SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1333
Overview of Data Mining
Rupashi Koul
Department of Computer Science Engineering, Dronacharya College of Engineering, Gurugram, Haryana, India
ABSTRACT
Data mining is the process of discovering patterns in large data sets involving
methods at the intersection of machine learning, statistics, and database
systems.[1] Data mining is an interdisciplinary sub field of computer science
and statistics with an overall goal to extract from a data set and transform the
information into a comprehensible structure for further use.[1][2][3][4] The
process of digging through data to discover hidden connections and predict
future trends has a long history. Sometimes referred to as ‘knowledge
discovery’ in databases, the term data mining wasn’t coined until the 1990s.
What was old is new again, as data mining technology keeps evolving to keep
pace with the limitless potential of big data and affordable computing power.
Over the last decade, advances inprocessingpowerandspeedhaveenabledus
to move beyond manual, tedious and time-consuming practices to quick, easy
and automated data analysis. The more complex the data sets collected, the
more potential there is to uncover relevant insights.
KEYWORDS: database, data mining, techniques
How to cite this paper: Rupashi Koul
"Overview of Data Mining" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.1333-1336, URL:
www.ijtsrd.com/papers/ijtsrd31368.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INTRODUCTION
The manual extraction of patterns from data has occurred
for centuries. Early methods of identifying patterns in data
include Bayes' theorem (1700s) and regression analysis
(1800s). The proliferation, ubiquity and increasingpowerof
computer technology have dramatically increased data
collection, storage, and manipulation ability. As data sets
have grown in size and complexity, direct data analysis has
increasingly been augmented with indirect, automated data
processing, aided by other discoveries in computer science,
specially in the field of machine learning, such as neural
networks, cluster analysis, genetic algorithms (1950s),
decision trees and decision rules (1960s), and support
vector machines (1990s). Data mining is the process of
applying these methods with the intention of uncovering
hidden patterns[5] in large data sets. It bridges the gap from
applied statistics and artificial intelligence to database
management by exploiting the way data is stored and
indexed in databases to execute the actual learning and
discovery algorithms more efficiently, allowing such
methods to be applied to ever-larger data sets. mining is
widely used in diverse areas. There are a number of
commercial data mining system available today and yet
there are many challenges in this field. Some of the areas in
which data mining is used is as follows:
A. Retail Industry
Data Mining has its great application in Retail Industry
because it collects large amount of data from on sales,
customer purchasing history, goods transportation,
consumption and services. It is natural that the quantity of
data collected will continue to expand rapidly becauseofthe
increasing ease, availability and popularity of the web. Data
mining in retail industry helps in identifying customer
buying patterns and trends that lead to improved quality of
customer service and good customer retention and
satisfaction.
B. Telecommunication Industry
Today the telecommunication industry is one of the most
emerging industries providing various services such as fax,
pager, cellular phone, internet messenger, images, e-mail,
web data transmission, etc. Due to the development of new
computer and communication technologies, the
telecommunication industry is rapidlyexpanding.Thisisthe
reason why data mining is become very important to help
and understand the business. Data mining in
telecommunication industry helps in identifying the
telecommunication patterns, catch fraudulent activities,
make better use of resource, and improve quality of service.
C. Education
There is a new emerging field, called Educational Data
Mining, concerns with developing methods that discover
knowledge from data originating from educational
Environments. The goals of EDM are identified as predicting
students’ future learning , studying the effectsof educational
support, and advancing scientific knowledge aboutlearning.
Data mining can be used by an institution to take accurate
decisions and also to predict the results of the student. With
the results the institution can focus on what to teach and
how to teach. Learning of the students can be captured and
used to develop techniques to teach them.
D. CRM
Customer Relationship Management is all about acquiring
and retaining customers, also improving customers’ loyalty
IJTSRD31368
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1334
and implementing customer focused strategies. Tomaintain
a proper relationship with a customer a business need to
collect data and the information. This is where data mining
plays its part. With data mining technologies the collected
data can be used for analysis. Instead of being confused
where to focus to retain customer, the seekers for the
solution get filtered results.
E. Fraud Detection
Billions of dollars have been lost to the action of frauds.
Traditional methods of fraud detection are and complex.
Data mining aids in providing meaningful patterns and
turning data into information. Any information that is valid
and useful is knowledge. A perfect fraud detection system
should protect information of all the users. A supervised
method includes collection of samplerecords.Theserecords
are classified fraudulent or non-fraudulent. A model is built
using this data and the algorithmismadetoidentifywhether
the record is fraudulent or not.
F. Intrusion Detection
Any action that will compromise the integrity and
confidentiality of a resource is an intrusion. The defensive
measures to avoid an intrusion includesuserauthentication,
avoid programming errors,andinformationprotection.Data
mining can help improve intrusion detection by adding a
level of focus to anomaly detection. It helps an analyst to
distinguish an activity from common everyday network
activity. Data mining also helps extract data which is more
relevant to the problem.
II. PROCESS OF DATA MINING
The data mining process is divided into two parts i.e. Data
and Data Mining. Data involves data cleaning, data
integration, data reduction, and data transformation. The
data mining part performs data mining, pattern evaluation
and knowledge representation of data.
A. Data Cleaning
Data cleaning is the first step in data mining. It holds
importance as dirty data if used directly in mining can cause
confusion in procedures and produce inaccurate results.
Basically, this step involves the removal of noisy or
incomplete data from the collection. Many methods that
generally clean data by itself are they are not robust.
B. Data Integration
When multiple heterogeneous data sources such as
databases, data cubes or files are combined for analysis, this
process is called data integration. This canhelpinimproving
the accuracy and speed of the data mining process. Different
databases have differentnamingconventionsofvariables,by
causing redundancies in the databases. Additional Data
Cleaning can be performed to remove the redundancies and
inconsistencies from the data integration without affecting
the reliability of data.
C. Data Reduction
This technique is applied to obtain relevant data foranalysis
from the collection of data. The size of the representation is
much smaller in volume while maintaining integrity. Data
Reduction is performed using methods such as Naive Bayes,
Decision Trees, Neural network, etc.
D. Data Transformation
In this process, data is transformed into a form suitable for
the data mining process. Data is consolidated so that the
mining process is more efficient and the patterns are easier
to understand. Data Transformation involves Data Mapping
and code generation process.
E. Data Mining
Data Mining is a process to identify interesting patterns and
knowledge from a large amount of data. In these steps,
intelligent patterns are applied to extract the data patterns.
The data is represented in the form of patterns and models
are structured using classificationandclusteringtechniques.
F. Pattern Evaluation
This step involves identifying interesting patterns
representing the knowledge based on measures. Data and
visualization methods are used to make the data
understandable by the user.
G. Knowledge Representation
Knowledge representation is a step wheredata visualization
and knowledge representation tools are used to represent
the mined data. Data is visualized in the form of reports,
tables, etc.
III. TYPES OF DATA MINED
A. Flat files:
Flat files is defined as data files in text form or binary form
with a structure that can be easily extracted by data mining
algorithms. Data stored in flat files have no relationship or
path among themselves, like if a relational databaseisstored
on flat file, then there will be no relationsbetweenthetables.
Flat files are represented by data dictionary.
B. Relational Database:
A Relational database is defined as the collection of data
organized in tables with rows and columns. Physical schema
in Relational databases is a schema which defines the
structure of tables. Logical schema in Relational databasesis
a schema which defines the relationship among tables.
C. Data Warehouses:
A is defined as the collection ofdata integratedfrommultiple
sources that will and There are three types of: Enterprise,
Data Mart and Virtual Warehouse. Two approaches can be
used to update data in Data Warehouse: Query-driven
Approach and Update-driven Approach.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1335
D. Databases:
databases is a collection of data organized by time stamps,
date, etc to represent transaction in databases. This type of
database has the capability to roll back or undo itsoperation
when a transaction is not completed or committed. It is
highly flexible system where users can modify information
without changing any sensitive information.
E. Multimedia databases:
Multimedia databases consists audio, video, images andtext
media. They can be stored on Object-Oriented Databases.
They are complex information in a formats.
F. Spatial Databases:
Spatial databases store geographical information. can store
data in the form of coordinates,topology,lines,polygons, etc.
G. Time Series Databases:
Time series databases containsstock exchangedata anduser
logged activities. handle array of numbers indexed by time,
date, etc. It requires real-time analysis.
H. WWW:
WWW refers to World wide web which is a collection of
documents and resources like audio, video, text, etc which
are identified by Uniform ResourceLocators(URLs)through
web browsers, linked by HTML pages, and accessible via the
Internet network. It is the most heterogeneousrepository as
it collects data from multiple resources. It is dynamic in
nature as volume of data is continuously increasing and
changing.
IV. DATA MINING TECHNIQUES
Data mining is highly effective and some techniquesusedfor
data mining are as follows:
A. CLASSIFICATION ANALYSIS
This analysis is used to retrieve important and relevant
information about data, and metadata. It is used to classify
different data in different classes. Classification is similar to
clustering in a way that it also segments data records into
different segments called classes. But unlike clustering,here
the data analysts would have the knowledge of different
classes or cluster. So, in classification analysis you would
apply algorithms to decide how new data should be
classified.
B. ASSOCIATION RULE LEARNING
It refers to the method that can help you identify some
interesting relations (dependency modeling) between
different variables in large databases. This technique can
help you unpack some hidden patterns in the data that can
be used to identify variables within the data and the
concurrence of different variables that appear very
frequently in the . rules are useful for examining and
forecasting customer behavior. It is highly recommended in
the retail industry analysis. This technique is used to
determine shopping basketdata analysis,productclustering,
catalog design and store layout. In IT, programmers use
association rules to build programs capable of machine
learning.
C. ANOMALY OR OUTLIER DETECTION
This refers to the observation for data items in a that do not
match an expected pattern or an expected behavior.
Anomalies are also known as outliers, novelties, noise,
deviations and exceptions. Often they provide critical and
actionable information. An anomaly is an item that deviates
considerably from the common average within a or a
combination of data. These types of items are statistically
aloof as compared to the rest of the data and hence, it
indicates that something out of the ordinary has happened
and requires additional attention. technique can beusedina
variety of domains, such as intrusion detection, system
health monitoring, fraud detection, fault detection, event
detection in sensor networks, and detecting disturbances.
Analysts often remove the anomalous data from the top
discover results with an increased accuracy.
D. CLUSTERING ANALYSIS
The cluster is actually a collection of data objects; those
objects are similar within the same cluster. That means the
objects are similar to one another within the same they are
rather they are dissimilar or unrelatedtotheobjectsinother
groups or in other clusters. Clustering analysisistheprocess
of discovering groups and clusters in the data in such a way
that the degree of association between twoobjects ishighest
if they belong to the same groupandlowestotherwise.result
of this analysis can be used to create customer profiling.
E. REGRESSION ANALYSIS
In statistical terms, a regression analysis is the process of
identifying and analyzing the relationship among variables.
It can help you understand the characteristic value of the
dependent variable changes, if any one of the independent
variables is varied. This means one variable is dependent on
another, but it is not vice versa. is generally used for
prediction and forecasting.
V. BENEFITS AND DISADVANTAGES OF DATA
MINING
There are several types of benefits and advantages of data
mining systems. Some of them are as follows:
One of the common benefits that can be derived with
these data mining systems is that they can be helpful
while predicting future trends.Andthatisquitepossible
with the help of technology and behavioral changes
adopted by the people.
Data mining helps organizations to make the profitable
adjustments in operation and production.
The data mining is a cost-effective and efficient solution
compared to other statistical data applications.
Most parts of the data mining process is basically from
information gathered with the help of marketing
analysis. With the help of such marketing analysis, one
can also find out those fraudulent acts and products
available in the market. Moreover, withthehelpofitone
can understand the importance of accurateinformation.
It can be implemented in new systemsaswell asexisting
platforms. is the speedy process which makes it easyfor
the users to analyze huge amount of data in less time.
Data mining technology is something that helps one person
in their and that is a process wherein which all the factors of
mining is involved precisely and while the involvement of
these mining systems, one can come across several
disadvantages of data they are as follows:
There are chances of companies may sell useful
information of their customers to other companies for
money.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1336
Many data mining analytics software is difficult to
operate and requires advance training to work on.
Different data mining tools work in different manners
due to different algorithms employed in their design.
Therefore, the selection of correct data mining tool is a
very difficult task.
The data mining techniques are not accurate, and so it
can cause serious consequences in certain conditions.
VI. CONCLUSION
Data Mining is an iterative processwheretheminingprocess
can be refined, and new data can be integrated to get more
efficient results. Data Mining meets the requirement of
effective, and flexible data analysis. It can be considered as a
natural evaluation of information technology. As a
knowledge discovery process, data preparation and data
mining tasks complete the data mining process. Data mining
processes can be performed on any kind of data discussed in
the above section. Finally, the bottom line is that all the
techniques help in the discovery of new creative things. At
the end of this paper about data mining, one can clearly
understand the areas of applications, types of source data,
process, techniques, and benefits with its own limitations.
Therefore, after reading all the above-mentioned
information about data mining one can determine its
credibility and feasibility even better.
References
[1] “Data Mining Curriculum”. ACM SIGKDD. 2006-04-30.
Retrieved 2014-01-27.
[2] ^ Clifton, Christopher (2010). "Encyclopædia
Britannica: Definition of Data Mining".Retrieved2010-
12-09
[3] ^ Hastie, Trevor; Tibshirani, Robert; Friedman,Jerome
(2009). "The Elements of Statistical Learning: Data
Mining, Inference, and Prediction". Archived from the
original on 2009-11-10. Retrieved 2012-08-07
[4] ^ Han, Kamber, Pei, Jaiwei, Micheline, Jian (June 9,
2011). Data Mining: Concepts and Techniques (3rd
ed.). Morgan Kaufmann. ISBN 978-0-12-381479-1.
[5] Kantardzic, Mehmed (2003). Data Mining: Concepts,
Models, Methods, and Algorithms. John Wiley & Sons.
ISBN 978-0-471-22852-3. OCLC 50055336.

More Related Content

What's hot

Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligencechirag patil
 
A comprehensive survey on data mining
A comprehensive survey on data miningA comprehensive survey on data mining
A comprehensive survey on data miningeSAT Publishing House
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data MiningIOSR Journals
 
A forecasting of stock trading price using time series information based on b...
A forecasting of stock trading price using time series information based on b...A forecasting of stock trading price using time series information based on b...
A forecasting of stock trading price using time series information based on b...IJECEIAES
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.docbutest
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsTechsparks
 
Characterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesCharacterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesIJTET Journal
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the artNazrul Islam
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data MiningAbcdDcba12
 
9 Data Mining Challenges From Data Scientists Like You
9 Data Mining Challenges From Data Scientists Like You9 Data Mining Challenges From Data Scientists Like You
9 Data Mining Challenges From Data Scientists Like YouSalford Systems
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data miningINFOGAIN PUBLICATION
 

What's hot (18)

Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligence
 
A comprehensive survey on data mining
A comprehensive survey on data miningA comprehensive survey on data mining
A comprehensive survey on data mining
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
A Survey on Data Mining
A Survey on Data MiningA Survey on Data Mining
A Survey on Data Mining
 
A forecasting of stock trading price using time series information based on b...
A forecasting of stock trading price using time series information based on b...A forecasting of stock trading price using time series information based on b...
A forecasting of stock trading price using time series information based on b...
 
Data mining
Data mining Data mining
Data mining
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.doc
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research Topics
 
Data mining and knowledge Discovery
Data mining and knowledge DiscoveryData mining and knowledge Discovery
Data mining and knowledge Discovery
 
Z36149154
Z36149154Z36149154
Z36149154
 
Data Mining
Data MiningData Mining
Data Mining
 
Characterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesCharacterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining Techniques
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the art
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data Mining
 
9 Data Mining Challenges From Data Scientists Like You
9 Data Mining Challenges From Data Scientists Like You9 Data Mining Challenges From Data Scientists Like You
9 Data Mining Challenges From Data Scientists Like You
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining
 
1699 1704
1699 17041699 1704
1699 1704
 

Similar to Overview of Data Mining

Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applicationsSubrat Swain
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
Data Mining @ Information Age
Data Mining @ Information AgeData Mining @ Information Age
Data Mining @ Information AgeIIRindia
 
A Review On Data Mining From Past To The Future
A Review On Data Mining From Past To The FutureA Review On Data Mining From Past To The Future
A Review On Data Mining From Past To The FutureKaela Johnson
 
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...ijtsrd
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS cscpconf
 
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEDATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEIJDKP
 
1. Web Mining – Web mining is an application of data mining for di.docx
1. Web Mining – Web mining is an application of data mining for di.docx1. Web Mining – Web mining is an application of data mining for di.docx
1. Web Mining – Web mining is an application of data mining for di.docxbraycarissa250
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industryijsrd.com
 
Data Mining & Applications
Data Mining & ApplicationsData Mining & Applications
Data Mining & ApplicationsFazle Rabbi Ador
 
Data Mining – A Perspective Approach
Data Mining – A Perspective ApproachData Mining – A Perspective Approach
Data Mining – A Perspective ApproachIRJET Journal
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnnjainutkarsh078
 
Analytics Unleashed_ Navigating the World of Data Science.pdf
Analytics Unleashed_ Navigating the World of Data Science.pdfAnalytics Unleashed_ Navigating the World of Data Science.pdf
Analytics Unleashed_ Navigating the World of Data Science.pdfkhushnuma khan
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
Introduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in DataIntroduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in Datahemayadav41
 
A Deep Dissertion Of Data Science Related Issues And Its Applications
A Deep Dissertion Of Data Science  Related Issues And Its ApplicationsA Deep Dissertion Of Data Science  Related Issues And Its Applications
A Deep Dissertion Of Data Science Related Issues And Its ApplicationsTracy Hill
 

Similar to Overview of Data Mining (20)

Fundamentals of data mining and its applications
Fundamentals of data mining and its applicationsFundamentals of data mining and its applications
Fundamentals of data mining and its applications
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Data Mining @ Information Age
Data Mining @ Information AgeData Mining @ Information Age
Data Mining @ Information Age
 
NCCT.pptx
NCCT.pptxNCCT.pptx
NCCT.pptx
 
A Review On Data Mining From Past To The Future
A Review On Data Mining From Past To The FutureA Review On Data Mining From Past To The Future
A Review On Data Mining From Past To The Future
 
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...
Applications, Techniques and Trends of Data Mining and Knowledge Discovery Da...
 
DOWLD SLIDES.pptx
DOWLD SLIDES.pptxDOWLD SLIDES.pptx
DOWLD SLIDES.pptx
 
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
DATA SCIENCE METHODOLOGY FOR CYBERSECURITY PROJECTS
 
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEDATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
 
2 Data-mining process
2   Data-mining process2   Data-mining process
2 Data-mining process
 
1. Web Mining – Web mining is an application of data mining for di.docx
1. Web Mining – Web mining is an application of data mining for di.docx1. Web Mining – Web mining is an application of data mining for di.docx
1. Web Mining – Web mining is an application of data mining for di.docx
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
 
Data Mining in Telecommunication Industry
Data Mining in Telecommunication IndustryData Mining in Telecommunication Industry
Data Mining in Telecommunication Industry
 
Data Mining & Applications
Data Mining & ApplicationsData Mining & Applications
Data Mining & Applications
 
Data Mining – A Perspective Approach
Data Mining – A Perspective ApproachData Mining – A Perspective Approach
Data Mining – A Perspective Approach
 
dataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnndataminingppt-170616163835.pdf jejwwkwnwnn
dataminingppt-170616163835.pdf jejwwkwnwnn
 
Analytics Unleashed_ Navigating the World of Data Science.pdf
Analytics Unleashed_ Navigating the World of Data Science.pdfAnalytics Unleashed_ Navigating the World of Data Science.pdf
Analytics Unleashed_ Navigating the World of Data Science.pdf
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
Introduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in DataIntroduction to Data Science: Unveiling Insights Hidden in Data
Introduction to Data Science: Unveiling Insights Hidden in Data
 
A Deep Dissertion Of Data Science Related Issues And Its Applications
A Deep Dissertion Of Data Science  Related Issues And Its ApplicationsA Deep Dissertion Of Data Science  Related Issues And Its Applications
A Deep Dissertion Of Data Science Related Issues And Its Applications
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Overview of Data Mining

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1333 Overview of Data Mining Rupashi Koul Department of Computer Science Engineering, Dronacharya College of Engineering, Gurugram, Haryana, India ABSTRACT Data mining is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.[1] Data mining is an interdisciplinary sub field of computer science and statistics with an overall goal to extract from a data set and transform the information into a comprehensible structure for further use.[1][2][3][4] The process of digging through data to discover hidden connections and predict future trends has a long history. Sometimes referred to as ‘knowledge discovery’ in databases, the term data mining wasn’t coined until the 1990s. What was old is new again, as data mining technology keeps evolving to keep pace with the limitless potential of big data and affordable computing power. Over the last decade, advances inprocessingpowerandspeedhaveenabledus to move beyond manual, tedious and time-consuming practices to quick, easy and automated data analysis. The more complex the data sets collected, the more potential there is to uncover relevant insights. KEYWORDS: database, data mining, techniques How to cite this paper: Rupashi Koul "Overview of Data Mining" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.1333-1336, URL: www.ijtsrd.com/papers/ijtsrd31368.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INTRODUCTION The manual extraction of patterns from data has occurred for centuries. Early methods of identifying patterns in data include Bayes' theorem (1700s) and regression analysis (1800s). The proliferation, ubiquity and increasingpowerof computer technology have dramatically increased data collection, storage, and manipulation ability. As data sets have grown in size and complexity, direct data analysis has increasingly been augmented with indirect, automated data processing, aided by other discoveries in computer science, specially in the field of machine learning, such as neural networks, cluster analysis, genetic algorithms (1950s), decision trees and decision rules (1960s), and support vector machines (1990s). Data mining is the process of applying these methods with the intention of uncovering hidden patterns[5] in large data sets. It bridges the gap from applied statistics and artificial intelligence to database management by exploiting the way data is stored and indexed in databases to execute the actual learning and discovery algorithms more efficiently, allowing such methods to be applied to ever-larger data sets. mining is widely used in diverse areas. There are a number of commercial data mining system available today and yet there are many challenges in this field. Some of the areas in which data mining is used is as follows: A. Retail Industry Data Mining has its great application in Retail Industry because it collects large amount of data from on sales, customer purchasing history, goods transportation, consumption and services. It is natural that the quantity of data collected will continue to expand rapidly becauseofthe increasing ease, availability and popularity of the web. Data mining in retail industry helps in identifying customer buying patterns and trends that lead to improved quality of customer service and good customer retention and satisfaction. B. Telecommunication Industry Today the telecommunication industry is one of the most emerging industries providing various services such as fax, pager, cellular phone, internet messenger, images, e-mail, web data transmission, etc. Due to the development of new computer and communication technologies, the telecommunication industry is rapidlyexpanding.Thisisthe reason why data mining is become very important to help and understand the business. Data mining in telecommunication industry helps in identifying the telecommunication patterns, catch fraudulent activities, make better use of resource, and improve quality of service. C. Education There is a new emerging field, called Educational Data Mining, concerns with developing methods that discover knowledge from data originating from educational Environments. The goals of EDM are identified as predicting students’ future learning , studying the effectsof educational support, and advancing scientific knowledge aboutlearning. Data mining can be used by an institution to take accurate decisions and also to predict the results of the student. With the results the institution can focus on what to teach and how to teach. Learning of the students can be captured and used to develop techniques to teach them. D. CRM Customer Relationship Management is all about acquiring and retaining customers, also improving customers’ loyalty IJTSRD31368
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1334 and implementing customer focused strategies. Tomaintain a proper relationship with a customer a business need to collect data and the information. This is where data mining plays its part. With data mining technologies the collected data can be used for analysis. Instead of being confused where to focus to retain customer, the seekers for the solution get filtered results. E. Fraud Detection Billions of dollars have been lost to the action of frauds. Traditional methods of fraud detection are and complex. Data mining aids in providing meaningful patterns and turning data into information. Any information that is valid and useful is knowledge. A perfect fraud detection system should protect information of all the users. A supervised method includes collection of samplerecords.Theserecords are classified fraudulent or non-fraudulent. A model is built using this data and the algorithmismadetoidentifywhether the record is fraudulent or not. F. Intrusion Detection Any action that will compromise the integrity and confidentiality of a resource is an intrusion. The defensive measures to avoid an intrusion includesuserauthentication, avoid programming errors,andinformationprotection.Data mining can help improve intrusion detection by adding a level of focus to anomaly detection. It helps an analyst to distinguish an activity from common everyday network activity. Data mining also helps extract data which is more relevant to the problem. II. PROCESS OF DATA MINING The data mining process is divided into two parts i.e. Data and Data Mining. Data involves data cleaning, data integration, data reduction, and data transformation. The data mining part performs data mining, pattern evaluation and knowledge representation of data. A. Data Cleaning Data cleaning is the first step in data mining. It holds importance as dirty data if used directly in mining can cause confusion in procedures and produce inaccurate results. Basically, this step involves the removal of noisy or incomplete data from the collection. Many methods that generally clean data by itself are they are not robust. B. Data Integration When multiple heterogeneous data sources such as databases, data cubes or files are combined for analysis, this process is called data integration. This canhelpinimproving the accuracy and speed of the data mining process. Different databases have differentnamingconventionsofvariables,by causing redundancies in the databases. Additional Data Cleaning can be performed to remove the redundancies and inconsistencies from the data integration without affecting the reliability of data. C. Data Reduction This technique is applied to obtain relevant data foranalysis from the collection of data. The size of the representation is much smaller in volume while maintaining integrity. Data Reduction is performed using methods such as Naive Bayes, Decision Trees, Neural network, etc. D. Data Transformation In this process, data is transformed into a form suitable for the data mining process. Data is consolidated so that the mining process is more efficient and the patterns are easier to understand. Data Transformation involves Data Mapping and code generation process. E. Data Mining Data Mining is a process to identify interesting patterns and knowledge from a large amount of data. In these steps, intelligent patterns are applied to extract the data patterns. The data is represented in the form of patterns and models are structured using classificationandclusteringtechniques. F. Pattern Evaluation This step involves identifying interesting patterns representing the knowledge based on measures. Data and visualization methods are used to make the data understandable by the user. G. Knowledge Representation Knowledge representation is a step wheredata visualization and knowledge representation tools are used to represent the mined data. Data is visualized in the form of reports, tables, etc. III. TYPES OF DATA MINED A. Flat files: Flat files is defined as data files in text form or binary form with a structure that can be easily extracted by data mining algorithms. Data stored in flat files have no relationship or path among themselves, like if a relational databaseisstored on flat file, then there will be no relationsbetweenthetables. Flat files are represented by data dictionary. B. Relational Database: A Relational database is defined as the collection of data organized in tables with rows and columns. Physical schema in Relational databases is a schema which defines the structure of tables. Logical schema in Relational databasesis a schema which defines the relationship among tables. C. Data Warehouses: A is defined as the collection ofdata integratedfrommultiple sources that will and There are three types of: Enterprise, Data Mart and Virtual Warehouse. Two approaches can be used to update data in Data Warehouse: Query-driven Approach and Update-driven Approach.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1335 D. Databases: databases is a collection of data organized by time stamps, date, etc to represent transaction in databases. This type of database has the capability to roll back or undo itsoperation when a transaction is not completed or committed. It is highly flexible system where users can modify information without changing any sensitive information. E. Multimedia databases: Multimedia databases consists audio, video, images andtext media. They can be stored on Object-Oriented Databases. They are complex information in a formats. F. Spatial Databases: Spatial databases store geographical information. can store data in the form of coordinates,topology,lines,polygons, etc. G. Time Series Databases: Time series databases containsstock exchangedata anduser logged activities. handle array of numbers indexed by time, date, etc. It requires real-time analysis. H. WWW: WWW refers to World wide web which is a collection of documents and resources like audio, video, text, etc which are identified by Uniform ResourceLocators(URLs)through web browsers, linked by HTML pages, and accessible via the Internet network. It is the most heterogeneousrepository as it collects data from multiple resources. It is dynamic in nature as volume of data is continuously increasing and changing. IV. DATA MINING TECHNIQUES Data mining is highly effective and some techniquesusedfor data mining are as follows: A. CLASSIFICATION ANALYSIS This analysis is used to retrieve important and relevant information about data, and metadata. It is used to classify different data in different classes. Classification is similar to clustering in a way that it also segments data records into different segments called classes. But unlike clustering,here the data analysts would have the knowledge of different classes or cluster. So, in classification analysis you would apply algorithms to decide how new data should be classified. B. ASSOCIATION RULE LEARNING It refers to the method that can help you identify some interesting relations (dependency modeling) between different variables in large databases. This technique can help you unpack some hidden patterns in the data that can be used to identify variables within the data and the concurrence of different variables that appear very frequently in the . rules are useful for examining and forecasting customer behavior. It is highly recommended in the retail industry analysis. This technique is used to determine shopping basketdata analysis,productclustering, catalog design and store layout. In IT, programmers use association rules to build programs capable of machine learning. C. ANOMALY OR OUTLIER DETECTION This refers to the observation for data items in a that do not match an expected pattern or an expected behavior. Anomalies are also known as outliers, novelties, noise, deviations and exceptions. Often they provide critical and actionable information. An anomaly is an item that deviates considerably from the common average within a or a combination of data. These types of items are statistically aloof as compared to the rest of the data and hence, it indicates that something out of the ordinary has happened and requires additional attention. technique can beusedina variety of domains, such as intrusion detection, system health monitoring, fraud detection, fault detection, event detection in sensor networks, and detecting disturbances. Analysts often remove the anomalous data from the top discover results with an increased accuracy. D. CLUSTERING ANALYSIS The cluster is actually a collection of data objects; those objects are similar within the same cluster. That means the objects are similar to one another within the same they are rather they are dissimilar or unrelatedtotheobjectsinother groups or in other clusters. Clustering analysisistheprocess of discovering groups and clusters in the data in such a way that the degree of association between twoobjects ishighest if they belong to the same groupandlowestotherwise.result of this analysis can be used to create customer profiling. E. REGRESSION ANALYSIS In statistical terms, a regression analysis is the process of identifying and analyzing the relationship among variables. It can help you understand the characteristic value of the dependent variable changes, if any one of the independent variables is varied. This means one variable is dependent on another, but it is not vice versa. is generally used for prediction and forecasting. V. BENEFITS AND DISADVANTAGES OF DATA MINING There are several types of benefits and advantages of data mining systems. Some of them are as follows: One of the common benefits that can be derived with these data mining systems is that they can be helpful while predicting future trends.Andthatisquitepossible with the help of technology and behavioral changes adopted by the people. Data mining helps organizations to make the profitable adjustments in operation and production. The data mining is a cost-effective and efficient solution compared to other statistical data applications. Most parts of the data mining process is basically from information gathered with the help of marketing analysis. With the help of such marketing analysis, one can also find out those fraudulent acts and products available in the market. Moreover, withthehelpofitone can understand the importance of accurateinformation. It can be implemented in new systemsaswell asexisting platforms. is the speedy process which makes it easyfor the users to analyze huge amount of data in less time. Data mining technology is something that helps one person in their and that is a process wherein which all the factors of mining is involved precisely and while the involvement of these mining systems, one can come across several disadvantages of data they are as follows: There are chances of companies may sell useful information of their customers to other companies for money.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31368 | Volume – 4 | Issue – 4 | May-June 2020 Page 1336 Many data mining analytics software is difficult to operate and requires advance training to work on. Different data mining tools work in different manners due to different algorithms employed in their design. Therefore, the selection of correct data mining tool is a very difficult task. The data mining techniques are not accurate, and so it can cause serious consequences in certain conditions. VI. CONCLUSION Data Mining is an iterative processwheretheminingprocess can be refined, and new data can be integrated to get more efficient results. Data Mining meets the requirement of effective, and flexible data analysis. It can be considered as a natural evaluation of information technology. As a knowledge discovery process, data preparation and data mining tasks complete the data mining process. Data mining processes can be performed on any kind of data discussed in the above section. Finally, the bottom line is that all the techniques help in the discovery of new creative things. At the end of this paper about data mining, one can clearly understand the areas of applications, types of source data, process, techniques, and benefits with its own limitations. Therefore, after reading all the above-mentioned information about data mining one can determine its credibility and feasibility even better. References [1] “Data Mining Curriculum”. ACM SIGKDD. 2006-04-30. Retrieved 2014-01-27. [2] ^ Clifton, Christopher (2010). "Encyclopædia Britannica: Definition of Data Mining".Retrieved2010- 12-09 [3] ^ Hastie, Trevor; Tibshirani, Robert; Friedman,Jerome (2009). "The Elements of Statistical Learning: Data Mining, Inference, and Prediction". Archived from the original on 2009-11-10. Retrieved 2012-08-07 [4] ^ Han, Kamber, Pei, Jaiwei, Micheline, Jian (June 9, 2011). Data Mining: Concepts and Techniques (3rd ed.). Morgan Kaufmann. ISBN 978-0-12-381479-1. [5] Kantardzic, Mehmed (2003). Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons. ISBN 978-0-471-22852-3. OCLC 50055336.