Data Mining. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support

Size: px
Start display at page:

Download "Data Mining. Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support"

Transcription

1 IEEE PROJECT LIST(JAVA) Data Mining CODE 18ANSP-DM ANSP-DM-002 TITLE AND ABSTRACT Analyzing Social Roles Based on a Hierarchical Model and Data Mining for Collective Decision-Making Support With the popularity of social networking services (SNSs) and the increase of users, individuals social roles in a social network have become more and more important in terms of the recommendation of personalized services and the collective decision-making process. Usually, in an SNS system, active users may not represent the major opinions among the whole users, and most of the users opinions may be multifarious. In this paper, we focus on analyzing and identifying users dynamical social roles to facilitate the collective decision-making process. After introducing the social choice theory and an improved collective decisionmaking model, we present a three-layer model to analyze users social roles in a hierarchical way and develop an integrated mechanism to utilize the identification of social roles to support the collective decision making. Based on a developed NetLogo-based tool, a case study for the course-offering determination with an application scenario is demonstrated to show the process of using users social roles to support the collective decision making. The comparison experiment conducted between our method and the Delphi method shows the usefulness of our proposed method to help users achieve the decision consensus in a more efficient way. A Reversible Watermarking Technique for Social Network Data Sets for Enabling Data Trust in Cyber, Physical, and Social Computing Social network data are being mined for extracting interesting patterns. Such data are collected by different researchers and organizations and are usually also shared via different channels. These data usually have huge volume because there are millions of social network users throughout the world. In this context, ownership protection of such data sets with huge volume becomes relevant. Digital watermarking is a more demanding solution than any other technique for ensuring rights protection and integrity of the original data sets. The objective of this paper is to devise a reversible watermarking technique for the social network data to prove ownership rights and also provide a mechanism for data recovery. Robustness of the proposed technique is evaluated through attack analysis using experimental study. In this paper, Z notation-based formal specification is also provided to show the working of the proposed reversible watermarking technique for social network data sets for enabling data trust in Cyber, Physical, and Social Computing (CPSCom).

2 18ANSP-DM ANSP-DM ANSP-DM-005 Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing In the social computing environment, the complete information about an individual is usually distributed in heterogeneous social networks, which are presented as linked data. Synthetically recognizing and integrating these distributed and heterogeneous data for efficiently information searching is an important but challenging work. In this paper, a dynamic weight (DW)-based similarity calculation is proposed to recognize and integrate similar individuals from distributed data environments. First, each link of an individual is weighted by applying DW. Then, a semantic similarity metric is proposed to combine the DW into similarity calculation. Then, a searching system framework for a similarity-based individual is designed and tested in real-world data sets. Finally, massive experiments are conducted both in benchmark and real-world social community data sets. The results show that our approach can produce a good result in similar individual searching in social networks. In addition, it performs significantly better than the existing state-of-the-art approaches in similar individual searching. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users personal profiles to keep track of users usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder s personal profile. The experimental results demonstrate that the IIDPS s user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently. Target-Based, Privacy Preserving, and Incremental Association Rule Mining We consider a special case in association rule mining where mining is conducted by a third party over data located at a central location that is updated from several source locations. The data at the central location is at rest while that flowing in through source locations is in motion. We impose some limitations on the source locations, so that the central target location tracks and privatizes changes and a

3 18ANSP-DM-006 third party mines the data incrementally. Our results show high efficiency, privacy and accuracy of rules for small to moderate updates in large volumes of data. We believe that the framework we develop is therefore applicable and valuable for securely mining big data. Modeling Urban Behavior by Mining Geotagged Social Data Data generated on location-based social networks provide rich information on the whereabouts of urban dwellers. Specifically, such data reveal who spends time where, when, and on what type of activity (e.g., shopping at a mall, or dining at a restaurant). That information can, in turn, be used to describe city regions in terms of activity that takes place therein. For example, the data might reveal that citizens visit one region mainly for shopping in the morning, while another for dining in the evening. Furthermore, once such a description is available, one can ask more elaborate questions. For example, one might ask what features distinguish one region from another some regions might be different in terms of the type of venues they host and others in terms of the visitors they attract. As another example, one might ask which regions are similar across cities. In this paper, we present a method to answer such questions using publicly shared Foursquare data. Our analysis makes use of a probabilistic model, the features of which include the exact location of activity, the users who participate in the activity, as well as the time of the day and day of week the activity takes place. Compared to previous approaches to similar tasks, our probabilistic modeling approach allows us to make minimal assumptions about the data which relieves us from having to set arbitrary parameters in our analysis (e.g., regarding the granularity of discovered regions or the importance of different features). We demonstrate how the model learned with our method can be used to identify the most likely and distinctive features of a geographical area, quantify the importance features used in the model, and discover similar regions across different cities. Finally, we perform an empirical comparison with previous work and discuss insights obtained through our findings. 18ANSP-DM-007 Mining Sequential Risk Patterns From Large-Scale Clinical Databases for Early Assessment of Chronic Diseases: A Case Study on Chronic Obstructive Pulmonary Disease Chronic diseases have been among the major concerns in medical fields since they may cause a heavy burden on healthcare resources and disturb the quality of life. In this paper, we propose a novel framework for early assessment on chronic diseases by mining sequential risk patterns with time interval information from diagnostic clinical records using sequential rules mining, and classification modeling techniques. With a complete workflow, the proposed framework consists of four phases namely data preprocessing, risk pattern mining, classification modeling, and post analysis. For empiricasl evaluation, we

4 18ANSP-DM ANSP-DM-009 demonstrate the effectiveness of our proposed framework with a case study on early assessment of COPD. Through experimental evaluation on a large-scale nationwide clinical database in Taiwan, our approach can not only derive rich sequential risk patterns but also extract novel patterns with valuable insights for further medical investigation such as discovering novel markers and better treatments. To the best of our knowledge, this is the first work addressing the issue of mining sequential risk patterns with time-intervals as well as classification models for early assessment of chronic diseases. CHRS: Cold Start Recommendation Across Multiple Heterogeneous Information Networks Nowadays, people are overwhelmingly exposed to various kinds of information from different information networks. In order to recommend users with the information entities that match their interests, many recommendation methods have been proposed so far. And some of these methods have explored different ways to utilize different kinds of auxiliary information to deal with the information sparsity problem of user feedbacks. However, as a special kind of information sparsity problem, the ``cold start'' problem is still a big challenge not well-solved yet in the recommendation problem. In order to tackle the ``cold start'' challenge, in this paper, we propose a novel recommendation model, which integrates the auxiliary information in multiple heterogeneous information networks (HINs), namely the Cross- HIN Recommendation System (CHRS). By utilizing the rich heterogeneous information from meta-paths, the CHRS is able to calculate the similarities of information entities and apply the calculated similarity scores in the recommendation process. For the information entities shared among multiple information networks, CHRS transfers item latent information from other networks to help the recommendation task in a given network. During the information transfer process, CHRS applies a domain adaptation matrix to tackle the domain difference problem. We conduct experiments to compare our CHRS method with several widely employed or the state-of-art recommendation models, and the experimental results demonstrate that our method outperforms the baseline methods in addressing the ``cold start'' recommendation problem. EHAUPM: Efficient High Average-Utility Pattern Mining With Tighter Upper Bounds High-utility itemset mining (HUIM) has become a popular data mining task, as it can reveal patterns that have a high-utility, contrarily to frequent pattern mining, which focuses on discovering frequent patterns. High average-utility itemset mining (HAUIM) is a variation of HUIM that provides an alternative measure, called the average utility, to select patterns by considering both their utilities and lengths. In the last decades, several algorithms have been developed to mine high average-utility itemsets (HAUIs). But most of them consume large amounts of memory and have long execution times, since they generally utilize the averageutility upper-bound (auub) model to overestimate the average utilities of itemsets. To improve the performance of HAUIM, this paper proposes two novel tighter upper-bound models as alternative to the traditional auub model for mininghauis. The looser upper-bound model considers the remaining-maximum

5 18ANSP-DM ANSP-DM ANSP-DM-012 utility in transactions to reduce the upper bound on the utilities of itemsets. The second upper-bound model ignores irrelevant items in transactions to further tighten the upper bound. Three pruning strategies are also designed to reduce the search space for mining HAUIs by a greater amount compared with the state-ofthe-art HAUI-Miner algorithm. Experiments conducted on several benchmark data sets show that the designed algorithm integrating the two novel upper-bound models outperforms the traditional HAUI-Miner algorithm in terms of runtime, memory usage, number of join operations, and scalability. Privacy-Preserving Data Mining: Methods, Metrics, and Applications The collection and analysis of data are continuously growing due to the pervasiveness of computing devices. The analysis of such information is fostering businesses and contributing beneficially to the society in many different fields. However, this storage and flow of possibly sensitive data poses serious privacy concerns. Methods that allow the knowledge extraction from data, while preserving privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the most relevant PPDM techniques from the literature and the metrics used to evaluate such techniques and presents typical applications of PPDM methods in relevant fields. Furthermore, the current challenges and open issues in PPDM are discussed. A Two-Layer Clustering Model for Mobile Customer Analysis Customer segmentation provides an effective way to obtain insights into customer characteristics and behavioral preferences. The authors two-layer clustering model for mobile telecom customer analysis enhances customer relationship management and focuses on a dynamically changing marketplace. With the rise of big data and the evolution of data mining technology, the mass storage of internal enterprise information can be analyzed effectively for hidden customer value. The promotion of marketing activities and customer relationship support are also based on an extensive precision-marketing model that evolved to target the customer base and obtain in-depth understanding to fit that base s needs. An increasingly important issue is how to integrate marketing resources and properly distribute and match individual customer interests and preferences with the most effective marketing activities, as well as mine data to determine those products or services most attractive to customers. Mining Coherent Topics With Pre-Learned Interest Knowledge in Twitter Discovering semantic coherent topics from the large amount of user-generated content (UGC) in social media would facilitate many downstream applications of intelligent computing. Topic models, as one of the most powerful algorithms, have been widely used to discover the latent semantic patterns in text collections. However, one key weakness of topic models is that they need documents with certain length to provide reliable statistics for generating coherent topics. In Twitter, the users' tweets are mostly short and noisy. Observations of word cooccurrences are incomprehensible for topic models. To deal with this problem, previous work tried to incorporate prior knowledge to obtain better results. However, this strategy is not practical for the fast evolving UGC in Twitter. In this

6 18ANSP-DM ANSP-DM-014 paper, we first cluster the users according to the retweet network, and the users' interests are mined as the prior knowledge. Such data are then applied to improve the performance of topic learning. The potential cause for the effectiveness of this approach is that users in the same community usually share similar interests, which will result in less noisy sub-data sets. Our algorithm pre-learns two types of interest knowledge from the data set: the interest-word-sets and a tweetinterest preference matrix. Furthermore, a dedicated background model is introduced to judge whether a word is drawn from the background noise. Experiments on two real life twitter data sets show that our model achieves significant improvements over state-of-the-art baselines. Mining Frequent Route Patterns Based on Personal Trajectory Abstraction Frequent route pattern mining from personal trajectory data is the basis of location awareness and location services. However, because personal trajectory data is highly uncertain, most existing approaches are only capable of finding short and incomplete route patterns. In this paper, a novel approach is proposed for the discovery of frequent route patterns based on trajectory abstraction. First, trajectory partition, location extraction, data simplification, and common segment discovery are used to abstract trajectory data, convert these trajectories into common segment temporal sequences (STS) and generate 1-frequent itemsets. Then, a pattern mining algorithm is proposed based on the spatial-temporal adjacency relationship. This algorithm uses the constraint mechanism and bidirectional projected database to mine frequent route patterns from STS. Based on the real GeoLife trajectory data, the experimental results indicate that the proposed method has better performance and can find longer route patterns than other currently available methods. AdScope: Search Campaign Scoping Using Relevance Feedback Advertisers use online advertising for branding and direct response. To raise brand awareness, for example, they target a broad set of online users whether or not these users have an intention to buy something is of secondary importance. In contrast, in direct response campaigns, advertisers are keenly interested in users intention to buy, so they specifically match up ads and search words accordingly (an ad for the search phrase, how to create a social network for cheap, for example, gives advertisers access to bargain hunters searching the Internet for tools to create social networks). To advertise on a search network, the sponsored ad networks for search engine queries, advertisers must determine a set of keywords to represent how users will search for their products in a search engine. Once these keywords are determined, the campaign can go live. Because it s difficult in the beginning to know exactly which queries users will pose, advertisers often identify the key phrases that are most likely to occur in queries, as well as keywords that are broadly similar to queries. If an advertiser is certain that a specific keyword can be one of the queries, then that keyword can be used as is. It s crucial to have the right set of keywords to target the right set of users. Otherwise, the campaign budget will be wasted on users who are less likely to convert into sales.

7 18ANSP-DM-015 Aspect-Based Extraction and Analysis of Affective Knowledge from Social Media Streams This article introduces an approach to analyze emotional values associated with brands and companies. Online media coverage about products and services typically refers to a wide range of aspects to which such emotional values apply. These aspects can include product features (such as a digital camera s maximum resolution), common applications (such as a smartphone used as a car navigation system), or perceptions in conjunction with a specific event (for example, as part of a sponsorship agreement). Our approach integrates affective and factual knowledge extraction to capture opinions related to specific aspects along multiple emotional dimensions. We use the automotive industry as a sample domain to demonstrate the proposed approach, given the large number of aspects that characterize its complex technical products.

Leveraging the Social Breadcrumbs

Leveraging the Social Breadcrumbs Leveraging the Social Breadcrumbs 2 Social Network Service Important part of Web 2.0 People share a lot of data through those sites They are of different kind of media Uploaded to be seen by other people

More information

Socially Engaging Banking

Socially Engaging Banking Accenture Interactive Point of View Series on : Enabling a digital first mindset Socially Engaging Operating Model Socially Engaging Relationship Management Intelligence Integrated Experience Design First

More information

PRODUCT REVIEW SENTIMENT ANALYSIS WITH TRENDY SYNTHETIC DICTIONARY AND AMBIGUITY MITIGATION

PRODUCT REVIEW SENTIMENT ANALYSIS WITH TRENDY SYNTHETIC DICTIONARY AND AMBIGUITY MITIGATION PRODUCT REVIEW SENTIMENT ANALYSIS WITH TRENDY SYNTHETIC DICTIONARY AND AMBIGUITY MITIGATION Prof. A. N. Nawathe anunawathe@gmail.com Godge Isha Sudhir ishagodge37@gmail.com Dang Poornima Mahesh dang.poornima@gmail.com

More information

1. Search, for finding individual or sets of documents and files

1. Search, for finding individual or sets of documents and files WHITE PAPER TURNING UNSTRUCTURED TEXT INTO INSIGHT Extending Business Intelligence With Text Analysis and Search EXECUTIVE SUMMARY While traditional business intelligence (BI) has transformed business

More information

DESIGN OF COPD BIGDATA HEALTHCARE SYSTEM THROUGH MEDICAL IMAGE ANALYSIS USING IMAGE PROCESSING TECHNIQUES

DESIGN OF COPD BIGDATA HEALTHCARE SYSTEM THROUGH MEDICAL IMAGE ANALYSIS USING IMAGE PROCESSING TECHNIQUES DESIGN OF COPD BIGDATA HEALTHCARE SYSTEM THROUGH MEDICAL IMAGE ANALYSIS USING IMAGE PROCESSING TECHNIQUES B.Srinivas Raja 1, Ch.Chandrasekhar Reddy 2 1 Research Scholar, Department of ECE, Acharya Nagarjuna

More information

STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING

STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING STRATEGIC TRACKING BENEFITS OF STRATEGIC TRACKING Strategic tracking of brand health and perceptions over time helps companies understand which marketing initiatives are successful and where future efforts

More information

The Accurate Marketing System Design Based on Data Mining Technology: A New Approach. ZENG Yuling 1, a

The Accurate Marketing System Design Based on Data Mining Technology: A New Approach. ZENG Yuling 1, a International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Accurate Marketing System Design Based on Data Mining Technology: A New Approach ZENG Yuling 1,

More information

Big Data in Emergency Informatics Social media data perspective. Rajendra Akerkar

Big Data in Emergency Informatics Social media data perspective. Rajendra Akerkar Big Data in Emergency Informatics Social media data perspective Rajendra Akerkar Outline What is Emergency Informatics? Big data and applications in emergency response Social media data Issues and challenges

More information

Introduction to Analytics Tools Data Models Problem solving with analytics

Introduction to Analytics Tools Data Models Problem solving with analytics Introduction to Analytics Tools Data Models Problem solving with analytics Analytics is the use of: data, information technology, statistical analysis, quantitative methods, and mathematical or computer-based

More information

Social Media Is More Than a Popularity Contest

Social Media Is More Than a Popularity Contest Capturing Attention, Building Relationships, and Making Sales in a Digital World Social media doesn t sell cars is still a common perception in the automotive industry. The truth? It doesn t, directly

More information

Big risks require big data thinking: EY Forensic Data Analytics (FDA), powered by IBM

Big risks require big data thinking: EY Forensic Data Analytics (FDA), powered by IBM Big risks require big data thinking: EY Forensic Data Analytics (FDA), powered by IBM Executives across multiple business functions, industries and geographies, have made significant advancements to solve

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council Distr.: General 19 March 2014 ECE/CES/2014/32 English only Economic Commission for Europe Conference of European Statisticians Sixty-second plenary session Paris,

More information

Moving From Contact Center to Customer Engagement

Moving From Contact Center to Customer Engagement Daitan White Paper Moving From Contact Center to Customer Engagement USING THE CLOUD, BIG DATA AND WEBRTC TO GET THERE Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group

More information

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION

Advancing Information Management and Analysis with Entity Resolution. Whitepaper ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information Management and Analysis with Entity Resolution Whitepaper February 2016 novetta.com 2016, Novetta ADVANCING INFORMATION MANAGEMENT AND ANALYSIS WITH ENTITY RESOLUTION Advancing Information

More information

Context-aware recommendation

Context-aware recommendation Context-aware recommendation Eirini Kolomvrezou, Hendrik Heuer Special Course in Computer and Information Science User Modelling & Recommender Systems Aalto University Context-aware recommendation 2 Recommendation

More information

Financial Infos. Issue (19)

Financial Infos. Issue (19) Financial Infos Issue (19) Customer Relationship Management (CRM) Definition: In reply to increasing competitiveness in the global market, businesses are looking for means to manage their relations with

More information

A SURVEY ON PRODUCT REVIEW SENTIMENT ANALYSIS

A SURVEY ON PRODUCT REVIEW SENTIMENT ANALYSIS A SURVEY ON PRODUCT REVIEW SENTIMENT ANALYSIS Godge Isha Sudhir ishagodge37@gmail.com Arvikar Shruti Sanjay shrutiarvikar89@gmail.com Dang Poornima Mahesh dang.poornima@gmail.com Maske Rushikesh Kantrao

More information

CHAPTER 4 A FRAMEWORK FOR CUSTOMER LIFETIME VALUE USING DATA MINING TECHNIQUES

CHAPTER 4 A FRAMEWORK FOR CUSTOMER LIFETIME VALUE USING DATA MINING TECHNIQUES 49 CHAPTER 4 A FRAMEWORK FOR CUSTOMER LIFETIME VALUE USING DATA MINING TECHNIQUES 4.1 INTRODUCTION Different groups of customers prefer some special products. Customers type recognition is one of the main

More information

Role of Data Mining in E-Governance. Abstract

Role of Data Mining in E-Governance. Abstract Role of Data Mining in E-Governance Dr. Rupesh Mittal* Dr. Saurabh Parikh** Pushpendra Chourey*** *Assistant Professor, PMB Gujarati Commerce College, Indore **Acting Principal, SJHS Gujarati Innovative

More information

Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms

Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms Panos Adamopoulos Goizueta Business School Emory University padamop@emory.edu Anindya Ghose

More information

We create clarity, out of the chaos of digital noise.

We create clarity, out of the chaos of digital noise. We create clarity, out of the chaos of digital noise. Alto-Analytics.com $65 million additional net income earned by a typical Fortune 500 increasing data accessibility 10% 60% increase in operating margin

More information

Empowering Transport Planning through Big Data. people. movement. insight.

Empowering Transport Planning through Big Data. people. movement. insight. Empowering Transport Planning through Big Data people. movement. insight. Introduction Throughout history, transportation has been the key in enabling the mobility of people and goods, allowing for the

More information

A Survey on Recommendation Techniques in E-Commerce

A Survey on Recommendation Techniques in E-Commerce A Survey on Recommendation Techniques in E-Commerce Namitha Ann Regi Post-Graduate Student Department of Computer Science and Engineering Karunya University, India P. Rebecca Sandra Assistant Professor

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 10 CHAPTER 2 LITERATURE SURVEY This chapter provides the related work that has been done about the software performance requirements which includes the sub sections like requirements engineering, functional

More information

WELCOME TO. Cloud Data Services: The Art of the Possible

WELCOME TO. Cloud Data Services: The Art of the Possible WELCOME TO Cloud Data Services: The Art of the Possible Goals for Today Share the cloud-based data management and analytics technologies that are enabling rapid development of new mobile applications Discuss

More information

Goya Deep Learning Inference Platform. Rev. 1.2 November 2018

Goya Deep Learning Inference Platform. Rev. 1.2 November 2018 Goya Deep Learning Inference Platform Rev. 1.2 November 2018 Habana Goya Deep Learning Inference Platform Table of Contents 1. Introduction 2. Deep Learning Workflows Training and Inference 3. Goya Deep

More information

ML Methods for Solving Complex Sorting and Ranking Problems in Human Hiring

ML Methods for Solving Complex Sorting and Ranking Problems in Human Hiring ML Methods for Solving Complex Sorting and Ranking Problems in Human Hiring 1 Kavyashree M Bandekar, 2 Maddala Tejasree, 3 Misba Sultana S N, 4 Nayana G K, 5 Harshavardhana Doddamani 1, 2, 3, 4 Engineering

More information

Theses. Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Paolo Garza Luca Cagliero, Luigi Grimaudo Daniele Apiletti, Giulia Bruno, Alessandro Fiori

Theses. Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Paolo Garza Luca Cagliero, Luigi Grimaudo Daniele Apiletti, Giulia Bruno, Alessandro Fiori Theses Elena Baralis, Tania Cerquitelli, Silvia Chiusano, Paolo Garza Luca Cagliero, Luigi Grimaudo Daniele Apiletti, Giulia Bruno, Alessandro Fiori Turin, January 2015 General information Duration: 6

More information

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Case Study How Gemalto s Trust Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform Traditional know-your-customer (KYC) processes are costly, complex

More information

Strategy Analysis. Chapter Study Group Learning Materials

Strategy Analysis. Chapter Study Group Learning Materials Chapter Study Group Learning Materials 2015, International Institute of Business Analysis (IIBA ). Permission is granted to IIBA Chapters to use and modify this content to support chapter activities. All

More information

Mining Heterogeneous Urban Data at Multiple Granularity Layers

Mining Heterogeneous Urban Data at Multiple Granularity Layers Mining Heterogeneous Urban Data at Multiple Granularity Layers Antonio Attanasio Supervisor: Prof. Silvia Chiusano Co-supervisor: Prof. Tania Cerquitelli collection Urban data analytics Added value urban

More information

Combine attribution with data onboarding to bridge the digital marketing divide

Combine attribution with data onboarding to bridge the digital marketing divide Combine attribution with data onboarding to bridge the digital marketing divide Understand how online marketing impacts offline sales Google Inc. 360suite-info@google.com g.co/360suite 1 Digital marketing

More information

Introduction to computable general equilibrium (CGE) Modelling

Introduction to computable general equilibrium (CGE) Modelling Introduction to computable general equilibrium (CGE) Modelling Organized by Economics and Social Commission for Western Asia (September 29, 2017) Beirut Presented by: Yves Surry: Professor at the Swedish

More information

Measuring Cross-Device, The Methodology

Measuring Cross-Device, The Methodology Measuring Cross-Device, The Methodology As the first company to crack-the-code on cross-screen, Tapad Data Scientists are asked to explain the power of our cross-screen technology on a near-daily basis.

More information

Daniels College of Business University of Denver MSBA Program (58 Credit-Hours) and MSBA DUGG (48 Credit-Hours) Revised: May 17, 2018

Daniels College of Business University of Denver MSBA Program (58 Credit-Hours) and MSBA DUGG (48 Credit-Hours) Revised: May 17, 2018 University of Denver MSBA Program (58 Credit-Hours) and MSBA DUGG (48 Credit-Hours) Revised: May 17, 2018 Program 1. Graduates will develop and execute architectures, policies, and practices that properly

More information

Goya Inference Platform & Performance Benchmarks. Rev January 2019

Goya Inference Platform & Performance Benchmarks. Rev January 2019 Goya Inference Platform & Performance Benchmarks Rev. 1.6.1 January 2019 Habana Goya Inference Platform Table of Contents 1. Introduction 2. Deep Learning Workflows Training and Inference 3. Goya Deep

More information

75/8. About Market Strategies driving confident business decisions. 1.3 million 6,000 #20. Global Reach. Broad Industry Expertise

75/8. About Market Strategies driving confident business decisions. 1.3 million 6,000 #20. Global Reach. Broad Industry Expertise Session Overview Utilities are expected to better engage their customers but customer touch points and offerings have exploded, making the best path forward seem overwhelming. Data to the rescue! - The

More information

Digital Tracking Playbook:

Digital Tracking Playbook: Digital Tracking Playbook: Putting Digital Tracking into practice December 2017 DigitalTracking Purchased cinema tickets Looked up restaurants With Digital Tracking, you can accurately gauge customer behavior

More information

Chart your future with predictive analytics

Chart your future with predictive analytics IBM Analytics Feature Guide IBM SPSS Modeler Chart your future with predictive analytics Finding hidden trends in your data can give you tremendous insights into your business. 2 Chart Your Future Contents

More information

ONLINE EVALUATION FOR: Name

ONLINE EVALUATION FOR: Name ONLINE EVALUATION FOR: Name Address URL Phone This product is fulfilled by Platypus - Media, Advertising & Design. Platypus has been working with local BBB s for over 20 years. We specialize in providing

More information

NAVIGATING TO ACCURATE POINTS OF INTEREST (POI): BENEFITTING MAP USERS AND BUSINESSES THROUGH THE 3D APPROACH

NAVIGATING TO ACCURATE POINTS OF INTEREST (POI): BENEFITTING MAP USERS AND BUSINESSES THROUGH THE 3D APPROACH VIEW POINT NAVIGATING TO ACCURATE POINTS OF INTEREST (POI): BENEFITTING MAP USERS AND BUSINESSES THROUGH THE 3D APPROACH Abstract Do you use a map to navigate from point A to point B? What do you use as

More information

Engaging in Big Data Transformation in the GCC

Engaging in Big Data Transformation in the GCC Sponsored by: IBM Author: Megha Kumar December 2015 Engaging in Big Data Transformation in the GCC IDC Opinion In a rapidly evolving IT ecosystem, "transformation" and in some cases "disruption" is changing

More information

IBM Cognos Consumer Insight

IBM Cognos Consumer Insight IBM Cognos Consumer Insight Create Relationships. Build Advocacy. Improve Loyalty. Marco Loprete Enhancing Customer Loyalty is the Top Digital Priority Enhance customer loyalty/advocacy 67% Deploy tablet/mobile

More information

3 WAYS ONLINE ANONYMITY HURTS BUSINESSES AND CONSUMERS

3 WAYS ONLINE ANONYMITY HURTS BUSINESSES AND CONSUMERS 3 WAYS ONLINE ANONYMITY HURTS BUSINESSES AND CONSUMERS A WHITE PAPER BY GIGYA Traditionally, the notion of online identity is that it must be protected and safeguarded by the individual it belongs to.

More information

Optimizing Outcomes in a Connected World: Turning information into insights

Optimizing Outcomes in a Connected World: Turning information into insights Optimizing Outcomes in a Connected World: Turning information into insights Michael Eden Management Brand Executive Central & Eastern Europe Vilnius 18 October 2011 2011 IBM Corporation IBM celebrates

More information

Empowering the Digital Marketer With Big Data Visualization

Empowering the Digital Marketer With Big Data Visualization Conclusions Paper Empowering the Digital Marketer With Big Data Visualization Insights from the DMA Annual Conference Preview Webinar Series Big Digital Data, Visualization and Answering the Question:

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 11 (Part II) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457

More information

Revolutionizing Your Web Results with WebTrends 7

Revolutionizing Your Web Results with WebTrends 7 October 6, 2004 Revolutionizing Your Web Results with WebTrends 7 Greg Drew Senior VP and General Manager Organizations accelerating ROI with the Web Allstate operates more than 11,000 Web initiatives.

More information

THE GUIDE TO MAXPOINT CONSUMER TRAFFIC INSIGHTS

THE GUIDE TO MAXPOINT CONSUMER TRAFFIC INSIGHTS THE GUIDE TO MAXPOINT CONSUMER TRAFFIC INSIGHTS MAXPOINT FOOT TRAFFIC IMPACT STUDIES: OVERVIEW MaxPoint uses our proprietary location-powered targeting to match neighborhood locations with audiences and

More information

Adobe Cloud Platform

Adobe Cloud Platform Adobe Cloud Platform Table of Contents 5 6 7 9 11 13 15 Adobe Cloud Platform Data Governance Machine Learning Profile Management Adobo I/O Ecosystem Why Adobe? Adobe Adobe Cloud Platform. 2 T oday s digital

More information

Data Mining and Knowledge Discovery in Large Databases

Data Mining and Knowledge Discovery in Large Databases Outline We are drowning in data, but we are starving for knowledge Part 2: Clustering - Hierarchical Clustering - Divisive Clustering - Density based Clustering Data Mining and Knowledge Discovery in Large

More information

The development of social science research methods influenced by social media

The development of social science research methods influenced by social media The development of social science research methods influenced by social media Lieke A.C. Hesen Pedagogical and Educational Sciences Abstract The introduction of social media during the past 15 years has

More information

WEEK 9 DATA MINING 1

WEEK 9 DATA MINING 1 WEEK 9 DATA MINING 1 Week 9 Data Mining Introduction The purpose of this paper is to present the illustration of different aspects, which are associated with data mining. In the current era, businesses

More information

IS Today: Managing in a Digital World 9/17/12

IS Today: Managing in a Digital World 9/17/12 IS Today: Managing in a Digital World Chapter 6 Enhancing Business Intelligence Using Information Systems Learning Objectives 6-2 With the help of their data warehouse and sophisticated business intelligence

More information

Knowledge Discovery and Data Mining

Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining Unit # 19 1 Acknowledgement The following discussion is based on the paper Mining Big Data: Current Status, and Forecast to the Future by Fan and Bifet and online presentation

More information

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do?

Operational Application of Targeted Data Analysis. Eric Chasin, NTELX Agenda. What we do? Operational Application of Targeted Analysis Eric Chasin, NTELX echasin@ntelx.com Agenda Who is NTELX? Applying Intelligence Multi Source and Multi Indicator Knowledge Based Decision Making to Medicaid/Medicare

More information

Proving Marketing Impact:

Proving Marketing Impact: Proving Marketing Impact: 3 Keys to Doing It Right THE RUNDOWN One of the most serious challenges in marketing is identifying the true impact of a given marketing spend change. In this guide, we show you

More information

2018 Visa. All rights reserved.

2018 Visa. All rights reserved. Disclaimer This presentation is based on information published by Visa in the Digital Transformation of SMBs: The Future of Commerce (the Report ). All references to consumers and small business surveyed,

More information

NOVEL DATAMINING TECHNIQUE FOR ONLINE SHOPPING

NOVEL DATAMINING TECHNIQUE FOR ONLINE SHOPPING NOVEL DATAMINING TECHNIQUE FOR ONLINE SHOPPING D. Ravi 1, A. Dharshini 2, Keerthaneshwari 3, M. Naveen Kumar 4 1,2,3,4 CSE Department, Kathir College of Engineering Abstract: Opinion mining is a type of

More information

Title Placeholder Left Aligns to a in accenture and May Move Vertically

Title Placeholder Left Aligns to a in accenture and May Move Vertically Title Placeholder Left Aligns to a in accenture and May Move Vertically Is that email offer from a big brand name really a phishing scam? When is a seemingly benign social media post really cyber bullying?

More information

Data Mining and Marketing Intelligence

Data Mining and Marketing Intelligence Data Mining and Marketing Intelligence Alberto Saccardi Abstract The technological advance has made possible to create data bases designed for the marketing intelligence, with the availability of large

More information

What s New in Attribution

What s New in Attribution What s New in Attribution April 2017 VIEWPOINTS What s New in Attribution Jason Chung Yuanying Huang Maya Kramer 1 Contents 3 Introduction 3 Cross-Device Measurement 4 Social Media 5 Integration of Top-Down

More information

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges ACCEPTED FROM OPEN CALL Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges Sancheng Peng, Guojun Wang, and Dongqing Xie Abstract Social influence analysis has become

More information

Generative Models for Networks and Applications to E-Commerce

Generative Models for Networks and Applications to E-Commerce Generative Models for Networks and Applications to E-Commerce Patrick J. Wolfe (with David C. Parkes and R. Kang-Xing Jin) Division of Engineering and Applied Sciences Department of Statistics Harvard

More information

CONTENT MODERATION: The Future is Bionic

CONTENT MODERATION: The Future is Bionic CONTENT MODERATION: The Future is Bionic Is that email offer from a big brand name really a phishing scam? When is a seemingly benign social media post really cyber bullying? In the absence of context,

More information

Introduction to digital marketing

Introduction to digital marketing Introduction to digital marketing with emphasis on social media DAVID FERNANDO TERRA FERMA MEDIA LTD www.terrafermamedia.com Marketing communications agency: website design & build social media marketing

More information

Marketing & Big Data

Marketing & Big Data Marketing & Big Data Surat Teerakapibal, Ph.D. Lecturer in Marketing Director, Doctor of Philosophy Program in Business Administration Thammasat Business School What is Marketing? Anti-Marketing Marketing

More information

Executive Summary: Quantifying the Role of Social Voice in Marketing Effectiveness. 10/25/2012 MarketShare & KellerFay Group

Executive Summary: Quantifying the Role of Social Voice in Marketing Effectiveness. 10/25/2012 MarketShare & KellerFay Group Executive Summary: Quantifying the Role of Social Voice in Marketing Effectiveness 10/25/2012 MarketShare & KellerFay Group. Introduction As Social Voice (online and offline word of mouth) becomes increasingly

More information

TeraCrunch Solution Blade White Paper

TeraCrunch Solution Blade White Paper TeraCrunch Solution Blade White Paper Transforming Organizations With Predictive Analytics & Artificial Intelligence M a y 2 0 1 6 TABLE OF CONTENTS 1. INTRODUCTION 3 2. APPROACH 3 3. PLATFORM 4 4. PROCESS

More information

ADVENT ONE. The Dynamic Demands of IoT in a Connected World

ADVENT ONE. The Dynamic Demands of IoT in a Connected World ADVENT ONE The Dynamic Demands of IoT in a Connected World Modern consumers have come to expect online, self-service and intuitive transacting in an on-demand world. We shop online, bank online and expect

More information

DETAILED MODULE WISE CONTENT

DETAILED MODULE WISE CONTENT DETAILED MODULE WISE CONTENT Module 1- Introduction to Digital Marketing The Introduction to Digital Marketing module introduces the foundational aspects of digital marketing and covers areas including:

More information

A Systematic Approach to Performance Evaluation

A Systematic Approach to Performance Evaluation A Systematic Approach to Performance evaluation is the process of determining how well an existing or future computer system meets a set of alternative performance objectives. Arbitrarily selecting performance

More information

Reaching Today s Health Care Consumer

Reaching Today s Health Care Consumer CONSUMER ENGAGEMENT Reaching Today s Health Care Consumer Digital Marketing Best Practices Cheryl Haas Managing Director, Audience Rx 2 3 Today s HEALTH CARE Consumer 4 Digital Usage 280M INTERNET USERS

More information

Cross-Device Consumer Graph

Cross-Device Consumer Graph Cross-Device Consumer Graph Enabling brands to have seamless conversations with consumers across devices Contact Us sales@drawbridge.com Table of Contents 3 Introduction 4 5 6 6 7 7 8 9 10 11 Approaches

More information

Case studies in Data Mining & Knowledge Discovery

Case studies in Data Mining & Knowledge Discovery Case studies in Data Mining & Knowledge Discovery Knowledge Discovery is a process Data Mining is just a step of a (potentially) complex sequence of tasks KDD Process Data Mining & Knowledge Discovery

More information

Engaging your mobile shoppers in-store. Todd Sherman, CMO

Engaging your mobile shoppers in-store. Todd Sherman, CMO Engaging your mobile shoppers in-store Todd Sherman, CMO Omnichannel (Omni-channel) All about In-Store Opportunity Technologies/Features Results Getting started (No, we re not covering mobile payments

More information

TIBCO Industry Analytics: Consumer Packaged Goods and Retail Solutions

TIBCO Industry Analytics: Consumer Packaged Goods and Retail Solutions TIBCO Industry Analytics: Consumer Packaged Goods and Retail Solutions TIBCO s robust, standardsbased infrastructure technologies are used by successful retailers around the world, including five of the

More information

BUS 168 Chapter 6 - E-commerce Marketing Concepts: Social, Mobile, Local

BUS 168 Chapter 6 - E-commerce Marketing Concepts: Social, Mobile, Local Consumers Online: The Internet Audience and Consumer Behavior Around 84% of U.S. adults use the Internet in 2015 Intensity and scope of use both increasing Some demographic groups have much higher percentages

More information

Data Ingestion in. Adobe Experience Platform

Data Ingestion in. Adobe Experience Platform Contents The challenges with data Adobe Experience Platform Data Ingestion in Adobe Experience Platform Data Ingestion Service Data Lake Conclusion Adobe Experience Platform helps customers to centralize

More information

Uncover possibilities with predictive analytics

Uncover possibilities with predictive analytics IBM Analytics Feature Guide IBM SPSS Modeler Uncover possibilities with predictive analytics Unlock the value of data you re already collecting by extracting information that opens a window into customer

More information

Big Data The Big Story

Big Data The Big Story Big Data The Big Story Jean-Pierre Dijcks Big Data Product Mangement 1 Agenda What is Big Data? Architecting Big Data Building Big Data Solutions Oracle Big Data Appliance and Big Data Connectors Customer

More information

Google Analytics. The Non-Technical Manager s Guide to Successful Google Analytics. Author: Helen M.

Google Analytics. The Non-Technical Manager s Guide to Successful Google Analytics.   Author: Helen M. 011 Google Analytics Nonlinear Digital is the full-service digital agency division of non-linear creations, with extensive knowledge and technical expertise in various CMS and marketing/analytics solutions,

More information

Build a Smarter Enterprise with Big Data & Analytics. Todd D Lavieri General Manager, Global Business Services

Build a Smarter Enterprise with Big Data & Analytics. Todd D Lavieri General Manager, Global Business Services Build a Smarter Enterprise with Big Data & Analytics Todd D Lavieri General Manager, Global Business Services Let s explore Big Data & Analytics The Market is changing Harness the opportunity for growth

More information

Google Your Way to Better Digital Marketing Campaigns. October 5th, 2016

Google Your Way to Better Digital Marketing Campaigns. October 5th, 2016 Google Your Way to Better Digital Marketing Campaigns October 5th, 2016 Link Walls, VP of Product Management, Digital Marketing Sudi Malloy, Team Lead, US Digital Marketing Services Agenda ChannelAdvisor

More information

HOSTING SERVICES - LINKING THE INFORMATION WAREHOUSE TO THE INFORMATION CONSUMER

HOSTING SERVICES - LINKING THE INFORMATION WAREHOUSE TO THE INFORMATION CONSUMER HOSTING SERVICES - LINKING THE INFORMATION WAREHOUSE TO THE INFORMATION CONSUMER Brian Freeman & Gideon Lidor AT&T Bell Laboratories, Holmdel, New Jersey 07733-3030 Abstract The warehouse and highway analogies

More information

Digital Marketing PRECISION EXAMS

Digital Marketing PRECISION EXAMS PRECISION EXAMS Digital Marketing EXAM INFORMATION Items 36 Points 41 Prerequisites NONE Grade Level 11-12 Course Length ONE SEMESTER Career Cluster MARKETING ARTS, A/V TECHNOLOGY AND COMMUNICATION Performance

More information

Digital Marketing PRECISION EXAMS

Digital Marketing PRECISION EXAMS PRECISION EXAMS Digital Marketing EXAM INFORMATION Items 36 Points 41 Prerequisites NONE Grade Level 11-12 Course Length ONE SEMESTER Career Cluster MARKETING ARTS, A/V TECHNOLOGY AND COMMUNICATION Performance

More information

Engage / AI across the funnel Practical routes to a better customer experience

Engage / AI across the funnel Practical routes to a better customer experience Practical routes to a better customer experience Introduction Artificial intelligence (AI) and machine learning are the most exciting developments in marketing and merchandising for decades. They offer

More information

Intelligent Parking Assistant - A Showcase of the MOBiNET. Platform Functionalities

Intelligent Parking Assistant - A Showcase of the MOBiNET. Platform Functionalities 22 nd ITS World Congress, Bordeaux, France, 5 9 October 2015 Paper number ITS-2391 Intelligent Parking Assistant - A Showcase of the MOBiNET Platform Functionalities Lars Mikkelsen 1*, Raphael Toledo 2,

More information

SSRG International Journal of Economics and Management Studies ( SSRG IJEMS ) Volume 4 Issue 9 September2017

SSRG International Journal of Economics and Management Studies ( SSRG IJEMS ) Volume 4 Issue 9 September2017 Business Intelligence: A Strategy for Business Development Youssra RIAHI Faculty of Informatics International University of Rabat, Technopolis parc, Sala el jadida 11100, Morocco Abstract Today, in a context

More information

Getting Big Value from Big Data

Getting Big Value from Big Data Getting Big Value from Big Data Expanding Information Architectures To Support Today s Data Research Perspective Sponsored by Aligning Business and IT To Improve Performance Ventana Research 2603 Camino

More information

Beginner s Guide to Inbound Marketing EDUCATE EMPOWER ACCELERATE

Beginner s Guide to Inbound Marketing EDUCATE EMPOWER ACCELERATE Beginner s Guide to Inbound Marketing EDUCATE EMPOWER ACCELERATE Inbound marketing is now the overwhelming marketing approach of choice for companies and organizations of all sizes, across all industries.

More information

Introduction to Business Cloud. White Paper

Introduction to Business Cloud. White Paper Introduction to Business Cloud White Paper Contents Introduction... 3 Background... 3 Solution... 4 Out-of-the-band Architecture... 5 Scalable... 6 Simple... 6 Secure... 7 Intelligent... 7 Intended Market

More information

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee

Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Business Analytics & Data Mining Modeling Using R Dr. Gaurav Dixit Department of Management Studies Indian Institute of Technology, Roorkee Lecture - 02 Data Mining Process Welcome to the lecture 2 of

More information

The E-Commerce Acceleration Playbook. How to Prioritize Your E-Commerce Activity to Grow Sales Faster

The E-Commerce Acceleration Playbook. How to Prioritize Your E-Commerce Activity to Grow Sales Faster The E-Commerce Acceleration Playbook How to Prioritize Your E-Commerce Activity to Grow Sales Faster Introduction: Why it s time for a new approach to e-commerce optimization You start your car in the

More information

MIS 300 Exam 1 Spring 2011

MIS 300 Exam 1 Spring 2011 MIS 300 Exam 1 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

How to drive profits with customer segmentation. A beginner s guide to breaking down your market into targetable groups

How to drive profits with customer segmentation. A beginner s guide to breaking down your market into targetable groups How to drive profits with customer segmentation A beginner s guide to breaking down your market into targetable groups Table of contents 3 5 Introduction Why segmentation? 8 9 11 13 17 21 5 steps to build

More information

The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales

The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales The usage of Big Data mechanisms and Artificial Intelligence Methods in modern Omnichannel marketing and sales Today's IT service providers offer a large set of tools supporting sales and marketing activities

More information

Application of Association Rule Mining in Supplier Selection Criteria

Application of Association Rule Mining in Supplier Selection Criteria Vol:, No:4, 008 Application of Association Rule Mining in Supplier Selection Criteria A. Haery, N. Salmasi, M. Modarres Yazdi, and H. Iranmanesh International Science Index, Industrial and Manufacturing

More information

Business Analytics. enherent. Leveraging Analytic Applications. May Connecting the Dots.

Business Analytics. enherent. Leveraging Analytic Applications. May Connecting the Dots. Connecting the Dots Business Analytics Leveraging Analytic Applications May 2010 2010 Corp. All rights reserved. www..com Data Explosion There is no bigger problem facing individuals and organizations

More information