Consult more than 14935 documents with no limitation. Our subscription options

Theme : Data

Our documents

Filtrer par :

03 Jul 2023

How to set up a long-term Data-Driven Omnichannel CRM Roadmap to better recruit, retain and grow its clients?

Case study - 4 pages - Business strategy

To become best-in-class in terms of data-driven client activation, the company should aim to deliver personalized and relevant messages to each customer across all channels, and at each stage of the customer journey. This requires a deep understanding of customer behavior and preferences,...

06 Oct 2023
doc

Data Analysis for Decision Making - Cookfood Project

Tutorials/exercises - 6 pages - Mathematics

A questionnaire is administered to a sample set of 856 individuals on a pilot consumer brand called "Cookfood" ready-to-eat product. The data gathered on the sample set is based on their answers with respect to their attitude to the new product, as well as standard demographics, such as...

23 Aug 2022

Scientific Research and Data Analysis

Worksheets - 4 pages - Philosophy

This document is the summary of a course that presents the different ways in which research can be conducted in Science, as well as the method of data analysis. Science is a more formal, rigorous approach in the quest for truthful knowledge. It relies on objectivity and rationality -...

19 Nov 2021

Wine Yield Forescasts Using EO and Weather Data

Internship report - 16 pages - Computer science

Yield forecast methods based on satellite imagery are numerous, and they are usually built around diverse machine learning approaches. This internship was an introduction to a whole remote sensing workflow development, from the input data retrieving to the final forecast itself, which is...

15 Mar 2021
doc

Witnesses and Data Messages

Law case study - 3 pages - Criminal law

In terms of section 15 of the Electronic Communications and Transactions Act, 25 of 2002 ('ECTA') the legal requirements for the admissibility and weight of data messages are stipulated by the Act. The term 'data message' means data generated, sent, received...

12 Feb 2021
doc

Implementing a database

Tutorials/exercises - 17 pages - Computer science

You are required to write a summative report for the company's senior management and shareholders, who you are to assume are not digital-literate in relation to databases, therefore the language should be clear and any technical terms used should be explained. The report should introduce the...

09 Mar 2015
doc

Utilizing Database Performance Using DB column storage

Case study - 4 pages - Educational studies

This paper seeks to discuss how databases can perform with DB column storage techniques. Over the past few years, databases systems running on column stores have been discussed and so much attention paid to them. In retrospect, column stores are used to store each and every database table column...

29 Sep 2015
doc

Data mining as a methodology for extracting hidden knowledge from breast cancer patient's

Essay - 5 pages - Medical studies

Modern monitoring devices among other data collection devices have helped health care organization reduce their cost of collecting and storing data. Specialized tools that come with such equipment have made the entire data collection and storage process more effective thereby...

19 Feb 2015
doc

Efficiency of Clustering Algorithms - Large Biological Data Bases

Case study - 6 pages - Educational studies

Today, protein sequences are more than one million (Sasson et al., 2002) and as such, there is need in bioinformatics for identifying meaningful patterns for the purposes of understanding their functions. For a long time, protein and gene sequences have been analyzed, compared and grouped using...

27 Feb 2015
doc

Security and Risk Management - IT Database security

Case study - 2 pages - Educational studies

The IT infrastructure of the organization makes it susceptible to external intrusions. For example, there are more than 1000 access points with no security awareness programs and no deployed security software programs or reporting to protect the access points. In addition, there is need for...

16 Apr 2014
pdf

Sensor protocols for information via negotiation: A data centric routing protocol for wireless sensor networks

Case study - 6 pages - Computer science

The emergence of Wireless Sensor Networks (WSN) as one of the dominant technology trends in the coming decades has posed numerous challenges for researchers. These networks are likely to be comprised of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in...

18 Aug 2014
doc

Data analysis in business

Case study - 4 pages - Business strategy

Business analytics is often referred to as practices, technology and skill in continued iterative exploration and investigation of previous business performance to attain insight and conduct the planning of business. A specific example of business analytics application is data analysis....

14 Jul 2014
doc

Recommendations for Data Warehouse Concept

Case study - 4 pages - Educational studies

The main aim of various business organizations is to be the leading producer of goods and services offered to their customers in order for the organization complete with competitors in the competitive market. In order for organizations to achieve these desire, organizations through their...

14 Sep 2011
doc

The importance of ethnobotany, compilation of data and the potential problems arising from distribution of this information

Thesis - 4 pages - Biology

Undoubtedly, it is beneficial for the catalogue information for the sake of preserving knowledge. When confronted with any situation, it would be great to have all of the relevant information possible to help make a decision. Particularly when yourself or a loved one is ill, being able to have...

30 Jun 2011
doc

Data warehousing

Essay - 3 pages - Computer science

A data warehouse is a term used to describe the electronically stored data of an organization. These warehouses are important in helping an organization analyze and report on the organization data. It is a process that aims at storing data but it also aims at...

03 Mar 2011
doc

Data sheet: CARE International

Essay - 10 pages - Services marketing

CARE International focuses on the technology of 'avant-garde' and the pending the needs of consumers in respect of personal care products. CARE International is based on a simple philosophy: innovate and offer the greatest number of consumers with the most innovative and effective...

29 Jun 2010
doc

Selecting informative features - a novel approach for the classification of large dataset

Thesis - 5 pages - Computer science

Feature subset selection plays an essential role in all data mining applications. It speeds up a data mining algorithm and improves mining performance. This paper proposes a novel approach of feature subset selection for classification problem. This approach aims to find common...

06 May 2010
pdf

Privacy preserving distributed data mining by using tree based randomization

Thesis - 8 pages - Computer science

Due to increasing concerns related to privacy, organizations are forced to take actions to protect the privacy of individuals when revealing customers' records during data mining activities. In this paper we present a methodology that preserves statistical relationship between attributes...

24 May 2010
pdf

A new paradigm in designing an advertisement - an application of real time data warehouse & data mining in preparation of an ad copy

Thesis - 16 pages - Computer science

The purpose of the article is to address the relative information of modeling an ad copy through real-time data warehousing. In modern enterprises the day-to-day activities information is to be stored in data warehouse. We have taken the example of data warehouse concept from...

29 Jun 2010
doc

Agent oriented domain driven data mining

Thesis - 6 pages - Computer science

Data mining is the process of knowledge discovery in the database. The basic need of data mining in business is to help in improving the business. There are different types of businesses based on domains. Data mining has been recognized as an essential element of decision...

13 Apr 2010
pdf

X-Server: New trends in databases for wired and wireless networks

Thesis - 3 pages - Computer science

Nowadays XML is being used as an underlying technology for most of the transactions on the internet. XML is widely used for Database Storage. Most of the leading product developed companies use XML as their Metadata framework. This work started with a goal to manage XML data and to provide...

28 Apr 2010
pdf

Weight adapted of k - nearest neighbor algorithm with genetic approach implementing over data classification

Thesis - 6 pages - Mathematics

The enormous flow of information in various fields of technology prompts for the development of novel Data Mining methodologies that can process and interprets large volumes of data to be classified to a specify category with high reliability. The problem with Data...

29 Apr 2010
pdf

Deploy robust data transmission over the noisy channel

Thesis - 2 pages - Physics

The secret data is encrypted and permutated using the chaos method. Experiments show the good quality of the stego-image and resistant against the various noise attacks (Like Salt and Pepper). At the same time, the proposed algorithm exhibits good encryption speed, less computations and...

28 Apr 2010
pdf

Performance comparison of feature selection technique for distributed database

Thesis - 3 pages - Computer science

Feature subset selection plays an essential role in all data mining applications. It speeds up a data mining algorithm and improves mining performance. This paper investigates the performance of several feature selection methods for classification: filter, wrapper and hybrid. The...

05 Aug 2010
doc

The history of data storage and it's place in modern day computing

Thesis - 2 pages - Computer science

Even before the first computer made its way into popular knowledge, data storage was an activity that had occurred many times. Data had been copied and stored on a hard disk like tool and then re-used by a mechanical contraption of some sort. In 1801 for example the punch card was...

19 Sep 2010
doc

Acquisition strategy specific to data centric applications and growth plans of EMC Corporation

Essay - 3 pages - Business strategy

EMC Corporation (NYSE: EMC), has adopted a strategy of selective acquisition along with its own plans of organic growth to consolidate its leadership position. Recent company activities and initiatives point towards this direction. Such a strategy is in sync with EMC's aim of becoming a leader in...

10 May 2010
pdf

Application of data mining techniques in designing knowledge base on student competency at the post graduate level

Thesis - 7 pages - Educational studies

Maintenance of academic standards is the prime concern of any educational institution. Education at the Masters level, involves the conscious involvement of time, money and effort by the candidates. With the industrial downturn and reduction in the demand for graduates at the job market due to...

03 Mar 2010
zip

Database enterprise manager

Tutorials/exercises - 27 pages - Computer science

The project titled “Database Enterprise Manger” is designed using Active Server Pages .NET with Microsoft Visual Studio.Net 2005 as front end and Microsoft SQL Server 2000 as back end which works in .Net framework version 2.0. The coding language used is VB .Net. The system...

29 Jun 2010
doc

Kanata: Adaptation and evolution in data sharing systems

Thesis - 3 pages - Computer science

The role of various elements employed in the adaptation and evolution of data systems is complex. This article elaborates a number of issues related to adaptation and changing data patterns. It includes the use of metadata. Metadata is employed in web pages and are used by search...

27 May 2009
doc

An absolute security system with a password for sending secret data files

Dissertation - 52 pages - Electronics, mechanics, engineering & technology

This is a work done on “cryptography”. Conventionally, data is protected from unauthorized interception or eavesdropping by analog techniques. In a digital data security system, when you press a button in the DTMF generator set keypad for data send a connection is...