:10.13084/2175-8018.v02n03a05 fatcat:zt5ckbcxujdlnfojcnnpqmcasq

Business Intelligence: A Rapidly Growing Option through Web Mining [article]

Priyanka Rahi (Department of Computer Science H.P. University, Shimla, H.P., India)
2012 arXiv   pre-print
Web usage mining techniques are attempted to reason about different materialized issues of Business Intelligence which include marketing expertise as domain knowledge and are specifically designed for  ...  To this end, the chapter provides an introduction to the field of Web mining and examines existing as well as potential Web mining applications applicable for different business function, like marketing  ...  moral support.  ... 
arXiv:1208.5875v1 fatcat:6kmjryhdyfg5pinod4nvfgn3cy
« Previous Showing results 1 — 15 out of 16,041 results