Professional Documents
Culture Documents
-1
Information Technology has become a major facilitator of business activities because:-
1. Perform high-speed, high-volume, numeric computations.
2. Provide fast, accurate and inexpensive communication within and between organizations.
3. Store huge amounts of data in an easy-to-access yet small space and allow quick and easy access.
4. Automate semiautomatic business processes and manually done tasks.
Definitions of IT
1. Information is the finished product for which data is the raw material.
2. Information has also been defined as data that have been put into a meaningful and useful context
and communicated to a recipient who uses it to make decisions.
3. The technology plays an important role in delivering timely and error free information to its
recipients.
4. Technology includes hardware, software, databases, and communication system.
5. Hardware is a set of devices such as processor, monitors, keyboard, and printer that accept data,
process them, and display them.
6. Software is a set of programs that enable the hardware to process data.
7. Database is also an integral part of IT system, which is a collection of related files, tables, relation
etc. that stores data and the association among them.
8. Network connects computing resources of an organization and facilitates sharing of hardware and
software. The organization processes and people are integral part of an IT System.
The manager would like to examine various alternatives, which may not be possible in a manual system due to time
constraint or due to sheer volume of data. Sometimes, a statistical analysis of fluctuating data is required which
may be done only with the help of a decision support system. The data may be distributed over various branches of
the organization and without the help of Information Technology;
it may not be possible to examine the data.
An information system that helps a manager in making a decision is called a computer-aided decision
support system (CADS) or simply decision support system (DSS). A DSS is designed with the help of
decision makers. A DSS aids in decision making process and does not make any decision. A DSS may be
used for doing a thorough risk analysis of a project. Such a DSS performs what - if analysis. A DSS
consists of a model of the real world, collection of facts- database, and a user interface.
CHP.-2
Computer Speed
The word length of a CPU is the number of bits it can process in a single cycle. A 64-bit machine can
process 64 bits in a single cycle. A 64-bit machine is faster than a 32-bit machine.
The cycle is defined by the internal clock of the control unit. The Pentium based systems have a clock
speed of 1GHz. The bus carries data, control signals, and address in a system. If the data bus width is
same as the word length, then one word can be moved at a time. If the bus width is half of word length,
two cycles are required for moving one word.
STORAGE AND STORAGE DEVICES
1) Volatile Storage
Main Memory
Cache
2) Nonvolatile Storage : The nonvolatile storage media do not require power supply to retain their
contents. Examples of such storage media are disks and magnetic tapes. Disk is used for online storage,
while tapes are used for archival storage.
For the
effective communication both the sender and the receiver should understand the signals and have
common interpretation for them. When communication has to be established a medium is required for
transmission. This pathway/medium is called as communication media. It includes twisted pair, coaxial
cable, fiber optic cable, microwave transmission, and satellite transmission.
Each character is preceded by start bit and ended with end bit, so that the receiving device knows where
the character begins and ends. It is inefficient due to the overhead of transmitting start a stop bits. It is
generally used for low speed data transmission.
TYPES OF COMPUTERS
Mainframes:
Minicomputers:
Workstations:
Microcomputer:
Network Computer:
COMPUTER SOFTWARE
Application Software
Application software is a term which is used for software created for a specific purpose. It is generally
a program or collection of programs used by end users. It can be called an application or simply an app.
System software
o Operating systems
o Device drivers
o Utilities
o Malicious software or malware
Email
Electronic mail is one of the oldest applications of the Internet and it has become the most common way
of communication. Email can be used to send a message to an individual or to a group of people. Text,
formatted document, or an image in any format can be sent via email. The email uses client/server
architecture. Clients are very advanced and provide amazing facilities. The user can create named
folders and can save selected messages into the folder. It is almost like filing letters into a cabinet. A
message can be sent to one person and a copy can be sent to another person. The message can be sent
with a request for an acknowledgment. A message can be forwarded, deleted, or replied to
Client/server architecture is a computing model
in which the server hosts, delivers and manages most of the resources and services to be consumed by
the client. This type of architecture has one or more client computers connected to a central server over
a network or internet connection. This system shares computing resources.
Client/server architecture is also known as a networking computing model or client/server network
because all the requests and services are delivered over a network.
An MIS deals with information that is systematically and routinely collected in accordance with a well-
defined set of rules. In other words, data collection is a planned activity for which resources are
allocated and rules are defined.
The information provided by an MIS assists managers in planning, organizing, staffing, coordinating,
directing and controlling the operations of an organization. The management experts have viewed these
steps as Management Control system. The following figure shows relationship between operations,
planning and control.
Information systems are used in all functional areas and operating divisions of business.
1. In finance and accounting, information systems are used to forecast revenue and business activity,
determine the best sources and uses of funds.
2. Information systems have been used for managing cash and other financial resources, and analyzing
investment.
3. Financial health of an organization is also checked using IS.
4. In sales and marketing, information systems are used to develop new goods and services (product
analysis), determining the best location for production and distribution facilities (site analysis),
determine the best advertising and sales approaches (promotion analysis) and set product prices to
get the highest total revenues (price analysis).
5. In manufacturing, information systems are used to process customer orders, develop production
schedules;
6. Control inventory lends and monitor product quality.
7. Service industries such as airline industry and railways use information systems to serve their
customers better.
8. Banks and other investment firms’ use IS to make good investments and sanction sound loans.
9. Publishing houses, healthcare organizations, and retail companies all make use of information
systems to serve their customers better and maximize their profit.
Data
Data is raw material with which we start and information is the finished product.
For example
1234 5000.00
2345 7000.00
3456 4500.00
2571 8000.00
The above lines contain data. But in the present form, the above data is useless. We now put the data in
the proper context as follows:
The data is now usable and we can process it to extract information such as the amount withdrawn from
account number 1234 is 5000.00. We can consolidate the data and extract the information that
24500.00 Rs. were withdrawn on 25/2/04.
Information
Information has been defined as
Data that have been put into a meaningful and useful context and communicated to a recipient who
uses it to make decisions it reduces uncertainty, reveals additional alternatives or helps eliminate
irrelevant or poor ones.
Data is processed to get information. The information makes a person more knowledgeable. Knowledge
is an awareness and understanding of a set of information that help decision-making. Knowledge makes
a person wise.
CHARACTERISTICS OF INFORMATION
1) Accurate
2) Complete
3) Economical
4) Flexibility
5) Reliable and verifiable
6) Relevant
7) Simple
8) Timely
9) Accessible and secure
DATA LIFE CYCLE
The data life cycle is the sequence of stages that a particular unit of data goes through from its initial
generation or capture to its eventual archival and/or deletion at the end of its useful life.
Six stages in the data life cycle. Here's one example:
1. Generation or capture: In this phase, data comes into an organization, usually through data entry,
acquisition from an external source or signal reception, such as transmitted sensor data.
2. Maintenance: In this phase, data is processed prior to its use. The data may be subjected to
processes such as integration, scrubbing and extract-transform-load (ETL).
3. Active use: In this phase, data is used to support the organization’s objectives and operations.
4. Publication: In this phase, data isn’t necessarily made available to the broader public but is just sent
outside the organization. Publication may or may not be part of the life cycle for a particular unit of
data.
5. Archiving: In this phase, data is removed from all active production environments. It is no longer
processed, used or published but is stored in case it is needed again in the future.
6. Purging: In this phase, every copy of data is deleted. Typically, this is performed on data that is
already archived.
Data lifecycle management (DLM) is becoming increasingly important since the explosion of big data and
the ongoing development of the Internet of Things (IoT). Enormous volumes of data are being generated
by an ever-increasing number of devices all over the world. Proper oversight of data throughout its life
cycle is essential to optimize its usefulness and minimize the potential for errors. Finally, archiving or
deleting data at the end of its useful life ensures that it does not consume more resources than
necessary.
The value of information is measured in terms of benefits to the organization. The benefits may be
tangible that can be easily quantified. For example, 5% increase in sales is a tangible benefit, which
corresponds to Rs. 50,000. If the cost of the information that led to this additional profit is Rs. 20,000.
Then the value of the information is Rs. 30,000.
Sometimes, the benefits may be intangible and cannot be easily quantified. For instance, the
information may help consumers to connect to a company better. The employees may feel respected in
an organization if more information is shared with them. In both the cases, the attrition rate will
decrease and the corresponding benefit cannot be directly measured in terms of financial benefit to the
organization.
In fact, whenever an organization identifies an opportunity for using information to its advantage, it
develops an information system.
However before developing the system, a cost/benefit analysis is done to figure out net benefit of the
system. There are many methods to assess value of information system, which is explained below.
1) Cost-benefit analysis
IT project and investments has to take its place in the queue for all too scarce cash resources, and the
rules for justifying are the same as for any other project because the risks inherent in decision about IT
are higher, the expected ROI needs to higher before an investment can be justified.
Because of high sum, IT investment has a high potential to damage the organization. A new product is
equally risky. But fundamentally, decision makers are less comfortable about IT because of their
ignorance of the issues and they lack faith in the estimates presented to them.
Identification of IT Costs
A Direct Cost
Management Time
1) Management effort and dedication
2) Employee Training
3) Management Resources
4) Personnel Issues
5) Cost of ownership
6) Employee Time
7) Employee Motivation
3) Earnings Growth
Another measure of IS value is the increase in earnings growth. Let us say, an organization experienced 6% sales
growth in year 2000. After installing IS, the sales growth became 11%. Assuming that no other factors affected
sales, 5% increase in the sales are due to information system.
4) Market Share
Similar to earnings growth one can also evaluate value of IS in terms of increased market share.
1) The project may succeed or it may fail. A project is a success if it is completed within time and
budget. Moreover, it must meet needs of its users and organization. Over a period of time, the
following main success and failure factors have been identified. There are many factors that
contribute to the success of a project.
2) The project scope should be stable and well understood. If the scope of the project changes during
the development of the software, the project is likely to suffer in terms of quality, schedule and
budget overrun.
3) An MIS project that aims at re-engineering the business processes of an organization faces major
challenge. Such projects are high-risk but at the same time have high potential for major benefits
4) The technology development platform and development language exposure are other critical
factors. Sometimes, the technology may be new and the team may have difficulty using the
technology. The platform and language newness may also create trouble for the team.
5) Support from the management is vital for the success of the project.
6) The objective of MIS must be in tune with the objective of the organization.
7) The system should be user friendly and the response time should be reasonable so that the user
does not feel frustrated or over-powered by the system.
8) MIS should be developed with a clear objective that must be documented before the development
commences.
9) An important aspect of an MIS is data. Data policy such as what data will be included, who will
provide the data, which will validate the data, who will integrate the data and how will the data
retire should be clearly stated. These seemingly trivial issues can turn a success into a failure.
10) A quality control plan must be in place to ensure quality of specification and quality of conformance.
11) The system should be properly documented so that attrition does not affect the project or MIS
adversely.
System concepts
Systems are—the transport system, educational system, healthcare delivery system, defense system,
economic system, communication system, management information system, transaction processing
system, decision support system, computer systems, etc. we are in the midst of an era of systems so to
say.
What is a system?
1. In certain cases, the decision can be made using a rule, procedure or quantitative method. Such
problems are known as structured organization may decide to place a purchase order for every
purchase requisition without worrying about merging them. Such decision can be programmed.
2. An organization may have a fixed re-order point and fixed re-order quantity irrespective of demand.
Such decision can be easily programmed.
3. Automated system such as transaction processing systems and MIS are often used to handle
programmed decisions.
4. These systems generate reports for concerned people so that they can take action e.g. a purchase
order will be generated for every requisition and a purchase order will be raised whenever the
Inventory goes below specified limit.
1. If the problem is unstructured, the solution cannot be arrived at using a set of rules of procedures.
The rules and procedures, at best, can help in identifying alternatives. An information system that
assists decision maker in making a non-programmed decision is referred to as decision support
system.
2. A decision support system (DSS) usually has large amount of data that is managed by a Database
Management System. The
3. DSS presents various views of data to the decision maker to facilitate decision-making.
4. A user may prefer graph whereas another user may like to see data in tabular form. A DSS is
designed to provide presentation flexibility to its users.
5. Details can be rolled up or drilled down depending on the requirement.
6. For instance, sales manager of area A would be interested in knowing total sales, details of each sub-
area within his area.
7. He would also like to know sales in area B, area C etc. to measure his relative performance. He
would not be interested in details of sub-areas of area B as C; and will down area A get complete
details.
8. DSS should provide facility to its user to perform statistical analysis of data.
9. E.g. Sales data can be analyzed for identifying seasonal fluctuations from regular demand change.
10. There are lots of software packages that can do amazingly good analysis of the data.
11. E.g. A Company is considering an investment in an IT Project. It can do a what-if-analysis to analyze
worst and best scenario. The expected cost and benefit can be changed within limits to estimate
payback period.
12. It may help a manager in perform goal-seeking analysis. In goal seeking analysis, you work backward
starting with goal to arrive at conditions required to achieve that goal. For instance, you may
allocate budget for inventory and then backward to figure cut the stock level, re-order point,
delivery time etc.
National security, for example, is a multilayered system that protects the sovereignty of a
state, its assets, its resources, and its people. Achieving the appropriate level of security
for an organization also requires a multifaceted system.
Security Analysis
The CIA Model
A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and
Availability; three key principles which should be guaranteed in any kind of secure system. This principle
is applicable across the whole subject of Security Analysis, from access to a user's internet history to
security of encrypted data across the internet. If any one of the three can be breached it can have
serious consequences for the parties concerned.
Confidentiality
Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps
the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the
one which is attacked most often. Cryptography and Encryption methods are an example of an attempt
to ensure confidentiality of data transferred from one computer to another.
Integrity
The ability to ensure that data is an accurate and unchanged representation of the original secure
information. One type of security attack is to intercept some important data and make changes to it
before sending it on to the intended receiver.
Availability
It is important to ensure that the information concerned is readily accessible to the authorised viewer at
all times. Some types of security attack attempt to deny access to the appropriate user, either for the
sake of inconveniencing them, or because there is some secondary effect. For example, by breaking the
web site for a particular search engine, a rival may become more popular
INFORMATION RIGHTS, PRIVACY AND FREEDOM IN AN INFORMATION SOCIETY
1. Privacy deals with the collection and use or misuse of data. Data is constantly being collected and
stored.
2. This data is often distributed, sold or used without our knowledge.
3. The health care provider and retail shops have, for instance, forms of data on its clients and
customers.
4. The fundamental question is “who owns this data and information?”
5. We know for sure that we would not like to share our medical records with others, definitely not
with insurance company or our employers.
Security Analysis
The CIA Model
A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and
Availability; three key principles which should be guaranteed in any kind of secure system. This principle
is applicable across the whole subject of Security Analysis, from access to a user's internet history to
security of encrypted data across the internet. If any one of the three can be breached it can have
serious consequences for the parties concerned.
Confidentiality
Confidentiality is the ability to hide information from those people unauthorized to view it. It is perhaps
the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the
one which is attacked most often. Cryptography and Encryption methods are an example of an attempt
to ensure confidentiality of data transferred from one computer to another.
Integrity
The ability to ensure that data is an accurate and unchanged representation of the original secure
information. One type of security attack is to intercept some important data and make changes to it
before sending it on to the intended receiver.
Availability
It is important to ensure that the information concerned is readily accessible to the authorised viewer at
all times. Some types of security attack attempt to deny access to the appropriate user, either for the
sake of inconveniencing them, or because there is some secondary effect. For example, by breaking the
web site for a particular search engine, a rival may become more popular
INFORMATION RIGHTS, PRIVACY AND FREEDOM IN AN INFORMATION SOCIETY
6. Privacy deals with the collection and use or misuse of data. Data is constantly being collected and
stored.
7. This data is often distributed, sold or used without our knowledge.
8. The health care provider and retail shops have, for instance, forms of data on its clients and
customers.
9. The fundamental question is “who owns this data and information?”
10. We know for sure that we would not like to share our medical records with others, definitely not
with insurance company or our employers.
Depending on the nature of the computer crime that an organization anticipates, it may adopt controls.
The controls are expensive to implement and the organization must evaluate the cost against the
benefit. To summarize, here is a list of control guidelines:
Virus Prevention
1. Install Anti-Virus/Malware Software.
2. Keep Your Anti-Virus Software Up to Date. Keep your anti-virus software up to date. Viruses and
malware are created all the time. Your scanning software is only as good as its database. It too must
be as up to date as possible.
3. Run Regularly Scheduled Scans with Your Anti-Virus Software. Set up your system to run antivirus
at regular intervals.
4. Keep Your Operating System Current
5. Secure your Network-
6. Avoid websites that provide pirated material.
7. Keep Your Personal Information Safe.
8. Back Up Your Files.
DISASTER RECOVERY
1. An information system performs key functions for an organization. If system becomes non-functional
for some time, the consequences may be unacceptable. Organizations usually have a set of
emergency procedures for critical functions. In best scenario, the end user will not be able to
discover the failure of regular system. Generally, the switching to alternate mechanism and
procedures is not seamless and the switching causes certain level of inconvenience to the users.
2. The main reasons for system failures include power failure, data corruption, disk failure, network
failure etc. Nature also plays its role sometimes in the form of a fine, flood or earthquake.
3. In addition, labour unrest or human errors may also render system unusable.
4. One of first stops of disaster planning is to identify threats. Not all the threats listed earlier will be a
concern to an organization.
5. After identifying the threats, appropriate disaster recovery plans should be implemented. We
discuss disaster recovery plans next.
Hardware backup
1. In case of a natural disaster or due to technology failure, the hardware may become unusable. There
are some companies whose line of business is to provide disaster recovery services.
2. A company may provide a hot site that has an operational ready to use system. This is an expensive
option, as the system is kept up to date, usually in different seismic zone.
3. The next option is to maintain a cold site. A cold site provides the infrastructure but not the
processing power and data.
4. In case of a problem, the backup system is made operational.
5. Some companies provide data backup services. You can keep a copy of your data in electronic farm.
Software Backup
1. Software programs are precious assets of an organization that must be protected. A human error
may delete a software package or a hardware failure may make it inaccessible. A simple strategy is
to make copies of software and keep them safely.
2. In addition, one may like to keep another copy of-site in a safe environment.
3. The least one should do is take regular backup. If the data is too large, incremental backups can be
taken or selected data may be backed up at regular intervals.
4. The smart strategy is to be in pro-active mode rather than reactive mode. It may be less expensive to
plan ahead to avoid possible down time than suffer losses.
CHP.8- SDLC
The goal of the System Life Cycle is to keep the project under control and assure that the information
system produced satisfies the requirements. The traditional system life cycle divides the project into a
series of steps, each of which has distinct deliverables, such as documents or computer programs. This is
known as the systems development life cycle (SDLC). The deliverables are related because each
subsequent step builds on the conclusions of previous steps.
Deliverables are produced by the managers or users. Some deliverables are oriented toward the
technical staff, whereas others are directed toward users and mangers.
Phase I - Initiation
The initiation phase may begin in the following ways:-
1. A user may work with the IS staff to produce a written request to study a particular business
problem.
2. The IS staff may discover an opportunity to use information systems beneficially and then try to
interest users.
3. A top manager may notice a business problem and ask the head of IS to look into it.
4. A computer crash or other operational problem may reveal a major problem that can be patched
temporarily but requires a larger project to fix it completely.
5. Regardless of how this phase begins, its goal is to analyze the scope and feasibility of a proposed
system and to develop a project plan.
A. Feasibility Study
The feasibility study is a user-oriented overview of the proposed information system’s purpose and
feasibility. A system’s feasibility is typically considered from economic, technical, and organizational
viewpoints.
1. Economic feasibility involves question such as whether the firm can afford to build the information
system, whether its benefits should substantially exceed its costs, and whether the project has
higher priority than other projects that might use the same resources.
2. Technical feasibility involves question such as whether the technology needed for the information
system exists and whether the firm has enough experience using that technology.
3. Organizational feasibility involves questions such as whether the information system has enough
support to be implemented successfully, whether it brings as excessive amount of change, and
whether the organization is changing too rapidly to absorb it.
If the information system appears to be feasible, the initiation phase produces a functional specification
and a project plan.
B: PROJECT PLANNING
FUNCTIONAL SPECIFICATIONS
1. The functional specification explains the importance of the business problem; summarizes changes
in business processes; and estimates the project’s benefits, costs, and risks.
2. It clarifies the purpose and scope of the proposed project by describing the business processes that
will be affected and how they will be performed using the system.
3. The functional specification is approved by both user and IS personnel.
4. Data Flow diagrams are provided in the Functional Specifications.
5. Data-flow diagrams (DFDs) represent a flow of a data of a process or a system (usually
an information system). The DFD also provides information about the outputs and inputs of each
entity and the process itself. A data-flow diagram has no control flow, there are no decision rules
and no loops. Specific operations based on the data can be represented by a flowchart. Data entry
screens will be included. This more detailed description is produced in the Development phase.
The development phase creates computer programs (with accompanying user and programmer
documentation) that accomplishes the data processing described in the functional specification. This is
done through a process of successive refinement in which the functional requirements are translated
into computer programs and hardware requirements. The purpose of the various steps and deliverables
in the development phase is to ensure that the system accomplishes the goals explained in the
functional specification.
Implementation is the process of putting a system into operation in an organization. It starts after the
development phase.
This phase begins with implementation planning, the process of creating plans for training, conversion,
and acceptance testing. The training plan explains how and when the user will be trained. The
conversion plan explains how and when the organization will convert to new business processes.
The acceptance-testing plan describes the process and criteria for verifying that the information system
works properly in supporting the improved work system.
Training is the process of ensuring that system participants know what they need to know about both
the work system and the information system. The training format depends on user backgrounds and the
purpose and features of both the work system and the information system. Users with no computer
experience may require special training. Training for frequently used transaction processing systems
differs from training for data analysis systems that are used occasionally. Information systems
performing diverse functions require more extensive training than systems used repetitively for new
functions. Training manuals and presentations help in the implementation system.
Maintenance is the process of modifying the information system over time. As users gain experience
with a system, they discover its shortcomings and usually suggest improvements. The shortcomings may
involve problems unrelated to the information system or may involve ways that the information system
might do more to support the work system, regardless of the original intentions. Some shortcomings are
bugs.
Important shortcomings must be corrected if users are to continue using an information system
enthusiastically.
GENETIC ALGORITHMS
They are called “genetic” because they work on the same principles as genetics: The members, which
adapt well to the environment, are selected for reproduction and produce offspring. Poor performers
die without offspring.
The figure above can be summarized that genetic algorithms let the data structures face the
environment and carry forward with only the fittest data structures. There are a few concepts that need
to be highlighted.
Mating: Mating is done by randomly selecting a bit position in the eight bit string and concatenating the
head of one parent to the tail of the other parent to produce the offspring e.g. the fifth bit crossover
point of parents xxxxxxxx & yyyyyyyy will produce offspring xxxxxyyy & yyyyyxxx.
Inversion: Inversion is done on a single string. The inversion concatenates the tail of the string to the
head of the same string e.g. sixth bit inversion of string abcdefgh will be ghabcdef.
Mutation: In mutation bits at one or more randomly selected positions are altered. It is done to ensure
that all locations of the rule space are reachable so as to avoid local minima.
Eg.
Five phases are considered in a genetic algorithm.
1. Initial population
2. Fitness function
3. Selection
4. Crossover
5. Mutation
ARTIFICIAL INTELLIGENCE
1. Intelligence is the computational part of the ability to achieve goals in the world.
2. AI is a branch of computer science concerned with the study and creation of computer systems that
exhibit some form of intelligence: systems that learn new concepts and tasks, systems that can
reason and draw useful conclusions about the world around us, systems that can understand a
natural language or perceive and comprehend a visual scene, and systems that perform other types
of feats that require human types of intelligence”.
Goals of AI
1. Emulate Humans
2. Solve Problems that Require Intelligence
3. Develop Expert Systems on Real-Life Problems
4. Enhance Interaction
Applications of AI
1. Game Playing
2. Automated Grammar Checking
3. Speech Recognition
4. Natural Language Understanding
5. Vision Systems
6. Expert Systems
7. Computer Simulated Natural Processes
8. Mathematical Theorem Proving
9. Intelligent Control
10. Planning a time schedule of a set of events to improve the efficiency
Building AI
1) Knowledge Representation and Reasoning
2) Heuristic Search
3) Inference
4) Learning
5) Planning
EXPERT SYSTEMS
An expert system is a set of programs that manipulate encoded knowledge to solve problems in a
specialized domain that normally requires human expertise. An expert system’s knowledge is obtained
from expert sources and coded in a form suitable for the system to use in its inference or reasoning
process.
Expert System is a result of the interaction between the system builder (knowledge engineer) and many
domain experts.
Expert systems are computer systems that are based on knowledge rather than the data. They
accumulate this knowledge at the time of system building. Knowledge is programmed and kept in such a
manner so that it can be browsed and appended from time to time. Expert systems possess a very high
level of expertise in the area for which they are made for. The best thing about expert systems is that
they grow over time and but for the initial expenditure incurred in building them, they work in a cost
effective manner. Expert systems have predictive modeling power i.e. they are capable of describing the
effects of new situation on the data and the solution. Expert system uses symbolic representations for
knowledge (rules, networks or frames).
This compilation often becomes a quick reference for best strategies, methods and consensus decisions.
This becomes a permanent knowledge base. Thus, one can say that expert systems have a permanent
memory. Expert systems gives access to the user to understand it’s reasoning and can be used to
provide training.
When the IF condition is satisfied by the facts, the action specified by the THEN is performed. These
rules may modify the set of facts in the knowledge base. These new facts can be used to form matches
with the IF portion of the rules. This matching of rule IF portions to the facts can produce “inference
chains”. The inference chains display how a conclusion is reached in an expert system. Rules can be used
in two ways: - by forward chaining and backward chaining.
Forward Chaining: Suppose you have a database which has some information stored in it and you want
to generate some new rules and test them with respect to the database. Then by the forward chaining
method you start with a fact that is present in the database. You infer some rule that comes due to a
consequence of a given fact. Next is that you add that inference as fact in the database. In other words
you have appended the database. Once a fact is added, it interacts with other facts and infers some new
fact that again gets added into the database. This process is continued till there is no further inference.
The process is “forward” because it uses the facts on the left side to derive information on the right
hand side.
Backward Chaining: Suppose you want to test whether a fact exists in the database. The process first
checks the database for that fact. If the fact that you want to establish is not there, then the process
tires to find other facts that conclude that fact. It tries to establish those facts first, which conclude the
fact you are interested in. The process continues in the same
Neural Networks
Neural Networks involve mathematical structures that are capable of learning. Neural network is a set of
connected input/output units where each connection has a weight associated with it. Neural networks
are primarily used for predictions. Neural networks use past data and fit a model on it to predict and
classify. Neural networks as the name suggest resembles the namesake found in human beings. Neural
networks begin with an input layer, which is given some weight before it connects to the output unit.
The output unit processes the values of input variable and weights with a combination function. There
are many hidden layers between the input and output layer. A neural network is trained by assigning
weights on the inputs of each of the units so that the network predicts the variable under question in
the best possible manner.
Neural Networks are a good choice for most classification and prediction tasks when the results of the
model are more important than understanding how the model works.
A neural network can have multiple layers. Suppose, we have a training data and we measure
attributes for training data. These measured attributes form the input layer. Weights are given to the
input layer according to their importance in the problem. The output from the input layer is assigned
some weights and this feed to the second layer, known as hidden layer. Similarly the weighted outputs
of these hidden layers can be fed to the next hidden layer and so on. Finally these outputs go into the
output layer, which emits network’s prediction. This process is explained in the figure given below.
If there is a single hidden layer then the network is called a two-layer neural network.
Similarly a network containing two hidden layers is called a three-layer neural network.
Applications of Neural Networks
1. Handwriting Recognition
2. Travelling Salesman Problem
3. Image Compression
4. Stock Exchange Prediction
FUZZY LOGIC
In standard set theory, an object is either a member of a set or it is not. There is no middle way. There is
no partial containment. The characteristic function of a traditional set assumes values 1 and 0, on the
basis of membership. If we generalize this concept and allow the characteristic function to assume all
values between 0 and 1, then we talk about the fuzzy sets and the value assumed by the characteristic
function denotes the degree or level of membership.
The main objective of fuzzy sets was to define the fuzziness and vagueness. Fuzzy set theory forms the
basis of Fuzzy logic. It is a relatively new discipline that has found applications in automated reasoning of
expert systems. Fuzzy models require defining of memberships functions. These functions can often be
defined on the basis of intuitive knowledge. Because of their simplicity to use and cost effectiveness,
fuzzy logic and fuzzy computation are good prospects for the next generation expert systems. The
universe of fuzzy set can take any value in the real interval 0 and 1.
example - Suppose we want to define the membership of batsmen of national level in a ountry.
ERP Characteristics:-
1. Flexibility
2. Modular & Open
3. Comprehensive
4. Beyond the Company
5. Best Business Practices
Features of ERP
Some of the major features of ERP and what ERP can do for the business system are:
1. ERP provides multi-platform, multi-facility, multi-mode manufacturing, multi-currency, multi-lingual
facilities.
2. It supports strategic and business planning activities, operational planning and execution activities,
creation of Materials and Resources.
3. ERP covers all functional areas like manufacturing, selling and distribution, payables, receivables,
inventory, accounts, human resources, purchases etc.
4. ERP performs core activities and increases customer service, thereby augmenting the corporate
image.
5. ERP bridges the information gap across organizations.
6. ERP provides complete integration of systems not only across departments but also across
companies under the same management.
7. ERP is the solution for better project management.
8. ERP allows automatic introduction of the latest technologies like Electronic Fund Transfer (EFT),
Electronic Data Interchange (EDI), Internet, Intranet, Video conferencing, E-Commerce etc.
9. ERP eliminates most business problems like material shortages, productivity enhancements,
customer service, cash management, inventory problems, quality problems, prompt delivery etc.
10. ERP provides intelligent business tools like decision support system, Executive information system,
Data mining and easy working systems to enable better decisions.
What is BPR?
1. BPR is the fundamental rethinking and radical redesign of processes to achieve dramatic
improvement in measures of performance such as cost reduction, quality, service and speed,”
2. Dramatic achievement means to achieve 80% or 90% reduction (in say, delivery time, work in
progress or rejection rate) and not just 5%, 10% reduction.
3. Radical redesign means BPR is reinventing and not enhancing or improving.
Fundamental rethinking means asking the question “why do you do what you do”, thereby eliminating
business process altogether if it does not add any value to the customer
For example:
Customer and Product are two entities. Customer number and name are attributes of the
Customer entity
Product name and price are attributes of product entity
Sale is the relationship between the customer and product
There are hundreds of such entities and relationships between these entities.
ERP IMPLEMENTATION
1. The success of an implementation mainly depends on how closely the implementation consultants,
users and vendors work together to achieve the overall objectives of the organisation.
2. The implementation consultants have to understand the needs of the users, understand the
prevailing business realties and design the business solutions keeping in mind It is the users who will
be driving the implementation and therefore their all these factors active involvement at all stages
of implementation is vital for the overall success of implementation.
3. It is worthwhile to remember that ERP is an enabling tool, which makes one do his work better,
which naturally need additional efforts.
4. During the course of implementation the standard package may undergo changes which may be a
simple one or a major ‘functionality’ change. Implementing such changes is known as Customization.
5. The contents of the package are known as modules and the modules are further divided into
Components.
6. The roles and responsibilities of the employees have to be clearly identified, understood and the
employees will have to accept new processes and procedures configured in the system laid down in
the ERP system.
7. Processes and procedures have to be simple and user friendly.
8. A well managed and implemented ERP package can give a 200 percent return on investment where
as a poorly implemented one can yield a return on investment as low as 25 percent.