DWM Merged
DWM Merged
def fact(n):
if n == 0:
return 1
else:
return factorial(n)
Output:
International Journal of Distributed and Parallel systems (IJDPS) Vol.1, No.1,
September 2010 125
DATA MINING
SYSTEM AND 100
APPLICATIONS: A
REVIEW 75
Mr. S. P. Deshpande
Department of MCA, D.C.P.E, H.V.P.Mandal Amravati, 50
India
Dr. V. M. Thakare
Post Graduate Deptt. of Computer Science,SGB,
Amravati University, Amravati, India 25
Presented by:
Aryan Sarang 9741
Akshat Sarraf 9742 0
Jugal Vaishnav 9747 Item 1 Item 2 Item 3 Item 4 Item 5
Introduction
30
2
1 20
0
10 12 14 16 10
THE DATA MINING TASKS:
Exploratory Data Analysis Predictive Modeling
It is simply exploring the data This model permits the value of
without any clear ideas of what one variable to be predicted
we are looking for. These from the known values of other
techniques are interactive and variables.
visual. Retrieval by Content
It is finding pattern similar to the
pattern of interest in the data
Descriptive Modeling Discovering Patterns and set. This task is most commonly
Rules used for text and image data
It describe all the data, It
It concern with pattern sets.
includes models for overall
probability distribution of the detection, the aim is spotting
data, partitioning of the p- fraudulent behavior by
dimensional space into groups detecting regions of the space
and models describing the defining the different types of
relationships between the transactions where the data
variables. points significantly different
from the rest.
Scope of Data Mining: Data mining derives its name from the
similarities between searching for valuable
business information in a large database and
mining a mountain for a vein of valuable ore.
Both processes require either sifting through
an immense amount of material or
intelligently probing it to find exactly where
the value resides. Given databases of
sufficient size and quality data mining
technology can generate new business
opportunities by providing these capabilities:
• Classification of data mining systems according to the data model: This classification based on the data model
involved such as relational database, object-oriented database, data warehouse, transactional database, etc.
• Classification of data mining systems according to the kind of knowledge discovered: This classification based on
the kind of knowledge discovered or data mining functionalities, such as characterization, discrimination, association,
classification, clustering, etc. Some systems tend to be comprehensive systems offering several data mining
functionalities together.
• Classification of data mining systems according to mining techniques used: This classification is according to the
data analysis approach used such as machine learning, neural networks, genetic algorithms, statistics, visualization,
database oriented or data warehouse-oriented, etc.
DATA MINING LIFE CYCLE
1. Business Understanding: This phase focuses on understanding the project objectives and requirements from
a business perspective, then converting this knowledge into a data mining problem definition and a
preliminary plan designed to achieve the objectives.
2. Data Understanding: It starts with an initial data collection, to get familiar with the data, to identify data quality
problems, to discover first insights into the data or to detect interesting subsets to form hypotheses for hidden
information.
3. Data Preparation: It covers all activities to construct the final dataset from the initial raw data.
4. Modeling: In this phase, various modeling techniques are selected and applied and their parameters are
calibrated to optimal values.
5. Evaluation: In this stage the model is thoroughly evaluated and reviewed. The steps executed to construct the
model to be certain it properly achieves the business objectives. At the end of this phase, a decision on the
use of the data mining results should be reached.
6. Deployment: The purpose of the model is to increase knowledge of the data, the knowledge gained will need
to be organized and presented in a way that the customer can use it. The deployment phase can be as simple
as generating a report or as complex as implementing a repeatable data mining process across the
enterprise.
THE DATA MINING MODELS
1. Data mining has two main types: Predictive 6. Regression predicts real-valued variables.
and Descriptive. 7. Time Series Analysis tracks attribute changes
2. Predictive models make future predictions over time.
(e.g., Classification, Regression). 8. Clustering groups data without predefined
3. Descriptive models discover patterns and classes. Summarization provides concise data
properties (e.g., Clustering, Summarization). insights.
4. Prediction uses past data to predict future 9. Association Rule Mining finds attribute
states. relationships.
5. Classification sorts data into predefined 10. Sequence Discovery reveals patterns in data
groups. sequences.
THE KNOWLEDGE DISCOVERY PROCESS
Data cleaning Data integration Data selection
It is also known as data cleansing; in this In this stage, multiple data sources, often The data relevant to the analysis is decided
phase noise data and irrelevant data are heterogeneous, are combined in a on and retrieved from the data collection.
removed from the collection. common source.
Knowledge representation
It is the final phase in which the discovered
knowledge is visually presented to the
user. This essential step uses visualization
techniques to help users understand and
interpret the data mining results
DATA MINING APPLICATIONS
1. Customer Relationship Management (CRM): Data mining is used to analyze customer data,
such as purchase history and behavior, to identify patterns and preferences. This helps
businesses tailor marketing strategies and improve customer satisfaction.
2. Fraud Detection: Financial institutions use data mining to detect fraudulent activities by
identifying unusual patterns in transactions or account behaviors. It helps in preventing
financial fraud and ensuring the security of transactions.
3. Healthcare: Data mining is applied in healthcare to predict disease outbreaks, improve
patient care, and manage medical resources efficiently. It can analyze patient records to
identify trends and risk factors.
4. Recommendation Systems: Companies like Amazon and Netflix use data mining to analyze
user behavior and provide personalized product or content recommendations. This
enhances the user experience and increases sales.
5. Manufacturing Quality Control: Data mining is used in manufacturing to monitor and improve
product quality. It can analyze production data to detect defects, reduce errors, and enhance
overall quality control processes.
6. Market Basket Analysis: Retailers employ data mining to analyze customer purchase
patterns. This helps in understanding which products are often bought together, allowing for
strategic product placement and targeted marketing campaigns.
447 Batch- D
TE - A/os
ustoegD
CustorerFD
Cusom Nane
Fat tablb Custones ald
CustoreD
Dneson tble ID
Aterest Rte
RoL Direngon table
egenTD
oct able
ybnen
Stroet
Eas! Pegion_ ID oAnt Cutoneadd Pncade
wes! AtgtRete
Sath Date
Noth
ROZ_TD
Frtoot_Am
FR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERING
stte
Leith
- Roll- up -Dice
- Daill-daun - Pvot
-Shce
(ones)
oCo
febnaiy to
arch
Jme
mon6)
Agst
fal
Temjstsn (sonson )
FR. CONCEICAO RODRIGUES COLLEGE OF
ENGINEERJNG
Sicei
Chica_o
ocaton NY
(Cite)
incos o5 26 85 a0
Tart (Gaeyor)
Diei
Vntas
Pivot:
winte
enpatre Sing
Segon)
90
NEERING
FR. CONCEICAO RODRIGUES COLLEGE OF ENGI
1)
-D
~ 13 )5 6 !6 Jq 3 33
(j]in
q q . ;q q q
~ tJtli ftll,lr.a,,,e1f .
I
I
1-oo 00
r (YrC( :: ODO
B -2- 60
lb60 - Q.Joo
II 00 - 2-0_{)
SJi ~ 300
ge,o
(J;,r o- :JOO () -5
· fut, (000, )/ 1 -:. [COO -JZ,q_o ::. /
gco
---; Y ~ boo
cr~U-3
- O- 1-I
l
Fw, 400 I z.. - 4oo ~5oo - ·- CJ-3.5
'2--~-3
''
l "
V. ~ I
'--'
,1 :::: ---~
-::
id
~ 30C>~ vi .,..
..... 3:)6
'
._ C)·5
l 03:,
Fr91 4-oo I
vi -- 4oo -- 6·~
{03
/03
' er) .
1/.e
ouduJ,e.b
a · r'b.Ji:r1-- td +
lr\D
,Lni+ta/~2Q · k ftR_dl/cerf ~ ~et ·-toj
be- k , w-trae atff?)l:afe_ J& _
- - = - + - ~ ~ ~ ~ ~ ~ t J . J .· ..!_!;,+ ~illllL~ ~ i
I
~Ve_ ge,et.fe/ t:f,Wb.-lf2
f'1 twdLI_Cf!d '
no -f~ affrir
·, y'\ h,Jtt:ed
se:t~
OF ENGINEERING
FR. CONCEICAO RODRlGUES COLLEGE
r/
· v
)
h.0
J
V
V
V
~1/ i
no I
rf lJl'tll, IQ
0
I
g_
(( dJfe_ _
SR&vc>R ~ s 1_s t6 /q uJ
/6 /Cf 20 2° 2-2
I C)uM&;
13 /oc..t-lh
)S 1/6~
)G Ye>t-d~
lb Yol,~"1
)q Yol,rA-1,
r 1tddk · c1d ,
1
9s \ rn,dcAc - ~ I I
jS Sell1~
23 l Mi'rh'~ -¥d lI
I
52- SJJJf~
J5 . yY11J/le. - cis,erJ
I I
?-.S IM1drile. - oyd 1
I I
1
30 r'nidrflt -qyd
'
-33 ,)c.1)/{!.;~
33 So1i «:CJ
35 SE,1io~
35 ~Sellr~97
35 SVJt(Jfr)
I
.35 itll 1~
I
J(, gV11!Q5,
I
I
!
'::/0 S,Q)ll~
NCEICAO RODRIGUES COLLEGE OF ENGTNEERIN
• (} I
~ ~~ ~JJL:__L&~~ ~ ~ ~ ~ ~ ~ ~ ~~ r---'--=------=--+-,:..=----------
l--------S-ilbfL_™_--_✓ _ _ _ _ _ _ _ _ _ _ _: j1 ,
--
. p V; -, 10 -- 0 ·3
- q -::. (} ~7-
I
Off/JiMN =\YP/J I
en,) ~
OJ - 0
ClAJNER. :: iYt?<l ' 3 . -- ().4- '
OfV/ 'Df2-- -
--
,p ;faiU:8 -:
I
I ID, -- 2:-- 3 -- 0· G1
r{s~ ~ I
I I T)i,j -- ~ 1-
--
6 ·2-
0
@ ~ Miva ~'tJfJ Cl~fcaJttYJ ~'rfhtv1 IV/ ~lt;pj tM(A c'
s},oiJ h()w 1v~ ())/} clu8S t
--f~ Y)w ifjl~ ~
0
P( Tn (OPIQ_ ~ ICW I 01 ) : / / _5 ' {) ~2
p[µti COf'le_ ~ )04) ) ct.) ~ (o I q ~ {) •6 1
p C), )
p(o !XJ ·-
k :=_ 2-
g IB ) IS 1
Jl'rlz. S-36· 53
?
eJ,Cl//ofJ 2.. -r :: 61 gI IO ) ) !E I 6
c_~ ~ 1,l!i'A Jl{ 1, ,2..1 '13{3, 4) , ff l [td), r; ( z,.3), £: { 1.i-111-), ;- f 1. s\.
1~~9tt
1 k ~ 1- ~
~ ' ).+
;....Q;' ~ C1 ':::. 13 {3; 4- J Ci- -·- £[4-14)
-~ '10 C- 1 Cz
- ~i ( ,)01~ 'B (3t' '-+) £(~11.j) Clv.-iS t~
J), LI r 2-} Lf s
3 C:314J 0 I
: { 613} 4 .3 z_
<j) { Zr !3) 2- 3
£ ~4-r4 ) I L) 2-
F{lr 5) 3 0-
'£[hLi-) J_ - f.S / ·5 2-
FLlr5 2-;-5 s ·_5 I
L g ~
'D 5 4- 3
6 1- )
f ._3 &-5 i-5 D~ l·-S
2-5
1·5
~,, Is) I
,,_ B C-- Q:
,4.
13
ro
I 0
: f g 7J 0
orF) L, E :J-5, 3 0
£ ... C S 2.. I
<J - ~ (<f, ~) =l
r-J£-)) - Ptn[4 s, 8·5/, /s) = ~ .s
- Ptfl(. . .S1 2,) :: [2_
FR . CONCEICAO RODRIGUES COLLEGE OF ENGINEERING
) ..~lh-l}yi_q
V
ih ~p'
''3· G
.3
2... (A/BJ 0
/-5 VJJ1FJ1l/ c-7 r..,
3:5 (J
...J
I
r>-~
~
C> r 1
,4 £ C- V 'F )::--
'
/.:,r'/Jt<.(.MU'.
I
[/
·"'" I
A g C-- If) r f Pon1:J F 8- T) ~ ch~-t
T
A 0
~ l ()
[_ g'
+ () ?
V 5 4- ~ ()
;
l-8
F h c; 9 j () I
~
.....
I
F D
~~dcm )1- ,JJ'{ v)vt 11/,f
A- o t {rt) FJ
1 £ - /V'rJx(Ji.s{(1)1rV1) ~ (s/ t·;> '° s\
(ris-l (r;J1F1 13) ., 4-
r,~ fV/tr1
A {Lr 1-I) -=--
·n
_.) f) 0 fV)IFJ_ tdt·f:: (D, F). l) : (3 1 3-5) ~ 3 -:5
I~
--- ~ 0 fV)/C( [ d/~ -t (D, f)1 [:_) :: c, / I• s) .._ / ~ s
C)-Fl s Lr 3--5 0
£ .,..
~
(D s Q_ 15 0
. I=;;
~7 -i}e frv5JJ?;x
l-5
,g A £ f P
, V
'-- ,
A/BJ 0
r Z 0
b {3-s) 0
(,. 5
V I· I
l
\
It 13 1/0 f £ I
I
[»loJina f}p !
- -A,. l,v,
Y V J,U IU I
V
j
fID1F)1E7, CJ
I
... (/+,BJ
' 1
ft/BJ 0 PV{(dr~t (AJ3)/ Yf?D1F), ~] /c" l
/
@ ~ ~~~
f+ B C- D E F
A- D
B l D
c.. i ~ 0 I :5
D 5 Lt 3 ()
E ~ 5 2- I 0
());di1 1k fvioit'ft;[
I\
[
~ . 0 V F
l~rhfJ
, IN ~hi;,( ~ ---
(I
C 7,5 0
fr0
(VrPJ 4- ,J__§; 3-2/2 0 Av&}d,sJ-[A/gJ, ~] /)Jf.t, 5, 3-5J = 1t
r:
f•S
6-5
D r I
I 8 'D p ~
(A-/B') C- UD 1F) 1
f:_ /r✓lJi Turjf() r cJ ~ -::; 3
I~
.
-3·5
~
I
I
I
0 I
,;;:
9
G
5-S
5
4-5
tr
3~ '
.5
I
I
2-5
I
2- I -
1-5
I
o--5
I)
I I
0 i- g__
Di ·
C_~
ioo 4
(}_o o 23-5 Q_
. C>o [ 2. z_ ~
lt-DD Q_ 3 c;
SOD 1t- . 2_
2- 5 5 6
+OO 4-
w 2- 5
~
t5c> f -.:r s- "Of!i·t - 56 -- Ads
/oo
L -
C ._
' ' - ~
z 6
3 t;,
2.5)
5
3 sl
4~ ~SU 5#-[cVIJ
\2--r g) ~
--{'
z2-1 s , 6
~3/5/ 4-
r ~-f:/OC.~
2 A 3 -1/3 4- 4/ It - I [oo--r
3 11s->2- 4: 4-/ 4- -- I {OO,--f-
2/\J >..S
3 /l 5 .-;> 2--