This Presentation covers Data Mining: Classification and Prediction, NEURAL NETWORK REPRESENTATION, NEURAL NETWORK APPLICATION DEVELOPMENT, BENEFITS AND LIMITATIONS OF NEURAL NETWORKS, Neural Networks, Real Estate Appraiser, Kinds of Data Mining Problems, Data Mining Techniques, Learning in ANN, Elements of ANN, Neural Network Architectures Recurrent Neural Networks and ANN Software.
This presentation gives the idea about Data Preprocessing in the field of Data Mining. Images, examples and other things are adopted from "Data Mining Concepts and Techniques by Jiawei Han, Micheline Kamber and Jian Pei "
Identifying and classifying unknown Network Disruptionjagan477830
Since the evolution of modern technology and with the drastic increase in the scale of network communication more and more network disruptions in traffic and private protocols have been taking place. Identifying and classifying the unknown network disruptions can provide support and even help to maintain the backup systems.
This presentation gives the idea about Data Preprocessing in the field of Data Mining. Images, examples and other things are adopted from "Data Mining Concepts and Techniques by Jiawei Han, Micheline Kamber and Jian Pei "
Identifying and classifying unknown Network Disruptionjagan477830
Since the evolution of modern technology and with the drastic increase in the scale of network communication more and more network disruptions in traffic and private protocols have been taking place. Identifying and classifying the unknown network disruptions can provide support and even help to maintain the backup systems.
This slide gives brief overview of supervised, unsupervised and reinforcement learning. Algorithms discussed are Naive Bayes, K nearest neighbour, SVM,decision tree, Markov model.
Difference between regression and classification. difference between supervised and reinforcement, iterative functioning of Markov model and machine learning applications.
Deep Learning For Practitioners, lecture 2: Selecting the right applications...ananth
In this presentation we articulate when deep learning techniques yield best results from a practitioner's view point. Do we apply deep learning techniques for every machine learning problem? What characteristics of an application lends itself suitable for deep learning? Does more data automatically imply better results regardless of the algorithm or model? Does "automated feature learning" obviate the need for data preprocessing and feature design?
Statistical theory is a branch of mathematics and statistics that provides the foundation for understanding and working with data, making inferences, and drawing conclusions from observed phenomena. It encompasses a wide range of concepts, principles, and techniques for analyzing and interpreting data in a systematic and rigorous manner. Statistical theory is fundamental to various fields, including science, social science, economics, engineering, and more.
Artificial Neural Networks (ANN) And Artificial Intelligence (AI)aNumak & Company
Artificial neural networks are mainly used in areas such as diagnosis, classification, prediction, control, data association, data filtering, and interpretation. In order to determine which mesh is more suitable for which problem, it is necessary to compare the properties of the networks with the properties of the problems.
Artificial Neural Networks (ANN) And Artificial Intelligence (AI)aNumak & Company
Artificial neural networks are mainly used in areas such as diagnosis, classification, prediction, control, data association, data filtering, and interpretation. In order to determine which mesh is more suitable for which problem, it is necessary to compare the properties of the networks with the properties of the problems.
Similar to Artificial Neural Networks for Data Mining (20)
1. What are the differences between a DBMS and RDBMS?
2. Explain the terms database and DBMS. Also, mention the different types of DBMS.
3. What are the advantages of DBMS?
4. Mention the different languages present in DBMS
5. What do you understand by query optimization?
6. Do we consider NULL values the same as that of blank space or zero?
7. What do you understand by aggregation and atomicity?
8. What are the different levels of abstraction in the DBMS?
9. What is an entity-relationship model?
10. What do you understand by the terms Entity, Entity Type, and Entity Set in DBMS?
11. What are relationships and mention different types of relationships in the DBMS
12. What is concurrency control?
13. What are the ACID properties in DBMS?
14. What is normalization and what are the different types of normalization?
15. What are the different types of keys in the database?
16. What do you understand by correlated subqueries in DBMS?
17. Explain Database partitioning and its importance.
18. What do you understand by functional dependency and transitive dependency in DBMS?
19. What is the difference between two and three-tier architectures?
20. Mention the differences between Unique Key and Primary Key
21. What is a checkpoint in DBMS and when does it occur?
22. Mention the differences between Trigger and Stored Procedures
23. What are the differences between Hash join, Merge join and Nested loops?
24. What do you understand by Proactive, Retroactive and Simultaneous Update?
25. What are indexes? Mention the differences between the clustered and non-clustered index
26. What do you understand by intension and extension?
27. What do you understand by cursor? Mention the different types of cursor A cursor is a database object which helps in manipulating data, row by row and represents a result set.
28. Explain the terms specialization and generalization
29. What do you understand by Data Independence?
30. What are the different integrity rules present in the DBMS?
31. What does Fill Factor concept mean with respect to indexes?
32. What is Index hunting and how does it help in improving query performance?
33. What are the differences between network and hierarchical database model?
34. Explain what is a deadlock and mention how it can be resolved?
35. What are the differences between an exclusive lock and a shared lock?
=>Concept of Governance
=>Risk and Control (GRC) as applicable to IT operational risk
=>Importance of documentation
=>DATA FLOW DIAGRAM for every application
=>Review of changes in the Data flow, reporting, etc.
=>Parameters for review
=>Importance of review on SLA compliance
=>Reporting to IT Strategy committee, Board etc.
Importance of Data - Where to find it, how to store, manipulate, and characterize it
Artificial Intelligence (AI)- Introduction to AI & ML Technologies/ Applications
Machine Learning (ML), Basic Machine Learning algorithms.
Applications of AI & ML in Marketing, Sales, Finance, Operations, Supply Chain
& Human Resources Data Governance
Legal and Ethical Issues
Robotic Process Automation (RPA)
Internet of Things (IoT)
Cloud Computing
What is Data ?
What is Information?
Data Models, Schema and Instances
Components of Database System
What is DBMS ?
Database Languages
Applications of DBMS
Introduction to Databases
Fundamentals of Data Modeling and Database Design
Database Normalization
Types of keys in database management system
Distributed Database
CASE (COMPUTER AIDED SOFTWARE ENGINEERING)
CASE and its Scope
CASE support in software life cycle documentation
project management
Internal Interface
Reverse Software Engineering
Architecture of CASE environment.
SOFTWARE RELIABILITY AND QUALITY ASSURANCE
Reliability issues
Reliability metrics
Reliability growth modeling
Software quality
ISO 9000 certification for software industry
SEI capability maturity model
comparison between ISO and SEI CMM
Software Testing
Different Types of Software Testing
Verification
Validation
Unit Testing
Beta Testing
Alpha Testing
Black Box Testing
White Box testing
Error
Bug
Software Design
Design principles
Problem partitioning
Abstraction
Top down and bottom up-design
Structured approach
Functional versus object oriented approach
Design specifications and verification
Monitoring and control
Cohesiveness
Coupling
Fourth generation techniques
Functional independence
Software Architecture
Transaction and Transform Mapping
SDLC
PDLC
Software Development Life Cycle
Program Development Life Cycle
Iterative model
Advantages of Iterative model
Disadvantages of Iterative model
When to use iterative model
Spiral Model
Advantages of Spiral model
Disadvantages of Spiral model
When to use Spiral model
Role of Management in Software Development
Software Lifecycle Models / Software Development Models
Types of Software development models
Waterfall Model
Features of Waterfall Model
Phase of Waterfall Model
Prototype Model
Advantages of Prototype Model
Disadvantages of Prototype model
V Model
Advantages of V-model
Disadvantages of V-model
When to use the V-model
Incremental Model
ITERATIVE AND INCREMENTAL DEVELOPMENT
INCREMENTAL MODEL LIFE CYCLE
When to use the Incremental model
Rapid Application Development RAD Model
phases in the rapid application development (RAD) model
Advantages of the RAD model
Disadvantages of RAD model
When to use RAD model
Agile Model
Advantages of Agile model
Disadvantages of Agile model
When to use Agile model
Introduction to software engineering
Software products
Why Software is Important?
Software costs
Features of Software?
Software Applications
Software—New Categories
Software Engineering
Importance of Software Engineering
Essential attributes / Characteristics of good software
Software Components
Software Process
Five Activities of a Generic Process framework
Relative Costs of Fixing Software Faults
Software Qualities
Software crisis
Software Development Stages/SDLC
What is Software Verification
Advantages of Software Verification
Advantages of Validation
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
Application Software
Applications Software
Software Types
Task-Oriented Productivity Software
Business Software
Application Software and Ethics
Computers and People
Software:
Systems and Application Software
Identify and briefly describe the functions of the two basic kinds of software
Outline the role of the operating system and identify the features of several popular operating systems
Discuss how application software can support personal, workgroup, and enterprise business objectives
Identify three basic approaches to developing application software and discuss the pros and cons of each
Outline the overall evolution and importance of programming languages and clearly differentiate among the generations of programming languages
Identify several key software issues and trends that have an impact on organizations and individuals
Programming Languages
A formal language for describing computation?
A “user interface” to a computer?
Syntax + semantics?
Compiler, or interpreter, or translator?
A tool to support a programming paradigm?
Number Codes and Registers
2’s complement numbers
Addition and subtraction
Binary coded decimal
Gray codes for binary numbers
ASCII characters
Moving towards hardware
Storing data
Processing data
More from Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU (20)
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. Data Mining: Classification and
Prediction
• 1. Classification with decision trees
• 2. Artificial Neural Networks
3. 1. CLASSIFICATION WITH DECISION
TREES
• Classification is the process of learning a model
that describes different classes of data. The
classes are predetermined.
• Example: In a banking application, customers
who apply for a credit card may be classify as a
“good risk”, a “fair risk” or a “poor risk”. Hence,
this type of activity is also called supervised
learning.
• Once the model is built, then it can be used to
classify new data.
4. • The first step, of learning the model, is accomplished by using a
training set of data that has already been classified. Each record in the
training data contains an attribute, called the class label, that indicates
which class the record belongs to.
• The model that is produced is usually in the form of a decision tree or a
set of rules.
• Some of the important issues with regard to the model and the
algorithm that produces the model include:
– the model’s ability to predict the correct class of the new data,
– the computational cost associated with the algorithm
– the scalability of the algorithm.
• Let examine the approach where the model is in the form of a decision
tree.
• A decision tree is simply a graphical representation of the description
of each class or in other words, a representation of the classification
rules.
5. • Example : Suppose that we have a database of
customers on the AllEletronics mailing list. The
database describes attributes of the customers, such as
their name, age, income, occupation, and credit rating.
The customers can be classified as to whether or not
they have purchased a computer at AllElectronics.
• Suppose that new customers are added to the
database and that you would like to notify these
customers of an upcoming computer sale. To send out
promotional literature to every new customers in the
database can be quite costly. A more cost-efficient
method would be to target only those new customers
who are likely to purchase a new computer. A
classification model can be constructed and used for
this purpose.
• The figure 2 shows a decision tree for the concept
buys_computer, indicating whether or not a customer
at AllElectronics is likely to purchase a computer.
6. Each internal node
represents a test on an
attribute. Each leaf node
represents a class.
A decision tree for the concept buys_computer, indicating whether or not a customer
at AllElectronics is likely to purchase a computer.
7. Training data tuples from the AllElectronics customer
database
age income student credit_rating
<=30 high no fair
<=30 high no excellent
31…40 high no fair
>40 medium no fair
>40 low yes fair
>40 low yes excellent
31…40 low yes excellent
<=30 medium no fair
<=30 low yes fair
>40 medium yes fair
<=30 medium yes excellent
31…40 medium no excellent
31…40 high yes fair
>40 medium no excellent
Class
No
No
Yes
Yes
Yes
No
Yes
No
Yes
Yes
Yes
Yes
Yes
No
8. 8
age?
<= 30 >40
31…40
income student credit_rating class
high no fair no
high no excellent no
medium no fair no
low yes fair yes
medium yes excellent yes
income student credit_rating class
high no fair yes
low yes excellent yes
medium no excellent yes
high yes fair yes
income student credit_rating class
medium no fair yes
low yes fair yes
low yes excellent no
medium yes fair yes
medium no excellent no
9. 9
Extracting Classification Rules from Trees
• Represent the knowledge in the form of IF-THEN rules
• One rule is created for each path from the root to a leaf
• Each attribute-value pair along a path forms a conjunction
• The leaf node holds the class prediction
• Rules are easier for humans to understand.
Example
IF age = “<=30” AND student = “no” THEN buys_computer = “no”
IF age = “<=30” AND student = “yes” THEN buys_computer = “yes”
IF age = “31…40” THEN buys_computer = “yes”
IF age = “>40” AND credit_rating = “excellent” THEN buys_computer =
“no”
IF age = “>40” AND credit_rating = “fair” THEN buys_computer = “yes”
10. 10
1. NEURAL NETWORK REPRESENTATION
• An ANN is composed of processing elements called or perceptrons,
organized in different ways to form the network’s structure.
Processing Elements
• An ANN consists of perceptrons. Each of the perceptrons receives
inputs, processes inputs and delivers a single output.
The input can be raw input
data or the output of
other perceptrons. The
output can be the final
result (e.g. 1 means yes, 0
means no) or it can be
inputs to other
perceptrons.
11. 11
The network
• Each ANN is composed of a collection of perceptrons grouped
in layers. A typical structure is shown in Fig.2.
Note the three layers:
input, intermediate
(called the hidden layer)
and output.
Several hidden layers can
be placed between the
input and output layers.
Figure 2
12. 12
Appropriate Problems for Neural Network
• ANN learning is well-suited to problems in which the training data
corresponds to noisy, complex sensor data. It is also applicable to
problems for which more symbolic representations are used.
• The backpropagation (BP) algorithm is the most commonly used ANN
learning technique. It is appropriate for problems with the
characteristics:
– Input is high-dimensional discrete or real-valued (e.g. raw sensor input)
– Output is discrete or real valued
– Output is a vector of values
– Possibly noisy data
– Long training times accepted
– Fast evaluation of the learned function required.
– Not important for humans to understand the weights
• Examples:
– Speech phoneme recognition
– Image classification
– Financial prediction
13. 13
NEURAL NETWORK APPLICATION
DEVELOPMENT
The development process for an ANN application has eight steps.
• Step 1: (Data collection) The data to be used for the training and
testing of ANN are collected. Important considerations
are that the particular problem is amenable to ANN solution and that
adequate data exist and can be obtained.
• Step 2: (Training and testing data separation) Trainning data must be
identified, and a plan must be made for testing the performance of
ANN. The available data are divided into training and testing data sets.
For a moderately sized data set, 80% of the data are randomly selected
for training, 10% for testing, and 10% secondary testing.
• Step 3: (Network architecture) A network architecture and a learning
method are selected. Important considerations are the exact number
of nodes and the number of layers.
14. 14
• Step 4: (Parameter tuning and weight initialization) There are
parameters for tuning ANN to the desired learning
performance level. Part of this step is initialization of the
network weights and parameters, followed by modification of
the parameters as training performance feedback is received.
– Often, the initial values are important in determining the effectiveness
and length of training.
• Step 5: (Data transformation) Transforms the application data
into the type and format required by the ANN.
• Step 6: (Training) Training is conducted iteratively by
presenting input and known output data to the ANN. The ANN
computes the outputs and adjusts the weights until the
computed outputs are within an acceptable tolerance of the
known outputs for the input cases.
15. 15
• Step 7: (Testing) Once the training has been completed, it is
necessary to test the network.
– The testing examines the performance of ANN using the derived
weights by measuring the ability of the network to classify the
testing data correctly.
– Black-box testing (comparing test results to historical results) is the
primary approach for verifying that inputs produce the appropriate
outputs.
• Step 8: (Implementation) Now a stable set of weights are
obtained.
– Now ANN can reproduce the desired output given inputs like those
in the training set.
– The ANN is ready to use as a stand-alone system or as part of
another software system where new input data will be presented
to it and its output will be a recommended decision.
16. 16
BENEFITS AND LIMITATIONS OF NEURAL NETWORKS
6.1 Benefits of ANNs
• Usefulness for pattern recognition, classification, generalization,
abstraction and interpretation of imcomplete and noisy inputs. (e.g.
handwriting recognition, image recognition, voice and speech
recognition, weather forecasing).
• Providing some human characteristics to problem solving that are
difficult to simulate using the logical, analytical techniques of expert
systems and standard software technologies. (e.g. financial
applications).
• Ability to solve new kinds of problems. ANNs are particularly effective
at solving problems whose solutions are difficult to define. This
opened up a new range of decision support applications formerly
either difficult or impossible to computerize.
17. [Artificial] Neural Networks
• A class of powerful, general-purpose tools readily applied to:
– Prediction
– Classification
– Clustering
• Biological Neural Net (human brain) is the most powerful – we
can generalize from experience
• Computers are best at following pre-determined instructions
• Computerized Neural Nets attempt to bridge the gap
– Predicting time-series in financial world
– Diagnosing medical conditions
– Identifying clusters of valuable customers
– Fraud detection
– Etc…
18. Neural Networks
• When applied in well-defined domains, their ability
to generalize and learn from data “mimics” a
human’s ability to learn from experience.
• Very useful in Data Mining…better results are the
hope
• Drawback – training a neural network results in
internal weights distributed throughout the network
making it difficult to understand why a solution is
valid
19. Neural Networks
What is a Neural Network?
Similarity with biological network
Fundamental processing elements of a neural network
is a neuron
1.Receives inputs from other source
2.Combines them in someway
3.Performs a generally nonlinear operation on the result
4.Outputs the final result
•Biologically motivated approach to
machine learning
20. Neural Network History
• 1930s thru 1970s
• 1980s:
– Back propagation – better way of training a neural net
– Computing power became available
– Researchers became more comfortable with n-nets
– Relevant operational data more accessible
– Useful applications (expert systems) emerged
• Check out Fair Isaac (www.fairisaac.com) which has a
division here in San Diego (formerly HNC)
21. Neural Network
• Neural Network learns by adjusting the weights so as
to be able to correctly classify the training data and
hence, after testing phase, to classify unknown data.
• Neural Network needs long time for training.
• Neural Network has a high tolerance to noisy and
incomplete data
22. Neural Network Classifier
• Input: Classification data
It contains classification attribute
• Data is divided, as in any classification problem.
[Training data and Testing data]
• All data must be normalized.
(i.e. all values of attributes in the database are changed to contain values in
the internal [0,1] or[-1,1])
Neural Network can work with data in the range of (0,1) or (-1,1)
• Two basic normalization techniques
[1] Max-Min normalization
[2] Decimal Scaling normalization
24. Loan Prospector – HNC/Fair Isaac
• A Neural Network (Expert System) is like a black box that knows how
to process inputs to create a useful output.
• The calculation(s) are quite complex and difficult to understand
25. Neural Net Limitations
• Neural Nets are good for prediction and estimation
when:
– Inputs are well understood
– Output is well understood
– Experience is available for examples to use to “train” the
neural net application (expert system)
• Neural Nets are only as good as the training set used
to generate it. The resulting model is static and must
be updated with more recent examples and
retraining for it to stay relevant
26. Neural Network Training
• Training is the process of setting the best weights on the
edges connecting all the units in the network
• The goal is to use the training set to calculate weights where
the output of the network is as close to the desired output as
possible for as many of the examples in the training set as
possible
• Back propagation has been used since the 1980s to adjust the
weights (other methods are now available):
– Calculates the error by taking the difference between the calculated
result and the actual result
– The error is fed back through the network and the weights are
adjusted to minimize the error
27. 27
Introduction
• Data Mining Definitions:
– Building compact and understandable models
incorporating the relationships between the
description of a situation and a result concerning
the situation.
– Extraction of interesting (non-trivial, implicit,
previously unknown and potentially useful)
information or patterns from data in large
databases.
28. 28
Kinds of Data Mining Problems
• Classification / Segmentation
• Forecasting/Prediction (how much)
• Association rule extraction (market basket
analysis)
• Sequence detection
30. 30
Neural Networks
• What are they?
– Based on early research aimed at representing the
way the human brain works
– Neural networks are composed of many
processing units called neurons
• Types (Supervised versus Unsupervised)
• Training
31. 31
Neural Networks are great, but..
• Problem 1: The black box model!
– Solution: 1. Do we really need to know?
– Solution 2. Rule Extraction techniques
• Problem 2: Long training times
– Solution 1: Get a faster PC with lots of RAM
– Solution 2: Use faster algorithms “For example:
Quickprop”
• Problems 3-: Back propagation
– Solution: Evolutionary Neural Networks!
33. Neural Network Concepts
• Neural networks (NN): a brain metaphor for
information processing
• Neural computing
• Artificial neural network (ANN)
• Many uses for ANN for
– pattern recognition, forecasting, prediction, and
classification
• Many application areas
– finance, marketing, manufacturing, operations,
information systems, and so on
36. Processing Information in ANN
w1
w2
wn
x1
x2
xn
.
.
.
Y
Y1
Yn
Y2
Inputs Weights Outputs
.
.
.
Neuron (or PE)
n
i
iiWXS
1
)( Sf
Summation
Transfer
Function
• A single neuron (processing element – PE) with
inputs and outputs
37. Elements of ANN
• Processing element (PE)
• Network architecture
– Hidden layers
– Parallel processing
• Network information processing
– Inputs
– Outputs
– Connection weights
– Summation function
38. Elements of ANN
• Processing element (PE)
• Network architecture
– Hidden layers
– Parallel processing
• Network information processing
– Inputs
– Outputs
– Connection weights
– Summation function
40. Learning in ANN
• A process by which a neural network learns the
underlying relationship between input and outputs,
or just among the inputs
• Supervised learning
– For prediction type problems
– E.g., backpropagation
• Unsupervised learning
– For clustering type problems
– Self-organizing
– E.g., adaptive resonance theory
41. A Taxonomy of ANN Learning
Algorithms
Learning Algorithms
Discrete/binary input Continuous Input
Surepvised Unsupervised
· Delta rule
· Gradient Descent
· Competitive learning
· Neocognitron
· Perceptor
· Simple Hopefield
· Outerproduct AM
· Hamming Net
· ART-1
· Carpenter /
Grossberg
· ART-3
· SOFM (or SOM)
· Other clustering
algorithms
Architectures
Supervised Unsupervised
Recurrent Feedforward Extimator Extractor
· Hopefield · SOFM (or SOM)· Nonlinear vs. linear
· Backpropagation
· ML perceptron
· Boltzmann
· ART-1
· ART-2
UnsupervisedSurepvised
42. A Supervised Learning Process
Compute
output
Is desired
output
achieved?
Stop
learning
Adjust
weights
Yes
No
ANN
Model
Three-step process:
1. Compute temporary
outputs
2. Compare outputs with
desired targets
3. Adjust the weights and
repeat the process
43. How a Network Learns
• Example: single neuron that learns the
inclusive OR operation
* See your book for step-by-step progression of the learning process
Learning parameters:
Learning rate
Momentum
44. Backpropagation Learning
• Backpropagation of Error for a Single Neuron
w1
w2
wn
x1
x2
xn
.
.
.
Yi
Neuron (or PE)
n
i
iiWXS
1
)( Sf
Summation
Transfer
Function
)(SfY
a(Zi – Yi)
error
45. Backpropagation Learning
• The learning algorithm procedure:
1. Initialize weights with random values and set other
network parameters
2. Read in the inputs and the desired outputs
3. Compute the actual output (by working forward
through the layers)
4. Compute the error (difference between the actual and
desired output)
5. Change the weights by working backward through the
hidden layers
6. Repeat steps 2-5 until weights stabilize
47. Neural Network Architectures
• Architecture of a neural network is driven by the
task it is intended to address
– Classification, regression, clustering, general
optimization, association, ….
• Most popular architecture: Feedforward, multi-
layered perceptron with backpropagation learning
algorithm
– Used for both classification and regression type
problems
48. Other Popular ANN Paradigms
Self Organizing Maps (SOM)
• Applications of SOM
– Customer segmentation
– Bibliographic classification
– Image-browsing systems
– Medical diagnosis
– Interpretation of seismic activity
– Speech recognition
– Data compression
– Environmental modeling, many more …
49. Applications Types of ANN
• Classification
– Feedforward networks (MLP), radial basis function, and
probabilistic NN
• Regression
– Feedforward networks (MLP), radial basis function
• Clustering
– Adaptive Resonance Theory (ART) and SOM
• Association
– Hopfield networks
• Provide examples for each type?
50. Advantages of ANN
• Able to deal with (identify/model) highly
nonlinear relationships
• Not prone to restricting normality and/or
independence assumptions
• Can handle variety of problem types
• Usually provides better results (prediction and/or
clustering) compared to its statistical
counterparts
• Handles both numerical and categorical variables
(transformation needed!)
51. Disadvantages of ANN
• They are deemed to be black-box solutions, lacking
expandability
• It is hard to find optimal values for large number of
network parameters
– Optimal design is still an art: requires expertise and
extensive experimentation
• It is hard to handle large number of variables
(especially the rich nominal attributes)
• Training may take a long time for large datasets;
which may require case sampling
52. ANN Software
• Standalone ANN software tool
– NeuroSolutions
– BrainMaker
– NeuralWare
– NeuroShell, … for more (see pcai.com) …
• Part of a data mining software suit
– PASW (formerly SPSS Clementine)
– SAS Enterprise Miner
– Statistica Data Miner, … many more …
53. Applications-I
• Handwritten Digit Recognition
• Face recognition
• Time series prediction
• Process identification
• Process control
• Optical character recognition
54. Application-II
• Forecasting/Market Prediction: finance and banking
• Manufacturing: quality control, fault diagnosis
• Medicine: analysis of electrocardiogram data, RNA & DNA
sequencing, drug development without animal testing
• Control: process, robotics