938 resultados para Business intelligence, data warehouse, sql server
Resumo:
The identification of criminal networks is not a routine exploratory process within the current practice of the law enforcement authorities; rather it is triggered by specific evidence of criminal activity being investigated. A network is identified when a criminal comes to notice and any associates who could also be potentially implicated would need to be identified if only to be eliminated from the enquiries as suspects or witnesses as well as to prevent and/or detect crime. However, an identified network may not be the one causing most harm in a given area.. This paper identifies a methodology to identify all of the criminal networks that are present within a Law Enforcement Area, and, prioritises those that are causing most harm to the community. Each crime is allocated a score based on its crime type and how recently the crime was committed; the network score, which can be used as decision support to help prioritise it for law enforcement purposes, is the sum of the individual crime scores.
Resumo:
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but instead what amounts to its essence or 'DNA'. Current approaches show insufficient deployment of various types of knowledge that could be brought to bear in providing a fingerprinting framework that remains effective, efficient and can accommodate both the whole as well as elemental protection at appropriate levels of abstraction to suit various Zones of Interest (ZoI) in an image or cross media artefact. The proposed framework aims to deliver selective composite fingerprinting that is powerfully aided by leveraging both multi-modal information as well as a rich spectrum of collateral context knowledge including both image-level collaterals and also the inevitably needed market intelligence knowledge such as customers' social networks interests profiling which we can deploy as a crucial component of our fingerprinting collateral knowledge.
Resumo:
Knowledge-elicitation is a common technique used to produce rules about the operation of a plant from the knowledge that is available from human expertise. Similarly, data-mining is becoming a popular technique to extract rules from the data available from the operation of a plant. In the work reported here knowledge was required to enable the supervisory control of an aluminium hot strip mill by the determination of mill set-points. A method was developed to fuse knowledge-elicitation and data-mining to incorporate the best aspects of each technique, whilst avoiding known problems. Utilisation of the knowledge was through an expert system, which determined schedules of set-points and provided information to human operators. The results show that the method proposed in this paper was effective in producing rules for the on-line control of a complex industrial process. (C) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Knowledge-elicitation is a common technique used to produce rules about the operation of a plant from the knowledge that is available from human expertise. Similarly, data-mining is becoming a popular technique to extract rules from the data available from the operation of a plant. In the work reported here knowledge was required to enable the supervisory control of an aluminium hot strip mill by the determination of mill set-points. A method was developed to fuse knowledge-elicitation and data-mining to incorporate the best aspects of each technique, whilst avoiding known problems. Utilisation of the knowledge was through an expert system, which determined schedules of set-points and provided information to human operators. The results show that the method proposed in this paper was effective in producing rules for the on-line control of a complex industrial process.
IQ in children with autism spectrum disorders: data from the Special Needs and Autism Project (SNAP)
Resumo:
Background Autism spectrum disorder (ASD) was once considered to be highly associated with intellectual disability and to show a characteristic IQ profile, with strengths in performance over verbal abilities and a distinctive pattern of ‘peaks’ and ‘troughs’ at the subtest level. However, there are few data from epidemiological studies. Method Comprehensive clinical assessments were conducted with 156 children aged 10–14 years [mean (s.d.)=11.7 (0.9)], seen as part of an epidemiological study (81 childhood autism, 75 other ASD). A sample weighting procedure enabled us to estimate characteristics of the total ASD population. Results Of the 75 children with ASD, 55% had an intellectual disability (IQ<70) but only 16% had moderate to severe intellectual disability (IQ<50); 28% had average intelligence (115>IQ>85) but only 3% were of above average intelligence (IQ>115). There was some evidence for a clinically significant Performance/Verbal IQ (PIQ/VIQ) discrepancy but discrepant verbal versus performance skills were not associated with a particular pattern of symptoms, as has been reported previously. There was mixed evidence of a characteristic subtest profile: whereas some previously reported patterns were supported (e.g. poor Comprehension), others were not (e.g. no ‘peak’ in Block Design). Adaptive skills were significantly lower than IQ and were associated with severity of early social impairment and also IQ. Conclusions In this epidemiological sample, ASD was less strongly associated with intellectual disability than traditionally held and there was only limited evidence of a distinctive IQ profile. Adaptive outcome was significantly impaired even for those children of average intelligence.
Resumo:
The modelling of a nonlinear stochastic dynamical processes from data involves solving the problems of data gathering, preprocessing, model architecture selection, learning or adaptation, parametric evaluation and model validation. For a given model architecture such as associative memory networks, a common problem in non-linear modelling is the problem of "the curse of dimensionality". A series of complementary data based constructive identification schemes, mainly based on but not limited to an operating point dependent fuzzy models, are introduced in this paper with the aim to overcome the curse of dimensionality. These include (i) a mixture of experts algorithm based on a forward constrained regression algorithm; (ii) an inherent parsimonious delaunay input space partition based piecewise local lineal modelling concept; (iii) a neurofuzzy model constructive approach based on forward orthogonal least squares and optimal experimental design and finally (iv) the neurofuzzy model construction algorithm based on basis functions that are Bézier Bernstein polynomial functions and the additive decomposition. Illustrative examples demonstrate their applicability, showing that the final major hurdle in data based modelling has almost been removed.
Resumo:
In expanding on earlier analyses of the evolution of multinational business that have drawn from concepts of competition and innovation, this study examines the strategies used by British multinationals, between 1870 and 1929, to protect the global reputation of their brands, which were crucial to their survival and success. Even after the passage of new trademark legislation in 1876, enforcement of trademarks remained expensive, and often firms preferred to negotiate, rather than to prosecute violations. Many trademark imitators were based in the newly industrializing countries of the time—the United States, Germany, and Japan—and were part of the British export supply chains as licensees, franchisees, or wholesalers. British firms responded to infringements by lobbying governments, appointing local agents to provide intelligence, and collaborating with other firms.
Resumo:
Many businesses in the UK occupy premises on fixed term leases, which usually run for several years. During this time property requirements can change. This research critically examines the three main mechanisms by which tenants can bring their leases to an end; breaks, assignment and subletting. We examine the legal rules governing these devices and undertake an analysis of lease data and surveys. Break clauses are providing a useful exit mechanism for many tenants, but they cannot give the more general flexibility of assignment and subletting. However, change is necessary to ensure that these latter provisions provide real flexibility for tenants.