1,308 research outputs found

    Business Analytics Using Predictive Algorithms

    Get PDF
    In today's data-driven business landscape, organizations strive to extract actionable insights and make informed decisions using their vast data. Business analytics, combining data analysis, statistical modeling, and predictive algorithms, is crucial for transforming raw data into meaningful information. However, there are gaps in the field, such as limited industry focus, algorithm comparison, and data quality challenges. This work aims to address these gaps by demonstrating how predictive algorithms can be applied across business domains for pattern identification, trend forecasting, and accurate predictions. The report focuses on sales forecasting and topic modeling, comparing the performance of various algorithms including Linear Regression, Random Forest Regression, XGBoost, LSTMs, and ARIMA. It emphasizes the importance of data preprocessing, feature selection, and model evaluation for reliable sales forecasts, while utilizing S-BERT, UMAP, and HDBScan unsupervised algorithms for extracting valuable insights from unstructured textual data

    Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity

    Get PDF
    Time series analysis is the process of building a model using statistical techniques to represent characteristics of time series data. Processing and forecasting huge time series data is a challenging task. This paper presents Approximation and Prediction of Stock Time-series data (APST), which is a two step approach to predict the direction of change of stock price indices. First, performs data approximation by using the technique called Multilevel Segment Mean (MSM). In second phase, prediction is performed for the approximated data using Euclidian distance and Nearest-Neighbour technique. The computational cost of data approximation is O(n ni) and computational cost of prediction task is O(m |NN|). Thus, the accuracy and the time required for prediction in the proposed method is comparatively efficient than the existing Label Based Forecasting (LBF) method [1].Comment: 11 page

    The prediction of mobile data traffic based on the ARIMA model and disruptive formula in industry 4.0: A case study in Jakarta, Indonesia

    Get PDF
    Disruptive technologies, which are caused by the cellular evolution including the Internet of Things (IoT), have significantly contributed data traffic to the mobile telecommunication network in the era of Industry 4.0. These technologies cause erroneous predictions prompting mobile operators to upgrade their network, which leads to revenue loss. Besides, the inaccuracy of network prediction also creates a bottleneck problem that affects the performance of the telecommunication network, especially on the mobile backhaul. We propose a new technique to predict more accurate data traffic. This research used a univariate Autoregressive Integrated Moving Average (ARIMA) model combined with a new disruptive formula. Another model, called a disruptive formula, uses a judgmental approach based on four variables: Political, Economic, Social, Technological (PEST), cost, time to market, and market share. The disruptive formula amplifies the ARIMA calculation as a new combination formula from the judgmental and statistical approach. The results show that the disruptive formula combined with the ARIMA model has a low error in mobile data forecasting compared to the conventional ARIMA. The conventional ARIMA shows the average mobile data traffic to be 49.19 Mb/s and 156.93 Mb/s for the 3G and 4G, respectively; whereas the ARIMA with disruptive formula shows more optimized traffic, reaching 56.72 Mb/s and 199.73 Mb/s. The higher values in the ARIMA with disruptive formula are closest to the prediction of the mobile data forecast. This result suggests that the combination of statistical and computational approach provide more accurate prediction method for the mobile backhaul networks

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    RHAS: robust hybrid auto-scaling for web applications in cloud computing

    Get PDF
    corecore