Companies have been accumulating data and customer information for years, but extraction of value from large amounts of data still remains the greatest challenge. Artificial Intelligence (AI) and Machine Learning (ML) specifically allow you to get the most out of your dat...
In his interview with Neptune, Vladimir Rybakov, Head of Data Science at WaveAccess, shared how to solve problems fast under extreme pressure, how taking responsibility can help progress in career and much more. Get the interview's key takeaways in our blog post.
When considering Machine Learning as a part of your company’s IT toolbox, there are certain things that are pivotal to address. We will touch upon how your approach to ML projects may impact the outcome.
Text mining is essentially the automated process of deriving high-quality information from text. Let’s explore what business challenges can be addressed by this technology and what related applications WaveAccess has developed.
In September 2018, delegates from WaveAccess attended three leading tech events hosted in Copenhagen: TechBBQ summit, Danish-Russian IT conference, and the AI conference organized by Computerworld. Here is what we learned.
A Machine Learning based solution allows to automatically search for cholesterol plaques in the cervical arteries in ultrasound scanning results. Figure out how it helped the US medical company to speed up transcripts by a factor of 5.
Wholesale Flights, an American airline tickets booking agency, increased its sales by 17% after the introduction of WaveAccess’ Machine Learning module. Its algorithms use the data to predict the chance of a lead conversion.
In June 2018, Microsoft announced WaveAccess as the 2018 Artificial Intelligence Partner of the Year in Russia. For the second year in a row, WaveAccess has won the category proving the company’s expertise in Machine Learning and AI.
WaveAccess developed an anti-fraud system to protect telecom companies from fraud attacks. The solution is based on Machine Learning and fuzzy logic algorithms. The security module recognizes suspicious actions as threats.
How we process your personal data