Sunday, May 26, 2019
Analysis of Data Mining
ITKM Analysis of Data Mining The article Data Mining by Christopher Clifton analyzed how dissimilar types of information mining techniques have been applied in crime detection and contrasting outcomes. Moreover, the analytic thinking proposed how the diametrical information mining techniques freighter be apply in detection of dissimilar form of frauds. The digest gave the advantages and disadvantages of using data mining in different operation. The major advantage was that data mining enables analysis of too big quantities of data. This is of import since such data cannot be analyzed manually since the data is often complex for humans to understand.However, data mining techniques have been used for double-faced purposes such as inappropriate disclosure of private information. The article analyzed different data mining techniques. Predictive modeling is one such technique used in estimation of particular target attribute. Descriptive modeling was another technique, whic h entails dividing data into groups. The other techniques described include ideal mining used in identification of rules relating to different data pattern and anomaly detection, which entails determining the unusual instances that, may arise when using the different data-mining model. ) What is the title and what was the objective of the bring/analysis) The title of the article was data mining. The article focused on skills in knowledge discovery can be used in analysis of large volumes of data sets. According to the article, data mining was invented about one and a half decades ago due to the advances in artificial intelligence. Discovery of expert system, hereditary algorithms, spooky networks, and machine leaning led to develop ways to adapt these schemes and use them for data mining purposes.Related article What Business Can shoot From Text MiningThe objective of the article was to give a history of data mining, the different types of data mining and the application of dat a mining in different fields such as business, scientific research, as well as by security agents in detection of crimes and terrorist activities (Clifton Web). Regarding the history of data mining, the article utter that data mining was first implemented in credit card fraud detection. The 2) What data mining algorithm was used (i. e. cluster analysis, last tree, neural network, other) and describe the algorithm?The analysis used both decision tree algorithm and clustering algorithm. By using decision tree algorithm, the information regarding data mining techniques was grouped by qualification use of predefined knowledge. The analysis entails description of different crime detection techniques. Moreover, the most appropriate technique for detection of different types of crimes was suggested based on the profitability of using any single technique. Using clustering technique, the data was divided into different groups to obtain certain patterns. Such pattern included classificati on to data mining techniques based on their uses.This was used to develop ways in which the different techniques can be applied in business (Clifton Web). 3) What was the outcome of the analysis, and how did it benefit the business, if there was a benefit? The analysis identified the various data mining techniques, their applications, strengths and weaknesses. The analysis was important to the business world. For example, the analysis on use of data mining in detection of credit card fraud identified the challenges involved on the process. This was crucial since it gave insights on how different techniques can be developed to make data mining more effective in credit card fraud detection.Another reason why the analysis was important to the business world was that it analyzed the different data mining approaches such as predictive modeling, descriptive modeling, pattern mining, and anomaly detection. The analysis explained how the different techniques work. Moreover, the analysis was crucial since it provided insights on how different techniques can be used in detection of fraud crime in different types of business transaction. Moreover, it highlighted the blemish on the different techniques. This is crucial since it provided intuitions on areas that can be improved to make the techniques more effective (Clifton Web).An additional reason why the analysis was important is that it pinpointed the issues that arise when using data mining techniques in fraud detection. One such issue is privacy concern. This was crucial since it gave insights on how the business world can continue using data mining techniques to combat crime without risking loss of reputation. Moreover, the companies can use data mining for fraud detection crimes while making less error such as those of biasness (Clifton Web). Conclusion Data mining has undergone modification with technological advancement. Data mining play a great post in enabling detection of problems such as frauds.This is beca use it enables analysis of large and complex quantities of data. In the article about data mining, Clifton used both decision tree and cluster analysis to assess the different types of data mining. By using decision tree, the author group data mining based on the techniques used. By using clustering, the data was grouped to obtain certain patterns. The analysis was important to business world since it provided insights on how the different data mining techniques work. whole shebang Cited Clifton, Christopher. data mining . Encyclopedia Bratanicca (n. d. ) 1-3. Web. .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.