LifeStyle Targeting on Big Data using Rapid Miner
|
|
- Joanna Reynolds
- 8 years ago
- Views:
Transcription
1 LifeStyle Targeting on Big Data using Rapid Miner Maksim Drobyshev, Lifestyle Marketing Ltd NCT Group, Moscow Abstract Raw purchases/social data can be used to predict customers behavior towards offers within promotions by using RapidMiner LifeStyle Targeting extension 1. This has been tested in tens of original retail databases having different data structures without any data cleaning/preparation. Novell algorithm was developed to forecast target value based on alternate number of auto-generated attributes. For every customer, data can include different number of records containing date, target field, and other text or numeric fields of several data sources. All combinations of values, words, and periods in all fields generate customer and offer characteristics used to forecast offer results for every customer. Up to four billion unique sparse characteristics (attributes) are supported. Student s T-test proves confidence of revealed offer versus customer portrait in decision-tree form. The algorithm has no limitation on the structure of numeric characteristics. Ordered values also can be transformed to numeric order index, and textual values to numeric count of phrase usage. LifeStyle Targeting is only one example of many applications where target value prediction based on poorly structured or auto-generated characteristics can be useful. The target values and characteristics generation in LifeStyle Targeting operator is separated from LifeStyle Segmentation executable which can be used for other operators. A restricted free Windows version of LifeStyle Segmentation is delivered with the operator. 1. Business model and Target value LifeStyle Targeting is a tool for predicting sales value for the customer s future purchases based on purchases and other events in a past (History) period and planned offers. Observations used to forecast the effect of promotions on future purchase make use of the last available purchase data, while the future purchase period for them is unknown. To collect statistics for prediction, all fitting in the data past observations are generated with known customer behavior both in the target and history periods. 1 Patent pending.
2 Offer consists of controlled parameters like promoted goods, price etc. In the case of NetFlix film ratings (Picture 1), they are FilmName and Year. Picture 1: Screen-shot of setting parameters for LifeStyle Targeting the target value of every observation (profit) is calculated as sum of amount field in the target period minus cost of the promotion. For the presented NetFlix rating prediction, the prognosis is made for the future rating of the film minus minimal required rating, equal four stars out of five (Picture 2). Subtraction is done for clarity to mark the threshold: if the prognosis of target value is more than zero, the offer can be presented to the customer. Picture 2: Target Values and Periods Only past data can be used for the prognosis, so the data is divided into the 30- days target periods with previous 360-days periods as history periods.
3 2. Characteristics A customer s habit as a part of lifestyle is usually connected with some consumption of goods and services and leaves several signs in his purchase data, which enable to predict target values knowing other related signs. Characteristics represent such signs of customer s habits like values of goods purchases with particular words and phrases in goods or category names, words and phrases in questionnaire and CRM logs etc. In the NetFlix data, Customer ID, Date, Rating, Year were used and additional info was added for some films from DVD database (Picture 3): Picture 3: Rating and Film Data For a typical supermarket with tens of thousands stock keeping units articles on sale, number of unique characteristics in real projects accounts to millions, but every particular customer has only his tiny subset. LifeStyle Segmentation supports up to four billion unique characteristics in a single project. Picture 4: Generated Characteristics
4 When making a prognosis of offer value for the customer, both offer and customer characteristics are important. Their generation is detailed at Picture 3. With high portion of duplicates, different abbreviations, misspellings and other noise in purchases data, revealing keywords in textual fields proved to be a good practice. Stemmed fields can also be added to the data to be automatically tested for better prognostic value compared to other data. 3. Customer-Offer Portrait The Customer-Offer portrait divides all observations into segments with maximum division s additional profit compared to parent segment, provided Student s T-test for given confidence passed. Additional profit calculates as a sum of target value deviations in sub-segment from average target value in parent segment. Together this assures that on every level maximum financial result is received and that noise level is below user-defined threshold. On the Picture 5, root segment is marked with R symbol. On every level, best Characteristics and its value divide segment into sub-segments, adding 1 and 0 symbols for positive and negative segments. If for any reason any characteristics would be suppressed or become too noisy taking into account the Student s T-Test, the next best characteristics would be chosen as best segment division by LifeStyle Segmentation. Picture 5: Decision tree and the Segments.
5 As seen on Decision tree, joined DVD-database characteristics are also useful for forecast, despite of poor joining quality (intentionally no data cleaning was made). As a performance example, this 15-level Decision Tree with ~5k nodes for ~730k observations, ~240k unique Characteristics and 90% Confidence was built in 4.5 hours on notebook (2.7GHz). The corresponding throughput is ~2 million Characteristics items per second. 4. Prognosis In Prognosis mode, same characteristics with same algorithm are generated for all possible combinations of customers in the last target period of data and all possible offers. After dividing into the segments according to the best characteristics and their values, average target value in segment is used as prognosis. Offers filtered for positive prognosis values and can be used for suggestions. Consistency of process ensures that new Offers are generated by the same algorithm and segmented by the same and most financially valuable characteristics as observations in the historical data. Acknowledgements We would like to thank Simon Fischer of Rapid-I for his time, valuable help and suggestions.
CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING
CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING Mary-Elizabeth ( M-E ) Eddlestone Principal Systems Engineer, Analytics SAS Customer Loyalty, SAS Institute, Inc. Is there valuable
More informationChapter 20: Data Analysis
Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification
More informationHow To Solve The Kd Cup 2010 Challenge
A Lightweight Solution to the Educational Data Mining Challenge Kun Liu Yan Xing Faculty of Automation Guangdong University of Technology Guangzhou, 510090, China catch0327@yahoo.com yanxing@gdut.edu.cn
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationUsing Adaptive Random Trees (ART) for optimal scorecard segmentation
A FAIR ISAAC WHITE PAPER Using Adaptive Random Trees (ART) for optimal scorecard segmentation By Chris Ralph Analytic Science Director April 2006 Summary Segmented systems of models are widely recognized
More informationReputation Marketing Proposal. Overview Summary
Reputation Marketing Proposal Overview Summary Issue: Directories Solution: Research, Set Up, and Claim Local Directories 1. Proper Industry Directory Research Develop detailed research on local directories
More informationNeural Networks and Back Propagation Algorithm
Neural Networks and Back Propagation Algorithm Mirza Cilimkovic Institute of Technology Blanchardstown Blanchardstown Road North Dublin 15 Ireland mirzac@gmail.com Abstract Neural Networks (NN) are important
More informationExample 3: Predictive Data Mining and Deployment for a Continuous Output Variable
Página 1 de 6 Example 3: Predictive Data Mining and Deployment for a Continuous Output Variable STATISTICA Data Miner includes a complete deployment engine with various options for deploying solutions
More informationRIGHTNOW GUIDE: KNOWLEDGE BASE AND SEARCH BEST PRACTICES
RIGHTNOW GUIDE: KNOWLEDGE BASE AND SEARCH BEST PRACTICES Version 1.1 2010 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All other trademarks
More informationData Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
More informationMASCOT Search Results Interpretation
The Mascot protein identification program (Matrix Science, Ltd.) uses statistical methods to assess the validity of a match. MS/MS data is not ideal. That is, there are unassignable peaks (noise) and usually
More informationCA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series
CA Nimsoft Monitor Probe Guide for Active Directory Response ad_response v1.6 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
More informationMODULE 7: FINANCIAL REPORTING AND ANALYSIS
MODULE 7: FINANCIAL REPORTING AND ANALYSIS Module Overview Businesses running ERP systems capture lots of data through daily activity. This data, which reflects such things as the organization's sales
More informationA STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
More informationCrowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach
Outline Crowdclustering with Sparse Pairwise Labels: A Matrix Completion Approach Jinfeng Yi, Rong Jin, Anil K. Jain, Shaili Jain 2012 Presented By : KHALID ALKOBAYER Crowdsourcing and Crowdclustering
More informationSearch All MDS/Modules (or on tab if you know what you re looking for)
How to Find an MDS Search All MDS/Modules (or on tab if you know what you re looking for) Have IMDS ID? No Going to have to search on: Part Number, supplier, Partial Name See General MDS Search Tips On
More informationCustomer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
More informationEssential Guide Cross Border Trade. Cross Border Trade. The Essential Guide. www.nmplondon.com
0 The Essential Guide 2015 2015 Net Net Media Media Planet Planet Ltd. Ltd. All Rights All Rights Reserved. 1 Executive Summary For UK businesses with strong brands and high export potential, expanding
More informationGerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationData Pre-Processing in Spam Detection
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain
More informationTutorial for proteome data analysis using the Perseus software platform
Tutorial for proteome data analysis using the Perseus software platform Laboratory of Mass Spectrometry, LNBio, CNPEM Tutorial version 1.0, January 2014. Note: This tutorial was written based on the information
More informationData Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
More informationCA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview
PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY
More information2015 Workshops for Professors
SAS Education Grow with us Offered by the SAS Global Academic Program Supporting teaching, learning and research in higher education 2015 Workshops for Professors 1 Workshops for Professors As the market
More informationA Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More informationWhat's New in QuickBooks 2015
Presented by MENDELSON CONSULTING http://bit.ly/mendelsonin http://bit.ly/mendelsonfb @Mendels0n Founded in 1992 Local, national, and international Industry awards: VAR Stars (Bob Scott s Insights) Killer
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationSearching. Qvidian Proposal Automation (QPA) Quick Reference Guide. Types of Searches. Browse
Qvidian Proposal Automation (QPA) Quick Reference Guide Types of Searches There are three main types of searches within QPA: Browse Search Advanced Search Please also refer to the sections Content Items
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationInferential Statistics. Data Mining. ASC September Proving value in complex analytics. 2 Rivers. Information and Data Management
ASC September Proving value in complex analytics 26 th September 2014 John McConnell Information and Data Management 1 1 2 Rivers Research Operational/Transactional Inferential Statistics Inferring parameter
More informationCustomer Relationship Management using Adaptive Resonance Theory
Customer Relationship Management using Adaptive Resonance Theory Manjari Anand M.Tech.Scholar Zubair Khan Associate Professor Ravi S. Shukla Associate Professor ABSTRACT CRM is a kind of implemented model
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More informationData Mining On Diabetics
Data Mining On Diabetics Janani Sankari.M 1,Saravana priya.m 2 Assistant Professor 1,2 Department of Information Technology 1,Computer Engineering 2 Jeppiaar Engineering College,Chennai 1, D.Y.Patil College
More informationData Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1
Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints
More informationRequest Submission Confirmation Email
Request Submission Confirmation Email Email Subject: [Request Title] Request Confirmation Request Confirmation Thank you for your request. We ll send a confirmation once your request has been reviewed
More informationE-Mail Campaign Manager 2.0 for Sitecore CMS 6.6
E-Mail Campaign Manager 2.0 Marketer's Guide Rev: 2014-06-11 E-Mail Campaign Manager 2.0 for Sitecore CMS 6.6 Marketer's Guide User guide for marketing analysts and business users Table of Contents Chapter
More informationREPUTATION MARKETING PROPOSAL Developed For: Dutchie s Fresh Market From: Screaming Tree Media
REPUTATION MARKETING PROPOSAL Developed For: Dutchie s Fresh Market From: Screaming Tree Media Reputation Marketing Proposal Overview Summary Issue: Company Is Not Listed On All The Correct Directory Sites
More informationUnderstanding Portfolios. Reading the Portfolio
Understanding Portfolios Reading the Portfolio The Portfolio Menu Navigation Menu provides access to various areas in a team s portfolio. It is available on all the pages of a team s online portfolio.
More informationAn Oracle Best Practice Guide April 2012. Best Practices for Knowledgebase and Search Effectiveness
An Oracle Best Practice Guide April 2012 Best Practices for Knowledgebase and Search Effectiveness Introduction Ensuring that your knowledgebase is properly optimized to help customers find what they need
More informationPerformance Dashboard Tutorial
Performance Dashboard Tutorial Introduction This documents describes how to set-up the Excel templates provided by L3 Analytics. The configuration is straight forward: fill in all fields from the spreadsheet
More informationANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
More informationAnalyze It use cases in telecom & healthcare
Analyze It use cases in telecom & healthcare Chung Min Chen, VP of Data Science The views and opinions expressed in this presentation are those of the author and do not necessarily reflect the position
More information5 Steps to Avoid Network Alert Overload
5 Steps to Avoid Network Alert Overload By Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic
More informationHow To Sharpen A Picture With A Camera Raw Sharpening Effect On A Black And White Camera Raw Image Sensor
Movie 3 Camera Raw sharpening 1 Amount slider 1 The Amount slider is like a volume control. As you increase the Amount the overall sharpening is increased. A default setting of 25% is applied to all raw
More informationSocial Media Implementations
SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.
More informationCOMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
More informationData Mining Techniques
15.564 Information Technology I Business Intelligence Outline Operational vs. Decision Support Systems What is Data Mining? Overview of Data Mining Techniques Overview of Data Mining Process Data Warehouses
More informationOvidSP Quick Reference Guide
OvidSP Quick Reference Guide Opening an OvidSP Session Open the OvidSP URL with a browser or Follow a link on a web page or Use Athens or Shibboleth access Select Resources to Search In the Select Resource(s)
More informationEasily Identify Your Best Customers
IBM SPSS Statistics Easily Identify Your Best Customers Use IBM SPSS predictive analytics software to gain insight from your customer database Contents: 1 Introduction 2 Exploring customer data Where do
More informationREUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS
REUTERS/TIM WIMBORNE SCHOLARONE MANUSCRIPTS COGNOS REPORTS 28-APRIL-2015 TABLE OF CONTENTS Select an item in the table of contents to go to that topic in the document. USE GET HELP NOW & FAQS... 1 SYSTEM
More informationDecision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
More informationINTELLIGENT MOBILE MONETIZATION--POWERED BY BIG DATA
INTELLIGENT MOBILE MONETIZATION--POWERED BY BIG DATA Using Predictive Learning to Reach the Right Customers with the Right Mobile App Cohort analysis a Big Data-powered approach for making every ad impression
More informationA Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationData mining techniques: decision trees
Data mining techniques: decision trees 1/39 Agenda Rule systems Building rule systems vs rule systems Quick reference 2/39 1 Agenda Rule systems Building rule systems vs rule systems Quick reference 3/39
More informationSpecific Usage of Visual Data Analysis Techniques
Specific Usage of Visual Data Analysis Techniques Snezana Savoska 1 and Suzana Loskovska 2 1 Faculty of Administration and Management of Information systems, Partizanska bb, 7000, Bitola, Republic of Macedonia
More informationDIRECT MAIL: MEASURING VOLATILITY WITH CRYSTAL BALL
Proceedings of the 2005 Crystal Ball User Conference DIRECT MAIL: MEASURING VOLATILITY WITH CRYSTAL BALL Sourabh Tambe Honza Vitazka Tim Sweeney Alliance Data Systems, 800 Tech Center Drive Gahanna, OH
More informationTroubleshooting PHP Issues with Zend Server Code Tracing
White Paper: Troubleshooting PHP Issues with Zend Server Code Tracing Technical January 2010 Table of Contents Introduction... 3 What is Code Tracing?... 3 Supported Workflows... 4 Manual Workflow... 4
More informationAdd external resources to your search by including Universal Search sites in either Basic or Advanced mode.
Opening a Nursing@Ovid Session Open the Nursing@Ovid URL with a browser or Follow a link on a web page or Use Athens or Shibboleth access Select Resources to Search On login, Nursing@Ovid may take you
More informationINVENTION/TECHNOLOGY EVALUATION RESULTS:
INVENTION/TECHNOLOGY EVALUATION RESULTS: With Focus On Assessing License Feasibility of the Product Submitted EVALUATION PERFORMED BY: LAMBERT & LAMBERT, INC 7616 CURRELL BLVD, SUITE 200 ST. PAUL, MN 55125
More informationNeural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
More informationAccuplacer Arithmetic Study Guide
Accuplacer Arithmetic Study Guide Section One: Terms Numerator: The number on top of a fraction which tells how many parts you have. Denominator: The number on the bottom of a fraction which tells how
More informationChapter 7. Using Formulas and Functions
Chapter 7 Using Formulas and Functions Although the majority of your analysis can be performed through the Research Assistant, there may be times when you are building a custom report or chart or working
More informationSegmentation of stock trading customers according to potential value
Expert Systems with Applications 27 (2004) 27 33 www.elsevier.com/locate/eswa Segmentation of stock trading customers according to potential value H.W. Shin a, *, S.Y. Sohn b a Samsung Economy Research
More informationEfficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words
, pp.290-295 http://dx.doi.org/10.14257/astl.2015.111.55 Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words Irfan
More informationMoving Enterprise Applications into VoiceXML. May 2002
Moving Enterprise Applications into VoiceXML May 2002 ViaFone Overview ViaFone connects mobile employees to to enterprise systems to to improve overall business performance. Enterprise Application Focus;
More information3/17/2009. Knowledge Management BIKM eclassifier Integrated BIKM Tools
Paper by W. F. Cody J. T. Kreulen V. Krishna W. S. Spangler Presentation by Dylan Chi Discussion by Debojit Dhar THE INTEGRATION OF BUSINESS INTELLIGENCE AND KNOWLEDGE MANAGEMENT BUSINESS INTELLIGENCE
More informationAgenda Item 1. Featured Start-Up -- OmniSpeech
Agenda Item 1 Featured Start-Up -- OmniSpeech BOARD OF REGENTS SUMMARY OF ITEM FOR ACTION INFORMATION OR DISCUSSION TOPIC: Featured Start-Up -- OmniSpeech (information item) COMMITTEE: Economic Development
More informationVisual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
More informationDATA MINING METHODS WITH TREES
DATA MINING METHODS WITH TREES Marta Žambochová 1. Introduction The contemporary world is characterized by the explosion of an enormous volume of data deposited into databases. Sharp competition contributes
More informationCleaned Data. Recommendations
Call Center Data Analysis Megaputer Case Study in Text Mining Merete Hvalshagen www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 10 Bloomington, IN 47404, USA +1 812-0-0110
More informationProduct Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle
Product Review: James F. Koopmann Pine Horse, Inc. Quest Software s Foglight Performance Analysis for Oracle Introduction I ve always been interested and intrigued by the processes DBAs use to monitor
More informationFrom Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data
100 001 010 111 From Raw Data to 10011100 Actionable Insights with 00100111 MATLAB Analytics 01011100 11100001 1 Access and Explore Data For scientists the problem is not a lack of available but a deluge.
More informationBoR (13) 185. BEREC Report on Transparency and Comparability of International Roaming Tariffs
BEREC Report on Transparency and Comparability of International Roaming Tariffs December 2013 Contents I. EXECUTIVE SUMMARY AND MAIN FINDINGS... 3 II. INTRODUCTION AND OBJECTIVES OF THE DOCUMENT... 5 III.
More informationMultiple Linear Regression in Data Mining
Multiple Linear Regression in Data Mining Contents 2.1. A Review of Multiple Linear Regression 2.2. Illustration of the Regression Process 2.3. Subset Selection in Linear Regression 1 2 Chap. 2 Multiple
More informationAspen Utilities. Energy Management and Optimization System for energy intensive industry sectors. The Challenge: Reduction of Production Costs
Aspen Utilities Energy Management and Optimization System for energy intensive industry sectors The Challenge: Reduction of Production Costs Energy is often the single largest operating expense after raw
More informationSiemens Industry Online Support Searching and filtering - keyword search. Search Alternative 1. Keyword search
Searching and filtering - keyword search Search Alternative 1 Keyword search Enter one or more keywords in the search box on the home page. For example: - Contactor 5.5 kw - S7 1200 - Frequency converter
More informationBusiness Challenges and Research Directions of Management Analytics in the Big Data Era
Business Challenges and Research Directions of Management Analytics in the Big Data Era Abstract Big data analytics have been embraced as a disruptive technology that will reshape business intelligence,
More informationWhite Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
More informationOracle IVR Integrator
Oracle IVR Integrator Concepts and Procedures Release 11i for Windows NT July 2001 Part No. A86103-03 1 Understanding Oracle IVR Integrator This topic group provides overviews of the application and its
More informationChapter 4: Artificial Neural Networks
Chapter 4: Artificial Neural Networks CS 536: Machine Learning Littman (Wu, TA) Administration icml-03: instructional Conference on Machine Learning http://www.cs.rutgers.edu/~mlittman/courses/ml03/icml03/
More informationData Mining Techniques
TIMELY. PRACTICAL. RELIABLE. Data Mining Techniques For Marketing, Sales, and Customer Relationship Management Third Edition Gordon S. Linoff Michael J. A. Berry Chapter 21 n Listen Carefully to What Your
More informationEffective Data Retrieval Mechanism Using AML within the Web Based Join Framework
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted
More informationPattern Mining and Querying in Business Intelligence
Pattern Mining and Querying in Business Intelligence Nittaya Kerdprasop, Fonthip Koongaew, Phaichayon Kongchai, Kittisak Kerdprasop Data Engineering Research Unit, School of Computer Engineering, Suranaree
More informationOne Size Doesn t Fit All: How a Segmentation Approach Can Help Guide CE Product Strategy
One Size Doesn t Fit All: How a Segmentation Approach Can Help Guide CE Product Strategy Presenters Joe Bates Director of Research Gina Woodall Vice President More than 2,100 members Top 20 Trade Association
More informationSKILL SETS NEED FOR ANALYTICS- DESCRIPTIVE, PREDICTIVE AND PRESCRIPTIVE ABSTRACT
ISSN: 2454-3659 (Online),2454-3861(print) Volume I, Issue 3 August2015 International Journal of Multidisciplinary Research Centre Research Article / Survey Paper / Case Study SKILL SETS NEED FOR ANALYTICS-
More informationAn introduction to using Microsoft Excel for quantitative data analysis
Contents An introduction to using Microsoft Excel for quantitative data analysis 1 Introduction... 1 2 Why use Excel?... 2 3 Quantitative data analysis tools in Excel... 3 4 Entering your data... 6 5 Preparing
More informationIntroduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
More informationSage 200 CRM 2015 Implementation Guide
Sage 200 CRM 2015 Implementation Guide Copyright statement Sage (UK) Limited and Sage Hibernia Limited, 2015. All rights reserved. If this documentation includes advice or information relating to any matter
More informationA Practical Method for Estimating Performance Degradation on Multicore Processors, and its Application to HPC Workloads.
A Practical Method for Estimating Performance Degradation on Multicore Processors, and its Application to HPC Workloads Tyler Dwyer, Alexandra Fedorova, Sergey Blagodurov, Mark Roth, Fabien Gaud, Jian
More informationSQL Server 2012 Performance White Paper
Published: April 2012 Applies to: SQL Server 2012 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.
More informationWorkflow Business Rules
Workflow Business Rules Objective The Workflow Business Rule Maintenance screen creates the rules necessary for approvals and notifications in the MUNIS system. Procedure To access the Workflow Business
More informationRULE-BASE DATA MINING SYSTEMS FOR
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES A.Kaleeswaran 1, V.Ramasamy 2 Assistant Professor 1&2 Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 1&2 Abstract: The main
More information2.2 Elimination of Trend and Seasonality
26 CHAPTER 2. TREND AND SEASONAL COMPONENTS 2.2 Elimination of Trend and Seasonality Here we assume that the TS model is additive and there exist both trend and seasonal components, that is X t = m t +
More informationNine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
More informationOracle Sales Compensation
Oracle Sales Compensation Implementation Guide Release 11i August 2000 Part No. A86178-01 Oracle Sales Compensation Implementation Guide, Release 11i Part No. A86178-01 Copyright 2000, Oracle Corporation.
More informationBank Over Draft Limit Management
Bank Over Draft Limit Management (Version 1.0) IMPRESSIVE STAR SOFTWARES (P) LTD. {Tally Integration, Extension, Distribution, Training & Service Partner} {Tally Shoper Retail Solution Partner} F-3, Mayur
More informationVMware vcenter Log Insight User's Guide
VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationStatistical Feature Selection Techniques for Arabic Text Categorization
Statistical Feature Selection Techniques for Arabic Text Categorization Rehab M. Duwairi Department of Computer Information Systems Jordan University of Science and Technology Irbid 22110 Jordan Tel. +962-2-7201000
More information