Data mining, Basic Computer Science

Assignment Help:
Process of Data mining

Data mining is an iterative process that typically involves the following phases:

Problem definition
A data mining project starts with the understanding of the business problem. Data mining experts, business experts, and domain experts work closely together to define the project objectives and the requirements from a business perspective. The project objective is then translated into a data mining problem definition.
In the problem definition phase, data mining tools are not yet required.

Data exploration
Domain experts understand the meaning of the metadata. They collect, describe, and explore the data. They also identify quality problems of the data. A frequent exchange with the data mining experts and the business experts from the problem definition phase is vital.
In the data exploration phase, traditional data analysis tools, for example, statistics, are used to explore the data.

Data preparation
Domain experts build the data model for the modeling process. They collect, cleanse, and format the data because some of the mining functions accept data only in a certain format. They also create new derived attributes, for example, an average value.
In the data preparation phase, data is tweaked multiple times in no prescribed order. Preparing the data for the modeling tool by selecting tables, records, and attributes, are typical tasks in this phase. The meaning of the data is not changed.

Modeling
Data mining experts select and apply various mining functions because you can use different mining functions for the same type of data mining problem. Some of the mining functions require specific data types. The data mining experts must assess each model.
In the modeling phase, a frequent exchange with the domain experts from the data preparation phase is required.

The modeling phase and the evaluation phase are coupled. They can be repeated several times to change parameters until optimal values are achieved. When the final modeling phase is completed, a model of high quality has been built.

Evaluation
Data mining experts evaluate the model. If the model does not satisfy their expectations, they go back to the modeling phase and rebuild the model by changing its parameters until optimal values are achieved. When they are finally satisfied with the model, they can extract business explanations and evaluate the following questions:
Does the model achieve the business objective?
Have all business issues been considered?
At the end of the evaluation phase, the data mining experts decide how to use the data mining results.

Deployment
Data mining experts use the mining results by exporting the results into database tables or into other applications, for example, spreadsheets.
The Intelligent Miner™ products assist you to follow this process. You can apply the functions of the Intelligent Miner products independently, iteratively, or in combination.

Related Discussions:- Data mining

Data structures hw help, Create an implementation of the Ordered Associativ...

Create an implementation of the Ordered Associative Array API using left-leaning red-black trees. Illustrate the use of the API by refactoring your WordBench as a client of Ordered

Distinguish between the cryptoprovider and the managed class, QUESTION ...

QUESTION (a) Using the Luhn 10 check formula verify whether the following account number is compliant: 49927398716. Show details of your workings (b) Why is it advisable to

What is Decode or execution cycle?, just the once the instruction has bee...

just the once the instruction has been fetched and is accumulated, the next step is to decode the instruction so as to work out what actions should be performed to execute it. This

Handling Text Files, I. Write an application that accomplishes the followin...

I. Write an application that accomplishes the following tasks: 1. Read a text file that contains, integers, doubles, alphabet, alphanumeric, and others. The name of the input fil

Explain briefly about gnome desktop, Question 1 Brief about the shells of ...

Question 1 Brief about the shells of Linux operating system Question 2 Explain briefly about GNOME desktop Question 3 Write note on the following Encryption Sig

Perverse software, Perverse software: Perverse software is a program w...

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w

Some CPUs provide multiple modes of operation, even though most systems onl...

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy.

C programming, input is n positive numbers and reverse it, out put gv the a...

input is n positive numbers and reverse it, out put gv the absolute difference and give the reverse(magic number),using function reverseinteger, and function generate magicnumber

Data Type Conversion, Sometimes you may drop to perform conversions among t...

Sometimes you may drop to perform conversions among the built-in types. To translate between types you just use the type name as a function. There are quite a few built-in function

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd