PROCESOS DE EXPLOTACIÓN DE INFORMACIÓN BASADOS EN SISTEMAS INTELIGENTES INFORMATION MINING PROCESSES BASED ON INTELLIGENT SYSTEMS
|
|
|
- Ann Gibson
- 10 years ago
- Views:
Transcription
1 Garcia-Martinez, R., Britos, p., Pollo-Cattaneo, F., Rodriguez, D., Pytel, P Information Mining Processes Based on Intelligent Systems Proceedings of II International Congress on Computer Science and Informatics (INFONOR-CHILE 2011) Pp ISBN PROCESOS DE EXPLOTACIÓN DE INFORMACIÓN BASADOS EN SISTEMAS INTELIGENTES INFORMATION MINING PROCESSES BASED ON INTELLIGENT SYSTEMS Ramón García-Martínez 1, Paola Britos 2, Florencia Pollo-Cattaneo 3, Darío Rodriguez 4, Pablo Pytel 5 RESUMEN La inteligencia de negocio propone un abordaje interdisciplinario (dentro del que se encuentra la Informática), que tomando todos los recursos de información disponibles y el uso de herramientas analíticas y de síntesis con capacidad de transformar la información en conocimiento, se centra en generar a partir de estos, conocimiento que contribuya con la toma de decisiones de gestión y generación de planes estratégicos en las organizaciones. La Explotación de Información es la sub-disciplina Informática que aporta a la Inteligencia de Negocio las herramientas para la transformación de información en conocimiento. Se ha definido como la búsqueda de patrones interesantes y de regularidades importantes en grandes masas de información. Cuando los procesos de explotación de información son definidos, se decide que algoritmos de minería de datos van a dar soporte a los procesos de explotación de información. En este contexto, este trabajo propone una caracterización de procesos de explotación de información relacionados a los siguientes problemas de inteligencia de negocio: descubrimiento de reglas de comportamiento, descubrimiento de grupos, descubrimiento de atributos significativos, descubrimiento de reglas de pertenencia a grupos y ponderación de reglas de comportamiento o de reglas de pertenencia a grupos. Palabras Claves: Inteligencia de Negocio, Procesos de Explotación de Información, Métodos basados en Sistemas Inteligentes, Descubrimiento de Grupos, Descubrimiento de Atributos Significativos, Descubrimiento de Reglas de Comportamiento, Ponderación de Atributos, Ponderación de Reglas. ABSTRACT Business Intelligence offers an interdisciplinary approach (within which is Information Systems), that takes all available information resources and using of analytical and synthesis tools with the ability to transform information into knowledge, focusing on generating knowledge that contributes to the management decision-making and generation of strategic plans in organizations. Information Mining is the sub-discipline of information systems which supports business intelligence tools to transform information into knowledge. It has defined as the search for interesting patterns and important regularities in large bodies of information. The need to identify information mining processes is addressed to obtain knowledge from available information. When information mining processes are defined, is may be decided which data mining algorithms will support the information mining processes. In this context, this paper proposes a characterization of the information mining process related to the following business intelligence problems: discovery of rules of behavior, discovery of groups, discovery of significant attributes, discovering rules of group membership and weight of rules of behavior or rules of group memberships. Keywords: Business Intelligence, Information Mining Processes, Intelligent systems-based methods, Discovery of Groups, Discovery of Significant Attributes, Discovery of Behaviour Rules, Weighting of Behaviour or Groupmembership Rules. 1 Grupo de Investigación en Sistemas de Información, Departamento de Desarrollo Productivo y Tecnológico, Universidad Nacional de Lanús. 29 de Septiembre Remedios de Escalada, Lanús. Buenos Aires, Argentina. [email protected] / [email protected] 2 Grupo de Investigación en Explotación de Información. Sede Andina. Universidad Nacional de Rio Negro. rio Negro. Argentina. [email protected] 3 Grupo de Estudio en Metodologías de Ingeniería de Software. Facultad Regional Buenos Aires. Universidad Tecnológica Nacional. Medrano 951. Ciudad Autónoma de Buenos Aires. Argentina. [email protected] 4 Grupo de Investigación en Sistemas de Información, Departamento de Desarrollo Productivo y Tecnológico, Universidad Nacional de Lanús. 29 de Septiembre Remedios de Escalada, Lanús. Buenos Aires, Argentina. [email protected] 5 Grupo de Investigación en Sistemas de Información, Departamento de Desarrollo Productivo y Tecnológico, Universidad Nacional de Lanús. 29 de Septiembre Remedios de Escalada, Lanús. Buenos Aires, Argentina. [email protected]
2 INTRODUCTION Business Intelligence offers an interdisciplinary approach (within which are included the Information Systems), that takes all the available information resources and uses analytical and synthesis tools with the ability to transform information into knowledge, focusing on generating knowledge that supports the management decision-making and generation of strategic plans at organizations [1]. Information Mining is the sub-discipline of information systems which provides to the Business Intelligence [2] the tools to transform information into knowledge [3]. It has been defined as the discovery of interesting patterns and important regularities in large information bases [4]. When speaking of information mining based on intelligent systems [5], this refers especially in the application of intelligent systems-based methods to discover and enumerate the existing patterns in the information. Intelligent systems-based methods [6] allow retrieving results about the analysis of information bases that the conventional methods fail to achieve [7], such as: TDIDT algorithms (Top Down Induction Decision Trees), self-organizing maps (SOM) and Bayesian networks. TDIDT algorithms allow the development of symbolic descriptions of the data to distinguish between different classes [8]. Selforganizing maps can be applied in the construction of information clusters. They have the advantage of being tolerant to noise and the ability to extend the generalization when needing the manipulation of new data [9]. Bayesian networks can be applied to identify discriminative attributes in large information bases and detect behaviour patterns in the analysis of temporal series [10]. It has been noted the necessity of having processes [11] that allow obtaining knowledge [12] from the large information-bases available [13], its characterization [14] and involved technologies [15]. In this context, this paper proposes a characterization of the information mining process related to the following business intelligence problems: discovery of behaviour rules, discovery of groups, discovery of significant attributes, discovery of group-membership rules and weighting of behaviour or group-membership rules, and the identification of information-systems technologies that can be used for the characterized processes. PROPOSED TECHNIQUES FOR INFORMATION MINING PROCESSES In this section, the following information-mining processes are proposed: discovery of behaviour rules, discovery of groups, discovery of significant attributes, discovery of group-membership rules and weighting of behaviour or group-membership rules. Process of Discovery of Behaviour Rules The process for discovery of behavioural rules applies when it is necessary to identify which are the conditions to get a specific outcome in the problem domain. The following problems are examples among others that require this process: identification of the characteristics for the most visited commercial office by customers, identification of the factors that increase the sales of a specific product, definition of the characteristics or traits of customers with high degree of brand loyalty, definition of demographic and psychographic attributes that distinguish the visitors to a website. For the discovery of behavioural rules from classes attributes in a problem domain that represents the available information base, it is proposed the usage of TDIDT induction algorithms [16] to discover the rules of behaviour for each class attribute. This process and its products can be seen graphically in Figure 1. First, all sources of information (databases, files, others) are identified, and then they are integrated together as a single source of information which is called integrated database. Based on the integrated database, the class attribute is selected (i.e. attribute A in the Figure 1). As a result of applying TDIDT to the class attribute, a set of rules which define the behaviour of that class is achieved. Process of Discovery of Groups The process of discovery of groups applies when it is necessary to identify a partition on the available information base of the problem domain. The following problems are examples among others that require this process: identification of the customers segments for banks and financial institutions, identification of type of calls of customer in telecommunications companies, identification of social groups with the same characteristics, identification of students groups with homogeneous characteristics. For the discovery of groups [17] [18] in information bases of the problem domain for which there is no
3 available "a priori criteria for grouping, it is proposed the usage of Kohonen s Self-Organizing Maps (or SOM) [19] [20] [21]. The use of this technology intends to find if there is any group that allows the generation of a representative partition for the problem domain which can be defined from available information bases. This process and its products can be seen graphically in Figure 2. Figure 1. Schema and products resulting of applying Process of Discovery of Behaviour Rules using TDIDT First, all sources of information (databases, files, others) are identified, and then they are integrated together as a single source of information which is called integrated database. Based on the integrated database, the selforganizing map (SOM) is applied. As a result of the application of Process Discovery of Groups using SOM, a partition of the set of records in different groups, that is called identified groups, is achieved. For each identified group, the corresponding data file is generated. Figure 2. Schema and products resulting of applying Process Discovery of Groups using SOM Process of Discovery of Significant Attributes The process of discovery of significant attributes applies when it is necessary to identify which are the factors with the highest incidence (or occurrence frequency) for a certain outcome of the problem. The following problems are examples among others that require this process: factors with incidence on the sales, distinctive features of customers with high degree of brand loyalty, key-attributes that characterize a product as marketable, key-features of visitors to a website. Bayesian Networks [22] allows seeing how the variation of the values of attributes impacts on the variation of the value of class attribute. The use of this process seeks to identify whether there is any interdependence among the attributes that modelize the problem domain which is represented by the available information base. This process and its products can be seen graphically in Figure 3. First, all sources of information (databases, files, others) are identified, and then they are integrated together as a single source of information which is called integrated
4 database. Based on the integrated database, the class attribute is selected (i.e. attribute A in the Figure 3). As a result of the application of the Bayesian Networks structural learning to the file with the identified class attribute, the learning tree is achieved. The Bayesian Networks predictive learning is applied to this tree obtaining the tree of weighting interdependence which has the class attribute as a root and to the other attributes with frequency (incidence) related the class attribute as leaf nodes. Figure 3. Schema and resulting products for applying Process Discovery of Significant Attributes using Bayesian Networks Process of Discovery of Group-membership Rules The process of discovery of group membership rules applies when it is necessary to identify which are the conditions of membership to each of the classes of an unknown partition a priori, but existing in the available information bases of the problem domain. The following problems are examples among others that require this process: types of customer s profiles and the characterization of each type, distribution and structure of data of a web site, segmentation by age of students and the behaviour of each segment, classes of telephone calls in a region and the characterization of each class. For running the process of discovery of groupmembership rules it is proposed to use of selforganizing maps (SOM) for finding groups and; once the groups are identified, the usage of induction algorithms (TDIDT) for defining each group behaviour rules [23] [24] [21]. This process and its products can be seen graphically in Figure 4. The procedure is a combination of the Discovery of Groups and the Discovery of Behaviour Rules processes defined above. When all sources of information (databases, files, others) are identified and integrated together, the self-organizing maps (SOM) are applied to obtain a partition of the set of records in different groups (called identified groups) which are stored in the ordered group files. The "group" attribute of each ordered group is identified as the class attribute of that group, establishing it in a file with the identified class attribute (GR). Then TDIDT is applied to the class attribute of each "GR group" and the set of rules that define the behaviour of each group is achieved. Process of Weighting of Behaviour or Groupmembership Rules The process of discovery of weighting of behaviour or group-membership rules applies when it is necessary to identify which are the conditions with the highest incidence (or occurrence frequency) for a certain
5 outcome of the problem, which can be related to the behaviour rules or group-membership. The following problems are examples among others that require this process: identification of the main factor that generates the improvement of sales for a particular product, distinctive features of customers with high degree of brand loyalty, identification of call types more frequently in a region. Figure 4. Schema and resulting products of running Process of Discovery of Group-membership Rules using SOM and TDIDT The procedure is a combination of the Discovery of Groups or the Discovery of Behaviour Rules processes, depending on the available information, and the Discovery of Significant Attributes process. As soon as the sources of information (databases, files, others) are integrated together as a single source of information, it is necessary to check if there are identified classes/groups. If there are identified classes/groups, first the TDIDT algorithm is applied for the discovery of behaviour rules for each class attribute. Then Bayesian Networks are used to discover the attributes of the rules preconditions with the highest incidence on the class attribute. As a result of the application of the structural learning, the learning tree is achieved. The predictive learning is applied to this tree obtaining the tree of weighting interdependence. The root is the group attribute and the other attributes as leaf nodes labelled with the frequency (incidence) on the group attribute. If there are no identified classes/groups, instead of applying the TDIDIT algorithm, the self-organizing maps (SOM) is used to define the class/group attribute. As a result of the application of SOM, a partition of the set of records in different groups is achieved (called identified groups). For each identified group, the group attribute is identified as the class attribute of that group, establishing it in a file with the identified class attribute (GR). Then Bayesian Networks is used to achieve the learning tree. The predictive learning is applied to this tree obtaining the tree of weighting interdependence. The root is the group attribute and the other attributes as leaf nodes labelled with the frequency (incidence) on the group attribute.
6 Figure 5. Schema and resulting products of running process of weighting of behaviour or Group-membership rules using SOM, TDIDT and Bayesian Networks
7 This process with both possible situations and products can be seen graphically in Figure 5. VALIDATION OF THE PROPOSED INFORMATION MINING PROCESSES The proposed information mining processes have been validated in three domains: political alliances, medical diagnosis and user behaviour. A full detailed report of these validations can be seen in [26]. In the political alliances domain, it has been sought to discover the behaviour of democrats and republicans representatives of the U.S. Congress based on the political agenda of a regular session, identifying the intraparty and interparty agreements and disagreements between interparty groups and minority intraparty groups. The first one was obtained using the process of discovery of behaviour rules for the representatives of each party, and the second one by using the process of discovery of the groups for the representatives who voted homogeneously (regardless of their party affiliation) and the rules that define that homogeneity (rules of membership to each group). Additionally it has been tried to identify which have been the law or laws with greater agreement among the identified agreements, using the process of weighting of behaviour rules or group-membership rules. In the medical diagnosis domain, the knowledge that allows to diagnose the type of lymphoma has been synthesized using as input the characteristics observed in the associated lymphography, identify the significant characteristic related to each type of diagnosis and whether there are common characteristics to different types of pathologies. The first one was obtained using the process of discovery of behaviour rules for each type of diagnosis, the second one by using the process of weighting of behaviour rules and the third one by using the discovery of lymphoma groups with homogeneous characteristics (regardless of its type) and the rules that defines the homogeneity (rules of membership to each group). In the user behaviour domain, it has been sought to specify a description of the reasons for subscribing or unsubscribing to an Internet service dial-up provided by a telephone company and identify the reasons with the highest incidence in each behaviour domain. The first one was sought using the process of discovery of behaviour rules for subscribing or unsubscribing to the service, and the second one by using the process of weighting of behaviour rules. CONCLUSIONS In this paper it has been proposed and described five information mining processes: discovery of behaviour rules, discovery of groups, discovery of significant attributes, discovery of group-membership rules and weighting of significant attribute related to behaviour or membership rules. Each process has been associated with the following techniques: the usage of TDIDT algorithm applied to the discovery of behaviour rules or group-membership rules, the usage of SOM applied to the discovery of groups, the usage of Bayesian Networks applied to the weighting of interdependence between attributes, the usage of SOM and TDIDT algorithms applied to the discovery of group-membership rules and the usage of Bayesian Networks applied to the weighting of significant attribute in behaviour or group-membership rules. During the documental research work it has been noted the indiscriminate use of terms "data mining" and "information mining" to refer to the same body of knowledge. However, raising this equivalence is similar to say that computer-systems are equivalent to information-systems. The first ones are related to the technology that supports the second ones and this is what makes them different. In this context, there is an open problem: the need to organize the body of knowledge related to engineering of information mining, establishing that data mining is related to algorithms; and information mining is related to processes and methodologies. In early stages of our research work, we have observed the indiscriminate use of terms "data mining" and "information mining" to refer to the same body of knowledge. We think that is a kind confusion similar to terms computer-systems and information-systems. Data Mining is related to the technology (algorithms) and Information Mining is related to the processes and methodologies. Data Mining is close to programming and Information Mining is close to software engineering. In this context is an open issue the need of organizing the body of knowledge related to Information Mining Engineering, establishing that data mining is related to algorithms; and information mining is related to processes and methodologies. ACKNOWLEDGMENT This research has been partially funded by National University of Lanus Research Project 33A105, National University of Rio Negro Research Project 40B065
8 Technological National University FRBA Research Project 25C126. REFERENCES 1. Thomsen, E. (2003). BI s Promised Land. Intelligent Enterprise, 6(4): Negash, S., Gray, P. (2008). Business Intelligence. En Handbook on Decision Support Systems 2, ed. F. Burstein y C. Holsapple (Heidelberg, Springer), Pp Langseth, J., Vivatrat, N. (2003). Why Proactive Business Intelligence is a Hallmark of the Real- Time Enterprise: Outward Bound. Intelligent Enterprise 5(18): Grigori, D., Casati, F., Castellanos, M., Dayal, u., Sayal, M., Shan, M. (2004). Business Process Intelligence. Computers in Industry 53(3): Michalski, R. Bratko, I. Kubat, M. (1998). Machine Learning and Data Mining, Methods and Applications (Editores) John Wiley & Sons. 6. Kononenko, I. y Cestnik, B. (1986). Lymphography Data Set. UCI Machine Learning Repository. y. Last Access 29 de Abril del Michalski, R. (1983). A Theory and Methodology of Inductive Learning. Artificial Intelligence, 20: Quinlan, J. (1990). Learning Logic Definitions from Relations. Machine Learning, 5: Kohonen, T. (1995). Self-Organizing Maps. Springer Verlag Publishers. 10. Heckerman, D., Chickering, M., Geiger, D. (1995). Learning bayesian networks, the combination of knowledge and statistical data. Machine learning 20: Chen, M., Han, J., Yu, P. (1996). Data Mining: An Overview from a Database Perspective. IEEE Transactions on Knowledge and Data Engineering, 8(6): Chung, W., Chen, H., Nunamaker, J. (2005). A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration. Journal of Management Information Systems, 21(4): Chau, M., Shiu, B., Chan, I., Chen, H. (2007). Redips: Backlink Search and Analysis on the Web for Business Intelligence Analysis. Journal of the American Society for Information Science and Technology, 58(3): Golfarelli, M., Rizzi, S., Cella, L. (2004). Beyond data warehousing: what's next in business intelligence?. Proceedings 7th ACM international workshop on Data warehousing OLAP. Pp Koubarakis, M., Plexousakis, D. (2000). A Formal Model for Business Process Modeling and Design. Lecture Notes in Computer Science, 1789: Britos, P., Jiménez Rey, E., García-Martínez, E. (2008). Work in Progress: Programming Misunderstandings Discovering Process Based On Intelligent Data Mining Tools. Proceedings 38th ASEE/IEEE Frontiers in Education Conference. 17. Kaufmann, L. y Rousseeuw, P. (1990). Finding Groups in Data: An Introduction to Cluster Analysis. John Wiley & Sons Publishers. 18. Grabmeier, J., Rudolph, A. (2002). Techniques of Cluster Algorithms in Data Mining. Data Mining and Knowledge Discovery, 6(4): Ferrero, G., Britos, P., García-Martínez, R., (2006). Detection of Breast Lesions in Medical Digital Imaging Using Neural Networks. In IFIP International Federation for Information Processing, Volume 218: Britos, P., Cataldi, Z., Sierra, E., García-Martínez, R. (2008). Pedagogical Protocols Selection Automatic Assistance. LNAI 5027: Britos, P., Grosser, H., Rodríguez, D., García- Martínez, R. (2008). Detecting Unusual Changes of Users Consumption. In Artificial Intelligence in Theory and Practice II, ed. M. Bramer, (Boston: Springer). 22. Britos, P., Felgaer, P., García-Martínez, R. (2008). Bayesian Networks Optimization Based on Induction Learning Techniques. In Artificial Intelligence in Theory and Practice II, ed. M. Bramer, (Boston: Springer). 23. Britos, P., Abasolo, M., García-Martínez, R. y Perales, F. (2005). Identification of MPEG-4 Patterns in Human Faces Using Data Mining Techniques. Proceedings 13th CGVCV. Pp Cogliati, M., Britos, P., García-Martínez, R. (2006a). Patterns in Temporal Series of Meteorological Variables Using SOM & TDIDT. In IFIP International Federation for Information Processing, Volume 217, Artificial Intelligence in Theory and Practice, ed. M. Bramer, (Boston: Springer), Pp Britos, P., Dieste, O., García-Martínez, R. (2008b). Requirements Elicitation in Data Mining for Business Intelligence Projects. In Advances in Information Systems Research, Education, and Practice eds. George Kasper e Isabel Ramos (Boston: Springer), en prensa. 26. Britos, P. (2008). Processes of Information Mining based on Intelligent Systems (in spanish). PhD thesis in Computer Science. School of Computing. Universidad Nacional de La Plata. See in
TOWARDS AN INFORMATION MINING ENGINEERING
TOWARDS AN INFORMATION MINING ENGINEERING García-Martínez, Ramón 1, Britos, Paola 2, Pesado, Patricia 3, Bertone, Rodolfo 3, Pollo-Cattaneo, Florencia 4, Rodríguez, Darío 1, Pytel, Pablo 1,4, Vanrell.
IMPROVING PIPELINE RISK MODELS BY USING DATA MINING TECHNIQUES
IMPROVING PIPELINE RISK MODELS BY USING DATA MINING TECHNIQUES María Fernanda D Atri 1, Darío Rodriguez 2, Ramón García-Martínez 2,3 1. MetroGAS S.A. Argentina. 2. Área Ingeniería del Software. Licenciatura
PATTERN DISCOVERY IN UNIVERSITY STUDENTS DESERTION BASED ON DATA MINING
Advances and Applications in Statistical Sciences Proceedings of The IV Meeting on Dynamics of Social and Economic Systems Volume 2, Issue 2, 2010, Pages 275-285 2010 Mili Publications PATTERN DISCOVERY
Requirements Elicitation in Data Mining for Business Intelligence Projects
Requirements Elicitation in Data Mining for Business Intelligence Projects Paola Britos 1, Oscar Dieste 2 and Ramón García-Martínez 3 1 Software and Knowledge Engineering Center. Buenos Aires Institute
FlowSpy: : exploring Activity-Execution Patterns from Business Processes
FlowSpy: : exploring Activity-Execution Patterns from Business Processes Cristian Tristão 1, Duncan D. Ruiz 2, Karin Becker 3 [email protected], [email protected], [email protected] 1 Departamento de
Towards a Methodology for the Design of Intelligent Tutoring Systems
Research in Computing Science Journal, 20: 181-189 ISSN 1665-9899 Towards a Methodology for the Design of Intelligent Tutoring Systems Enrique Sierra, Ramón García-Martínez, Zulma Cataldi, Paola Britos
Curriculum Reform in Computing in Spain
Curriculum Reform in Computing in Spain Sergio Luján Mora Deparment of Software and Computing Systems Content Introduction Computing Disciplines i Computer Engineering Computer Science Information Systems
50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008
50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008 Fabricante: Indra Grupo: Inteligencia de Negocios Subgrupo: SQL Server 2008 - ETL - AS - RS Formación: Indra Horas: 25 Introducción
Academic Performance: An Approach From Data Mining
Academic Performance: An Approach From Data Mining David L. LA RED MARTINEZ Julio C. ACOSTA Valeria E. URIBE Alice R. RAMBO Dpto. Informática, FaCENA, Universidad Nacional del Nordeste (UNNE) (3400) Corrientes,
Pattern Recognition in Medical Images using Neural Networks. 1. Pattern Recognition and Neural Networks
Pattern Recognition in Medical Images using Neural Networks Lic. Laura Lanzarini 1, Ing. A. De Giusti 2 Laboratorio de Investigación y Desarrollo en Informática 3 Departamento de Informática - Facultad
Subject Description Form
Subject Description Form Subject Code Subject Title COMP417 Data Warehousing and Data Mining Techniques in Business and Commerce Credit Value 3 Level 4 Pre-requisite / Co-requisite/ Exclusion Objectives
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
KNOWLEDGE DISCOVERY BASED ON COMPUTATIONAL TAXONOMY AND INTELLIGENT DATA MINING
KNOWLEDGE DISCOVERY BASED ON COMPUTATIONAL TAXONOMY AND INTELLIGENT DATA MINING Perichinsky, G. 1, García-Martínez, R. 2,3 & Proto, A. 4 1.- Data Base & Operative Systems Laboratory School of Engineering.
Intelligent Systems Applied to Optimize Building s Environments Performance
Intelligent Systems Applied to Optimize Building s Environments Performance E. Sierra 1, A. Hossian 2, D. Rodríguez 3, M. García-Martínez 4, P. Britos 5, and R. García-Martínez 6 Abstract By understanding
Diploma course ICT and informational advanced competences for in-service primary and secondary teachers in Mexico
ISSN 1989-9572 Diploma course ICT and informational advanced competences for in-service primary and secondary teachers in Mexico Diplomado de TIC y competencias informacionales avanzadas para maestros
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
INTELIGENCIA DE NEGOCIO CON SQL SERVER
INTELIGENCIA DE NEGOCIO CON SQL SERVER Este curso de Microsoft e-learning está orientado a preparar a los alumnos en el desarrollo de soluciones de Business Intelligence con SQL Server. El curso consta
Definition of a Technological Ecosystem for Scientific Knowledge Management in a PhD Programme
Definition of a Technological Ecosystem for Scientific Knowledge Management in a PhD Programme Alicia García-Holgado Francisco J. García-Peñalvo Mª José Rodríguez-Conde Research Group in InterAction and
Intelligent Systems to Assist in Cytological Diagnosis and to Train Cytotechnics TIN2004-07236
Jornadas de Seguimiento de Proyectos, 2007 Programa Nacional de Tecnologías Informáticas Intelligent Systems to Assist in Cytological Diagnosis and to Train Cytotechnics TIN2004-07236 Jose Manuel Zurita
A comparative study of two models for the seismic analysis of buildings
INGENIERÍA E INVESTIGACIÓN VOL. No., DECEMBER 0 (-) A comparative study of two models for the seismic analysis of buildings Estudio comparativo de dos modelos para análisis sísmico de edificios A. Luévanos
Susana Sanduvete-Chaves, Salvador Chacón-Moscoso, Milagrosa Sánchez- Martín y José Antonio Pérez-Gil ( )
ACCIÓN PSICOLÓGICA, junio 2014, vol. 10, n. o 2, 3-20. ISSN: 1578-908X 19 THE REVISED OSTERLIND INDEX. A COMPARATIVE ANALYSIS IN CONTENT VALIDITY STUDIES 1 EL ÍNDICE DE OSTERLIND REVISADO. UN ANÁLISIS
"34".!! "#$%&'()!*+!(#!*,!-%!.%/01%$2&%! 5-106&%78!9:!;(#%&1(!-%!3(70&6!<!=67>!9(?@%#!AB$%C!<!D@17!E&12(&?%!
"34".!! "#$%&'()!*+!(#!*,!-%!.%/01%$2&%! 5-106&%78!9:!;(#%&1(!-%!3(70&6!!9(?@%#!AB$%C!
Adaptación de MoProSoft para la producción de software en instituciones académicas
Adaptación de MoProSoft para la producción de software en instituciones académicas Adaptation of MoProSoft for software production in academic institutions Gabriela Alejandra Martínez Cárdenas Instituto
Move to Usability SOA Arquitecture: Undo Process Implementation
Move to Usability SOA Arquitecture: Undo Process Implementation Hernan Merlino, Oscar Dieste, Patricia Pesado, and Ramon Garcia-Martinez Abstract This work is a new stage of an investigation in usability
DIFFERENTIATIONS OF OBJECTS IN DIFFUSE DATABASES DIFERENCIACIONES DE OBJETOS EN BASES DE DATOS DIFUSAS
Recibido: 01 de agosto de 2012 Aceptado: 23 de octubre de 2012 DIFFERENTIATIONS OF OBJECTS IN DIFFUSE DATABASES DIFERENCIACIONES DE OBJETOS EN BASES DE DATOS DIFUSAS PhD. Amaury Caballero*; PhD. Gabriel
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Cuánto se demora una pit stop?
Cuánto se demora una pit stop? The Internet of Things Connect Transform Reimagine Edgar Galindo Septiembre 2015 Version 1.0 2 Agenda The IoT Por qué nos debería importar? Optimice su cadena de valor a
How To Learn More About Dmonge
Dr. David A. Monge National University of Cuyo (UNCuyo) ITIC Research Institute Espacio de la Ciencia y la Tecnología (ECT) Padre Jorge Contreras 1300, M5502JMA Mendoza, Argentina Phone 1: +54 (261) 4291000
Optimizing the Cellular Network Planning Process for In-Building Coverage using Simulation
Optimizing the Cellular Network Planning Process for In-Building Coverage using Simulation A. Huerta-Barrientos *, M. Elizondo-Cortés Departamento de Ingeniería de Sistemas, Facultad de Ingeniería Universidad
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
ENVIRONMENT: Collaborative Learning Environment
Guía Integrada de Actividades Contexto de la estrategia de aprendizaje a desarrollar en el curso: The activity focuses on the Task Based Language Learning (TBLL). The task is used by the student in order
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
Healthcare Data Mining: Prediction Inpatient Length of Stay
3rd International IEEE Conference Intelligent Systems, September 2006 Healthcare Data Mining: Prediction Inpatient Length of Peng Liu, Lei Lei, Junjie Yin, Wei Zhang, Wu Naijun, Elia El-Darzi 1 Abstract
A FIRST COURSE IN SOFTWARE ENGINEERING METHODS AND THEORY UN CURSO INICIAL SOBRE TEORÍA Y MÉTODOS DE LA INGENIERÍA DE SOFTWARE
INVITED ARTICLE A FIRST COURSE IN SOFTWARE ENGINEERING METHODS AND THEORY UN CURSO INICIAL SOBRE TEORÍA Y MÉTODOS DE LA INGENIERÍA DE SOFTWARE CARLOS ZAPATA Ph.D., Profesor Asociado, Facultad de Minas,
PROBLEM-BASED LEARNING IN MATERIALS AND MANUFACTURING ENGINEERING EDUCATION ACCORDING TO THE ITESM-2015
PROBLEM-BASED LEARNING IN MATERIALS AND MANUFACTURING ENGINEERING EDUCATION ACCORDING TO THE ITESM-2015 Eduardo Cárdenas Alemán, César Alberto Núñez López, Juan Oscar Molina Solís Monterrey Institute of
New Server Installation. Revisión: 13/10/2014
Revisión: 13/10/2014 I Contenido Parte I Introduction 1 Parte II Opening Ports 3 1 Access to the... 3 Advanced Security Firewall 2 Opening ports... 5 Parte III Create & Share Repositorio folder 8 1 Create
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Dirección de Tecnologías de Información COM-16101-001. Web and Social Media Analytics 22 de Septiembre de 2010
Dirección de Tecnologías de Información COM-16101-001 Web and Social Media Analytics 22 de Septiembre de 2010 Dr. Víctor M. González y González [email protected] Agenda Cambios en el curso Business
Speech understanding in dialogue systems
Speech understanding in dialogue systems Sergio Grau Puerto [email protected] Departament de Sistemes Informàtics i Computació Universitat Politècnica de València Sergio Grau Puerto. Carnegie Mellon: June
Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing
Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition
Europass Curriculum Vitae
Europass Curriculum Vitae Personal information First name(s) / Surname(s) Germán Ros-Sánchez Address(es) (1) Prat de la Riba, #33, 3 rd floor (3 rd door). Cerdanyola del Vallès 08290, Barcelona (Spain).
VMware vsphere with Operations Management: Fast Track
VMware vsphere with Operations Management: Fast Track Duración: 5 Días Código del Curso: VSOMFT Método de Impartición: Curso Cerrado (In-Company) Temario: Curso impartido directamente por VMware This intensive,
College of Health and Human Services. Fall 2013. Syllabus
College of Health and Human Services Fall 2013 Syllabus information placement Instructor description objectives HAP 780 : Data Mining in Health Care Time: Mondays, 7.20pm 10pm (except for 3 rd lecture
1313.- Grado en Administración y Dirección de Empresas, Mención Creación y Dirección de Empresas, Itinerario Emprendedores
Guía Docente 35802 Estrategia de Marketing / Marketing Strategy FICHA IDENTIFICATIVA Datos de la Asignatura Código 35802 Titulación Nombre Carácter Ciclo Curso 1313.- Grado en Administración y Dirección
NEW TOOLS FOR THE SELECTION OF TECHNOLOGIES; APPLICATION TO SHEET METAL FORMING
XI CONGRESO INTERNACIONAL DE INGENIERIA DE PROYECTOS LUGO, 26-28 Septiembre, 2007 NEW TOOLS FOR THE SELECTION OF TECHNOLOGIES; APPLICATION TO SHEET METAL FORMING Abstract David. Cortés Saenz (p), Carles.
A virtual sensor for monitoring excited thermal turbogenerator rotors
INGENIERÍA E INVESTIGACIÓN VOL. 32 No. 3, DECEMBER 2012 (5-9) A virtual sensor for monitoring excited thermal turbogenerator rotors Sensor virtual para el monitoreo térmico de rotores de turbogeneradores
Guidelines for Designing Web Maps - An Academic Experience
Guidelines for Designing Web Maps - An Academic Experience Luz Angela ROCHA SALAMANCA, Colombia Key words: web map, map production, GIS on line, visualization, web cartography SUMMARY Nowadays Internet
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Strategies to Reduce Defects in Floor and Wall Tiles; Application of Continuous Improvement Processes
Strategies to Reduce Defects in Floor and Wall Tiles; Application of Continuous Improvement Processes P. Del Solar and M. Del Río Abstract Continuous improvement is a key element in any business strategy,
Data Mining. 1 Introduction 2 Data Mining methods. Alfred Holl Data Mining 1
Data Mining 1 Introduction 2 Data Mining methods Alfred Holl Data Mining 1 1 Introduction 1.1 Motivation 1.2 Goals and problems 1.3 Definitions 1.4 Roots 1.5 Data Mining process 1.6 Epistemological constraints
Organizational agility through project portfolio management. Dr Catherine P Killen University of Technology, Sydney (UTS)
Organizational agility through project portfolio management Dr Catherine P Killen University of Technology, Sydney (UTS) Acerca del Autor Catherine Killen es profesor en la Universidad Tecnología de Sídney
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Dyna ISSN: 0012-7353 [email protected] Universidad Nacional de Colombia Colombia
Dyna ISSN: 0012-7353 [email protected] Universidad Nacional de Colombia Colombia VELÁSQUEZ HENAO, JUAN DAVID; RUEDA MEJIA, VIVIANA MARIA; FRANCO CARDONA, CARLOS JAIME ELECTRICITY DEMAND FORECASTING USING
Evaluation of an exercise for measuring impact in e-learning: Case study of learning a second language
Evaluation of an exercise for measuring impact in e-learning: Case study of learning a second language J.M. Sánchez-Torres Universidad Nacional de Colombia Bogotá D.C., Colombia [email protected]
CONCEPTS OF INDUSTRIAL AUTOMATION. By: Juan Carlos Mena Adolfo Ortiz Rosas Juan Camilo Acosta
CONCEPTS OF By: Juan Carlos Mena Adolfo Ortiz Rosas Juan Camilo Acosta What is industrial automation? Introduction Implementation of normalized technologies for optimization of industrial process Where
Valther Galván Ponce de León. V. Galván Ponce de León. Universidad Iberoamericana
Success case - reinventing communications through the implementation of cisco unified communications in a bank of niche. Innovative response to the growing demand for communications, offering corporate
Knowledge Discovery from Data Bases Proposal for a MAP-I UC
Knowledge Discovery from Data Bases Proposal for a MAP-I UC P. Brazdil 1, João Gama 1, P. Azevedo 2 1 Universidade do Porto; 2 Universidade do Minho; 1 Knowledge Discovery from Data Bases We are deluged
KNOWLEDGE BASE DATA MINING FOR BUSINESS INTELLIGENCE
KNOWLEDGE BASE DATA MINING FOR BUSINESS INTELLIGENCE Dr. Ruchira Bhargava 1 and Yogesh Kumar Jakhar 2 1 Associate Professor, Department of Computer Science, Shri JagdishPrasad Jhabarmal Tibrewala University,
Reading comprehension through group work activities in an EFL classroom: An action research report
Reading comprehension through group work activities in an EFL classroom: An action research report Arafat Rahaman ISSN 1699-437X Year 2014, Volume 10, Number 2 (September) Abstract: This classroom action
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
UNIVERSIDAD PONTIFICIA COMILLAS FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATION
UNIVERSIDAD PONTIFICIA COMILLAS FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATION List of Subjects by Department 14-15 DEPARTAMENTO DE ECONOMÍA - DEPARTAMENT OF ECONOMICS Análisis de la Coyuntura Analysis
Consumer Behavior (21916) 2013-2014
Consumer Behavior (21916) 2013-2014 Degree: Grau en Administració I Direcció d Empreses Trimester: 2 Language: English Credits: 5 Sessions: Theory Sessions: Thursday- Friday 9.00-10.30 [group 1] 19.00-20.30
CURRICULUM VITAE. Name: Ana Maria Iglesias Maqueda. Date: 5/10/2004. Signature:
CURRICULUM VITAE Name: Ana Maria Iglesias Maqueda Date: 5/10/2004 Signature: PERSONAL DATA FAMILY NAME: Iglesias Maqueda FIRST NAME: Ana Maria PASSPORT NUMBER: 6.251.356 DATE OF BIRTH: 05/18/1975 GENDER:
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Inteligencia Artificial Representación del conocimiento a través de restricciones (continuación)
Inteligencia Artificial Representación del conocimiento a través de restricciones (continuación) Gloria Inés Alvarez V. Pontifica Universidad Javeriana Cali Periodo 2014-2 Material de David L. Poole and
Master in Science, specialty in Information Systems. ITESM. México, June 1984.
LAURA CRUZ REYES Instituto Tecnológico de Cd. Madero División de Estudios de Posgrado e Investigación Juventino Rosas y Jesús Urueta Cd. Madero Tamaulipas México CP. 89440 Tel/Fax (52) 833 215 85 44 e-mail:
Cambridge IGCSE. www.cie.org.uk
Cambridge IGCSE About University of Cambridge International Examinations (CIE) Acerca de la Universidad de Cambridge Exámenes Internacionales. CIE examinations are taken in over 150 different countries
AN ENVIRONMENT BASED ON PRE-CONCEPTUAL SCHEMAS FOR AUTOMATICALLY GENERATING SOURCE CODE UNDER THE MVC PATTERN
AN ENVIRONMENT BASED ON PRE-CONCEPTUAL SCHEMAS FOR AUTOMATICALLY GENERATING SOURCE CODE UNDER THE MVC PATTERN UN ENTORNO PARA LA GENERACIÓN AUTOMÁTICA DE CÓDIGO BAJO EL PATRÓN MVC A PARTIR DE ESQUEMAS
Sales Management Main Features
Sales Management Main Features Optional Subject (4 th Businesss Administration) Second Semester 4,5 ECTS Language: English Professor: Noelia Sánchez Casado e-mail: [email protected] Objectives Description
Secure Architectures for a Three-Stage Polling Place Electronic Voting System
Secure Architectures for a Three-Stage Polling Place Electronic Voting System Josué Figueroa González and Silvia B. González Brambila Departamento de Sistemas, Universidad Autónoma Metropolitana, Azcapotzalco,
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
ENSEMBLE DECISION TREE CLASSIFIER FOR BREAST CANCER DATA
ENSEMBLE DECISION TREE CLASSIFIER FOR BREAST CANCER DATA D.Lavanya 1 and Dr.K.Usha Rani 2 1 Research Scholar, Department of Computer Science, Sree Padmavathi Mahila Visvavidyalayam, Tirupati, Andhra Pradesh,
Marta Zorrilla Universidad de Cantabria
Tipos de problemas Marta Zorrilla Universidad de Cantabria Slides from Tan, P., Steinbach, M., Kumar, V. Introduction to data mining. Pearson Prentice Hall. 2006 Data Mining Tasks Prediction Methods Use
270107 - MD - Data Mining
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 015 70 - FIB - Barcelona School of Informatics 715 - EIO - Department of Statistics and Operations Research 73 - CS - Department of
Test effort: A pre-conceptual-schema-based representation
Test effort: A pre-conceptual-schema-based representation Carlos Mario Zapata-Jaramillo a & Diana María Torres-Ricaurte b a Facultad de Minas, Universidad Nacional de Colombia, Colombia. [email protected]
PREDICTING THE INTENTION OF USING A TECHNOLOGY PRODUCT OR SERVICE THROUGH A FUZZY CONTROLLER
PREDICTING THE INTENTION OF USING A TECHNOLOGY PRODUCT OR SERVICE THROUGH A FUZZY CONTROLLER Libertad Caicedo Acosta (District University Francisco José de Caldas, Bogotá, Colombia) licedoa@correo,udistrital.edu.co
COURSE GUIDE: Ubiquitous Computing and Ambient Intelligence (UCAMI)
COURSE GUIDE: Ubiquitous Computing and Ambient Intelligence (UCAMI) Academic year: 2013-2014 Program: Center: University: Communication Technologies (i 2 -CIT) Universidad Autónoma de Madrid Last modified:
Fluency With Information Technology CSE100/IMT100
Fluency With Information Technology CSE100/IMT100 ),7 Larry Snyder & Mel Oyler, Instructors Ariel Kemp, Isaac Kunen, Gerome Miklau & Sean Squires, Teaching Assistants University of Washington, Autumn 1999
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
