Evaluate the reliability of the data mining algorithms

Assignment Help Data Structure & Algorithms
Reference no: EM13470530

The development of complex algorithms that can mine mounds of data that have been collected from people and digital devices have led to the adoption of data mining by most businesses as a means of understanding their customers better than before. Data mining takes place in retailing and sales, banking, education, manufacturing and production, health care, insurance, broadcasting, marketing, customer services, and a number of other areas. The analytical information gathered by data-mining applications has given some businesses a competitive advantage, an ability to make informed decisions, and better ways to predict the behavior of customers.

Write a four to five (4-5) page paper in which you:

1. Determine the benefits of data mining to the businesses when employing:

  • Predictive analytics to understand the behavior of customers
  • Associations discovery in products sold to customers
  • Web mining to discover business intelligence from Web customers
  • Clustering to find related customer information

2. Assess the reliability of the data mining algorithms. Decide if they can be trusted and predict the errors they are likely to produce.

3. Analyze privacy concerns raised by the collection of personal data for mining purposes.

  • Choose and describe three (3) concerns raised by consumers.
  • Decide if each of these concerns is valid and explain your decision for each.
  • Describe how each concern is being allayed.

4. Provide at least three (3) examples where businesses have used predictive analysis to gain a competitive advantage and evaluate the effectiveness of each business's strategy.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13470530

Questions Cloud

Find the probability of selecting case to examine and : the wood county sheriff classifies crimes by age in years of the criminal and whether the crime is violent or
Chocolate bars produced by a certain machine are labeled : chocolate bars produced by a certain machine are labeled with 8.0 oz. the distribution of the actual weights of these
A young man robbed a woman in a womens restroom at the : a young man robbed a woman in a womens restroom at the washington national monument. during the robbery the woman had
Why do employers obtain a signed waiver from an applicant : 1.why do employers obtain a signed waiver from an applicant regarding credit and background checks? what is the
Evaluate the reliability of the data mining algorithms : the development of complex algorithms that can mine mounds of data that have been collected from people and digital
You are the search team leader on a homicide crime scene : you are the search team leader on a homicide crime scene in which a body was located in a small field approximately 3
When the fight began there were 20 or so patrons in the : joe stopped for a beer at the turn-a-round lounge in small town on his way home from work. he ran into his
In your opinion are rules of evidence more focused on : 1. in your opinion are rules of evidence more focused on protecting the rights of the public or protecting the rights
Assume tank is drained at rate of frac14 cubic foot per : a cylindrical tank full of water measures 3 feet high and has a circular base with a radius of 1 foot. suppose the tank

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd