A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Real-time business intelligence system architecture with stream mining
2010
2010 Fifth International Conference on Digital Information Management (ICDIM)
We argued that a new breed of data-mining, namely stream-mining where continuous data streams arrive into the system and get mined very quickly, stimulates the design of a new real-time BI architecture ...
We attempted in this paper to present a unified view on the real-time BI system architecture powered by stream-mining. Some typical applications in which our architecture can support are described. ...
A timeout threshold is determined by the time required to make a decision, which restricts the rulebased searching/matching time as well as the BI mining time. ...
doi:10.1109/icdim.2010.5664637
dblp:conf/icdim/HangF10
fatcat:bohfucramjcdnncii65yn6vnb4
An application of discrete mathematics in the design of an open pit mine
1988
Discrete Applied Mathematics
It is worth noting that our method Design of an open mine 19 Note added in proof A numerical procedure for generating search patterns has recently been developed by the authors. ...
In addition, both these methods have the capabilities of handling variable wall slope restrictions which is an important practical consideration. ...
The set S, is called the "search pattern". Lipkewich and Borgman 1141 give an example of a search pattern for a pit with wall slope restriction of 4!P throughout. ...
doi:10.1016/0166-218x(88)90030-3
fatcat:vwthbyoq4zd2zflejudfrke5my
Enabling Real-Time Business Intelligence by Stream Data Mining
[chapter]
2011
New Fundamental Technologies in Data Mining
Section 4 details a set of experiments by simulating the different impacts of traditional data-mining and stream-mining in rt-BI architecture. ...
Real-time Analytics Layer Real-time Data mining, Stream Mining, etc Real-time Data Process Layer Real-time Data Warehouse, Stream SQL, etc. ...
A timeout threshold is determined by the time required to make a decision, which restricts the rule-based matching time as well as the BI mining time. ...
doi:10.5772/13123
fatcat:2l3s4gjtkvcy3djriz73d65bgu
A Comprehensive Analysis of Proprietary and Open Source Data Mining Tools
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
(c) technical analysis of proprietary and open source data mining tools. ...
This paper described the (a) various tools and techniques used by data mining applications. (b) compared features and limitations both in Proprietary and open sources data mining tools. ...
It introduced DP (Dependent Pattern) algorithm that is not only mines compact sets of patterns, but also discovers meaningful patterns.
III. ...
doi:10.32628/cseit206210
fatcat:463k5b47q5h6fkq4p6abeqx2oa
Constraint-Based Mining of Fault-Tolerant Patterns from Boolean Data
[chapter]
2006
Lecture Notes in Computer Science
We compare three declarative specifications of fault-tolerant bi-sets by means of a constraint-based mining approach. ...
Therefore, we study various extensions of this kind of bi-set towards fault-tolerance. ...
In other terms, these bi-sets are relevant but they constitute a quite restrictive collection of dense bi-sets which lack from formal properties. ...
doi:10.1007/11733492_4
fatcat:tsfjfszu5neebbvgvmaeygqkqe
A Review of Modern Sequential Rule Mining Techniques
2014
International Journal of Computer Applications
Among various data mining objectives the mining of frequent patterns has been the focus of knowledge discovery in databases. ...
In this paper, we aim to investigate efficient algorithm for mining including association rule and sequential patterns. ...
SPM is restricted for creating predictions. for instance, take into account a pattern. ...
doi:10.5120/15359-3829
fatcat:dmhq5l4cpjdbva3cgq6vajhgpu
Advanced analytics: opportunities and challenges
2009
Industrial management & data systems
Design/methodology/approach -A range of recently published research literature on business intelligence (BI); predictive analytics; and data, text and web mining is reviewed to explore their current state ...
The first part discusses a framework for BI using the data, text, and web mining technologies for advanced analytics; and the second part identifies and discusses the opportunities and challenges the business ...
If not, they are restricted to a very limited set of techniques and problems. ...
doi:10.1108/02635570910930073
fatcat:i6emgwkcxrcrhd6bql4ndirxue
Uncertainty consideration in rock mass blastability assessment in open pit mines using Monte Carlo simulation
2021
Eurasian Mining
At the same time, the lake of data and cost restrictions does not allow in-depth and comprehensive field studies. ...
Blastability Index (BI) BI was introduced by Lily [15] based on the in-situ characteristics of the rock mass to predict specific charge of blasting in open pit mines. ...
doi:10.17580/em.2021.01.07
fatcat:bpxtxad3n5cf5pn3ppqgicxli4
Predictive Analysis for Risk Reduction in Data Mining
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Business Intelligence is also gaining more significance as the organizations worldwide want to build intelligence into their business processes so they can better understand the customer behavior or patterns ...
This paper aims to explore Data Mining and Predictive Analysis in the context of business applications and the techniques involved which eventually build the intelligence needed in the Business Intelligence ...
The applications of predictive algorithms aren't solely restricted to the net world. ...
doi:10.32628/cseit195417
fatcat:qxn2m32x6jd35dkumiwcaodyxa
秋田県北鹿地域黒鉱鉱床産Carrollite,Meneghinite,Bournoniteについて
Carrollite, meneghinite and bournonite from the Kuroko deposits, Akita Prefecture, Japan
1983
The Journal of the Japanese Association of Mineralogists Petrologists and Economic Geologists
Carrollite, meneghinite and bournonite from the Kuroko deposits, Akita Prefecture, Japan
X-ray
diffraction
pattern
of carrollite
from
the Matsumine
ore
deposit
of
the Hanaoka
mine
Table
3. ...
II: Bournonite from A.S.T.M. card, 12-94 (locality is not given). diffraction
pattern
of bournonite
from the
Uwamuki
No. 3 ore deposit
of the Kosaka
mine ...
., Urabe, T. and Shimazaki, H. (1975) , Carrollite from the Sazare mine, Ehime Prefecture, Japan. Mineral. J., 7, 552-561. ...
doi:10.2465/ganko1941.78.441
fatcat:u72esr4xmnfo3lfmeoak7kod74
Building data mining solutions with OLE DB for DM and XML for analysis
2005
SIGMOD record
XML for Analysis covers both OLAP and Data Mining. The goal is to allow consumer applications to query various BI packages from different platforms. ...
It defines a SQL language for data mining based on a relational concept. More recently, Microsoft, Hyperion, SAS and a few other BI vendors formed the XML for Analysis Council. ...
After training, the data mining algorithms find patterns, which are persisted inside the data mining model. ...
doi:10.1145/1083784.1083805
fatcat:3gqyao44hng4xfp37mpfxxyytu
k/2-hop
2019
Proceedings of the VLDB Endowment
With the increase of devices equipped with location sensors, mining spatio-temporal data for interesting behavioral patterns has gained attention in recent years. ...
Therefore, in this paper, we propose a new fast exact sequential convoy pattern mining algorithm "k/2-hop" that is free of data-dependent parameters. ...
In [11] , a unifying movement pattern mining framework capable of mining multiple movement patterns calle get move is proposed. ...
doi:10.14778/3329772.3329773
fatcat:kt23zoev35hs3ajlau7ti2n4h4
A Review on Business Intelligence and Big Data
2017
International Journal of Intelligent Systems and Applications in Engineering
This paper overviews the current state of the art of BI and big data, and discuss how big data era affects BI solutions in general context. ...
Unlike decades before, BI now is to be extract value from huge data ocean by using big data tools as well as classical ones. So, an interclusion has emerged between big data and BI. ...
BI is just not used as a tool for better decision making for administrative purposes but also used by industries in order to extract useful patterns by outlier detection, process mining and clustering ...
doi:10.18201/ijisae.2017533861
fatcat:56mrk4rtozadxk7krjyws4vm2y
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
2013
IOSR Journal of Computer Engineering
Frequent pattern mining is an important chore in the data mining, which reduces the complexity of the data mining task. ...
The usages of frequent patterns in various verticals of the data mining functionalities are discussed in this paper. ...
This has severely restricted the usage of frequentpattern mining [47] . Reducing the number of uninteresting patterns is an active and emerging research area [50] . ...
doi:10.9790/0661-1320813
fatcat:tangady5irbazoyqtvzlargq7q
Mining co-regulated gene profiles for the detection of functional associations in gene expression data
2007
Bioinformatics
In order to discover these hidden patterns, we propose the concept of mining co-regulated gene profiles. ...
Our experimental results show that the Mining Attribute Profile (MAP) method is an efficient tool for the analysis of gene expression data and competitive with bi-clustering techniques. ...
While redundant patterns can be discarded by mining only the closed patterns (Pasquier, 1999) , the number of similar patterns is only insufficiently reduced. ...
doi:10.1093/bioinformatics/btm276
pmid:17537754
fatcat:qfagwrpdjjfmzlrkhp5vdr2hky
« Previous
Showing results 1 — 15 out of 41,451 results