Across
- 3. ____________ is a network of perceptron, which are neurons with multiple inputs and one output. (Note: use the 9th letter of the answer to open the first password protected file).
- 4. To improve the prediction accuracy __________ approach is used to combine all the social transportation data. (Note: use the 9th letter of the answer to open the first password protected file).
- 10. _______Is an instance of crowd sourcing mechanism that eliminates the need for paid individuals for collecting the geographic information.
- 11. They are the quantitative analysts of the next generation as they possess both computational and analytical skills. What are they popularly known as? (Note: use the 10th letter of the answer to open the first password protected file).
- 14. ________ Data is the one that possess challenges in data collection and cleaning due to its vast information. (Note: use the 3rd letter of the answer to open the first password protected file).
- 16. The Stan Davis and Bill Davidson book first published in 1991.
- 19. _____________ is the process that is used for deriving useful information and drawing patterns from a huge set of data. (Note: use the 6th letter of the answer to open the first password protected file).
- 22. The role of _____ officer is to superintend the building and use of analytical capabilities. (Note: use the 9th letter of the answer to open the first password protected file).
- 25. By employing the mobile phone data, a good dataset would contain “_________ rates” and “recording periods” that can be used for estimating the origin-destination matrix .
- 26. Data management have expanded considerably, and almost every organization will end up with a _____________ environment.
- 27. ___________Information is collected from the social signals that are generated by the public transportation systems.
- 29. ___________ refers to a system of neurons that can be used in sports analytics for classification and prediction.
- 31. Arguably the world’s largest operations research project. (Note: use the 5th letter of the answer to open the first password protected file).
- 32. ________ Information is extracted from social networking sites using NLP. (Note: use the 6th letter of the answer to open the first password protected file).
- 34. Name one of the sensors used to measure the outlier parameters mentioned in Sports Analytics Article. (Note: use the 1st letter of the answer to open the first password protected file).
Down
- 1. If the source is a Surveillance video which is the analytical approach that is used to estimate the traffic count and violation.
- 2. The second era of analytics was known as the __________
- 5. The teams can take advantage of them for ____________ of roster composition, optimization of tactics and avoiding unexpected circumstances.
- 6. The software framework that was used for fast processing and analyzing big data when single servers failed.
- 7. _________ Analytics is one of the approaches used to filter the outlying information and analyze only the required data.
- 8. Out of the two important sports variables mentioned in the article, which is quite predictable.
- 9. To deal with relatively unstructured data, companies turned to a new class of databases known as__________
- 12. From how many trips per day does the transportation of London collects data from smart card? (Note: use the 8th letter of the answer to open the first password protected file).
- 13. The previous studies reported in the sports literature used a combination of __________ methods, clustering, or both.
- 15. Which V in Big Data refers to uncertainty and inconsistencies of Data?
- 17. An application of statistical analysis first done in baseball to evaluate and compare a player’s performance.
- 18. It is the process of ________ in the examined datasets with purpose to solve the described problems.
- 20. Expand RBF Networks mentioned in the article.
- 21. According to Gartner’s Magic Quadrant, a company that has high ability to execute and low completeness of vision are known as_______.
- 23. One of the 7 success pillars of business analytics.
- 24. _________ methods were used to rapidly generate models from the fast-moving data.
- 25. After the introduction of the ITS system, the amount of data generated has reached ________ levels. (Note: use the 2nd letter of the answer to open the first password protected file).
- 28. ____________ signal can serve as an early warning system for budding problems. However, they are indicative, not confirmatory.
- 30. Security Quality Requirements Engineering is the expansion for?
- 33. Performance analytics helps in controlling the ___________costs. (Note: use the 5th letter of the answer to open the first password protected file).
