Big Data Architecture for Mobile Network Operators

Author(s):  
Milan N. Simakovic ◽  
Zoran G. Cica ◽  
Ina B. Masnikosa
Author(s):  
Sriganesh Lokanathan ◽  
Gabriel Kreindler ◽  
Nisansa Dilushan de Silva ◽  
Yuhei Miyauchi ◽  
Dedunu Dhananjaya

Author(s):  
Michael Goul ◽  
T. S. Raghu ◽  
Ziru Li

As procurement organizations increasingly move from a cost-and-efficiency emphasis to a profit-and-growth emphasis, flexible data architecture will become an integral part of a procurement analytics strategy. It is therefore imperative for procurement leaders to understand and address digitization trends in supply chains and to develop strategies to create robust data architecture and analytics strategies for the future. This chapter assesses and examines the ways companies can organize their procurement data architectures in the big data space to mitigate current limitations and to lay foundations for the discovery of new insights. It sets out to understand and define the levels of maturity in procurement organizations as they pertain to the capture, curation, exploitation, and management of procurement data. The chapter then develops a framework for articulating the value proposition of moving between maturity levels and examines what the future entails for companies with mature data architectures. In addition to surveying the practitioner and academic research literature on procurement data analytics, the chapter presents detailed and structured interviews with over fifteen procurement experts from companies around the globe. The chapter finds several important and useful strategies that have helped procurement organizations design strategic roadmaps for the development of robust data architectures. It then further identifies four archetype procurement area data architecture contexts. In addition, this chapter details exemplary high-level mature data architecture for each archetype and examines the critical assumptions underlying each one. Data architectures built for the future need a design approach that supports both descriptive and real-time, prescriptive analytics.


2021 ◽  
Vol 45 (3) ◽  
pp. 102086
Author(s):  
William Lehr ◽  
Fabian Queder ◽  
Justus Haucap

Author(s):  
M.Dolores Ruiz ◽  
Juan Gomez-Romero ◽  
Carlos Fernandez-Basso ◽  
Maria J. Martin-Bautista

Complexity ◽  
2019 ◽  
Vol 2019 ◽  
pp. 1-13
Author(s):  
Cristina Sánchez-Rebollo ◽  
Cristina Puente ◽  
Rafael Palacios ◽  
Claudia Piriz ◽  
Juan P. Fuentes ◽  
...  

Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their followers. A big data architecture is proposed to analyze messages in real time in order to classify users according to different parameters like level of activity, the ability to influence other users, and the contents of their messages. Graphs have been used to analyze how the messages propagate through the network, and this involves a study of the followers based on retweets and general impact on other users. Then, fuzzy clustering techniques were used to classify users in profiles, with the advantage over other classifications techniques of providing a probability for each profile instead of a binary categorization. Algorithms were tested using public database from Kaggle and other Twitter extraction techniques. The resulting profiles detected automatically by the system were manually analyzed, and the parameters that describe each profile correspond to the type of information that any expert may expect. Future applications are not limited to detecting terrorist activism. Human resources departments can apply the power of profile identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these techniques.


2021 ◽  
Vol 10 (2) ◽  
pp. 1-16
Author(s):  
Esharenana E. Adomi ◽  
Gloria O. Oyovwe-Tinuoye

The study is intended to explore COVID-19 information seeking and utilization among women in Warri Metropolis, Delta State, Nigeria. Descriptive survey research design was adopted using a self-constructed questionnaire to collect data. Data were analyzed using simple percentages. Findings revealed that a majority of the women need information on COVID-19 preventive measures, followed by causes of the pandemic; Internet is the source of COVID-19 information used by the highest number of respondents, followed by television and social media; a majority of them consider the authority of the source of the information on coronavirus followed by usefulness of the information; a majority access COVID-19 information to enable them identify symptoms of the disease followed by protection against COVID-19 infection while concern for reliability of much of the available information on the pandemic was a major barrier to their utilization of COVID-19 information. It is recommended that effort should be made by government to get mobile network operators to reduce network tariff.


Sign in / Sign up

Export Citation Format

Share Document