Over the last few years, many organizations

Size: px
Start display at page:

Download "Over the last few years, many organizations"

Transcription

1 Evaluating and Selecting Mining Tools by Mike Ferguson Over the last few years, any organizations have invested oney developing data warehouses and data arts. They have ipleented systeatic schees for extracting data fro a variety of operational sources, purchased new tools to help with data cleaning and collating, designed new database structures to suarize and store the data, and purchased new hardware for the database s. The justification for these efforts has varied widely, particularly in the degree of focus on specific business questions to be addressed. While subject-oriented data arts are usually designed to eet a well-defined business need, enterprise-wide data warehousing efforts have often had less specific goals. Soe took the If you build it, they will coe approach. Generally, regardless of the original otivation for investing in warehousing, that prophecy will coe true. In this era of coputer inforation systes, ost organizations are drowning in data while starving for real inforation. Build a warehouse or a data art offering data in a for that perits easy analysis, and there is likely to be an upsurge of interest in data analysis. Business analysts want to find new ways to increase profitability, budget watchers want to axiize the return on their investent in infrastructure. Such is the cliate that has led to the widespread current interest in data ining, also known as database exploration, inforation discovery, or knowledge discovery. This article is an overview of data ining, addressing: A fraework for understanding the eleents of data ining The atheatical and statistical techniques that data ining tools are based on Soe applications of these data ining techniques A set of evaluation criteria for selecting data ining products Planning considerations when introducing today s (still iature) data ining technology Knowing What to Look for No atter how uch integrated and suarized data it contains, every data warehouse ust include a set of reporting tools that can turn the data into useful inforation. analysis products offer functions ranging fro basic query and reporting capabilities to sophisticated developent tools for creating online analytical processing, or OLAP, applications. In practice, different tools are aied at different warehouse users. The ost powerful tools are typically used by inforation object producers, while visual reporting and data delivery tools are designed for inforation consuers. Despite their any differences, however, ost of these analysis tools share one key characteristic: they depend on their users to guide the investigation. They require a predefined starting point a hypothesis, a query, a procedure, or a progra that dictates the nature of the data analysis to be carried out by the tool. Naturally, a tool (assuing it is easy to use) does provide its user the facility to ore easily explore the contents of a database and test out various hypotheses. However, the tools theselves do not address the need to uncover previously unknown business facts. Yet this is a very real requireent. Thanks to our coputers, we have ore data than we can handle. As a result, any areas of decision aking territory that could have potentially enorous value to a business still reain totally unexplored because no one knows of their existence. Today, data ining technology is taking the first step into this unknown territory. In general, the goal of data ining is to bring the practice of inforation processing closer to providing the real answers organizations are seeking fro their data. Coercial users hope that data ining will suppleent huan anageent insights, allowing the business to ake ore proactive, knowledgedriven decisions in their quest to reain copetitive. A Mining Fraework Figure 1 illustrates a siple fraework that will help explain what is involved in data ining. Based in part on an analysis by Two Crows Corporation, 1 the fraework depicts the following five ajor eleents: the business proble, data ining approaches, specific techniques, algoriths or ipleentations, and tools or products. The business proble. This, of course, ust be the starting point in any consideration of data ining technology. For exaple, you would like to answer questions like, Which custoers are ost likely to default, and why? ining tools seek to address two key business requireents:

2 Description discovering patterns, associations and clusters of inforation (such as custoer buying patterns). Prediction using those patterns to predict future trends and behaviors (such as the likelihood of a custoer defaulting on a loan). ining approaches. These are the classes or categories of data ining ethods used for description and/or prediction. There are six ajor classes: Classification (developing profiles of groups of ites in ters of their attributes) Regression (establishing a relationship between a series of ites, for the purpose of forecasting) Ipleentation algorith Figure 1. A data ining fraework 1 Business proble ining approach ining technique 1 1 Mining product Tie series (like regression, but using the additional properties of tied inforation) Clustering (segenting ites that exhibit consistent behavior or characteristics into subsets or clusters) Association analysis (recognizing that the presence of one set of ites iplies the presence of another set) Sequence discovery (recognizing that of one set of ites is followed by another set) Classification, regression, and tie series are priarily used for prediction, while clustering, association, and sequence discovery are ore appropriate for describing relationships that exist in the data. ining techniques. These are the basis of all data ining. Over the last thirty years, coputers have inspired researchers to suppleent the forer anual ethods of statistical analysis with any new coputational techniques for discovering patterns in data. (See the sidebar for a list of popular data ining techniques used in today s products, together with soe exaples of typical business applications to which they ight be applied.) Algoriths. Although each technique represents a specific type of analysis, products ipleent any varieties of the techniques. The design of the data ining algorith(s) can ake a significant difference to product perforance and scalability. This is crucial when the product is required to ine a very large database; never assue linear scalability of any data ining tool as data volues grow. ining products range fro stand-alone desktop-based tools to data ining s ipleented on high-perforance client/ or parallel processing coputers, exploiting the power of ultiprocessors. Soe products extract saples of inforation and ine the saples locally on the desktop while others ine the data directly in the warehouse databases. Fraework Relationships Turning to the relationships aong the eleents of the fraework, Figure 1 includes soe data odeling notations indicating the cardinality ( 1 or ) of each relationship. For those less failiar with data odeling notations, here is what Figure 1 says: A business proble ay be studied using ore than one class of odel, and (of course) any odeling approach can be applied to any different business probles. More than one technique can be used for any class of odel, and any given technique can be used for ore than one class of odel. There is usually ore than one way of ipleenting any given technique. ining tools ay support ore than one of the techniques, and (of course) each technique is supported by ore than one vendor s product.

3 For any given technique (taking slight liberties with the odeling notation), a particular product supports a particular ipleentation algorith. Evaluation Criteria for Mining Products To help in selecting data ining tools, we now propose a set of evaluation criteria. These are classified into nine ajor areas, as follows: 1. Product Architecture 2. Warehouse/OLAP Integration 3. Perforance 4. Function 5. Presentation 6. Sources 7. Preparation ining client tool or Web browser Extract/ saple LAN WAN or WWW SQL or DML Tier 1 Tier 2 Tier 3 Figure 2. Possible data ining configurations Mining Mining or file Single Hardware Server SQL SQL or DML or file 8. Environent 9. Adinistration Each area is described briefly below, and represented by a set of evaluation criteria in Table 1, A Product Evaluation Checklist. Following this review of the nine areas, we discuss two iportant product requireents rule conversion and data visualization in a bit ore depth. 1. Product Architecture When evaluating any software product, we should understand its operational and connectivity requireents, how its data (and etadata) is stored, and whether run-tie perforance and scalability requireents have been taken into account in its design. Possible two-tier and three-tier data ining architectures are depicted in Figure 2. Sapling vs. Direct Access. Tools ay use sapling techniques to process a representative subset of data or process the data by accessing a warehouse directly. Sapling supports client-based analysis, while Figure 3. ining parallelis direct access is a -based approach. The ore data to be ined, the ore we would tend to favor tools that perfor their analysis in place. Direct access tools that read the data using the native SQL of the database are likely to be the ost scalable as data volues rise. On the other hand, a sapling approach will usually offer ore opportunity for data cleaning and other data preparation activities (see Preparation below). But if the data is already stored in a well-designed data warehouse, these activities ay ulti threaded ining objects - 1 per processor Mining Server A P I Parallel DBMS or file A P I have already been carried out. We return to this subject in our discussion of planning considerations, in the last part of this article. 2. Warehouse/OLAP Integration This criterion deals with how well the products integrate with other coponents of a data warehousing or data analysis architecture. Several fors of integration are possible:

4 Mining Techniques The ost coonly used techniques in data ining, together with exaples of potential applications are: Decision Trees A decision tree is a tree-shaped structure that visually describes a set of rules (conditions) that caused a decision to be ade, such as a decision to purchase a product. Fro decision trees we can generate rules for the autoatic classification of a set of data, for exaple, to segent a custoer database. Specific decision tree ethods include Classification and Regression Trees (CART) and Chi Square Autoatic Interaction Detection (CHAID). Potential applications for decision trees include: Medical diagnosis: What are the factors that affect kidney transplant survival rates? Retail analysis: What are the categories of results fro a custoer survey? Decision trees are often cobined with neural networks to explain why a neural network has reached a particular conclusion. They can also be cobined with rule induction (see below) to generate logic for repetitive decision aking. For exaple, to help telesales staff confine their sales of ortgages to those custoers and prospects who are identified as good risks because their profile atches one autoatically ined fro the data. Genetic Algoriths Genetic algoriths are optiization techniques that can be used to iprove other data ining algoriths so that they derive the best odel for a given set of data. The resulting odel is then applied to the data to uncover hidden patterns or to ake predictions. Genetic algoriths are best suited to segentation/clustering applications but can be applied to ost situations involving learning. Note the use of the word optial in the following questions, which is an indicator that genetic algoriths ay be the technique to use to answer these types of questions. Potential applications include: Direct ailing: What is the optial profile of the ideal custoer who is likely to invest ore than 25,000 in utual funds this year? Risk analysis: What is the optial profile of a low risk hoe loan prospect who earns less than $75,000 and wants to live in San Jose? Medical diagnosis: What is the optial treatent plan for a particular diagnosis? Retail analysis: What is the optial store layout for a particular location? Neural Networks These are non-linear predictive odels that learn how to detect a pattern to atch a particular profile through a training process that involves iterative learning, using a set of data that describes what you want the to find. They are so naed because, on a superficial level, their operation resebles that of the huan brain. Potential applications include: Direct ailing: Who will respond to this ailing? Risk analysis: Which prospective custoers are a good credit risk? Medical diagnosis: What disease is this person likely to contract? Retail analysis: What product is this custoer likely to purchase? Neural networks are appropriate for clustering, sequencing, and prediction probles. Their ain drawback is their opaqueness they do not explain why they have reached a particular conclusion. But in soe applications (like atching handwriting saples) this is not iportant. Predictive Modeling A variety of techniques can be used to identify patterns, which can then be used to predict the future. These include classical linear regression and its derivative, logistic regression analysis, and further extensions such as Generalized Additive Models (GAM) and Multivariate Adaptive Regression Splines (MARS). These techniques are ost often used to predict the odds of a particular outcoe, based upon the observed data. For exaple: Direct ailing: Which geographic areas are ost likely to respond to a new ailing initiative? Retail analysis: Which custoers are ost likely to be interested in a new product? Rule Induction Rule induction is the process of extracting useful If...then... rules fro data, based on statistical significance. Potential applications include:

5 Direct ailing: Will the response to a ailing capaign be greater than 5%? Risk analysis: Will a one year return on investent of a stock be greater, equal to, or less than 10%? Risk Manageent: What are the good risk criteria and thresholds that ust be et before offering a custoer a ortgage? Fuzzy Logic Fuzzy logic handles iprecise concepts (like sall, big, young, old, high, low) and is ore flexible than other techniques. It provides the notion of a fuzzy set rather than clear dearcation boundaries; for exaple, rather than 0 or 1 there are also 0.9, 0.85, 0.93, 0.21, 0.05 etc. A potential application ight be direct ailing: Who ight be a likely person to ail in our new capaign? K-Nearest Neighbor (k-nn) This technique places an object of interest into a class or group by exaining its attributes and grouping it with others whose attributes are closest to it. k-nn is a classic technique for discovering associations and sequences when the data attributes are nueric. With non-nueric attributes or variables, it is a lot harder to apply this technique, because of the difficulty of defining a etric that can be used to quantify the distance between a pair of non-nueric values. Published APIs open up the possibility of interoperation with any other tools. Next, consider etadata integration. Where and how is a product s etadata stored, and whether it can be launched fro an inforation directory, for exaple. Rule conversion is another useful feature. If a ining tool can convert the rules it has discovered about the business into SQL or 3GL code, this code can then be reused by other decision support tools or applications. See the later section on this topic. Ideally, an interface with an OLAP tool would perit a two-way exchange of inforation, supporting an iterative style of data analysis. The OLAP tool could pass selected subsets of a data warehouse to the ining tool to be ined for patterns that are not easily exposed using analytical tools. Then, if the data ining tool can pass its findings as SQL queries directly to the OLAP tool, the OLAP tool can be used to verify the findings in a larger database. 3. Perforance ining is inherently coputationally expensive and can involve large aounts of data. To support interactive data ining activity, a tool ust exploit perforance enhancing technology. Does the tool exploit ultiprocessors, for exaple, by running ultiple instances of itself, or by handling the processing for a ining technique like a neural network in parallel (see Figure 3). 4. Function Next, consider the extent of the data ining function supported by a product to what degree does it support the full range of potential data ining activities? Users generally need to have a range of techniques available to use in a data ining solution how any different data ining approaches and techniques are supported in the product? Does it have a set of canned rule odels and applications that can aid productivity? Application developent facilities and agent technology that enables event- or tierdriven ining are also worth looking for. Clearly the ore techniques supported by a product the ore types of ining applications can be supported. Furtherore, support for ultiple techniques allows users to look at the sae proble fro any different angles, and so iprove the thoroughness of an investigation. If a pattern is not detected using one for of ining, another technique can be used to see if it uncovers anything. Equally, if different techniques autoatically coe to the sae conclusion over pattern discoveries, then user confidence grows in the accuracy of the find. 5. Presentation This evaluation criterion deals with the user interface. Especially iportant is the support for data visualization, by providing different ways to view the ined data. We discuss this area further in a later section see Visualization is Key. Also, a tool s usability will be influenced by its interfaces with workflow or groupware products, which can allow us to tie together the separate stages of a data ining process and disseinate the findings. 6. Sources Earlier (under Architecture) we addressed the issue of whether the tool supports direct access to data or extracts a saple for ining. Here we

6 evaluate the level of support for various possible data sources. Of course, for any potential user of a data ining product, the specific data sources of interest will depend on the existing database environent. For soe applications, it ay also be iportant to be able to include external data sources in the ining process. 7. Preparation A variety of data preparation activities are norally needed before applying the actual data ining techniques, especially when the source data coes fro operational databases. A data ining tool ay provide support for: cleansing, such as copleting issing data fields, identifying inconsistent data in different data sources, or resolving referential integrity violations. description, supplying etadata such as row or value counts or distributions. transforation, adding new derived values, cobining continuous attribute values into ranges, or replacing categorical attributes by a series of binary (yes/no) attributes. The need for such transforations will depend upon the tool and the technique(s) to be applied. sapling, as required for training or odel building. pruning, identifying dependent, independent, and correlated coluns or variables. Typically, data preparation is the ost tie-consuing aspect of data ining. Also, the preparation effort increases with the nuber of data sources to be consolidated. Anything that a tool can do to support this process will speed up the overall process of developing a data ining odel. Product evaluation criteria 1. Product Architecture Client/ architecture storage anipulation Connectivity to data 2. Warehouse/OLAP Integration Interoperability Metadata Rule conversion Connectivity to other tools 3. Perforance Scalability Parallelis 4. Function Mining approaches Mining techniques Canned applications Canned rule odels Application developent 5. Presentation visualization Workflow interface Groupware interface GUI 6. Sources Warehouse data Operational data External data Multi-database 7. Preparation cleansing description transforation sapling pruning 8. Environent Platfors Size constraints 9. Adinistration Central adinistration Security Table 1. A product evaluation checklist Features to consider 2-tier or 3-tier? Flat file or relational database? Extract sapling, direct access to database, or both? ODBC, DBMS gateway, or ORB? Server-resident ining objects supported? Published APIs exist? Docuent ining objects in an inforation directory? Launch ining objects fro a directory? Convert ined rules to SQL or 3GL code? Pass rules directly to OLAP tools? Receive data for ining fro OLAP tools? Support for ultiple user access (ining )? Multi-threaded ining? Support for ining very large databases? Architecture exploits ultiprocessors, parallel s? Algoriths designed for parallel operation? Support for ajor prediction and description approaches? How any data ining techniques are supported? For exaple, pre-built Risk Manageent applications For exaple, Credit Model, Debit Model, Fraud Detection Model, Credit Risk Model, Profitability Model, Attrition Model Application developent capability? Support for tier-based or event-based ining triggers? Support for graphs, aps, tables, rotation, etc? Support for a ining process (saple, report, etc.)? Support for disseinating output (e-ail, publish/subscribe)? Toolbar custoization etc.? Direct access to data warehouse? Access to data in operational databases? Access to external data (deographics, etc.)? Multiple data sources supported directly, or via a gateway? Identify issing, inconsistent or incorrect data? Generates etadata fro source data? Perfors data conversions, transforations? Assists with sapling process? Assists with pruning and selection of independent variables? Client platfors supported? Server platfors supported? Maxiu saple size? Maxiu nuber of rows or records? Maxiu nuber of fields? Maxiu nuber of values for a discrete field? Maxiu range for a nueric field? Support for versioning of data ining objects? Usage onitoring and reporting? User access authorization? Private, group, and public ining objects?

7 8. Environent This category deals with the client and platfors supported, and any liitations on the sizes of data that can be ined. 9. Adinistration There is a significant difference between a tool designed for a single user and one intended for enterprisewide use, or even departental sharing. Shared tools will include central support for user security and authorization, usage onitoring and reporting, and for saving and reusing ultiple versions of data ining objects such as data saples, odels, and rules. In addition to the features discussed above, one ust also (as with all products) consider the vendor. ining is a coplex and relatively new field; any sall copanies are offering new products. Does the vendor have the resources to aintain the product s evolution and growth? Is training available? Rule Conversion Support for rule conversion is an iportant requireent for the integration of data ining tools with OLAP and other data analysis applications. The ability to convert ined rules into SQL queries and 3GL code supports two requireents of inforation processing: segentation. Autoatically converting the rules that define ined patterns into SQL or 3GL allows the to be used iediately for exaple, to segent a custoer base for custoized arketing. Rule reuse. Mined rules, when expressed in the for of SQL queries, becoe available for reuse by other OLAP applications. Rules converted to 3GL can be stored (for exaple, on a rules ) as standard procedures or objects, and reused by application developent tools. This is an area in which OLAP and data ining products often work well together, the ining tool generating the SQL fro the rules discovered and passing the SQL to an OLAP product for execution. Alternatively, converting ined rules into 3GL code allows these sae rules to be included in applications. This capability can then perit soe systes to be brought forward to the front office. For exaple, suppose that the front-end of a ortgage issuing application norally siply a data gathering stage could be extended to check the custoer input against previously ined rules that qualify custoers as a good risk. Telephone operators and counter clerks could then be epowered to authorize certain safe loans without referring the application fors to back office staff. This exaple illustrates how data ining can lead to a variety of benefits, including: Increased expertise ebodied in application software Correct reuse of previously established business rules More propt custoer service Risk anageent, rather than risk avoidance. Visualization Is Key No atter which type of data ining application is planned, or developent tools used, a rich set of data visualization capabilities are an iportant prerequisite. Mining is a cobination of two concepts: Autoatic pattern discovery Pattern visualization. No atter how effective the data ining tool ay be discovering patterns, those patterns are viewed, evaluated, and acted upon through the tool s user interface. The tool user has the power to abandon a line of inquiry, to regenerate the inquiry with adjusted paraeters, or to ake a strategic anageent decision based on the inforation presented. Clearly, the influence of the visualization coponent of the data ining tool is paraount. The success of the visualization activity relies heavily on the huan user s ability to access and coprehend the results of the analysis. Therefore: There ust be a natural way for users to visualize the results of the data ining activity. Visualization ust be intuitive and integrate sealessly into the user s current environent. Even the best set of rules or the ost coplete table of data ay reveal ore inforation when visualized with color, shape, position, size, orientation, relief, or texture. To illustrate this, an exaple of segentation is shown in Figure 4. The figure shows deographic data reporting the levels of response to a arketing prootion, for states and local areas. The height of each state indicates its response rating and ebedded coluns identify specific localities. [Editor s note: Unfortunately, black and white reproduction reduces the effectiveness of the original colored iage.] Planning the Introduction of Mining Our nine-part checklist proposed a set of evaluation criteria for data ining products. In an ideal world one data ining tool would satisfy all these requireents. However life is not like that at least, not

8 yet. Copared with expectations, early releases of any of the new ining tools are liited in functionality and not well docuented. In this part of our overview, we review soe of the practical considerations surrounding the introduction and use of today s data ining tools. An Ipleentation Fraework ining, like any other technology, should be introduced in an architected anner to ensure true integration. A defined technical architecture is a blueprint for a true endto-end inforation delivery solution that includes data ining technology. Figure 5 shows the Base Associates International Warehouse Technical Architecture. The Access coponent of the above technical architecture coprises several related technologies that address data access and analysis: Query, reporting and analysis tools Multi-diensional DBMS OLAP clients Relational OLAP clients DSS application developent tools ining technology is the ost recent addition to this coponent, although the overall level of function, and the degree of integration aong the current tools in this arketplace is still soewhat liited, as we discuss below. Early Product Liitations It is, of course, a fact of business that the aturity and scope of any software product in both its current and its future releases depends on arket forces, and on the scale of the vendor s operations and the range of environents the vendor can support. A Brief Look at the Marketplace Many of the products in the arketplace are based on a particular ain technique. Soe support ultiple techniques. Below is a list of techniques and soe of the products in the arketplace that use the. Decision Tree Soe tools that use an easy-tounderstand graphical categorization of knowledge (decision-aking logic) are: KnowledgeSeeker fro Angoss Software XpertRule Profiler fro Attar Software Business Miner fro Business Objects Cleentine fro Integral Solutions Ltd. Quadstone fro DecisionHouse (TreeHouse) Neural Network Soe tools that support parallel interconnecting coputing units learning to do tasks by a training process on available data are: Marksan fro HNC Software IBM s Intelligent Miner RedBrick s Mine Cleentine fro Integral Solutions Ltd. SAS Suite fro SAS Institute Predictive Modeling Soe tools that use identified patterns to predict the future are: Discovery Server fro Pilot Software IBM s Intelligent Miner Rule Discovery Soe tools that support autoatic identification and testing of hypotheses to generate rules and patterns are: Surveyor fro Distilleries Mineset fro Silicon Graphics IBM s Intelligent Miner Multiple Techniques Soe tools that support ultiple ining techniques including verification of stated hypotheses by pattern validation (top down), forensic analysis, discovery of unknown facts by rule induction and neural networks (botto up) are: IBM s Intelligent Miner Cleentine fro Integral Solutions Decisionhouse fro Quadstone IDIS fro Inforation Discovery SAS Suite fro SAS Institute Unfortunately, any of today s data ining tools tend to be available only for a liited nuber of database environents and platfors. In practice, tools offering liited platfor support are likely to be used only for specific, focused applications. While data ining is undoubtedly iportant to the enterprise, top anageent are unlikely to change their underlying database and operating systes infrastructure to deploy it. For these reasons, it is likely that any organizations will need to deploy several different ining tools to satisfy the full range of possible data ining applications, and there will

9 be a strong interest in web-enabled ining s. Integration is another weak area. ining technology is currently represented by a plethora of data ining tools, any of which are soewhat stand-alone in their first releases: Specialist freestanding tools fro sall-scale independent vendors (such as Cleentine fro Integral Solutions, Decisionhouse fro Quadstone, and XpertRule fro Attar Software). Specialist freestanding tools fro large ulti-functional software vendors (such as Intelligent Miner fro IBM, and Mineset fro Silicon Graphics). Integrated tools fro decision support vendors (such as Discovery Server fro Pilot Software, and SAS Syste fro SAS Institute). In the long ter, as we ove into the world of distributed software coponents, lack of interoperability is a severe liitation. But one short-ter advantage of freestanding tools over integrated tool suites is that copanies can get started with data ining without having to invest in a coplete technology or pay the price of a coplete suite. On the other hand, an integrated suite favors developers already using that suite for other developent work. They can probably adopt the data ining coponents quickly, while continuing to use other failiar coponents for related requireents such as data visualization. While soe tool integration is starting to appear (for exaple, Red Brick has introduced Red Brick Mine, which cobines its star schea data warehouse with data ining software fro Mind Corporation), we have yet to see a widespread erger of data ining and decision-support software. Currently, -based Figure 4. visualization exaple ining client tool or Web browser Extract/ saple LAN WAN or WWW Tier 1 Tier 2 Tier 3 Figure 5. A data warehouse syste SQL or DML ining tools with APIs (like IBM s Intelligent Miner, for exaple) hold the ost proise in this area. Mergers, acquisitions, and arketing agreeents will inevitably lead to further integration. Quality and Warehouse Access One of the biggest probles in data ining is the quality of the data. Unlike ordinary SQL queries, data ining techniques are highly sensitive to issing or inconsistent Mining Mining or file Single Hardware Server SQL SQL or DML or file data. This is particularly true for techniques that use sapling, which is a proble when starting with operational databases; ining saples are likely to contain issing or inaccurate data. One advantage of ining a data warehouse is that the tools are working with data of a ore unifor and predictable quality, because the data has already been cleansed as it was taken fro operational systes.

10 As we pointed out in the evaluation fraework (under Warehouse/OLAP Integration), to ake the best use of data ining techniques, tools need to integrate with a data warehouse (to ensure quality of data within a consolidated database) as well as with other interactive business analysis tools (to ensure visual coprehension of data ining results). However, the liitations of any of today s data ining tools noted above predoinantly standalone tools, supporting a narrow range of platfors liits their ability to interact with already established data warehouses. This in turn andates a ining approach involving extraction and iporting of data onto a different platfor for analysis. Deciding What to Mine The yth that ining cannot be done at the atoic level is not an arguent for data sapling. Mining detailed atoic-level transaction data ay take longer, but it usually eans that the analysis is ore exhaustive, leading to ore accurate knowledge discovery. When atoic level data is stored in an enterprise data warehouse, with suaries and soe detail data being available at the data art level, it is often the case that data ining is best deployed against the warehouse. On the other hand, there is a trend towards data art developent rather than enterprise data warehouse developent, because of the shorter tie scales involved and the faster return on investent. It ight see, therefore, that data ining projects would have to wait for the enterprise level warehouses to be deployed. Actually, this is not the case. ining can and does work well on suary data and/or atoic transactional data in a data art. However, because of the possibility that data suarization has obscured key aspects of a pattern, interoperability with OLAP tools becoes very iportant. Interoperability allows an analyst to develop an iterative approach to data ining and pattern verification, as we discussed earlier under Warehouse/ OLAP Integration. Future Directions While data ining technology is still in its infancy, there is no doubt where it is headed. The direction is clearly towards ining s, ining agents, and ining objects. The industry trend toward thin client architectures will pressure ining vendors to ake their products available fro web browsers and fro groupware frontends like Lotus Notes. The actual data ining algoriths, on the other hand, will ove as close to the data as possible. Given the trend toward universal (or objectrelational) DBMS s (such as Inforix s Universal Server, and IBM s DB2 Universal base), it would be logical to expect that ining algoriths will eventually becoe an integral part of the DBMS itself, supported by query optiization technology, and exploiting the DBMS s support for parallelis. That developent will not aterialize overnight. In the eantie, there will be fierce copetition aong the vendors of existing data ining tools, and an inevitable shakeout. Greater tool integration is inevitable, either through acquisition (vendor takeovers), consortia (arketing agreeents) or design (integrated design or developent agreeents). Multiplatfor support, and the evolution of key features including ining s, ulti-threading, scalability, published APIs, and web visualization are all going to becoe critical over the next two years. So before you dig into your gold ine of data looking to strike it rich, evaluate the data ining and DBMS arket carefully. References 1. Mining: Products, Applications, and Technologies, a research report by Two Crows Corporation. For ore inforation see

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Data Mining for Successful Healthcare Organizations

Data Mining for Successful Healthcare Organizations Data Mining for Successful Healthcare Organizations For successful healthcare organizations, it is important to empower the management and staff with data warehousing-based critical thinking and knowledge

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

An Application Research on the Workflow-based Large-scale Hospital Information System Integration

An Application Research on the Workflow-based Large-scale Hospital Information System Integration 106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Investing in corporate bonds?

Investing in corporate bonds? Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Investing in corporate bonds?

Investing in corporate bonds? Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Danske Bank acquires Sampo Bank

Danske Bank acquires Sampo Bank Danske Bank acquires Sapo Bank Overview of Sapo Bank Noveber 9, 2006 Disclaier This presentation is not for release, publication or distribution in Australia, Canada, the Hong Kong Special Adinistrative

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

A Multi-Core Pipelined Architecture for Parallel Computing

A Multi-Core Pipelined Architecture for Parallel Computing Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES

EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES Acknowledgeents We would like to extend a special thank you to ebers of the Public Chairs Foru (PCF) and the Association of Chief Executives

More information

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks Sensors as a Service Oriented Architecture: Middleware for Sensor Networks John Ibbotson, Christopher Gibson, Joel Wright, Peter Waggett, IBM U.K Ltd, Petros Zerfos, IBM Research, Boleslaw K. Szyanski,

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft Introduction to the Michael Clark Developent Manager Microsoft Agenda Why Is Sync both Interesting and Hard Sync Fraework Overview Using the Sync Fraework Future Directions Suary Why Is Sync Iportant Coputing

More information

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE Copleted Research Paper Steffen Zierann Arne Katzarzik Dennis Kundisch Abstract Utilizing a global IT sourcing strategy

More information

A SOA-Based Architecture Framework

A SOA-Based Architecture Framework A SOA-Based Architecture Fraework Wil M. P. van der Aalst, Michael Beisiegel 2, Kees M. van Hee, Dieter König 3, and Christian Stahl Departent of Matheatics and Coputer Science Eindhoven University of

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

130: Rule-based Expert Systems. Ajith Abraham Oklahoma State University, Stillwater, OK, USA 1 PROBLEM SOLVING USING HEURISTICS

130: Rule-based Expert Systems. Ajith Abraham Oklahoma State University, Stillwater, OK, USA 1 PROBLEM SOLVING USING HEURISTICS : Rule-based Expert Systes Ajith Abraha Oklahoa State University, Stillwater, OK, USA Proble Solving Using Heuristics 99 What are Rule-based Systes? 9 Inference Engine in Rule-based Systes 9 Expert Syste

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search 8 The Open Bioinforatics Journal, 28, 2, 8-89 Open Access odeling Cooperative Gene Regulation Using Fast Orthogonal Search Ian inz* and ichael J. Korenberg* Departent of Electrical and Coputer Engineering,

More information

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus Advances in Applied Matheatical Biosciences. ISSN 8-998 Volue, Nuber (0), pp. 9- International Research Publication House http://www.irphouse.co Matheatical Model for Glucose-Insulin Regulatory Syste of

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation //j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Option B: Credit Card Processing

Option B: Credit Card Processing Attachent B Option B: Credit Card Processing Request for Proposal Nuber 4404 Z1 Bidders are required coplete all fors provided in this attachent if bidding on Option B: Credit Card Processing. Note: If

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Work Travel and Decision Probling in the Network Marketing World

Work Travel and Decision Probling in the Network Marketing World TRB Paper No. 03-4348 WORK TRAVEL MODE CHOICE MODELING USING DATA MINING: DECISION TREES AND NEURAL NETWORKS Chi Xie Research Assistant Departent of Civil and Environental Engineering University of Massachusetts,

More information

Fuzzy approach for searching in CRM systems

Fuzzy approach for searching in CRM systems Fuzzy approach for searching in CRM systes BOGDAN WALEK, JIŘÍ BARTOŠ, CYRIL KLIMEŠ Departent of Inforatics and Coputers University of Ostrava 30. dubna 22, 701 03 Ostrava CZECH REPUBLIC bogdan.walek@osu.cz,

More information

US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar.

US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar. US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar. 25, 2010 (54) PROCESSING OF SERVICE-ORIENTED Publication Classi?cation

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: Poland Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

Don t Run With Your Retirement Money

Don t Run With Your Retirement Money Don t Run With Your Retireent Money Understanding Your Resources and How Best to Use The A joint project of The Actuarial Foundation and WISER, the Woen s Institute for a Secure Retireent WISER THE WOMEN

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Storing and Accessing Live Mashup Content in the Cloud

Storing and Accessing Live Mashup Content in the Cloud Storing and Accessing Live Mashup Content in the Cloud Krzysztof Ostrowski Cornell University Ithaca, NY 14853, USA krzys@cs.cornell.edu Ken Biran Cornell University Ithaca, NY 14853, USA ken@cs.cornell.edu

More information

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process

Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process IMECS 2008 9-2 March 2008 Hong Kong Evaluating Software Quality of Vendors using Fuzzy Analytic Hierarchy Process Kevin K.F. Yuen* Henry C.W. au Abstract This paper proposes a fuzzy Analytic Hierarchy

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

A Hybrid Grey-Game-MCDM Method for ERP Selecting Based on BSC. M. H. Kamfiroozi, 2 A. BonyadiNaeini

A Hybrid Grey-Game-MCDM Method for ERP Selecting Based on BSC. M. H. Kamfiroozi, 2 A. BonyadiNaeini Int. J. Manag. Bus. Res., 3 (1), 13-20, Winter 2013 IAU A Hybrid Grey-Gae-MCDM Method for ERP Selecting Based on BSC 1 M. H. Kafiroozi, 2 A. BonyadiNaeini 1,2 Departent of Industrial Engineering, Iran

More information

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

The Design and Implementation of an Enculturated Web-Based Intelligent Tutoring System

The Design and Implementation of an Enculturated Web-Based Intelligent Tutoring System The Design and Ipleentation of an Enculturated Web-Based Intelligent Tutoring Syste Phaedra Mohaed Departent of Coputing and Inforation Technology The University of the West Indies phaedra.ohaed@gail.co

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

An improved TF-IDF approach for text classification *

An improved TF-IDF approach for text classification * Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process African Journal of Business Manageent Vol. 4(3), pp. 339-349, March 00 Available online at http://www.acadeicjournals.org/ajbm ISSN 993-833 00 Acadeic Journals Full Length Research Paper A decision odel

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information