BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems
|
|
|
- Cecil Grant
- 9 years ago
- Views:
Transcription
1 BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Knowledge Based Systems Overall Comments Compared to last year, the pass rate is significantly better this year. Average marks are fairly consistent across questions 1,2, 3, 4, though, a little on the low side. Standard deviation results are fairly low across all questions.thus, it may be concluded that the candidates appear to be fairly equated in their ability. However, the spread of results (range) is wide which would indicate that there were some high achieving candidates. Question 3 was a disappointment as it was worst answered, but has appeared in various forms on previous test papers. Question 5 was anticipated to attract the best performance since it has appeared on previous exam papers, and indeed, it was the best attempted. In general, candidates seem not to have prepared well for the paper, and have taken an instrumental approach in which they have revised previous exam questions and attempted to recreate the answers verbatim, as many answers across different test centres were quite formulaic and similar. Where variations in questions have been included, candidates have struggled. Question A1 1. Data Mining has been capitalised on in the commercial world through the implementation of Business Intelligence Systems. i. Discuss how Data Mining technologies have made the transition from research laboratory to business applications. Focus on the real business problems that data mining technologies address and the benefits perceived to have been realised. (20 marks) ii. Discuss the implications of using intelligent data analytics to unfairly exploit data on user behaviour. (5 marks) Answer Pointers and Marking Scheme: Question 1.i: 20 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of commercial usage of data mining technology, and how application tools have been developed for use by the nontechnical business user. 1. The learner will understand the main approaches used in AI problem solving. [1.2] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.3, 4.4] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6, 6.7] particularly on the Internet. [7.1, 7.2, 7.3,7.4]
2 Data mining is often used in business, particularly on the web, to provide support for the implicit web, in which personal information about the user is indirectly discovered from their normal interactions. Such valuable knowledge enables tailoring and personalization of services. With the increased power of Web 2.0, in which users are generators of data and not just consumers, many new opportunities have emerged for technologies that can make value of the available data. Data mining as employed in business intelligence systems and data analytics are means by which Strategic management is implemented. The knowledge derived from analysis of data using data mining helps a decision maker understand the nature of the problem better and supports better informed decision making. Data Mining can support the tactical detail about exactly how a strategy will translate to actions. In the business world, data mining is used extensively for personalized marketing, e.g. for profiling users and targeting advertisements to their interests and needs. Question 1.ii: 5 marks. General distribution of marks according to salient Candidates must demonstrate current awareness of an important application of artificial intelligence technology, data mining, and comment on its potential dangers in the context of privacy. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5] particularly on the Internet. [7.1, 7.2, 7.3, 7.4] Data mining is now used in intelligent search engines on the web (Google), games, consumer robots with vision systems, handwriting reading in PDA, speech synthesis in word processors, intelligent tutoring, knowledge management, etc. As knowledge working grows, it is expected that such technologies would continue to become more prevalent and the potential for abuse of privacy thus grows. A major factor impacting on the spread of data analytics is concerns with the manner in which data are collected, interpreted, distributed and manipulated to achieve a competitive advantage. The limits of what is acceptable to the consumer can often be pushed by companies seeking to capitalize on the value of data. As an example, employers these days can and do survey personal data on social network sites, such
3 as Facebook, to glean background data on prospective employees. Answers could describe how monitoring of pages visited (times and location) can be used to develop a profile of users interests without their explicit consent to that information, which could be potentially sold on, or used to target marketing campaigns. Answers must consider realistic and timely reasons, e.g. right now technological growth in terms of mobile systems enables data to be stored on location, which can be interpreted to the advantage of marketers. EXAMINER S COMMENTS Question 1 has appeared on previous exam papers in various forms, so it was expected that performance would be better. However, students did not cope well even with the standard topic of data mining. QA1(i): What was required 1. Data mining technology is now more reliable, cheaper and accessible. 2. Businesses now make use of large amounts of data and ways to exploit that data resource are in demand for better service and competitive advantage 3. Use of Internet and cloud means that data is being generated in large amounts and is relatively easy to gather in order to process. 4. Use of mobile technologies and the Internet of things contributes to the mass of Big data available on the Internet as an untapped resource. 5. Description of data mining and business intelligence required 6. Relationship between functions of data mining (patter generation, rule induction, clustering) and requirements of business (e.g. rules for business knowledge, market segmentation analysis) should be included. QA1(i): What was included by students 1. Tend to focus on different hypothetical applications of data mining without specific cases being cited 2. Tend to confuse data mining with database access 3. Tend to confuse data collection of individual cases (e.g. from a customer) and processing of big data patterns and trends (without identification of individuals) QA1(ii): What was required 1. Data analytics may be unreliable and too much dependence may be placed on them. 2. Checks must be in place to prevent unauthorised use/selling of data and avoid spam/fraud. 3. Consent should be gained before data are collected and used.
4 4. Process needs to be more transparent but business has vested interest in keeping data analytics processes opaque to third parties. QA1(ii): What was included by students 1. Tend to look at the advantages and disadvantages of Data analytics 2. Tend to confuse data analytics with data mining 3. Tend not to consider privacy issues explicitly Question A2 2. AI technologies each offer different advantages and limitations; consider neural networks and case-based reasoning and i. Explain why the chosen problem could not be solved by one technology alone and justify why a hybrid system must be used that would, in principle, overcome the limitations inherent in each technology. (10 marks) ii. Describe how the two technologies could be used in combination to solve the chosen problem. (15 marks) MODEL ANSWER POINTERS Question 2.i: 10 marks. Five marks for each technology discussed. Candidates must demonstrate an ability to critically evaluate the two AI technologies and be able to synthesise knowledge in to a cohesive vision of an application that integrates both technologies. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] Combining neural nets with case based systems must be addressed. Brief explanations of each technology should be included, with discussion of the comparative merits of each. An ability to provide explanations for the outputs of the NN, to deal with applications in which knowledge is implicit, or an ability to learn and self-develop are possible benefits. Together they could be used for different aspects of a given task. The requirements of the task must be discussed, e.g. that it embodies implicit knowledge, or that there are many existing examples of cases available. Together, e.g. CBR can be used to train the NN, which will then be employed for decision-making. CBR could be used to explain or justify the solutions from the NN.
5 Question 2.ii: 15 marks. General distribution of marks according to salient Candidates must be able to generate an hypothesised system architecture and produce appropriate representations of the knowledge embodied in the system, as well as be able to run a virtual simulation of a problem solving scenario. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] 3. The learner will understand methodological approaches to developing knowledgebased systems. [3.3, 3.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.2, 6.3, 6.4, 6.5] particularly on the Internet. [7.1, 7.2, 7.3] Candidates may choose any recognized knowledge representation formalism, e.g. rules, cases, frames, logic, etc. A clear explanation of the knowledge base must be provided from which it should be possible to understand how the case based-kbs would be utilised in combination with the NN to solve problems. It is important that the example shows collaboration between the two knowledge bases. EXAMINER S COMMENTS Question 2 is a variation of a question that has appeared on previous exam papers. Students were expected to perform well on this topic but they struggled to consider both AI technologies in combination. QA2(i): What was required 1. Identify a specific problem and discuss its requirements in terms of AI technologies. 2. Explain the principles of hybrid systems and the potential to solve the chosen problem by combining benefits and compensating for limitations of each separate technology QA2(i): What was included by students 1. Tend to not specify a particular problem 2. Tend to explain technologies separately but not relate to problem 3. Tend to consider other technologies (e.g. Fuzzy systems) instead of NN and CBR
6 4. Tend to confuse rule based systems with CBR and NN QA2(i): What was required 1. Focus on chosen problem and the process of problem solution 2. Demonstrate integration or co-operation between CBR and NN to solve problem 3. Highlight the dependency on hybridisation to solve the problem QA2(ii): What was included by students 1. Tend to describe technologies separately 2. Do not focus on the steps of the problem solution process 3. Tend to be superficial and lack technical details Question A3 3. AI technologies often emerge from insight to the way nature works. These natural ideas are shaped in to forms that enable technological solutions to be developed. Consider genetic algorithms and i. Describe the inspiration from nature that has most significantly contributed to its development. (10 marks) ii. Specify a suitable problem of your choice (i.e. one that requires an intelligent approach) and explain how a genetic algorithm approach could be used to produce a solution. (15 marks) iii. MODEL ANSWER POINTERS Question 3.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of the bases of much of AI in nature, and show direct contribution that nature has had on the development of AI technologies genetic algorithms. 1. The learner will understand the main approaches used in AI problem solving. [1.1,1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.4] apply them to problem solving.[5.1, 5.2, 5.3] Genetic algorithms human gene evolution. Candidates should outline the principles of human gene evolution as they relate to the methods of genetic algorithms. The discussion should highlight similarities and differences, and evaluate the extent to which GA technology development can be traced to knowledge of the mechanisms of human evolution.
7 Question 3.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the criteria that makes a problem or task suitable for a KBS approach, and show an ability to solve a problem using GA methods. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.5] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving.[5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6] particularly on the Internet. [7.1, 7.2, 7.3] A clear explanation of the task must be provided from which it should be possible to understand that it requires an intelligent approach to solve it, and further, that the solution method is sound. It is important that the solution shows clear linkage to the natural phenomenon for its explanation. The task should be complex, require nonalgorithmic methods, and be focused on optimisation or one that entails intelligent search. The answer should reference inheritance, mutation, selection, and crossover. The concepts of population, generations, fitness, evolution, etc. should be mentioned appropriately. EXAMINER S COMMENTS Question 3 has appeared on previous exam papers as it covers some basic concepts of knowledge-based systems and AI. However, this question proved to be the most challenging for students. QA3(i): What was required 1. Identify Theory of Evolution and DNA as relevant concepts from nature. 2. Describe Evolution and DNA processes as experienced in nature. 3. Relate GA processes to Evolution and DNA to show similarity
8 QA3(i): What was included by students 1. Failed to describe Evolution and DNA adequately or at all. 2. Tend to present GA processes in isolation without connexion to nature 3. Tend to confuse ANN with GA and focused on human neural system. QA3(ii): What was required 1. Identify suitable problem 2. Describe in detail step by step how GA could be applied to solve problem QA3(ii): What was included by students 1. Failed to specify suitable "intelligent" problem 2. Tend to provide superficial description of GA process 3. Failed to relate in detail the steps of GA with the problem requirements (i.e. no worked example) Question B4 4. Knowledge elicitation involves modelling the knowledge used by an expert to solve problems. Consider an example application domain and construct a knowledge base for the domain by completing the following tasks: i. Describe briefly general methods that could be applied to elicit the knowledge needed to solve a small complex problem. (10 marks) ii. Present an example knowledge base using a knowledge representation formalism of your choice. Ensure that it is adequately annotated with a textual explanation of how it could be used to solve suitable problems. (15 marks) MODEL ANSWER POINTERS Question 4.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of how knowledge is elicited and acquired for a KBS. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] 3. The learner will understand methodological approaches to developing knowledgebased systems. [3.1, 3.2, 3.3, 3.4] apply them to problem solving.[5.1, 5.2, 5.3] Techniques such as interviewing, observation, repertory grid, and automated
9 elicitation systems, machine learning, user maintenance should be discussed. Appropriate methodologies could be discussed too, such as KADS. Suitability of methods for task and situations should be explained. Question 4.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the criteria that makes a problem or task suitable for a KBS approach, and show an ability to solve a problem using KBS methods. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.5] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving.[5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6] particularly on the Internet. [7.1, 7.2, 7.3] A clear explanation of the task must be provided from which it should be possible to understand that it requires an intelligent approach to solve it, and further, that the solution method is sound. Candidates may choose any recognized knowledge representation formalism, e.g. rules, cases, frames, logic, etc. A clear explanation of the knowledge base must be provided from which it should be possible to understand how the KB would be utilised to solve problems. For example, a rule based approach could be used and should include a set of selfconsistent production rules: IF antecedent Then consequent
10 EXAMINER S COMMENTS Question 4 has appeared many times in various forms on previous exam papers, and should be familiar to candidates. However, performance was disappointing. QA4(i): What was required 1. Describe methods such as automated elicitation, knowledge discovery, observation, interviews, task analysis. 2. Identify example complex problem and relate methods to specific problem context. QA4(ii): What was included by students 1. Mentioned basic elicitation methods such as questionnaires, interviews, and observation but not automated methods (e.g. learning) 2. Did not specify specific problem or relate methods to context 3. Lacked details on presented methods. 4. Confused knowledge elicitation methods with inference methods (i.e. FW and BW chaining) QA4(ii): What was required 1. Identify specific problem context. 2. Generate small knowledge base with sample knowledge (e.g. using rules, frames, cases, logic) 3. Walk-through problem solution process with the knowledge base as it executes to solve the problem. QA4(ii): What was included by students 1. Tended not to specify detailed problem context. 2. Tended to provide few knowledge items for the knowledge base (e.g. only 3 or 4 rules) 3. Tended to include multiple knowledge types briefly rather than one in detail. 4. Failed to provide walk-through in detail of problem solution process.
11 Question B5 5. There are many alternative ways to solve a problem, each of which has its own merits in a particular situation. i. Explain both brute-force and heuristic search methods and discuss their relative merits with the aid of suitable examples. (10 marks) ii. Explain the difference between inductive and deductive reasoning and comment on the suitability of each for example problems of your choice. (15 marks) Question 5.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the methods employed in AI for search, and be able to evaluate each on particular criteria. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5, 6.6] particularly on the Internet. [7.2, 7.3, 7.4] The solution should compare and contrast the two search techniques and make reference to the following points: Uninformed search An uninformed search algorithm is one that does not take into account the specific nature of the problem. As such, they can be implemented in general, and then the same implementation can be used in a wide range of problems thanks to abstraction. The drawback is that most search spaces are extremely large, and an uninformed search (especially of a tree) will take a reasonable amount of time only for small examples. As such, to speed up the process, sometimes only an informed search will do. Informed search In an informed search, a heuristic that is specific to the problem is used as a guide. A good heuristic will make an informed search dramatically out-perform any uninformed search. There are few prominent informed list-search algorithms. A possible member of that category is a hash table with a hashing function that is a heuristic based on the problem at hand. Most informed search algorithms explore trees, such as the Bestfirst search, which is a search with a heuristic that attempts to predict how close the end of a path is to a solution, so that paths which are judged to be closer to a solution
12 are extended first. Efficient selection of the current best candidate for extension is typically implemented using a priority queue. Question 5.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the methods employed in AI for problem solving and reasoning, and be able to evaluate each on particular criteria. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2, 1.3] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5, 6.6] particularly on the Internet. [7.2, 7.3, 7.4] Solutions should provide descriptions of the two general techniques and address the points of difference. It is essential that the answer contain example tasks that are each best solved using one of the techniques. The discussion should make it clear why the task requires a particular approach, i.e. the nature of the task (data driven or goal driven), and step by-step explanations should be included to illustrate problem solution. EXAMINER S COMMENTS Question 5 has appeared on previous exam papers so it was expected that candidates would attempt it and perform relatively well. QA5(i): What was required 1. Define search in general 2. Describe Brute-force as uninformed and comprehensive 3. Describe heuristic as informed and satisfying 4. Provide example methods of each type of reasoning (e.g. depth-first/a*) 5. Discuss merits of each and compare/contrast 6. Demonstrate with example
13 QA5(i): What was included by students 1. Confused informed and uninformed when giving definitions. 2. Tend to give incomplete definitions. 3. Failed to provide adequate examples of each type of search. 4. Failed to compare and contrast search methods adequately. 5. Failed to include general definition of search. QA5(ii): What was required 1. Define reasoning in general 2. Explain Inductive reasoning as ampliative (i.e. permits generalisation from specifics), uncertain (probabilistic), permits erroneous reasoning (e.g. false conclusions (generalisations) to be produced from available evidence (true premises)) 3. Acknowledges notion of strong/weak conclusions from inductive reasoning. 4. Explain deductive reasoning as non-ampliative, confirmatory (asserts specifics from known generals), certain conclusions if supported by valid premises. 5. Acknowledges notion of valid/invalid arguments. 4. Compare and contrast using suitable examples. QA5(ii): What was included by students 1. Confused inductive and deductive and sometimes discussed the wrong way round. 2. Failed to provide general definition of reasoning. 3. Tended to provide brief definitions only. 4. Sometimes incomplete examples of reasoning provided. 5. Confused deductive and inductive with forward and backward chaining respectively
Chapter 11. Managing Knowledge
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
IAI : Expert Systems
IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm
Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules.
Strategic Marketing Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a pass in both mandatory
Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015
Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students
Business Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS *
EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS * EXECUTIVE SUPPORT SYSTEMS DRILL DOWN: ability to move
INTELLIGENT DECISION SUPPORT SYSTEMS FOR ADMISSION MANAGEMENT IN HIGHER EDUCATION INSTITUTES
INTELLIGENT DECISION SUPPORT SYSTEMS FOR ADMISSION MANAGEMENT IN HIGHER EDUCATION INSTITUTES Rajan Vohra 1 & Nripendra Narayan Das 2 1. Prosessor, Department of Computer Science & Engineering, Bahra University,
Nine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
Machine Learning: Overview
Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave
Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules.
Module Specification: Strategic Marketing Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
OCR LEVEL 2 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING CLOUD COMPUTING L/505/5652 LEVEL 2 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Understanding cloud
REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION
REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION Pilar Rey del Castillo May 2013 Introduction The exploitation of the vast amount of data originated from ICT tools and referring to a big variety
Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
Masters in Artificial Intelligence
Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
LONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
P2 Performance Management March 2014 examination
Management Level Paper P2 Performance Management March 2014 examination Examiner s Answers Note: Some of the answers that follow are fuller and more comprehensive than would be expected from a well-prepared
A Knowledge Base Representing Porter's Five Forces Model
A Knowledge Base Representing Porter's Five Forces Model Henk de Swaan Arons ([email protected]) Philip Waalewijn ([email protected]) Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam,
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013
About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director
01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING THE BUSINESS ANALYTICS PROCESS FOR BIG DATA J/505/5326 LEVEL 3 UNIT 39 GUIDED LEARNING HOURS: 60 UNIT CREDIT
Masters in Computing and Information Technology
Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Improving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.
Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
Genetic Algorithms and Sudoku
Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 [email protected] MICS 2009
DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
Masters in Human Computer Interaction
Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from
Masters in Advanced Computer Science
Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate
Writing Your PG Research Project Proposal
Writing Your PG Research Project Proposal Typically, most research project proposals will contain the following elements: The proposed title of your research project An outline of the scope and rationale
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Master of Science in Computer Science
Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,
Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking
Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking Rajendra M Sonar, Asst Professor (IT), SJM School of Management, Indian Institute of Technology Bombay Powai,
Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
Masters in Networks and Distributed Systems
Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to
Chapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
Using Artificial Intelligence to Manage Big Data for Litigation
FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Using Artificial Intelligence to Manage Big Data for Litigation Understanding Artificial Intelligence to Make better decisions Improve the process Allay the fear
Introduction. Chapter 1
Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because
Mastering Metrics is a 15-credit mandatory module which sits within the suite of Level 6 modules.
Mastering Metrics Mastering Metrics is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a pass in both mandatory modules
Five High Order Thinking Skills
Five High Order Introduction The high technology like computers and calculators has profoundly changed the world of mathematics education. It is not only what aspects of mathematics are essential for learning,
How to Become a Data Driven Business
January 2012 Executive summary Becoming a Data Driven Business, particularly from a Marketing perspective, presents significant benefits in helping your business to grow, develop and succeed, by working
IAM Level 6. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition
IAM Level 6 Diploma in Business and Administrative Management Qualification handbook 2011 edition Published by the IAM IAM 2011 Registered charity number 254807 Published 2011 All rights reserved. This
Organisation Profiling and the Adoption of ICT: e-commerce in the UK Construction Industry
Organisation Profiling and the Adoption of ICT: e-commerce in the UK Construction Industry Martin Jackson and Andy Sloane University of Wolverhampton, UK [email protected] [email protected] Abstract:
Reaching CMM Levels 2 and 3 with the Rational Unified Process
Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project
Principal Hiring Scorecard 1
Principal Hiring Scorecard A high-quality principal hiring process has far-ranging impacts on the leadership and student learning in a given school. The principal hiring should be fair, rigorous, and data-driven,
Preparatory Action on the enhancement of the European industrial potential in the field of Security research
PASR Preparatory Action on the enhancement of the European industrial potential in the field of Security research Grant Agreement no. 108600 Supporting activity acronym: PRISE Activity full name: Privacy
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research
Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:
Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires
Course 395: Machine Learning
Course 395: Machine Learning Lecturers: Maja Pantic ([email protected]) Stavros Petridis ([email protected]) Goal (Lectures): To present basic theoretical concepts and key algorithms that form the core
NON-PROBABILITY SAMPLING TECHNIQUES
NON-PROBABILITY SAMPLING TECHNIQUES PRESENTED BY Name: WINNIE MUGERA Reg No: L50/62004/2013 RESEARCH METHODS LDP 603 UNIVERSITY OF NAIROBI Date: APRIL 2013 SAMPLING Sampling is the use of a subset of the
This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making.
Lost in a sea of data? Facing an external audit? Or just wondering how you re going meet the challenges of the next regulatory law? When you need fast, dependable support and company-specific solutions
Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)
Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate
Day 7 Business Information Systems-- the portfolio. Today s Learning Objectives
Day 7 Business Information Systems-- the portfolio MBA 8125 Information technology Management Professor Duane Truex III Today s Learning Objectives 1. Define and describe the repository components of business
An Introduction to Advanced Analytics and Data Mining
An Introduction to Advanced Analytics and Data Mining Dr Barry Leventhal Henry Stewart Briefing on Marketing Analytics 19 th November 2010 Agenda What are Advanced Analytics and Data Mining? The toolkit
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I
Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy
Session 10 : E-business models, Big Data, Data Mining, Cloud Computing
INFORMATION STRATEGY Session 10 : E-business models, Big Data, Data Mining, Cloud Computing Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Internet
A Review And Evaluations Of Shortest Path Algorithms
A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing
MA in Theory and History of Typography & Graphic Communication For students entering in 2006
MA in Theory and History of Typography & Graphic Communication For students entering in 2006 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Faculty of Arts
BUSINESS STRATEGY SYLLABUS
Master of Science in Management BUSINESS STRATEGY SYLLABUS Academic Year 2011-2012 Professor: Yuliya Snihur Email: [email protected] Office hours: by appointment COURSE OUTLINE Strategy involves
Reflection Report International Semester
Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:
Contents. Dedication List of Figures List of Tables. Acknowledgments
Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description
Examiner s report F7 Performance Management June 2016
Examiner s report F7 Performance Management June 2016 General Comments The June 2016 paper represented the final paper in the current format. There were two sections; Section A consisted of 20, 2-mark
[ know me ] A Strategic Approach to Customer Engagement Optimisation
[ know me ] A Strategic Approach to Customer Engagement Optimisation A Verint and KANA White Paper Table of contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical
BEPS ACTIONS 8-10. Revised Guidance on Profit Splits
BEPS ACTIONS 8-10 Revised Guidance on Profit Splits DISCUSSION DRAFT ON THE REVISED GUIDANCE ON PROFIT SPLITS 4 July 2016 Public comments are invited on this discussion draft which deals with the clarification
Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market
Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market FILIPPO NERI University of Naples Department of Computer Science 80100 Napoli ITALY [email protected]
Visionet IT Modernization Empowering Change
Visionet IT Modernization A Visionet Systems White Paper September 2009 Visionet Systems Inc. 3 Cedar Brook Dr. Cranbury, NJ 08512 Tel: 609 360-0501 Table of Contents 1 Executive Summary... 4 2 Introduction...
Knowledge Engineering (Ingeniería del Conocimiento)
Knowledge Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 1: Introduction to Knowledge-Based Systems (KBSs) 1 Topic 1: Introduction to Knowledge- Based
STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
D A T A M I N I N G C L A S S I F I C A T I O N
D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.
Managing Knowledge. Chapter 11 8/12/2015
Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion Video Case 2: Tour: Alfresco: Open Source Document Management System Instructional Video 1: Analyzing
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview.
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Andersen Consultng 1600 K Street, N.W., Washington, DC 20006-2873 (202) 862-8080 (voice), (202) 785-4689 (fax) [email protected]
CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139
CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.
White Paper. Data Mining for Business
White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL
School of Computer Science
School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human
Writing learning objectives
Writing learning objectives This material was excerpted and adapted from the following web site: http://www.utexas.edu/academic/diia/assessment/iar/students/plan/objectives/ What is a learning objective?
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Integrated Communication
Integrated Communication Integrated Communication is a 15-credit mandatory module which sits within the suite of Level 4 modules. To gain the CIM Level 4 Certificate in Professional Marketing a pass in
Foundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
Capability Statement
Capability Statement The Lead Generation Company (LGCo) was established over eleven years ago and is s premier organisation in the provision of lead and marketing solutions. We have over a decade of experience
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT. Software Engineering 1. June 2015 EXAMINERS REPORT
BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT Software Engineering 1 June 2015 EXAMINERS REPORT General Comments This is a technical paper about Software Engineering. Questions seek to
Course Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
Chapter 6 - Enhancing Business Intelligence Using Information Systems
Chapter 6 - Enhancing Business Intelligence Using Information Systems Managers need high-quality and timely information to support decision making Copyright 2014 Pearson Education, Inc. 1 Chapter 6 Learning
