Fig 5 - uploaded by Katarzyna Marciniak
Content may be subject to copyright.
Source publication
Managers as decision-makers present in different sectors should be supported in efficient and more and more sophisticated way. There are huge number of software tools developed for such users starting from simple registering data from business area – typical for operational level of management – up to intelligent techniques with delivering knowledg...
Context in source publication
Context 1
... knowledge base, where rules are created by the user in an indirect way -when setting up the model in the process of data mining, and directly in the directory where the knowledge base, the user can create a new file with a list of rules, which also will be subject to verification of exactly in the same way as described in the previous section (Fig. 5). Access to both knowledge bases is necessary from the point of view of the user. It should have full access to view both bases, in order to quickly find the rules required him to create such a new model. Knowledge economy, should be made available in the form of a "read-only" due to that it is created automatically with the knowledge ...
Citations
... The former is based on common sense, encompassing a variety of phenomena (e.g. the ability to walk or run), roughly what Polanyi referred to as "tacit knowledge", which cannot be captured in language as it is tied to the environment and set in culture and relationships [1]. The interpretation of such knowledge can be subjective [2] (when do you walk slow or fast?, and when do you start running?). On the contrary, the latter has a verbal or written form (e.g. ...
... In this case, "context" is often referred to as environment [7], location [8], or situation [9]. To these three nouns, we can respectively pin the following questions: (1) what resources are you surrounded by?, (2) where are you?, and (3) who are you with, or what are you doing? However, the context can be known or unknown, and if necessary may be identified "manually" by exploiting the expert (or domain knowledge), or "automatically" by using particular types of attributes [10]. ...