نتایج جستجو برای: financial intelligence

تعداد نتایج: 251707  

2014
Juan Liu

1. The challenge of data analytics The recent decade has observed a tremendous advance in data analytics. Powered by sophisticated computational techniques and powerful software tools, users interact with data analytics systems to sliceand-dice data and integrate results into their sense-making or decision-making process. Examples are abundant: scientists constructing theory from experimental o...

Journal: :Cognitive Systems Research 2017
Derek A. Epp

Collective intelligence, or the wisdom of crowds, refers to a phenomenon by which, under the right conditions, groups of individuals can render highly accurate judgments. This phenomenon has long played an important role in economics, where understanding the behavior of groups is often essential to explaining economic outcomes. More recently, political scientists have shown that trends in publi...

2000
Guofei Jiang George Cybenko Dennis McGrath

National-scale critical infrastructure protection depends on many processes: intelligence gathering, analysis, interdiction, detection, response and recovery, to name a few. These processes are typically carried out by different individuals, agencies and industry sectors. Many new threats to national infrastructure are arising from the complex couplings that exist between advanced information t...

2007
Pooja Jadhav Sylvia C. Wong Gary B. Wills Richard M. Crowder Nigel Shadbolt

The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance of existing engines to identify possible areas of concern. Firstly, this paper investigate the use of advanced business intelligence tenchniques to solve the problem of knowledge transfer from maintenance to design of a...

Journal: :IJIDSS 2015
Lester Ingber

Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author’s work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, a...

Journal: :IJBIR 2013
Urban Ask

There is considerate interest in Business Intelligence (BI) from many perspectives, but little research describing design and use of BI in real companies is available (Granlund, 2011; Jourdan, Rainer & Marshall, 2008). The aim of this article is to add empirical evidence to the knowledge of BI practices, addressing calls for research. BI practices are reported from 193 large Nordic organization...

2013
David R. Shanks Ben R. Newell Eun Hee Lee Divya Balakrishnan Lisa Ekelund Zarus Cenac Fragkiski Kavvadia Christopher Moore

Can behavior be unconsciously primed via the activation of attitudes, stereotypes, or other concepts? A number of studies have suggested that such priming effects can occur, and a prominent illustration is the claim that individuals' accuracy in answering general knowledge questions can be influenced by activating intelligence-related concepts such as professor or soccer hooligan. In 9 experime...

2012

The last years have seen the development of many credit scoring models for assessing the creditworthiness of loan applicants. Traditional credit scoring methodology has involved the use of statistical and mathematical programming techniques such as discriminant analysis, linear and logistic regression, linear and quadratic programming, or decision trees. However, the importance of credit grant ...

2004
Alex Richardson Shirley Gregor Richard Heaney

The nature of investing in share markets is undergoing significant changes due to the growth in electronic or online trading. Online trading has meant increased trading by new types of traders, often relatively inexpert. This paper reports a study that investigated whether more active trading by novice traders, meaning reduced decision making time, was associated with lower trading performance....

2000
GEORGE CYBENKO GUOFEI JIANG

National-scale critical infrastructure protection depends on many processes: intelligence gathering, analysis, interdiction, detection, response and recovery, to name a few. These processes are typically carried out by different individuals, agencies and industry sectors. Many new threats to national infrastructure are arising from the complex couplings that exist between advanced information t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید