A COMPARATIVE STUDY OF BUSINESS INTELLIGENCE AND ARTIFICIAL INTELLIGENCE WITH BIG DATA ANALYTICS
DOI:
https://doi.org/10.59367/4bhwaq30Keywords:
Business Intelligence, Artificial Intelligence, Big DataAbstract
Business intelligence combines operational and historical data with analytical tools, providing business planners and decision makers with valuable and competitive information. Business intelligence (BI) aim to improve the timing and quality of data so managers can better understand the company's position relative to competitors. For example, business intelligence tools and techniques can be used to analyze changes in the market, customer behavior and usage patterns, customer preferences, company capacity and the economy. Additionally, analysts and managers can use business intelligence to determine which changes are most likely to translate into change. The process of extracting implicit, previously unknown and useful information from data is called data mining. Clustering, data collection, learning classification rules, discovering relationships, identifying changes, and investigating anomalies are examples of such techniques. The introduction of data storage as a repository, advances in data cleaning, better hardware and software capabilities, and the advent of web architecture have all combined to create better business intelligence. This document attempts to provide a framework for developing business intelligence. Artificial intelligence is already being used to detect and investigate vulnerabilities. Manipulation and Movement Given a static environment, AI robots can easily detect and map their environment.
Business intelligence combines operational and historical data with analytical tools, providing business planners and decision makers with valuable and competitive information. Business intelligence (BI) aims to improve the timing and quality of data so managers can better understand the company's position relative to competitors. For example, business intelligence tools and techniques can be used to analyze changes in the market, customer behavior and usage patterns, customer preferences, company capacity and the economy. Additionally, analysts and managers can use business intelligence to determine which changes are most likely to translate into change. The process of extracting implicit, previously unknown and useful information from data is called data mining. Clustering, data collection, learning classification rules, discovering relationships, identifying changes, and investigating anomalies are examples of such techniques. The introduction of data storage as a repository, advances in data cleaning, better hardware and software capabilities, and the advent of web architecture have all combined to create better business intelligence. This document attempts to provide a framework for developing business intelligence. Artificial intelligence is already being used to detect and investigate vulnerabilities. Manipulation and Movement Given a static environment, AI robots can easily detect and map their environment.
References
Mughal, A. A. (2019). A COMPREHENSIVE STUDY OF PRACTICAL TECHNIQUES AND METHODOLOGIES IN INCIDENT-BASED APPROACHES FOR CYBER FORENSICS. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 2 (1), 1-18.
Lowlesh Nandkishor Yadav, “Predictive Acknowledgement using TRE System to reduce cost and Bandwidth”IJRECE VOL. 7 ISSUE 1 (JANUARY- MARCH 2019) pg no 275-278
Mughal, A. A. (2022). Building and Securing the Modern Security Operations Center (SOC). International Journal of Business Intelligence and Big Data Analytics, 5 (1), 1-15.
Mughal, A. A. (2021). Cybersecurity Architecture for the Cloud: Protecting Network in a Virtual Environment. International Journal of Intelligent Automation and Computing, 4 (1), 35-48
Yonbawi, S., Alahmari, S., Daniel, R., Lydia, E. L., Ishak, M. K., Alkahtani , H. K., ... & Mostafa , S. M. (2023). Modified Metaheuristics with Transfer Learning Based Insect Pest Classification for Agricultural Crops . Computer Systems Science & Engineering, 46(3)
Lee, E., Rabbi, F., Almashaqbeh, H., Aljarbouh, A., Ascencio, J., &Bystrova , N. V. (2023 , March ). The issue of software reliability in program code cloning . In AIP Conference Proceedings (Vol. 2700, No. 1). AIP Publishing
Sharmili , N., Yonbawi , S., Alahmari , S., Lydia, E. L., Ishak, M . K., Alkahtani , H. K., ... & Mostafa , S. M . (2023 ). Earthworm Optimization with Improved SqueezeNet Enabled Facial Expression Recognition Model. Computer Systems Science & Engineering, 46(2).
Rutskiy , V., Aljarbouh , A., Thommandru , A., Elkin , S., Amrani, Y. E., Semina, E., ... & Tsarev, R. (2022). Prospects for the Use of Artificial Intelligence to Combat Fraud in Bank Payments . In Proceedings of the Computational Methods in Systems and Software (pp . 959 -971 ). Cham : Springer International Publishing.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Futuristic Innovation in Arts, Humanities and Management (IJFIAHM)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.