Abstract:
A method of thresholding of a database of customer purchasing history using a computer, includes providing a customer purchase history database including data regarding customer satisfaction, awareness of vendor brands, previous purchasing history, and size of customer budget, providing a predetermined threshold regarding the data, establishing, in the computer, boundaries surrounding the predetermined threshold, splitting the data, in the computer, to maximize the differences in the data across the split; generating, in the computer, a model of the data, in the computer, based upon the split, and allocating marketing resources based upon the model.
Abstract:
A method and system estimates future software support requirements based on statistical models of previous observations of support requests, either for the same product or for a different product having features previously identified as correlated with features of a new product. The estimates include an estimated volume of support requests and an estimated type of support requests. The estimated types include the activity occurring at the time of the failure, an identifier as to whether a defect in the software was previously known, and the like. The estimates are used to estimate and allocate support resources prior to support requests being received, and prior to a software product being released.
Abstract:
A method of subject-adaptive, real-time sleep stage classification to classify electroencephalogram sleep recordings into sleep stages to determine whether a subject exhibits a sleep disorder includes performing subject adaptation to improve classification accuracy for a new subject with limited training data, the performing subject adaptation comprises using linear-chain conditional random fields and potential functions, training the linear-chain conditional random fields using the training data, continuously receiving the electroencephalogram waves, continuously extracting features from the electroencephalogram waves, the extracting features comprising transforming each of the electroencephalogram waves to capture information embedded in the electroencephalogram waves, and continuously classifying the sleep stages according to extracted features and learned parameters from the linear-chain conditional random fields.
Abstract:
Risk in business management is analyzed based on a probabilistic network approach which quantifies the impact of operational risk on financial metrics such as Value-at-Risk (VAR) and/or Potential Losses (PL). This approach provides further capability to determine the optimal placement of one or more countermeasures within a system to minimize the impact of operational risks.
Abstract:
The disclosed embodiments describe a method, apparatus, and system for pushing information. In one embodiment, the method comprises: receiving dynamic spatio-temporal behavior data of a moving individual; conducting an analysis according to historical dynamic spatio-temporal behavior data of the moving individual to acquire spatio-temporal behavioral characteristics of the moving individual; determining appropriate information as matching information for the moving individual according to the spatio-temporal behavioral characteristics of the moving individual in combination with dynamic spatio-temporal behavior data of the moving individual at a current time; and sending the matching information to the moving individual. In the method of the disclosure, behavioral characteristics of a moving individual are analyzed to obtain habit and preference characteristics of the moving individual. Targeted push information is sent, thereby solving the problem of pushed information having less diversified, targeted, and not so accurate content.
Abstract:
A method and structure for predicting traffic on a network, includes a receiver which receives data related to traffic on at least a portion of a network. A calculator calculates a traffic prediction for at least a part of the network, the traffic prediction being calculated by using a deviation from a historical traffic on the network.
Abstract:
Techniques for data center analysis are provided. In one aspect, a method for modeling thermal distributions in a data center is provided. The method includes the following steps. Vertical temperature distribution data is obtained for a plurality of locations throughout the data center. The vertical temperature distribution data for each of the locations is plotted as an s-curve, wherein the vertical temperature distribution data reflects physical conditions at each of the locations which is reflected in a shape of the s-curve. Each of the s-curves is represented with a set of parameters that characterize the shape of the s-curve, wherein the s-curve representations make up a knowledge base model of predefined s-curve types from which thermal distributions and associated physical conditions at the plurality of locations throughout the data center can be analyzed.
Abstract:
A method and system estimates future software support requirements based on statistical models of previous observations of support requests, either for the same product or for a different product having features previously identified as correlated with features of a new product. The estimates include an estimated volume of support requests and an estimated type of support requests. The estimated types include the activity occurring at the time of the failure, an identifier as to whether a defect in the software was previously known, and the like. The estimates are used to estimate and allocate support resources prior to support requests being received, and prior to a software product being released.
Abstract:
A method of subject-adaptive, real-time sleep stage classification to classify electroencephalogram sleep recordings into sleep stages to determine whether a subject exhibits a sleep disorder includes performing subject adaptation to improve classification accuracy for a new subject with limited training data, the performing subject adaptation comprises using linear-chain conditional random fields and potential functions, training the linear-chain conditional random fields using the training data, continuously receiving the electroencephalogram waves, continuously extracting features from the electroencephalogram waves, the extracting features comprising transforming each of the electroencephalogram waves to capture information embedded in the electroencephalogram waves, and continuously classifying the sleep stages according to extracted features and learned parameters from the linear-chain conditional random fields.
Abstract:
A computer implemented method and a computer system implementing the method provide enterprises with pre-emptive/proactive operational risk management. First, historical data on the occurrence of operational risk events and other internal business/external metrics and indicators are collected. This is followed by construction of a model for correlating the risk events with internal and external metrics and indicators. This can result in the estimation of the probability of occurrence of risk events and a model for the severity of a loss event (in termns of, say, dollar amount) as a function of the various variables that are related to or have leverage on the business operation. The Key Risk Indicators for the business are then identified based on the model. Following this, the identified key risk factors are forecasted for future time periods and used to identify early warnings of risk and is further validated. This is used as a basis for the identification and execution of appropriate proactive/pre-emptive risk management and mitigation actions.