The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Closing prices of the financial stock market change daily at the end of each session. These changes happen because of many factors that affect the prices of the stocks. This study attempts to accurately predict closing prices by applying a data mining approach and investigate and identify the most influential factors of Dubai Financial Stock Market prices. The main objective of this study is to help...
Business Intelligence is new important area of informatics. It presents options to work with data and provides basic theoretical determination of the issue. Business Intelligence as a process of transforming data into information and knowledge is one of the fastest growing areas of information technology. We want to deepen knowledge and skills and show how we can work with data and acquired important...
Social media analytics play a major role in e-commerce for extracting the useful information of a product or service. Opinion mining has become the key process of social media analytics. Twitter is a big online social activity platform where millions of people share their opinions. In this paper two clustering techniques, k-means and DBSCAN, are applied to an annotated Twitter dataset in order to...
Extracting the customers who share similar interests that are connected via set of relationships in Telecom social network is a challenging scenario. This paper addresses an efficient method of building multi-relational and heterogeneous social network for telecom customers and identifying social structures present in the telecommunication network. The telecom social network is constructed by considering...
The development needs the internet and cable television entertainment increase per year that affect popping up various multimedia service provider company which is offered a lot of services to win the market. This makes customer has a lot of company choices and makes customer to be more demanded and move easily from a provider to other provider, where company knows that keep customer has the cost...
Along with the activity of human on social media platform increasing, social media analysis has been widely used in various fields' research, including sentiment analysis. In this paper, we propose a framework to evaluate customer satisfaction on the basis of the data from social media platform and the technology of sentiment analysis. Evaluating customer satisfaction based on the comments from social...
Event logs are history records that contain sequence data for the activity of a case that has been executed by an information system. Event logs can be valuable information with a technique called mining process. With this technique, cheating on the business processes of an enterprise can be detected early on. Thus, the company can commit further examination of business processes, especially the business...
Inspired by the coming of data-driven innovation and economy, an increasing number of companies over the world are eager to analyze their data for creating useful knowledge, while graph data have become more and more crucial in many areas, such as social networks and medical/chemical applications. Different from conventional transaction data, finding the frequent patterns in a graph is more challenging...
Detecting and disseminating food hazard information is a critical task that directly affects the public health. In spite of its importance, however, few systems are developed to automatically gather and analyze food hazard information. In this paper, we introduce our preliminary work to build such system. Our final system aims to detect and extract food hazard event from the live data shared on the...
Recently, sophisticated attacks are increased against specific business companies, organizations and various facilities and the attackers are trying to remove attack traces such as system logs and related information on the victim systems. Therefore, it is getting more difficult to collect the information for attack analysis. In order to overcome this situations, companies and organizations have started...
We are living in an era of big data - an age of huge information. Big Data incorporate endless information. Big Data is getting larger in industries and providing better business. It has changes the world in the terms of predicting customer's behaviour. Another buzz word these days is social networks and relation between two of these is very obvious yet complicated. Both Big Data and Social network...
The purpose of this paper is to provide a comprehensive solution for industry through research and development of an Internet of Things (IoT) based Cyber Physical System for Industrial Informatics Analytics with the following objectives. This study conducted a review regarding big data analytics in industry and designed a cyber physical system with the integration of various existing and proprietary...
This paper describes a decision support system (DSS) built on knowledge extraction using simulation-based optimization and data mining. The paper starts with a requirements analysis based on a survey conducted with a number of industrial companies about their practices of using simulations for decision support. Based upon the analysis, a new, interactive DSS that can fulfill the industrial requirements,...
Sentiment analysis has become the heart of social media research and many studies have been applied to obtain users' opinion in fields such as electronic commerce and trade, management and also regarding political figures. Social media has recently become a rich resource in mining user sentiments. Social opinion has been analysed using sentiment analysis and some studies show that sentiment analysis...
Social-media websites, such as newspapers, blogs, and forums, are the main places of generation and exchange of user-generated comments. These comments are viable sources for opinion mining, descriptive annotations and information extraction. User-generated comments are formatted using a HTML template, they are therefore entwined with the other information in the HTML document. Their unsupervised...
On the basis of depth study of commercial bank credit risk control model literature, this paper introduced the concepts of credit risk and credit risk control. We research the main influencing factors of commercial bank credit risk control scientifically by artificial neural network theory, and then set a commercial bank credit risk control index system which contains 3 levels of 27 indexes. Improved...
This paper presents a concept to anticipate deviations from the target process and thus inefficiencies within development projects by aid of predictive analytics. It is stated that predictive analytics approaches can be adapted to predict deviations in development projects, comparable to the anticipation of crimes. Deviations in terms of time, costs and quality are seen as a result of waste and therefore...
Big data denotes to data volumes in the range of zettabytes (1021) and beyond. The world's technological per-capita capacity to store information has roughly doubled every 40 months since the 1980s, as of 2012, every day 2.5 exabytes (2.5×1018) of data were created, as of 2014, every day 2.3 zettabytes (2.3×1021) of data were created [4, 5]. Every year, NASA and the National Science Foundation host...
The size of fraudulent activity is increasing rapidly, with individuals and organisations being at great risk. This paper inspects and determines the various components required to deliver a successful fraud detection system. It is hoped that in reading this report, the reader will comprehend what is required and see the true benefit of implementing such a solution. Following the structure of a robust...
Data completeness is one of the most important data quality dimensions and an essential premise in data analytics. With new emerging Big Data trends such as the data lake concept, which provides a low cost data preparation repository instead of moving curated data into a data warehouse, the problem of data completeness is additionally reinforced. While traditionally the process of filling in missing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.