IIIS has the capacity to perform business intelligence, sentiment analysis and sophisticated analytics of datasets
Since interpreting images is strictly connected to discovering and learning patterns, the IIIS also has the capacity to deploy techniques in Machine Learning and Data Mining. In particular, given the large volumes of data collections now available under the banner of Big Data, the IIIS has the capacity to perform business intelligence, sentiment analysis and sophisticated analytics of datasets with also an understanding of delicate issues like privacy protection. The management of such collections of information are issues the IIIS can perform as researchers have experience in all sorts of database systems (transactional, data-warehouses, geographical, non-sql) and techniques for Information System Management. We can leverage the data to information, knowledge and wisdom. The applications of the IIIS expertise is also used in pattern recognition and document analysis, text mining and many other applications that bring light from collections of data.
WHAT IS BE?
Essentially, BE is a method of assembling individual pieces to form an integrated component architecture. Each requirement is translated into its corresponding ‘behavior tree’ which describes unambiguously the precise behaviors of this particular requirement. The ‘tree’ is built from: components; states the components become; events and decisions/constraints associated with the components; and the causal, logical and temporal dependencies associated with the component. When each component is modelled in this way, and then integrated into a larger whole, a clear pattern of intersections become evident. The individual components fit together like a puzzle to form a coherent component architecture in which the integrated behavior of the components is evident. One component establishes a precondition for another component to perform its function and so on. This allows a software system to be constructed from its requirements, rather than merely satisfying its requirements. Duplications and redundancies are identified and can be more easily removed and traceability becomes more manageable.