The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Big data is a voluminous and complex collection of data that is difficult to process using the day to day database management techniques and traditional data processing tools. Analysis of such data by organizations can discover previously unknown trends and opportunities which can be used for optimization of services and even help executives in decision making. One such source of data is clickstream...
As there are many requests from business units for resources which is a conventional existence in IT industries. They often face workforce management issue with a accountable budget and limited human resources. Resource Management Group Portal (RMGPortal) has been proposed to use within TATA Consultancy Services Limited (TCS) to assign right employee with right skill to the appropriate requirement...
The objective of this paper is to present a review literature on what are impacts of Data Mining (DM) in Business Intelligence (BI). The paper highlights various features of DM. It involves three steps: explorations, pattern identification and deployment. BI is the hot topic among all industries aiming for relevance. BI emphasizes on detail integration and or organizing of data. DM and BI work together...
Searching relationship among persons is more and more growing importance to acquire related information, genealogical relationship and personnel history. In this paper, the framework with three portions is proposed for exploring peoples' relationship from their personnel information. The first portion focuses on storage structure to store data in Graph database by representing persons as nodes and...
An important area of work in big data software engineering involves the design and development of software frameworks for data-intensive systems that perform large-scale data collection and analysis. We report on our work to design and develop a software framework for analyzing the collaborative editing behavior of OpenStreetMap users when working on the task of crisis mapping. Crisis mapping occurs...
To achieve the business objectives of an organization, the business goals and strategies must align. GQM+Strategies® is a method that aligns goals and strategies. By repeatedly defining lower-level goals and strategies, GQM+Strategies creates grids, which are specified from the initial set of goals and strategies, to link goals and strategies across different level units. Although the above approach...
Until this day information overload is an important issue and the influence of information technology cannot be denied. Even though there is a lot of existing research on the relation of information technology and information overload it is still contradicting. Therefore, this systematic literature review investigates the contents and applied research designs of the body of knowledge of the relation...
This study investigates how different gamification implementations can increase crowdsourcees' motivation and participation in crowdsourcing (CS). To this end, we review empirical literature that has investigated the use of gamification in crowdsourcing settings. Overall, the results of the review indicate that gamification has been an effective approach for increasing crowdsourcing participation...
Growth of computing and analytics, internet and distributed computing, and increasing tendency to use crowd sourcing for creative tasks, the use of collaborative idea in information intensive activities is a growing research concern. In CIS companies would cooperate to do their interlinked business together. It responds to customer requests for information retrieval from or writing on data contents...
In this paper, a new concept based on the field of web usage mining, a new recommender system for user rating and synonyms based ranking of the websites has been proposed. In recommender system, when the user searches for a keyword, that keyword is searched and also the related synonyms. Based on its search, the websites are displayed and user is asked to give rating. The user rating is used to upgrade...
In 2004, Wall Mart guaranteed to have the biggest information stockroom with 500 terabytes stockpiling (identical to 50 printed accumulations of the US Library of Congress). In 2009, eBay stockpiling added up to eight petabytes (think about 104 years of HD-TV feature). After two years, the Yahoo distribution center totalled 170 petabytes1 (8.5 seasons of all hard circle drives made in 1995)2. Since...
As Internet and Information Technology are becoming more dominant in our life, nowadays enterprise or business firms require changes in order to cope with this new technology. Otherwise, the extinction of such a business will become a certainty. This study addresses Eservice problems in Electronic Repair business. This domain is chosen because it is usually managed with human interactions, customers'...
Face Recognition is important Biometric credentials for identification or verification of a person. In this paper, we propose a novel technique of generating compressed unique features of face images which helps in improving matching speed of recognition. The training face database samples are applied to 2D-DWT to obtain LL band features. The LL band features are subjected to normalization to scale...
The "Big Data" is a very huge or voluminous amount of data and difficult to process using conventional data processing applications and tools. A retailer handles a millions of customer transactions per hour and transfers those into DBs and it contains more than 2.5 petabytes of data. When compare to bar codes data RFID (Radio frequency identification) alone generates 1,000 times as bar codes...
The main objective of the study is to analyze and investigate the relationships between staff and resources in a hospital using process mining social network miner technique with respect to working together metric. Using social network miner (working together metric) we could better track and trace the behavior of doctors during the treatment process of patients. Using this technique, we could better...
Feature selection is very relevant for speech emotion recognition task. Still, there is no consensus on optimal feature set and classification scheme for this task. Sequential forward selection (SFS) technique for multistage emotion classification scheme is proposed in this paper. Feature sets were formed from initial collection of 6552 speech emotion features. Experimental study was performed using...
Communication is the key to any successful project development, because it is a process of transmitting ideas and information. In many cases, a project developer communicates but still lack understanding. Stakeholders and the project developers often make the same mistake and too easily consider a model to be properly communicated or validated. They fail because of human factors which are an important...
Many organizations, including businesses, government agencies and research organizations, are collecting vast amounts of data, which are stored, processed and analyzed to mine interesting patterns and knowledge to support efficient and quality decision making. In order to improve data quality and to facilitate further analysis, many application domains require information from multiple sources to...
Software development teams face a critical threat to the security of their systems: insiders. A malicious insider is a person who violates an authorized level of access in a software system. Unfortunately, when creating software, developers do not typically account for insider threat. Students learning software development are unaware of the impacts of malicious actors and are far too often untrained...
In the face of heterogeneity, privacy laws and the scale of various data sources, Privacy Preserving Record Linkage is an increasingly relevant topic for organizations that intent to collaborate on a data level. In addition, new collaboration scenarios require an exchange that would take place online and in real-time. To address these needs, in this paper we present a framework for consensual and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.