Professional Documents
Culture Documents
1
DA Mod 4 Manini Hemanth
2
DA Mod 4 Manini Hemanth
1. Image Recognition:
Image recognition is one of the most common applications of machine learning. It is used to
identify objects, persons, places, digital images, etc. The popular use case of image recognition
and face detection is, Automatic friend tagging suggestion:
Facebook provides us a feature of auto friend tagging suggestion. Whenever we upload a photo
with our Facebook friends, then we automatically get a tagging suggestion with name, and the
technology behind this is machine learning's face detection and recognition algorithm.
2. Speech Recognition
While using Google, we get an option of "Search by voice," it comes under speech recognition,
and it's a popular application of machine learning.
Speech recognition is a process of converting voice instructions into text, and it is also known as
"Speech to text", or "Computer speech recognition." At present, machine learning algorithms
are widely used by various applications of speech recognition. Google assistant, Siri, Cortana,
and Alexa are using speech recognition technology to follow the voice instructions.
3. Traffic prediction:
If we want to visit a new place, we take help of Google Maps, which shows us the correct path
with the shortest route and predicts the traffic conditions.
It predicts the traffic conditions such as whether traffic is cleared, slow-moving, or heavily
congested with the help of two ways:
o Real Time location of the vehicle form Google Map app and sensors
o Average time has taken on past days at the same time.
Everyone who is using Google Map is helping this app to make it better. It takes information
from the user and sends back to its database to improve the performance.
4. Product recommendations:
Machine learning is widely used by various e-commerce and entertainment companies such
as Amazon, Netflix, etc., for product recommendation to the user. Whenever we search for some
product on Amazon, then we started getting an advertisement for the same product while internet
surfing on the same browser and this is because of machine learning.
Google understands the user interest using various machine learning algorithms and suggests the
product as per customer interest.
As similar, when we use Netflix, we find some recommendations for entertainment series,
movies, etc., and this is also done with the help of machine learning.
5. Self-driving cars:
One of the most exciting applications of machine learning is self-driving cars. Machine learning
plays a significant role in self-driving cars. Tesla, the most popular car manufacturing company
is working on self-driving car. It is using unsupervised learning method to train the car models to
detect people and objects while driving.
6. Email Spam and Malware Filtering:
Whenever we receive a new email, it is filtered automatically as important, normal, and spam.
We always receive an important mail in our inbox with the important symbol and spam emails in
our spam box, and the technology behind this is Machine learning. Below are some spam filters
used by Gmail:
3
DA Mod 4 Manini Hemanth
o Content Filter
o Header filter
o General blacklists filter
o Rules-based filters
o Permission filters
Some machine learning algorithms such as Multi-Layer Perceptron, Decision tree, and Naïve
Bayes classifier are used for email spam filtering and malware detection.
7. Virtual Personal Assistant:
We have various virtual personal assistants such as Google assistant, Alexa, Cortana, Siri. As
the name suggests, they help us in finding the information using our voice instruction. These
assistants can help us in various ways just by our voice instructions such as Play music, call
someone, Open an email, Scheduling an appointment, etc.
8. Online Fraud Detection:
Machine learning is making our online transaction safe and secure by detecting fraud transaction.
Whenever we perform some online transaction, there may be various ways that a fraudulent
transaction can take place such as fake accounts, fake ids, and steal money in the middle of a
transaction. So to detect this, Feed Forward Neural network helps us by checking whether it is
a genuine transaction or a fraud transaction.
For each genuine transaction, the output is converted into some hash values, and these values
become the input for the next round. For each genuine transaction, there is a specific pattern
which gets change for the fraud transaction hence, it detects it and makes our online transactions
more secure.
9. Stock Market trading:
Machine learning is widely used in stock market trading. In the stock market, there is always a
risk of up and downs in shares, so for this machine learning's long short term memory neural
network is used for the prediction of stock market trends.
10. Medical Diagnosis:
In medical science, machine learning is used for diseases diagnoses. With this, medical
technology is growing very fast and able to build 3D models that can predict the exact position
of lesions in the brain.
It helps in finding brain tumors and other brain-related diseases easily.
4
DA Mod 4 Manini Hemanth
Why is BI important?
Measurement: creating KPI (Key Performance Indicators) based on historic data
Identify and set benchmarks for varied processes.
With BI systems organizations can identify market trends and spot business problems that
need to be addressed.
BI helps on data visualization that enhances the data quality and thereby the quality of
decision making.
BI systems can be used not just by enterprises but SME (Small and Medium Enterprises)
5
DA Mod 4 Manini Hemanth
Before we define collection, it’s essential to ask the question, “What is data?” The abridged
answer is, data is various kinds of information formatted in a particular way. Therefore, data
collection is the process of gathering, measuring, and analyzing accurate data from a variety of
relevant sources to find answers to research problems, answer questions, evaluate outcomes, and
forecast trends and probabilities.
Our society is highly dependent on data, which underscores the importance of collecting it.
Accurate data collection is necessary to make informed business decisions, ensure quality
assurance, and keep research integrity.
During data collection, the researchers must identify the data types, the sources of data, and what
methods are being used. We will soon see that there are many different data collection methods.
There is heavy reliance on data collection in research, commercial, and government fields.
Before an analyst begins collecting data, they must answer three questions first:
6
DA Mod 4 Manini Hemanth
What methods and procedures will be used to collect, store, and process the information?
Primary.
As the name implies, this is original, first-hand data collected by the data researchers. This
process is the initial information gathering step, performed before anyone carries out any further
or related research. Primary data results are highly accurate provided the researcher collects the
information. However, there’s a downside, as first-hand research is potentially time-consuming
and expensive.
Secondary.
Secondary data is second-hand data collected by other parties and already having undergone
statistical analysis. This data is either information that the researcher has tasked other people to
collect or information the researcher has looked up. Simply put, it’s second-hand information.
Although it’s easier and cheaper to obtain than primary information, secondary information
raises concerns regarding accuracy and authenticity. Quantitative data makes up a majority of
secondary data.
Let’s get into specifics. Using the primary/secondary methods mentioned above, here is a
breakdown of specific techniques.
Interviews.
7
DA Mod 4 Manini Hemanth
The researcher asks questions of a large sampling of people, either by direct interviews or means
of mass communication such as by phone or mail. This method is by far the most common
means of data gathering.
Projective Technique.
Projective data gathering is an indirect interview, used when potential respondents know why
they're being asked questions and hesitate to answer. For instance, someone may be reluctant to
answer questions about their phone service if a cell phone carrier representative poses the
questions. With projective data gathering, the interviewees get an incomplete question, and they
must fill in the rest, using their opinions, feelings, and attitudes.
Delphi Technique.
The Oracle at Delphi, according to Greek mythology, was the high priestess of Apollo’s temple,
who gave advice, prophecies, and counsel. In the realm of data collection, researchers use the
Delphi technique by gathering information from a panel of experts. Each expert answers
questions in their field of specialty, and the replies are consolidated into a single opinion.
Focus Groups.
Focus groups, like interviews, are a commonly used technique. The group consists of anywhere
from a half-dozen to a dozen people, led by a moderator, brought together to discuss the issue.
Questionnaires.
Questionnaires are a simple, straightforward data collection method. Respondents get a series of
questions, either open or close-ended, related to the matter at hand.
Unlike primary data collection, there are no specific collection methods. Instead, since the
information has already been collected, the researcher consults various data sources, such as:
Financial Statements
Sales Reports
Retailer/Distributor/Deal Feedback
Business Journals
8
DA Mod 4 Manini Hemanth
Trade/Business Magazines
The internet
Data storage essentially means that files and documents are recorded digitally and saved in a
storage system for future use. Storage systems may rely on electromagnetic, optical or other
media to preserve and restore the data if needed. Data storage makes it easy to back up files for
safekeeping and quick recovery in the event of an unexpected computing crash or cyberattack.
Data storage can occur on physical hard drives, disk drives, USB drives or virtually in the cloud.
The important thing is that your files are backed up and easily available should your systems
ever crash beyond repair. Some of the most important factors to consider in terms of data storage
are reliability, how robust the security features tend to be and the cost to implement and maintain
the infrastructure. Browsing through different data storage solutions and applications can help
you arrive at the choice that is the best fit for your business' needs.
There are two broad types of data storage, including direct attached storage and network attached
storage. There are many devices that fit into each of these categories, each with their own unique
advantages and disadvantages, which we’ll explain in more detail below. For now, let’s take a
closer look at each of these main categories:
As the name might suggest, direct attached storage (DAS) includes types of data storage that are
physically connected to your computer. This storage is generally accessible to only a single
machine. Some common devices in this category include:
Hard Drives
Solid-State Drives (SSD)
CD/DVD Drives
Flash Drives
And More
DAS solutions are great for creating local backups and can be more affordable than NAS
solutions, but sharing data between machines can be cumbersome.
9
DA Mod 4 Manini Hemanth
Network attached storage (NAS) allows for multiple machines to share storage over a network.
This is accomplished with multiple hard drives or other storage devices in a RAID configuration.
One of the key benefits of NAS is the ability to centralize data and improve collaboration. Data
can be easily shared among connected machines, and permission levels can be set to control
access. While NAS solutions tend to be more costly than DAS solutions, they are still very
affordable as storage technology has advanced significantly.
Numerous data storage devices provide reliable protection of important files, but a few
differences can help you find the best fit for your business. Computer memory and local storage
may not be enough to keep your proprietary data protected. The best way to protect yourself is
non-volatile data storage, which doesn't require continuous power to store and preserve data.
Consider these non-volatile data storage options.
Using only flash memory, these solid-state storage systems offer swift data transfer between SSD
and a smaller physical size than a disk array. The upfront cost tends to be higher, but there's great
potential to pay a lower cost over time.
These storage devices include both flash memory drives and hard disk drives for balanced
performance. Hybrid flash arrays offer low-cost startup, reasonable performance costs and fast
data access on demand. All-flash arrays offer lower latency and faster performance than hybrid
flash but may cost even more.
Budget-friendly and flexible, hybrid cloud storage offers a secure and compliant option that
helps to assure business continuity. This type of data storage accommodates frequent backups
and long-term archives as well as future scaling and always-on availability. The combination of
cloud and on-premises storage adds a layer of safety to ensure data is protected and available,
and storage space could potentially be unlimited.
Backup Software
10
DA Mod 4 Manini Hemanth
Software for system and enterprise backups typically comes with a license or a subscription rate
billed monthly or annually. Convenience is a big factor in being able to "set it and forget it," in
many cases.
Backup Appliances
Backup servers, backup and recovery appliances and other devices for this purpose come with a
hefty price tag. Configurations may be complicated and reliability may be at risk with
misconfigurations and incorrect software tuning.
Cloud Storage
Complete cloud-based or online storage solutions offer virtual data storage and convenient
access to your materials from anywhere, not just a local computer or external hard disk.
Reliability tends to be on point, but organizations need to consider a cloud storage
security strategy before implementing.
For best results in protecting your data, you should strive to maintain three copies of your
important files. Store your primary data plus two backup copies, preferably with one backed up
remotely and offsite.
Knowledge management is the conscious process of defining, structuring, retaining, and sharing
the knowledge and experience of employees within an organization.
As organizations evolve, expand into new areas, and define their approach to business, they
develop significant institutional knowledge. This information is invaluable to the company.
Imparting it to new or less experienced staff is vital for maintaining successful operations.
11
DA Mod 4 Manini Hemanth
The primary goal of knowledge management is facilitating the connection of staff looking for
information, or institutional knowledge, with the people who have it.
1. Accumulating knowledge
2. Storing knowledge
3. Sharing knowledge
By accumulating and storing the staff’s knowledge, companies hold onto what has made them
successful in the past. In addition, sharing this information throughout the organization informs
staff of past approaches that improve performance or better inform new strategies.
To achieve the goal of knowledge management, companies have to enable and promote a culture
of learning and development, creating an environment where employees are encouraged to share
information to better the collective workforce.
Types of knowledge
The information knowledge management covers can generally be broken down into three main
types:
1. Explicit knowledge is knowledge and information that can be easily codified and taught, such
as how to change the toner in a printer and mathematical equations.
2. Implicit knowledge is knowledge that explains how best to implement explicit knowledge. For
example, consider discussing a task with an experienced co-worker. They may provide explicit
steps detailing how to complete the job. But they may also use their understanding of the
situation to consider different options and decide the best approach for your given circumstances.
The experienced employee utilizes and shares their implicit knowledge to improve how the team
operates.
12
DA Mod 4 Manini Hemanth
3. Tacit knowledge is knowledge gained through experience. Therefore, it is more intuitive and
less easy to share with others. Examples of tacit knowledge are “know-hows”, innovative
thinking, and understanding body language.
While knowledge management for implicit and tacit knowledge can be harder to implement, with
correct procedures in place, you can ensure all relevant information is shared around the
company and retained as staff retire or move on.
Utilizing all the expertise in your company benefits the business as a whole, creating best
practices for everyday tasks, improving situational awareness, developing employee intuition for
course corrections, and enhancing organizational capacity.
13