BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems

Size: px
Start display at page:

Download "BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT. March 2013 EXAMINERS REPORT. Knowledge Based Systems"

Transcription

1 BCS HIGHER EDUCATION QUALIFICATIONS Level 6 Professional Graduate Diploma in IT March 2013 EXAMINERS REPORT Knowledge Based Systems Overall Comments Compared to last year, the pass rate is significantly better this year. Average marks are fairly consistent across questions 1,2, 3, 4, though, a little on the low side. Standard deviation results are fairly low across all questions.thus, it may be concluded that the candidates appear to be fairly equated in their ability. However, the spread of results (range) is wide which would indicate that there were some high achieving candidates. Question 3 was a disappointment as it was worst answered, but has appeared in various forms on previous test papers. Question 5 was anticipated to attract the best performance since it has appeared on previous exam papers, and indeed, it was the best attempted. In general, candidates seem not to have prepared well for the paper, and have taken an instrumental approach in which they have revised previous exam questions and attempted to recreate the answers verbatim, as many answers across different test centres were quite formulaic and similar. Where variations in questions have been included, candidates have struggled. Question A1 1. Data Mining has been capitalised on in the commercial world through the implementation of Business Intelligence Systems. i. Discuss how Data Mining technologies have made the transition from research laboratory to business applications. Focus on the real business problems that data mining technologies address and the benefits perceived to have been realised. (20 marks) ii. Discuss the implications of using intelligent data analytics to unfairly exploit data on user behaviour. (5 marks) Answer Pointers and Marking Scheme: Question 1.i: 20 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of commercial usage of data mining technology, and how application tools have been developed for use by the nontechnical business user. 1. The learner will understand the main approaches used in AI problem solving. [1.2] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.3, 4.4] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6, 6.7] particularly on the Internet. [7.1, 7.2, 7.3,7.4]

2 Data mining is often used in business, particularly on the web, to provide support for the implicit web, in which personal information about the user is indirectly discovered from their normal interactions. Such valuable knowledge enables tailoring and personalization of services. With the increased power of Web 2.0, in which users are generators of data and not just consumers, many new opportunities have emerged for technologies that can make value of the available data. Data mining as employed in business intelligence systems and data analytics are means by which Strategic management is implemented. The knowledge derived from analysis of data using data mining helps a decision maker understand the nature of the problem better and supports better informed decision making. Data Mining can support the tactical detail about exactly how a strategy will translate to actions. In the business world, data mining is used extensively for personalized marketing, e.g. for profiling users and targeting advertisements to their interests and needs. Question 1.ii: 5 marks. General distribution of marks according to salient Candidates must demonstrate current awareness of an important application of artificial intelligence technology, data mining, and comment on its potential dangers in the context of privacy. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5] particularly on the Internet. [7.1, 7.2, 7.3, 7.4] Data mining is now used in intelligent search engines on the web (Google), games, consumer robots with vision systems, handwriting reading in PDA, speech synthesis in word processors, intelligent tutoring, knowledge management, etc. As knowledge working grows, it is expected that such technologies would continue to become more prevalent and the potential for abuse of privacy thus grows. A major factor impacting on the spread of data analytics is concerns with the manner in which data are collected, interpreted, distributed and manipulated to achieve a competitive advantage. The limits of what is acceptable to the consumer can often be pushed by companies seeking to capitalize on the value of data. As an example, employers these days can and do survey personal data on social network sites, such

3 as Facebook, to glean background data on prospective employees. Answers could describe how monitoring of pages visited (times and location) can be used to develop a profile of users interests without their explicit consent to that information, which could be potentially sold on, or used to target marketing campaigns. Answers must consider realistic and timely reasons, e.g. right now technological growth in terms of mobile systems enables data to be stored on location, which can be interpreted to the advantage of marketers. EXAMINER S COMMENTS Question 1 has appeared on previous exam papers in various forms, so it was expected that performance would be better. However, students did not cope well even with the standard topic of data mining. QA1(i): What was required 1. Data mining technology is now more reliable, cheaper and accessible. 2. Businesses now make use of large amounts of data and ways to exploit that data resource are in demand for better service and competitive advantage 3. Use of Internet and cloud means that data is being generated in large amounts and is relatively easy to gather in order to process. 4. Use of mobile technologies and the Internet of things contributes to the mass of Big data available on the Internet as an untapped resource. 5. Description of data mining and business intelligence required 6. Relationship between functions of data mining (patter generation, rule induction, clustering) and requirements of business (e.g. rules for business knowledge, market segmentation analysis) should be included. QA1(i): What was included by students 1. Tend to focus on different hypothetical applications of data mining without specific cases being cited 2. Tend to confuse data mining with database access 3. Tend to confuse data collection of individual cases (e.g. from a customer) and processing of big data patterns and trends (without identification of individuals) QA1(ii): What was required 1. Data analytics may be unreliable and too much dependence may be placed on them. 2. Checks must be in place to prevent unauthorised use/selling of data and avoid spam/fraud. 3. Consent should be gained before data are collected and used.

4 4. Process needs to be more transparent but business has vested interest in keeping data analytics processes opaque to third parties. QA1(ii): What was included by students 1. Tend to look at the advantages and disadvantages of Data analytics 2. Tend to confuse data analytics with data mining 3. Tend not to consider privacy issues explicitly Question A2 2. AI technologies each offer different advantages and limitations; consider neural networks and case-based reasoning and i. Explain why the chosen problem could not be solved by one technology alone and justify why a hybrid system must be used that would, in principle, overcome the limitations inherent in each technology. (10 marks) ii. Describe how the two technologies could be used in combination to solve the chosen problem. (15 marks) MODEL ANSWER POINTERS Question 2.i: 10 marks. Five marks for each technology discussed. Candidates must demonstrate an ability to critically evaluate the two AI technologies and be able to synthesise knowledge in to a cohesive vision of an application that integrates both technologies. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] Combining neural nets with case based systems must be addressed. Brief explanations of each technology should be included, with discussion of the comparative merits of each. An ability to provide explanations for the outputs of the NN, to deal with applications in which knowledge is implicit, or an ability to learn and self-develop are possible benefits. Together they could be used for different aspects of a given task. The requirements of the task must be discussed, e.g. that it embodies implicit knowledge, or that there are many existing examples of cases available. Together, e.g. CBR can be used to train the NN, which will then be employed for decision-making. CBR could be used to explain or justify the solutions from the NN.

5 Question 2.ii: 15 marks. General distribution of marks according to salient Candidates must be able to generate an hypothesised system architecture and produce appropriate representations of the knowledge embodied in the system, as well as be able to run a virtual simulation of a problem solving scenario. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] 3. The learner will understand methodological approaches to developing knowledgebased systems. [3.3, 3.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.2, 6.3, 6.4, 6.5] particularly on the Internet. [7.1, 7.2, 7.3] Candidates may choose any recognized knowledge representation formalism, e.g. rules, cases, frames, logic, etc. A clear explanation of the knowledge base must be provided from which it should be possible to understand how the case based-kbs would be utilised in combination with the NN to solve problems. It is important that the example shows collaboration between the two knowledge bases. EXAMINER S COMMENTS Question 2 is a variation of a question that has appeared on previous exam papers. Students were expected to perform well on this topic but they struggled to consider both AI technologies in combination. QA2(i): What was required 1. Identify a specific problem and discuss its requirements in terms of AI technologies. 2. Explain the principles of hybrid systems and the potential to solve the chosen problem by combining benefits and compensating for limitations of each separate technology QA2(i): What was included by students 1. Tend to not specify a particular problem 2. Tend to explain technologies separately but not relate to problem 3. Tend to consider other technologies (e.g. Fuzzy systems) instead of NN and CBR

6 4. Tend to confuse rule based systems with CBR and NN QA2(i): What was required 1. Focus on chosen problem and the process of problem solution 2. Demonstrate integration or co-operation between CBR and NN to solve problem 3. Highlight the dependency on hybridisation to solve the problem QA2(ii): What was included by students 1. Tend to describe technologies separately 2. Do not focus on the steps of the problem solution process 3. Tend to be superficial and lack technical details Question A3 3. AI technologies often emerge from insight to the way nature works. These natural ideas are shaped in to forms that enable technological solutions to be developed. Consider genetic algorithms and i. Describe the inspiration from nature that has most significantly contributed to its development. (10 marks) ii. Specify a suitable problem of your choice (i.e. one that requires an intelligent approach) and explain how a genetic algorithm approach could be used to produce a solution. (15 marks) iii. MODEL ANSWER POINTERS Question 3.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of the bases of much of AI in nature, and show direct contribution that nature has had on the development of AI technologies genetic algorithms. 1. The learner will understand the main approaches used in AI problem solving. [1.1,1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.4] apply them to problem solving.[5.1, 5.2, 5.3] Genetic algorithms human gene evolution. Candidates should outline the principles of human gene evolution as they relate to the methods of genetic algorithms. The discussion should highlight similarities and differences, and evaluate the extent to which GA technology development can be traced to knowledge of the mechanisms of human evolution.

7 Question 3.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the criteria that makes a problem or task suitable for a KBS approach, and show an ability to solve a problem using GA methods. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.5] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving.[5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6] particularly on the Internet. [7.1, 7.2, 7.3] A clear explanation of the task must be provided from which it should be possible to understand that it requires an intelligent approach to solve it, and further, that the solution method is sound. It is important that the solution shows clear linkage to the natural phenomenon for its explanation. The task should be complex, require nonalgorithmic methods, and be focused on optimisation or one that entails intelligent search. The answer should reference inheritance, mutation, selection, and crossover. The concepts of population, generations, fitness, evolution, etc. should be mentioned appropriately. EXAMINER S COMMENTS Question 3 has appeared on previous exam papers as it covers some basic concepts of knowledge-based systems and AI. However, this question proved to be the most challenging for students. QA3(i): What was required 1. Identify Theory of Evolution and DNA as relevant concepts from nature. 2. Describe Evolution and DNA processes as experienced in nature. 3. Relate GA processes to Evolution and DNA to show similarity

8 QA3(i): What was included by students 1. Failed to describe Evolution and DNA adequately or at all. 2. Tend to present GA processes in isolation without connexion to nature 3. Tend to confuse ANN with GA and focused on human neural system. QA3(ii): What was required 1. Identify suitable problem 2. Describe in detail step by step how GA could be applied to solve problem QA3(ii): What was included by students 1. Failed to specify suitable "intelligent" problem 2. Tend to provide superficial description of GA process 3. Failed to relate in detail the steps of GA with the problem requirements (i.e. no worked example) Question B4 4. Knowledge elicitation involves modelling the knowledge used by an expert to solve problems. Consider an example application domain and construct a knowledge base for the domain by completing the following tasks: i. Describe briefly general methods that could be applied to elicit the knowledge needed to solve a small complex problem. (10 marks) ii. Present an example knowledge base using a knowledge representation formalism of your choice. Ensure that it is adequately annotated with a textual explanation of how it could be used to solve suitable problems. (15 marks) MODEL ANSWER POINTERS Question 4.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an appreciation of how knowledge is elicited and acquired for a KBS. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.3, 2.4, 2.5] 3. The learner will understand methodological approaches to developing knowledgebased systems. [3.1, 3.2, 3.3, 3.4] apply them to problem solving.[5.1, 5.2, 5.3] Techniques such as interviewing, observation, repertory grid, and automated

9 elicitation systems, machine learning, user maintenance should be discussed. Appropriate methodologies could be discussed too, such as KADS. Suitability of methods for task and situations should be explained. Question 4.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the criteria that makes a problem or task suitable for a KBS approach, and show an ability to solve a problem using KBS methods. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2] 2. The learner will be able to critically compare and contrast various knowledge representation systems. [2.1, 2.2, 2.5] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving.[5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.6] particularly on the Internet. [7.1, 7.2, 7.3] A clear explanation of the task must be provided from which it should be possible to understand that it requires an intelligent approach to solve it, and further, that the solution method is sound. Candidates may choose any recognized knowledge representation formalism, e.g. rules, cases, frames, logic, etc. A clear explanation of the knowledge base must be provided from which it should be possible to understand how the KB would be utilised to solve problems. For example, a rule based approach could be used and should include a set of selfconsistent production rules: IF antecedent Then consequent

10 EXAMINER S COMMENTS Question 4 has appeared many times in various forms on previous exam papers, and should be familiar to candidates. However, performance was disappointing. QA4(i): What was required 1. Describe methods such as automated elicitation, knowledge discovery, observation, interviews, task analysis. 2. Identify example complex problem and relate methods to specific problem context. QA4(ii): What was included by students 1. Mentioned basic elicitation methods such as questionnaires, interviews, and observation but not automated methods (e.g. learning) 2. Did not specify specific problem or relate methods to context 3. Lacked details on presented methods. 4. Confused knowledge elicitation methods with inference methods (i.e. FW and BW chaining) QA4(ii): What was required 1. Identify specific problem context. 2. Generate small knowledge base with sample knowledge (e.g. using rules, frames, cases, logic) 3. Walk-through problem solution process with the knowledge base as it executes to solve the problem. QA4(ii): What was included by students 1. Tended not to specify detailed problem context. 2. Tended to provide few knowledge items for the knowledge base (e.g. only 3 or 4 rules) 3. Tended to include multiple knowledge types briefly rather than one in detail. 4. Failed to provide walk-through in detail of problem solution process.

11 Question B5 5. There are many alternative ways to solve a problem, each of which has its own merits in a particular situation. i. Explain both brute-force and heuristic search methods and discuss their relative merits with the aid of suitable examples. (10 marks) ii. Explain the difference between inductive and deductive reasoning and comment on the suitability of each for example problems of your choice. (15 marks) Question 5.i: 10 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the methods employed in AI for search, and be able to evaluate each on particular criteria. 1. The learner will understand the main approaches used in AI problem solving. [1.1, 1.2, 1.3] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5, 6.6] particularly on the Internet. [7.2, 7.3, 7.4] The solution should compare and contrast the two search techniques and make reference to the following points: Uninformed search An uninformed search algorithm is one that does not take into account the specific nature of the problem. As such, they can be implemented in general, and then the same implementation can be used in a wide range of problems thanks to abstraction. The drawback is that most search spaces are extremely large, and an uninformed search (especially of a tree) will take a reasonable amount of time only for small examples. As such, to speed up the process, sometimes only an informed search will do. Informed search In an informed search, a heuristic that is specific to the problem is used as a guide. A good heuristic will make an informed search dramatically out-perform any uninformed search. There are few prominent informed list-search algorithms. A possible member of that category is a hash table with a hashing function that is a heuristic based on the problem at hand. Most informed search algorithms explore trees, such as the Bestfirst search, which is a search with a heuristic that attempts to predict how close the end of a path is to a solution, so that paths which are judged to be closer to a solution

12 are extended first. Efficient selection of the current best candidate for extension is typically implemented using a priority queue. Question 5.ii: 15 marks. General distribution of marks according to salient Candidates must demonstrate an understanding of the methods employed in AI for problem solving and reasoning, and be able to evaluate each on particular criteria. 1. The learner will understand the main approaches used in AI problem solving.[1.1, 1.2, 1.3] 4. The learner will understand concepts and appreciate the significance of issues relevant to adaptive computing. [4.1, 4.2, 4.3, 4.4] apply them to problem solving. [5.1, 5.2, 5.3, 5.4, 5.5] techniques used within them. [6.1, 6.2, 6.3, 6.4, 6.5, 6.6] particularly on the Internet. [7.2, 7.3, 7.4] Solutions should provide descriptions of the two general techniques and address the points of difference. It is essential that the answer contain example tasks that are each best solved using one of the techniques. The discussion should make it clear why the task requires a particular approach, i.e. the nature of the task (data driven or goal driven), and step by-step explanations should be included to illustrate problem solution. EXAMINER S COMMENTS Question 5 has appeared on previous exam papers so it was expected that candidates would attempt it and perform relatively well. QA5(i): What was required 1. Define search in general 2. Describe Brute-force as uninformed and comprehensive 3. Describe heuristic as informed and satisfying 4. Provide example methods of each type of reasoning (e.g. depth-first/a*) 5. Discuss merits of each and compare/contrast 6. Demonstrate with example

13 QA5(i): What was included by students 1. Confused informed and uninformed when giving definitions. 2. Tend to give incomplete definitions. 3. Failed to provide adequate examples of each type of search. 4. Failed to compare and contrast search methods adequately. 5. Failed to include general definition of search. QA5(ii): What was required 1. Define reasoning in general 2. Explain Inductive reasoning as ampliative (i.e. permits generalisation from specifics), uncertain (probabilistic), permits erroneous reasoning (e.g. false conclusions (generalisations) to be produced from available evidence (true premises)) 3. Acknowledges notion of strong/weak conclusions from inductive reasoning. 4. Explain deductive reasoning as non-ampliative, confirmatory (asserts specifics from known generals), certain conclusions if supported by valid premises. 5. Acknowledges notion of valid/invalid arguments. 4. Compare and contrast using suitable examples. QA5(ii): What was included by students 1. Confused inductive and deductive and sometimes discussed the wrong way round. 2. Failed to provide general definition of reasoning. 3. Tended to provide brief definitions only. 4. Sometimes incomplete examples of reasoning provided. 5. Confused deductive and inductive with forward and backward chaining respectively

Chapter 11. Managing Knowledge

Chapter 11. Managing Knowledge Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion. Video Case 2: Tour: Alfresco: Open Source Document Management System Video Case 3: L'Oréal: Knowledge

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

IAI : Expert Systems

IAI : Expert Systems IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm

More information

Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules.

Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. Strategic Marketing Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a pass in both mandatory

More information

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015

Course Outline Department of Computing Science Faculty of Science. COMP 3710-3 Applied Artificial Intelligence (3,1,0) Fall 2015 Course Outline Department of Computing Science Faculty of Science COMP 710 - Applied Artificial Intelligence (,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description : Students

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS *

EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS * EXECUTIVE SUPPORT SYSTEMS (ESS) STRATEGIC INFORMATION SYSTEM DESIGNED FOR UNSTRUCTURED DECISION MAKING THROUGH ADVANCED GRAPHICS AND COMMUNICATIONS * EXECUTIVE SUPPORT SYSTEMS DRILL DOWN: ability to move

More information

INTELLIGENT DECISION SUPPORT SYSTEMS FOR ADMISSION MANAGEMENT IN HIGHER EDUCATION INSTITUTES

INTELLIGENT DECISION SUPPORT SYSTEMS FOR ADMISSION MANAGEMENT IN HIGHER EDUCATION INSTITUTES INTELLIGENT DECISION SUPPORT SYSTEMS FOR ADMISSION MANAGEMENT IN HIGHER EDUCATION INSTITUTES Rajan Vohra 1 & Nripendra Narayan Das 2 1. Prosessor, Department of Computer Science & Engineering, Bahra University,

More information

Nine Common Types of Data Mining Techniques Used in Predictive Analytics

Nine Common Types of Data Mining Techniques Used in Predictive Analytics 1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better

More information

Machine Learning: Overview

Machine Learning: Overview Machine Learning: Overview Why Learning? Learning is a core of property of being intelligent. Hence Machine learning is a core subarea of Artificial Intelligence. There is a need for programs to behave

More information

Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules.

Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. Module Specification: Strategic Marketing Strategic Marketing is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING CLOUD COMPUTING L/505/5652 LEVEL 2 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Understanding cloud

More information

REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION

REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION REFLECTIONS ON THE USE OF BIG DATA FOR STATISTICAL PRODUCTION Pilar Rey del Castillo May 2013 Introduction The exploitation of the vast amount of data originated from ICT tools and referring to a big variety

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

LONG BEACH CITY COLLEGE MEMORANDUM

LONG BEACH CITY COLLEGE MEMORANDUM LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor

More information

P2 Performance Management March 2014 examination

P2 Performance Management March 2014 examination Management Level Paper P2 Performance Management March 2014 examination Examiner s Answers Note: Some of the answers that follow are fuller and more comprehensive than would be expected from a well-prepared

More information

A Knowledge Base Representing Porter's Five Forces Model

A Knowledge Base Representing Porter's Five Forces Model A Knowledge Base Representing Porter's Five Forces Model Henk de Swaan Arons ([email protected]) Philip Waalewijn ([email protected]) Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam,

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013

About the Author. The Role of Artificial Intelligence in Software Engineering. Brief History of AI. Introduction 2/27/2013 About the Author The Role of Artificial Intelligence in Software Engineering By: Mark Harman Presented by: Jacob Lear Mark Harman is a Professor of Software Engineering at University College London Director

More information

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.

01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours. (International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING THE BUSINESS ANALYTICS PROCESS FOR BIG DATA J/505/5326 LEVEL 3 UNIT 39 GUIDED LEARNING HOURS: 60 UNIT CREDIT

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Improving Decision Making and Managing Knowledge

Improving Decision Making and Managing Knowledge Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,

More information

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation. Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

Genetic Algorithms and Sudoku

Genetic Algorithms and Sudoku Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 [email protected] MICS 2009

More information

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Writing Your PG Research Project Proposal

Writing Your PG Research Project Proposal Writing Your PG Research Project Proposal Typically, most research project proposals will contain the following elements: The proposed title of your research project An outline of the scope and rationale

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking

Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking Rajendra M Sonar, Asst Professor (IT), SJM School of Management, Indian Institute of Technology Bombay Powai,

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Chapter Managing Knowledge in the Digital Firm

Chapter Managing Knowledge in the Digital Firm Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management

More information

Using Artificial Intelligence to Manage Big Data for Litigation

Using Artificial Intelligence to Manage Big Data for Litigation FEBRUARY 3 5, 2015 / THE HILTON NEW YORK Using Artificial Intelligence to Manage Big Data for Litigation Understanding Artificial Intelligence to Make better decisions Improve the process Allay the fear

More information

Introduction. Chapter 1

Introduction. Chapter 1 Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because

More information

Mastering Metrics is a 15-credit mandatory module which sits within the suite of Level 6 modules.

Mastering Metrics is a 15-credit mandatory module which sits within the suite of Level 6 modules. Mastering Metrics Mastering Metrics is a 15-credit mandatory module which sits within the suite of Level 6 modules. To gain the CIM Level 6 Diploma in Professional Marketing a pass in both mandatory modules

More information

Five High Order Thinking Skills

Five High Order Thinking Skills Five High Order Introduction The high technology like computers and calculators has profoundly changed the world of mathematics education. It is not only what aspects of mathematics are essential for learning,

More information

How to Become a Data Driven Business

How to Become a Data Driven Business January 2012 Executive summary Becoming a Data Driven Business, particularly from a Marketing perspective, presents significant benefits in helping your business to grow, develop and succeed, by working

More information

IAM Level 6. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition

IAM Level 6. Diploma in Business and Administrative Management. Qualification handbook. 2011 edition IAM Level 6 Diploma in Business and Administrative Management Qualification handbook 2011 edition Published by the IAM IAM 2011 Registered charity number 254807 Published 2011 All rights reserved. This

More information

Organisation Profiling and the Adoption of ICT: e-commerce in the UK Construction Industry

Organisation Profiling and the Adoption of ICT: e-commerce in the UK Construction Industry Organisation Profiling and the Adoption of ICT: e-commerce in the UK Construction Industry Martin Jackson and Andy Sloane University of Wolverhampton, UK [email protected] [email protected] Abstract:

More information

Reaching CMM Levels 2 and 3 with the Rational Unified Process

Reaching CMM Levels 2 and 3 with the Rational Unified Process Reaching CMM Levels 2 and 3 with the Rational Unified Process Rational Software White Paper TP174 Table of Contents INTRODUCTION... 1 LEVEL-2, REPEATABLE... 3 Requirements Management... 3 Software Project

More information

Principal Hiring Scorecard 1

Principal Hiring Scorecard 1 Principal Hiring Scorecard A high-quality principal hiring process has far-ranging impacts on the leadership and student learning in a given school. The principal hiring should be fair, rigorous, and data-driven,

More information

Preparatory Action on the enhancement of the European industrial potential in the field of Security research

Preparatory Action on the enhancement of the European industrial potential in the field of Security research PASR Preparatory Action on the enhancement of the European industrial potential in the field of Security research Grant Agreement no. 108600 Supporting activity acronym: PRISE Activity full name: Privacy

More information

COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES

COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research

More information

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom:

Important dimensions of knowledge Knowledge is a firm asset: Knowledge has different forms Knowledge has a location Knowledge is situational Wisdom: Southern Company Electricity Generators uses Content Management System (CMS). Important dimensions of knowledge: Knowledge is a firm asset: Intangible. Creation of knowledge from data, information, requires

More information

Course 395: Machine Learning

Course 395: Machine Learning Course 395: Machine Learning Lecturers: Maja Pantic ([email protected]) Stavros Petridis ([email protected]) Goal (Lectures): To present basic theoretical concepts and key algorithms that form the core

More information

NON-PROBABILITY SAMPLING TECHNIQUES

NON-PROBABILITY SAMPLING TECHNIQUES NON-PROBABILITY SAMPLING TECHNIQUES PRESENTED BY Name: WINNIE MUGERA Reg No: L50/62004/2013 RESEARCH METHODS LDP 603 UNIVERSITY OF NAIROBI Date: APRIL 2013 SAMPLING Sampling is the use of a subset of the

More information

This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making.

This software agent helps industry professionals review compliance case investigations, find resolutions, and improve decision making. Lost in a sea of data? Facing an external audit? Or just wondering how you re going meet the challenges of the next regulatory law? When you need fast, dependable support and company-specific solutions

More information

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track)

Study Plan for the Master Degree In Industrial Engineering / Management. (Thesis Track) Study Plan for the Master Degree In Industrial Engineering / Management (Thesis Track) Plan no. 2005 T A. GENERAL RULES AND CONDITIONS: 1. This plan conforms to the valid regulations of programs of graduate

More information

Day 7 Business Information Systems-- the portfolio. Today s Learning Objectives

Day 7 Business Information Systems-- the portfolio. Today s Learning Objectives Day 7 Business Information Systems-- the portfolio MBA 8125 Information technology Management Professor Duane Truex III Today s Learning Objectives 1. Define and describe the repository components of business

More information

An Introduction to Advanced Analytics and Data Mining

An Introduction to Advanced Analytics and Data Mining An Introduction to Advanced Analytics and Data Mining Dr Barry Leventhal Henry Stewart Briefing on Marketing Analytics 19 th November 2010 Agenda What are Advanced Analytics and Data Mining? The toolkit

More information

Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I

Gerard Mc Nulty Systems Optimisation Ltd gmcnulty@iol.ie/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Gerard Mc Nulty Systems Optimisation Ltd [email protected]/0876697867 BA.,B.A.I.,C.Eng.,F.I.E.I Data is Important because it: Helps in Corporate Aims Basis of Business Decisions Engineering Decisions Energy

More information

Session 10 : E-business models, Big Data, Data Mining, Cloud Computing

Session 10 : E-business models, Big Data, Data Mining, Cloud Computing INFORMATION STRATEGY Session 10 : E-business models, Big Data, Data Mining, Cloud Computing Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Internet

More information

A Review And Evaluations Of Shortest Path Algorithms

A Review And Evaluations Of Shortest Path Algorithms A Review And Evaluations Of Shortest Path Algorithms Kairanbay Magzhan, Hajar Mat Jani Abstract: Nowadays, in computer networks, the routing is based on the shortest path problem. This will help in minimizing

More information

MA in Theory and History of Typography & Graphic Communication For students entering in 2006

MA in Theory and History of Typography & Graphic Communication For students entering in 2006 MA in Theory and History of Typography & Graphic Communication For students entering in 2006 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Faculty of Arts

More information

BUSINESS STRATEGY SYLLABUS

BUSINESS STRATEGY SYLLABUS Master of Science in Management BUSINESS STRATEGY SYLLABUS Academic Year 2011-2012 Professor: Yuliya Snihur Email: [email protected] Office hours: by appointment COURSE OUTLINE Strategy involves

More information

Reflection Report International Semester

Reflection Report International Semester Reflection Report International Semester Studying abroad at KTH Royal Institute of Technology Stockholm 18-01-2011 Chapter 1: Personal Information Name and surname: Arts, Rick G. B. E-mail address: Department:

More information

Contents. Dedication List of Figures List of Tables. Acknowledgments

Contents. Dedication List of Figures List of Tables. Acknowledgments Contents Dedication List of Figures List of Tables Foreword Preface Acknowledgments v xiii xvii xix xxi xxv Part I Concepts and Techniques 1. INTRODUCTION 3 1 The Quest for Knowledge 3 2 Problem Description

More information

Examiner s report F7 Performance Management June 2016

Examiner s report F7 Performance Management June 2016 Examiner s report F7 Performance Management June 2016 General Comments The June 2016 paper represented the final paper in the current format. There were two sections; Section A consisted of 20, 2-mark

More information

[ know me ] A Strategic Approach to Customer Engagement Optimisation

[ know me ] A Strategic Approach to Customer Engagement Optimisation [ know me ] A Strategic Approach to Customer Engagement Optimisation A Verint and KANA White Paper Table of contents Introduction... 1 What is customer engagement?... 2 Why is customer engagement critical

More information

BEPS ACTIONS 8-10. Revised Guidance on Profit Splits

BEPS ACTIONS 8-10. Revised Guidance on Profit Splits BEPS ACTIONS 8-10 Revised Guidance on Profit Splits DISCUSSION DRAFT ON THE REVISED GUIDANCE ON PROFIT SPLITS 4 July 2016 Public comments are invited on this discussion draft which deals with the clarification

More information

Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market

Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market Using Software Agents to Simulate How Investors Greed and Fear Emotions Explain the Behavior of a Financial Market FILIPPO NERI University of Naples Department of Computer Science 80100 Napoli ITALY [email protected]

More information

Visionet IT Modernization Empowering Change

Visionet IT Modernization Empowering Change Visionet IT Modernization A Visionet Systems White Paper September 2009 Visionet Systems Inc. 3 Cedar Brook Dr. Cranbury, NJ 08512 Tel: 609 360-0501 Table of Contents 1 Executive Summary... 4 2 Introduction...

More information

Knowledge Engineering (Ingeniería del Conocimiento)

Knowledge Engineering (Ingeniería del Conocimiento) Knowledge Engineering (Ingeniería del Conocimiento) Escuela Politécnica Superior, UAM Course 2007-2008 Topic 1: Introduction to Knowledge-Based Systems (KBSs) 1 Topic 1: Introduction to Knowledge- Based

More information

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER

STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected

More information

D A T A M I N I N G C L A S S I F I C A T I O N

D A T A M I N I N G C L A S S I F I C A T I O N D A T A M I N I N G C L A S S I F I C A T I O N FABRICIO VOZNIKA LEO NARDO VIA NA INTRODUCTION Nowadays there is huge amount of data being collected and stored in databases everywhere across the globe.

More information

Managing Knowledge. Chapter 11 8/12/2015

Managing Knowledge. Chapter 11 8/12/2015 Chapter 11 Managing Knowledge VIDEO CASES Video Case 1: How IBM s Watson Became a Jeopardy Champion Video Case 2: Tour: Alfresco: Open Source Document Management System Instructional Video 1: Analyzing

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview.

A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview. A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Andersen Consultng 1600 K Street, N.W., Washington, DC 20006-2873 (202) 862-8080 (voice), (202) 785-4689 (fax) [email protected]

More information

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.

More information

White Paper. Data Mining for Business

White Paper. Data Mining for Business White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

Writing learning objectives

Writing learning objectives Writing learning objectives This material was excerpted and adapted from the following web site: http://www.utexas.edu/academic/diia/assessment/iar/students/plan/objectives/ What is a learning objective?

More information

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards

More information

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin

Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)

More information

Integrated Communication

Integrated Communication Integrated Communication Integrated Communication is a 15-credit mandatory module which sits within the suite of Level 4 modules. To gain the CIM Level 4 Certificate in Professional Marketing a pass in

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Capability Statement

Capability Statement Capability Statement The Lead Generation Company (LGCo) was established over eleven years ago and is s premier organisation in the provision of lead and marketing solutions. We have over a decade of experience

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,

More information

BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT. Software Engineering 1. June 2015 EXAMINERS REPORT

BCS HIGHER EDUCATION QUALIFICATIONS. BCS Level 5 Diploma in IT. Software Engineering 1. June 2015 EXAMINERS REPORT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT Software Engineering 1 June 2015 EXAMINERS REPORT General Comments This is a technical paper about Software Engineering. Questions seek to

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Learning is a very general term denoting the way in which agents:

Learning is a very general term denoting the way in which agents: What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);

More information

Chapter 6 - Enhancing Business Intelligence Using Information Systems

Chapter 6 - Enhancing Business Intelligence Using Information Systems Chapter 6 - Enhancing Business Intelligence Using Information Systems Managers need high-quality and timely information to support decision making Copyright 2014 Pearson Education, Inc. 1 Chapter 6 Learning

More information