Friday, 20 December 2013

Week # 16

LEARNING FROM DATA

A method of filtering and reworking knowledge into valid and helpful data. Final goal is to enhance the qualities of communication and deciding. Begin with a hypothesis derived from observation or previous data. I bottom up approach we've got No hypothesis to check, Unknown Patterns and Key relationships. knowledge image is changing and exploring knowledge into some significant knowledge visually is understood as knowledge image. If we glance at artificial neural network as learning model it's shapely when human brain’s network and Simulate biological informatics via networks of interconnected neurons. Neural networks are analog and parallel. In supervised learning the model defines the result one set of observations, known as inputs, has on another set of observations, known as outputs. In different words, the inputs are assumed to be at the start and outputs at the top of the causative chain. The models will embody mediating variables between the inputs and outputs. wherever as in unsupervised learning all the observations are assumed to be caused by latent variables, that is, the observations are assumed to be at the top of the causative chain. In observe, models for supervised learning typically leave the likelihood for inputs undefined . This model isn't required as long because the inputs are accessible, however if a number of the input values are missing, it's unacceptable to infer something regarding the outputs. If the inputs are shapely, then missing inputs cause no downside since they will be thought of latent variables as in unsupervised learning.

Week # 15

KNOWLEDGE TRANSFER IN E-WORLD
Strategies of data Transfer
Tacit data transfer , distinctive in complicated, non-algorithmic comes, wherever data is mentally hold on. specific Inter-team Transfer — one team shares expertise with another engaged on an identical job at another web site

E-World
Internet technology to serve the inner desires of a company. Link data staff and users (like line managers) twenty four hrs every day.
Extranets square measure the technical community to come up with revenue and guarantee competitive advantage.Extranets guarantee durable bonds between partners and company members

Groupware
Software that helps individuals work along from a distance. Facilitates data transfer between data seekers and data suppliers

Groupware Applications
Newsgroups and work-flow systems, Chat rooms, Video communication, data sharing software

E-Business
Brings universal access to net to core business method of exchanging info Connects important business systems on to important communities

Customer Relationship Management (CRM)
Customer relationship management  may be a model for managing a company’s interactions with current and future customers. It involves victimisation technology to arrange, automate, and synchronize sales, marketing, client service, and technical support.

  • Increased client satisfaction
  • Cross-selling merchandise expeditiously
  • Making decision centers additional economical
 

Tuesday, 10 December 2013

Week # 14


The system is assured to achieve success if : The user(s) have previous expertise with systems applications, The user is actively concerned in process /identifying the precise systems functions, The user is actively concerned in user acceptance testing and also the final system analysis.
Reliable documentation (especially throughout user training) plays a key role throughout readying, Documentation as well as examples, illustrations, and graphics might cut back coaching time.
Two Approaches used for transferring metric linear unit system technology in implementation:
The system is truly transferred from the information developer on to the operating unit within the organization, putting in the system on the resident hardware.
Technical Integration, information Sharing Integration, higher cognitive process Flow Integration, progress Reengineering

Maintenance implies the manner of constructing the desired corrections which might still meet user's expectations.

Strong leadership, User participation within the method, structure politics, structure climate, User readiness (willing)

The new system ought to offer positive identification / protocol protection, Security procedures ought to be systematically discovered, Access ought to be restricted relating to update of the kilobyte.

Should be a daily, integral a part of a learning organization, transmission (or conveying) the information of 1 supply to a different supply, Goal is to promote/facilitate information sharing, increase collaboration and networking, Sources: information bases, experts, etc, Media: LAN, secure/insecure lines, encrypted/plain text, etc, Consumers: another application, a manager, a customer, etc.

Reasoning (why to do) BEFORE process (how to do), Knowing however the Organization, handles Mistakes, Doing is healthier than Talking Employee’s

Ability Utilization, Advancement , Level of accomplishment, Level of power, Compensation, Independence, Authority (supervision)

Monday, 2 December 2013

Week # 13

SYSTEM TESTING AND DEPLOYMENT

The knowledge system ought to meet user expectations. Performance typically depends on the standard of explicit/tacit data hold on within the mental object. For the expert: quality relates to a reasoning method that produces reliable and correct solutions inside the knowledge system framework. For the user, quality relates to the system’s ability to figure with efficiency. For the data developer, quality relates to however well the data supply is and the way well the user's expectations square measure written into the mental object.
It is needed to regulate performance, efficiency, and quality of the mental object. 

Logical Testing : to form certain that the system produces correct results.

User Acceptance : Testing It follows logical testing and checks the system's behavior during a realistic atmosphere

ISSUES: Subjective nature of data (tacit),Lack of reliable specifications, Verifying correctness/consistency, Negligence just in case of testing, Time limitations for data developers to check the system, Complexity just in case of user interfaces.

Logical Testing Approaches : Verify the mental object formation, The structure of the data because it relates to circular or redundant errors is verified.
Consistency, correctness and completeness of data base rules also are verified, Verify the mental object practicality.

User Acceptance Testing Approaches:
Selecting a person/team for testing, Deciding on user acceptance check criteria, Developing a collection of check cases, Maintaining a go surfing totally different versions of the checks and test results, Field-testing the system.

Test Team/Plan : A testing arrange indicates WHO is to try to do the testing. Commitment initiates with management support and a check team with a check arrange. The team is predicted to be freelance of the design/codification of the system , understand systems technology/knowledge base infrastructure, be well versed within the organization's business.

Deciding on user acceptance check criteria: Accuracy, Adaptability, Adequacy, Appeal, Availability, Ease of use, Performance, Face validity, Robustness, Reliability, Operational/Technical check. 

User Acceptance check Techniques: Face Validation, Developing a collection of check cases, Subsystem Validation, Maintaining a go surfing totally different versions of the tests/test results, Field testing the system.