A COMPARATIVE STUDY OF BUSINESS INTELLIGENCE AND ARTIFICIAL INTELLIGENCE WITH BIG DATA ANALYTICS

Authors

  • Mr. Kunal Sur Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Neehal Jiwane Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India
  • Vijay Rakhade Department of Computer Science and Engineering, Technology, Shri Sai, College Chandrapur, India

DOI:

https://doi.org/10.59367/4bhwaq30

Keywords:

Business Intelligence, Artificial Intelligence, Big Data

Abstract

Business intelligence combines operational and historical data with analytical tools, providing business   planners and decision makers with valuable and competitive information. Business intelligence (BI) aim to improve the timing and quality of data so managers can better understand the company's position relative to competitors. For example, business intelligence tools and techniques can be used to analyze    changes in the market, customer behavior and usage patterns, customer preferences, company capacity    and the economy. Additionally, analysts and managers can use business intelligence to determine which changes are most likely to translate into change. The process of extracting implicit, previously unknown and useful information from data is called data mining. Clustering, data collection, learning classification rules, discovering relationships, identifying changes, and investigating anomalies are examples of such techniques. The introduction of data storage as a repository, advances in data cleaning, better hardware and software capabilities, and the advent of web architecture have all combined to create better business intelligence. This document attempts to provide a framework for developing business intelligence. Artificial   intelligence is already being used to detect and investigate vulnerabilities. Manipulation and Movement Given a static environment, AI robots can easily detect and map their environment.

Business intelligence combines operational and historical data with analytical tools, providing business planners and decision makers with valuable and competitive information. Business intelligence (BI) aims to improve the timing and quality of data so managers can better understand the company's position relative to competitors. For example, business intelligence tools and techniques can be used to analyze changes in the market, customer behavior and usage patterns, customer preferences, company capacity and the economy. Additionally, analysts and managers can use business intelligence to determine which changes are most likely to translate into change. The process of extracting implicit, previously unknown and useful information from data is called data mining. Clustering, data collection, learning classification rules, discovering relationships, identifying changes, and investigating anomalies are examples of such techniques. The introduction of data storage as a repository, advances in data cleaning, better hardware and software capabilities, and the advent of web architecture have all combined to create better business intelligence. This document attempts to provide a framework for developing business intelligence. Artificial intelligence is already being used to detect and investigate vulnerabilities. Manipulation and Movement Given a static environment, AI robots can easily detect and map their environment.

References

Mughal, A. A. (2019). A COMPREHENSIVE STUDY OF PRACTICAL TECHNIQUES AND METHODOLOGIES IN INCIDENT-BASED APPROACHES FOR CYBER FORENSICS. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 2 (1), 1-18.

Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth”IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278

Mughal, A. A. (2022). Building and Securing the Modern Security Operations Center (SOC). International Journal of Business Intelligence and Big Data Analytics, 5 (1), 1-15.

Mughal, A. A. (2021). Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment. International Journal of Intelligent Automation and Computing, 4 (1), 35-48

Yonbawi, S., Alahmari, S., Daniel, R., Lydia, E. L., Ishak, M. K., Alkahtani , H. K., ... & Mostafa , S. M. (2023). Modified Metaheuristics with Transfer Learning Based Insect Pest Classification for Agricultural Crops . Computer Systems Science & Engineering, 46(3)

Lee, E., Rabbi, F., Almashaqbeh, H., Aljarbouh, A., Ascencio, J., &Bystrova , N. V. (2023 , March ). The issue of software reliability in program code cloning . In AIP Conference Proceedings (Vol. 2700, No. 1). AIP Publishing

Sharmili , N., Yonbawi , S., Alahmari , S., Lydia, E. L., Ishak, M . K., Alkahtani , H. K., ... & Mostafa , S. M . (2023 ). Earthworm Optimization with Improved SqueezeNet Enabled Facial Expression Recognition Model. Computer Systems Science & Engineering, 46(2).

Rutskiy , V., Aljarbouh , A., Thommandru , A., Elkin , S., Amrani, Y. E., Semina, E., ... & Tsarev, R. (2022). Prospects for the Use of Artificial Intelligence to Combat Fraud in Bank Payments . In Proceedings of the Computational Methods in Systems and Software (pp . 959 -971 ). Cham : Springer International Publishing.

Downloads

Published

2024-03-11

Issue

Section

Articles

How to Cite

A COMPARATIVE STUDY OF BUSINESS INTELLIGENCE AND ARTIFICIAL INTELLIGENCE WITH BIG DATA ANALYTICS . (2024). International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM), 3(1), 266-278. https://doi.org/10.59367/4bhwaq30

Similar Articles

1-10 of 53

You may also start an advanced similarity search for this article.