Data mining, Basic Computer Science

Assignment Help:
Process of Data mining

Data mining is an iterative process that typically involves the following phases:

Problem definition
A data mining project starts with the understanding of the business problem. Data mining experts, business experts, and domain experts work closely together to define the project objectives and the requirements from a business perspective. The project objective is then translated into a data mining problem definition.
In the problem definition phase, data mining tools are not yet required.

Data exploration
Domain experts understand the meaning of the metadata. They collect, describe, and explore the data. They also identify quality problems of the data. A frequent exchange with the data mining experts and the business experts from the problem definition phase is vital.
In the data exploration phase, traditional data analysis tools, for example, statistics, are used to explore the data.

Data preparation
Domain experts build the data model for the modeling process. They collect, cleanse, and format the data because some of the mining functions accept data only in a certain format. They also create new derived attributes, for example, an average value.
In the data preparation phase, data is tweaked multiple times in no prescribed order. Preparing the data for the modeling tool by selecting tables, records, and attributes, are typical tasks in this phase. The meaning of the data is not changed.

Modeling
Data mining experts select and apply various mining functions because you can use different mining functions for the same type of data mining problem. Some of the mining functions require specific data types. The data mining experts must assess each model.
In the modeling phase, a frequent exchange with the domain experts from the data preparation phase is required.

The modeling phase and the evaluation phase are coupled. They can be repeated several times to change parameters until optimal values are achieved. When the final modeling phase is completed, a model of high quality has been built.

Evaluation
Data mining experts evaluate the model. If the model does not satisfy their expectations, they go back to the modeling phase and rebuild the model by changing its parameters until optimal values are achieved. When they are finally satisfied with the model, they can extract business explanations and evaluate the following questions:
Does the model achieve the business objective?
Have all business issues been considered?
At the end of the evaluation phase, the data mining experts decide how to use the data mining results.

Deployment
Data mining experts use the mining results by exporting the results into database tables or into other applications, for example, spreadsheets.
The Intelligent Miner™ products assist you to follow this process. You can apply the functions of the Intelligent Miner products independently, iteratively, or in combination.

Related Discussions:- Data mining

Subroutine and functions, Subroutine and Functions:  In a program, it ...

Subroutine and Functions:  In a program, it is often necessary to repeat a statement or group of statements at several points to accomplish a particular task. Repeating the sa

Describe any five requirements of clustering in data mining, Question 1...

Question 1 What is data mining? What are the major issues in data mining? Explain 2 What is meant by data reduction? Explain any three techniques of data reduction 3 Define a b

Flowchart, i need help with flowcharting a procedure

i need help with flowcharting a procedure

Create email account, Create Email Account: For sending or receiving e...

Create Email Account: For sending or receiving email, you need to have to an email account. The email account may be provided by the organization for which you are working or

Netlogo, Do you have expert can deal with netlogo

Do you have expert can deal with netlogo

Syntax of a Procedure in assembly language, There are two kinds of procedur...

There are two kinds of procedures, the intrasegments, which are found on the similar segment of instructions and the inter-segments which can be stored on dissimilar memory segment

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

N-ary relationships in database design, n-ary relationships in database des...

n-ary relationships in database design Each n-ary where n>2 relationship type is maped into a table name of the relationship works as the name of the table. The primary key of suc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd