Data Mining: Business Intelligence, Data Integration: Different Data Analysis Methods
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Data analysis helps for obtaining raw data and converting it into information useful for decision-making by users. Data is collected and analyzed to answer questions, test hypotheses or disprove theories. There are different technique of data Analysis which may be used for Prediction and Identification. However, many business users want to apply data analysis to business data to understand the trends, to make predictions and to improve their business decisions. It is important to know which data analysis technique should be applied when and to which kind of data.The paper provides an explanation and study on different common data analysis techniques use today in day to day life and business predictions, business decision making.
Authors and Affiliations
Vrushali A. Chavan
Fault node recovery in wireless sensor networks using FNR
Some WSN by lots of immobile node and with the restricted energy and while not further charge of energy. Whereas extension of the many sensing element nodes and their operation. Therefore it is normal. Unactive nodes mi...
Nano materials filled Polymers for reducing the thermal Peak temperature in a vehicle
There is an increasing demand for fuel nowadays and it is soon expected that there will be an acute shortage in the fuel that we are using at present. Hence there is a need to optimize the fuel usage. Almost 10% of f...
Wi-Fi Based Home Automation Using Android & Arduino Platform
On the way to achieve and satisfy the increased demands of the people to lead a sophisticated lifestyle as an impact of industrial growth and evolution of technologies; the home automation domain is been considered to b...
Balanced Pipeline Stages with Minimum Logic Delay on Encrypted High Speed Data Using FPGA Based AES Algorithm
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunicatio...
slugPerformance Enhancement Over Wireless Mobile Adhoc Network
face detection research confronts the full range of challenges found in general purpose, object class recognition. However, the class of faces also has very apparent regularities that are exploited by ma...