Artificial
Intelligence in Marketing - - Madhavi
Lata K and Piyali Maji
Artificial
intelligent system is a system that is made to "learn"
during its existence. In other words, it learns to respond
to situations in order to reach its objective. Intelligent
systems are designed to automate the decision-making process
and to assist and enhance the human decision-making process.
The business world has recognized the need for intelligent
information systems in the effective functioning of business.
Expert systems, neural networks and intelligent agents are
regaining their importance in business applications. Fuzzy
logic, pattern recognition and speech recognition have gained
exemplary importance as business applications, where they
not only need to deal with uncertainty but also to provide
a highly secure system. Artificial intelligent systems are
gaining momentum because they are designed to emulate human
reasoning. They have now gradually branched out with nonlinear
approaches to solve the problems that often arise in business.This
is where these applications gain an edge over the conventional
applications whose flow is linear. Some of the benefits of
intelligent applications are lower costs, optimal decision-making,
and increased productivity and efficiency. This paper discusses
the applications of artificial intelligence in the marketing
function of business. Business professionals need an understanding
of artificial intelligence applications, especially the expert
systems and neural networks that are being used extensively
by large companies.
©
2005 IUP. All Rights Reserved.
A
Hierarchical Model for Design Reliability Assessment of Modular
Design-based Software
-- Raghuraj
Singh, Onkar Singh and Yogesh Singh
This
research paper describes a hierarchical model for the assessment
of the design reliability of a software developed on the modular
design-based philosophy. The current research is based on
some of the top measures, which are the best software reliability
measures, identified in an earlier study conducted by Lawrence
Livermore National Laboratory [11]. The model relates various
design properties like span of control, levels of control,
abstraction, encapsulation, coupling, cohesion, design complexity,
design size, visibility, frequency ratio, and connectivity
to high level design reliability attributes like completeness,
correctness, usability, fault tolerance, strength and effectiveness.
The quantitative assessment of design property values has
been done with the help of some of the well-established and
newly defined design metrics. The relationship between design
properties and design reliability attributes has been determined
according to their specific influence and importance. Various
design reliability attributes have been used to develop an
equation by formulating the design reliability of software
empirically.
©
2005 IUP. All Rights Reserved.
Security
Tools for Information Flow Over Internet - - Shafeeq
Ahmad, Vipin Saxena and D S Kushwaha
Internet
offers the opportunity to buy and sell almost anything. One
can easily purchase software, information, music CDs, video
CDs, etc., in minimum time. Electronic Data Interchange (EDI)
is the electronic exchange of business documents in a standard,
computer processable, and universally accepted format between
the trading partnersbuyer and seller. Today, online banking
service, online reservation of airlines and railways are also
available, which need an error-free transfer of information
from one end to the other. This paper deals with different
kinds of security measures which must be taken into account
for secure transactions of information from buyer to seller
or from client to the server. Along with the important security
tools for information flow over Internet, the concept of verification
of digital signature with the help of non-crackable algorithmRSA
algorithmis discussed in this article.
©
2005 IUP. All Rights Reserved.
A
Comparative Study of IT Level Implementations of Select Indian
Automobile Organizations - - Vinod
Kumar Jain and A K Ramani
In
today's competitive environment, technology plays an important
role. The use of technology is right from the purchase of
raw material to the delivery of the finished product to the
customer. Organizations are now working on the concept of
paperless office, implementing JIT philosophy, and adopting
the Kanban technique, so that they can compete on the basis
of price and quality of the products. A key aspect of Supply
Chain Management (SCM) is its ability to help management to
take strategic decisions quickly, based on accurate data,
which requires an efficient and effective information system.
Managing the flow of information in a supply chain is as important
as managing the flow of products. Information is vital for
a supply chain to function. Without information being relayed
at the right time to the right place, there will be no purchase
orders, shipment messages, or payments, and the supply chain
will eventually shut down. Different manufacturing organizations
use different IT tools as per their requirements. In the complex
supply chain environment of the automobile industry, different
IT tools required for various processes to function effectively,
can be thoroughly explained with the help of four dimensionsInformation
System's Efficiency, Communication System's Efficiency, Network
Administration, and Operating Mode. This paper attempts to
compare the IT level scores (based on the IT tools that the
organizations have implemented) of eight selected automobile
organizations of India.
©
2005 IUP. All Rights Reserved.
Building
an Example Application with the Unstructured Information Management
Architecture
-- D
Ferrucci and A Lally
IBM's
Unstructured Information Management Architecture (UIMA) is
a software architecture for developing and deploying Unstructured
Information Management (UIM) applications. In this paper,
we provide a high-level overview of the architecture, introduce
its basic components, and describe the set of tools that constitute
a UIMA development framework. Then, we take the reader through
the steps involved in building a simple UIM application, thus
highlighting the major UIMA concepts and techniques.
©
2004 by International Business Machines Corporation (http://www.research.ibm.com).
This article was earlier published in IBM Systems Journal,
Volume 43, Number 3, 2004. Reprinted with permission. |