Data mining objective, Database Management System

Assignment Help:

State your technical objectives for mining the data.

Data Understanding.

Describe the data

For each attribute, give its description and data type. For numeric attributes, give mean, min, max and stdev; for nominal attributes with a few values, list the values.

This could be laid out in a table. Comment on the data, rather than just putting in a screen shot from Rapidminer from which I can not determine your understanding.
Explore the data

Discuss the results of an initial exploration of the data using graphs and exploratory statistics. You do NOT need to report on ALL attributes in this section, but comment on anything you found of note, such as attributes or groups of attributes that seem predictive; correlated attributes; attributes with limit value because of too much or too little variability, attributes with unusual distributions etc. Your discussion should be with respect to your initial business and data mining objectives.

Verify data quality

Does the dataset have many missing values?

Is the presence of noise, bias or outliers likely to be an issue?

Are there sufficient attributes and examples to achieve your mining objectives?

Data Preparation.

Select Data

If you need to reduce the number of rows or columns in the dataset, discuss the approaches you tried, and what worked best.
Clean Data

If data quality was an issue, discuss the approaches you tried, and what worked best.
Construct Data

Detail data transformations you tried, why you thought it would be useful, and how well they work. The report should get across the iterative nature of this phase. It should also get across that you used the results of data exploration to inform this phase, rather than randomly trying different techniques in the hope that something would work.

This section can be merged with the next section - modelling - if it makes it easier to link preparation techniques with the resulting model accuracy.

Modelling

Select modelling technique

Discuss which algorithms are most appropriate for the dataset and mining objectives, justify your selection.
Generate Test Design

Explain how you will generate training and test data and how you will evaluate your results.
Build andAssess the model

For each algorithm:

Detail the parameter values tried, the model generated (did you learn anything from the model itself, e.g. decision tree nodes). Discuss and interpret the model accuracy, and if relevant, how the accuracy might be improved. Include diagrams where relevant

Evaluation

The purpose of this section is to document, in business, non-technical terms, what information you have learnt from the dataset. This discussion should focus on your original business objective(s), but can also include other things you have learnt along the way.


Related Discussions:- Data mining objective

Difference between a composite key and attribute, Question: (a) Discuss...

Question: (a) Discuss the difference between a composite key and a composite attribute. How would each be indicated in an E-R diagram? Support your answer with appropriate exam

Define view? how it is related to data independence, A View may be defi...

A View may be defined of as a virtual table, that is, a table that does not really exist in its own right but is instead inferred from one or more underlying base data table. T

Relational algebra and calculus, Q.  What is relational algebra and calcul...

Q.  What is relational algebra and calculus? Explain the relational algebra operators :- Selection and predicate, set operation, joins and division. Sol. Relational Algebra

Distributed control and data sharing , Distributed Control and Data sharing...

Distributed Control and Data sharing: The geographical distribution of an organization can be showed in the distribution of the data; if a number of different sites are linked to e

Misuse of data or a database, As with other software, databases can potenti...

As with other software, databases can potentially be used for unethical purposes. As a database developer, and a consumer, you should recognize database misuse, and how it may affe

What is bucket overflow and how bucket overflow is handled, What is bucket ...

What is bucket overflow and how bucket overflow is handled through Over Flow Chaining or Closed Hashing? Ans: Bucket: unit of storage holding records. Bucket is a disk block

What are called jukebox systems, What are called jukebox systems? Jukeb...

What are called jukebox systems? Jukebox systems have a few drives and numerous disks that can be loaded into single of the drives automatically.

What is rigorous two phase locking protocol, Differentiate strict two phase...

Differentiate strict two phase locking protocol and rigorous two phase locking protocol. In strict two phase locking protocol all exclusive mode locks taken by a transaction is

Sql queries, find a name whose address is erode from student table

find a name whose address is erode from student table

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd