SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Application and Trends ofData Mining
Data Mining for Financial Data Analysis Design and construction of data warehouses for multidimensional data analysis and data mining Loan payment prediction and customer credit policy analysis Classification and clustering of customers for targeted marketing Detection of money laundering and other financial crimes Data Mining for the Retail Industry
A few examples of data mining in the retail industry Design and construction of data warehouses based on the benefits of data mining Multidimensional analysis of sales, customers, products, time, and region Analysis of the effectiveness of sales campaigns Customer retention—analysis of customer loyalty Product recommendation and cross-referencing of items
Data Mining for the Telecommunication Industry Multidimensional analysis of telecommunication data Fraudulent pattern analysis and the identification of unusual patterns Multidimensional association and sequential pattern analysis: Mobile telecommunication services Use of visualization tools in telecommunication data analysis
Data Mining for Biological Data Analysis Semantic integration of heterogeneous, distributed genomic and proteomic databases. Alignment, indexing, similarity search, and comparative analysis of multiple nucleotide , protein sequences. Discovery of structural patterns and analysis of genetic networks and protein pathways. Association and path analysis: identifying co-occurring gene sequences and linking genes to different stages of disease development. Visualization tools in genetic data analysis.
Data Mining in Scientific Applications Scientific data can be amassed at much higher speeds and lower costs.  This has resulted in the accumulation of huge volumes of high-dimensional data, stream data, and heterogeneous data, containing rich spatial and temporal information. Scientific applications are shifting from the “hypothesize-and-test” paradigm toward a “collect and store data, mine for new hypotheses, confirm with data or experimentation” process.
Data Mining for Intrusion Detection Development of data mining algorithms for intrusion detection Association and correlation analysis, and aggregation to help select and build discriminating attributes Analysis of stream data Distributed data mining Visualization and querying tools
Trends in Data Mining  Application exploration Scalable and interactive data mining methods Integration of data mining with database systems, data warehouse systems, and Webdatabase systems Standardization of data mining language Visual data mining
Cont.. Biological data mining Data mining and software engineering Web mining Distributed data mining Real-time or time-critical data mining Graph mining, link analysis, and social network analysis
Cont.. Multi relational and multi database data mining New methods for mining complex types of data Privacy protection and information security in data mining
Assessment of a Data mining System Must be based on:     1. Data types2. System issues3. Data sources4. Data mining functions and methodologies.5. Coupling data mining with database and/or data warehouse systems.6. Scalability7. Visualization tools8. Data mining query language and graphical user interface
Theoretical Foundations of Data Mining Data reduction Data compression Pattern discovery Probability theory Microeconomic view Inductive databases
Statistical Data Mining techniques     1. Regression2. Generalized linear model3. Analysis of variance4. mixed effect model5. Factor analysis6. Discriminate analysis7. Time series analysis8. Survival analysis9. Quality control
Visual and Audio Data Mining Visual data mining discovers implicit and useful knowledge from large data sets using data and/or knowledge visualization  Data visualization and data mining can be integrated in the following ways:     Data visualizationData mining result visualizationData mining process visualizationInteractive visual data mining techniques.
Security of Data Mining Data security enhancing techniques have been developed to help protect data.  Databases can employ a multilevel security model to classify and restrict data according to various security levels, with users permitted access to only their authorized level.  Privacy-sensitive data mining deals with obtaining valid data mining results without learning the underlying data values.
Visit more self help tutorials Pick a tutorial of your choice and browse through it at your own pace. The tutorials section is free, self-guiding and will not involve any additional support. Visit us at www.dataminingtools.net

Weitere ähnliche Inhalte

Was ist angesagt?

Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
ankur bhalla
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
smj
 

Was ist angesagt? (20)

Application of data mining
Application of data miningApplication of data mining
Application of data mining
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Mining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and CorrelationsMining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and Correlations
 
Data mining concepts and work
Data mining concepts and workData mining concepts and work
Data mining concepts and work
 
Data Mining: Classification and analysis
Data Mining: Classification and analysisData Mining: Classification and analysis
Data Mining: Classification and analysis
 
Data Mining: What is Data Mining?
Data Mining: What is Data Mining?Data Mining: What is Data Mining?
Data Mining: What is Data Mining?
 
Lecture6 introduction to data streams
Lecture6 introduction to data streamsLecture6 introduction to data streams
Lecture6 introduction to data streams
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Data preprocessing
Data preprocessingData preprocessing
Data preprocessing
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
 
Association rule mining
Association rule miningAssociation rule mining
Association rule mining
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
 
3. mining frequent patterns
3. mining frequent patterns3. mining frequent patterns
3. mining frequent patterns
 
Artificial Neural Networks for Data Mining
Artificial Neural Networks for Data MiningArtificial Neural Networks for Data Mining
Artificial Neural Networks for Data Mining
 
web mining
web miningweb mining
web mining
 
4.2 spatial data mining
4.2 spatial data mining4.2 spatial data mining
4.2 spatial data mining
 
01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data Mining: Association Rules Basics
Data Mining: Association Rules BasicsData Mining: Association Rules Basics
Data Mining: Association Rules Basics
 

Ähnlich wie Data Mining: Application and trends in data mining

Introduction To Data Mining
Introduction To Data MiningIntroduction To Data Mining
Introduction To Data Mining
dataminers.ir
 
Introduction To Data Mining
Introduction To Data Mining   Introduction To Data Mining
Introduction To Data Mining
Phi Jack
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and history
nbaisane16
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
Needa Multani
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptx
ImXaib
 
Data Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical UniversityData Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical University
butest
 

Ähnlich wie Data Mining: Application and trends in data mining (20)

1.3 applications, issues
1.3 applications, issues1.3 applications, issues
1.3 applications, issues
 
1.3 applications, issues
1.3 applications, issues1.3 applications, issues
1.3 applications, issues
 
Data Mining Appliction chapter 5.pdf
Data Mining  Appliction    chapter 5.pdfData Mining  Appliction    chapter 5.pdf
Data Mining Appliction chapter 5.pdf
 
Data mining
Data miningData mining
Data mining
 
Introduction
IntroductionIntroduction
Introduction
 
Data Mining & Applications
Data Mining & ApplicationsData Mining & Applications
Data Mining & Applications
 
Introduction To Data Mining
Introduction To Data MiningIntroduction To Data Mining
Introduction To Data Mining
 
Introduction To Data Mining
Introduction To Data Mining   Introduction To Data Mining
Introduction To Data Mining
 
DM UNIT_5 ppt for btech final year students
DM UNIT_5 ppt for btech final year studentsDM UNIT_5 ppt for btech final year students
DM UNIT_5 ppt for btech final year students
 
Exploring Data Wealth: Data Mining Insights
Exploring Data Wealth: Data Mining InsightsExploring Data Wealth: Data Mining Insights
Exploring Data Wealth: Data Mining Insights
 
Data minig with Big data analysis
Data minig with Big data analysisData minig with Big data analysis
Data minig with Big data analysis
 
Introduction.ppt
Introduction.pptIntroduction.ppt
Introduction.ppt
 
data minig for eng with all topics and history
data minig for eng with all topics and historydata minig for eng with all topics and history
data minig for eng with all topics and history
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Data mining 1
Data mining 1Data mining 1
Data mining 1
 
Generating actionable consumer insights from analytics
Generating actionable consumer insights from analyticsGenerating actionable consumer insights from analytics
Generating actionable consumer insights from analytics
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Trends in DM.pptx
Trends in DM.pptxTrends in DM.pptx
Trends in DM.pptx
 
Data Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical UniversityData Mining Xuequn Shang NorthWestern Polytechnical University
Data Mining Xuequn Shang NorthWestern Polytechnical University
 

Mehr von DataminingTools Inc

Mehr von DataminingTools Inc (20)

Terminology Machine Learning
Terminology Machine LearningTerminology Machine Learning
Terminology Machine Learning
 
Techniques Machine Learning
Techniques Machine LearningTechniques Machine Learning
Techniques Machine Learning
 
Machine learning Introduction
Machine learning IntroductionMachine learning Introduction
Machine learning Introduction
 
Areas of machine leanring
Areas of machine leanringAreas of machine leanring
Areas of machine leanring
 
AI: Planning and AI
AI: Planning and AIAI: Planning and AI
AI: Planning and AI
 
AI: Logic in AI 2
AI: Logic in AI 2AI: Logic in AI 2
AI: Logic in AI 2
 
AI: Logic in AI
AI: Logic in AIAI: Logic in AI
AI: Logic in AI
 
AI: Learning in AI 2
AI: Learning in AI 2AI: Learning in AI 2
AI: Learning in AI 2
 
AI: Learning in AI
AI: Learning in AI AI: Learning in AI
AI: Learning in AI
 
AI: Introduction to artificial intelligence
AI: Introduction to artificial intelligenceAI: Introduction to artificial intelligence
AI: Introduction to artificial intelligence
 
AI: Belief Networks
AI: Belief NetworksAI: Belief Networks
AI: Belief Networks
 
AI: AI & Searching
AI: AI & SearchingAI: AI & Searching
AI: AI & Searching
 
AI: AI & Problem Solving
AI: AI & Problem SolvingAI: AI & Problem Solving
AI: AI & Problem Solving
 
Data Mining: Text and web mining
Data Mining: Text and web miningData Mining: Text and web mining
Data Mining: Text and web mining
 
Data Mining: Outlier analysis
Data Mining: Outlier analysisData Mining: Outlier analysis
Data Mining: Outlier analysis
 
Data Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence dataData Mining: Mining stream time series and sequence data
Data Mining: Mining stream time series and sequence data
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
 
Data Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisData Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysis
 
Data warehouse and olap technology
Data warehouse and olap technologyData warehouse and olap technology
Data warehouse and olap technology
 
Data Mining: Data processing
Data Mining: Data processingData Mining: Data processing
Data Mining: Data processing
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Data Mining: Application and trends in data mining

  • 1. Application and Trends ofData Mining
  • 2. Data Mining for Financial Data Analysis Design and construction of data warehouses for multidimensional data analysis and data mining Loan payment prediction and customer credit policy analysis Classification and clustering of customers for targeted marketing Detection of money laundering and other financial crimes Data Mining for the Retail Industry
  • 3. A few examples of data mining in the retail industry Design and construction of data warehouses based on the benefits of data mining Multidimensional analysis of sales, customers, products, time, and region Analysis of the effectiveness of sales campaigns Customer retention—analysis of customer loyalty Product recommendation and cross-referencing of items
  • 4. Data Mining for the Telecommunication Industry Multidimensional analysis of telecommunication data Fraudulent pattern analysis and the identification of unusual patterns Multidimensional association and sequential pattern analysis: Mobile telecommunication services Use of visualization tools in telecommunication data analysis
  • 5. Data Mining for Biological Data Analysis Semantic integration of heterogeneous, distributed genomic and proteomic databases. Alignment, indexing, similarity search, and comparative analysis of multiple nucleotide , protein sequences. Discovery of structural patterns and analysis of genetic networks and protein pathways. Association and path analysis: identifying co-occurring gene sequences and linking genes to different stages of disease development. Visualization tools in genetic data analysis.
  • 6. Data Mining in Scientific Applications Scientific data can be amassed at much higher speeds and lower costs. This has resulted in the accumulation of huge volumes of high-dimensional data, stream data, and heterogeneous data, containing rich spatial and temporal information. Scientific applications are shifting from the “hypothesize-and-test” paradigm toward a “collect and store data, mine for new hypotheses, confirm with data or experimentation” process.
  • 7. Data Mining for Intrusion Detection Development of data mining algorithms for intrusion detection Association and correlation analysis, and aggregation to help select and build discriminating attributes Analysis of stream data Distributed data mining Visualization and querying tools
  • 8. Trends in Data Mining Application exploration Scalable and interactive data mining methods Integration of data mining with database systems, data warehouse systems, and Webdatabase systems Standardization of data mining language Visual data mining
  • 9. Cont.. Biological data mining Data mining and software engineering Web mining Distributed data mining Real-time or time-critical data mining Graph mining, link analysis, and social network analysis
  • 10. Cont.. Multi relational and multi database data mining New methods for mining complex types of data Privacy protection and information security in data mining
  • 11. Assessment of a Data mining System Must be based on: 1. Data types2. System issues3. Data sources4. Data mining functions and methodologies.5. Coupling data mining with database and/or data warehouse systems.6. Scalability7. Visualization tools8. Data mining query language and graphical user interface
  • 12. Theoretical Foundations of Data Mining Data reduction Data compression Pattern discovery Probability theory Microeconomic view Inductive databases
  • 13. Statistical Data Mining techniques 1. Regression2. Generalized linear model3. Analysis of variance4. mixed effect model5. Factor analysis6. Discriminate analysis7. Time series analysis8. Survival analysis9. Quality control
  • 14. Visual and Audio Data Mining Visual data mining discovers implicit and useful knowledge from large data sets using data and/or knowledge visualization Data visualization and data mining can be integrated in the following ways: Data visualizationData mining result visualizationData mining process visualizationInteractive visual data mining techniques.
  • 15. Security of Data Mining Data security enhancing techniques have been developed to help protect data. Databases can employ a multilevel security model to classify and restrict data according to various security levels, with users permitted access to only their authorized level. Privacy-sensitive data mining deals with obtaining valid data mining results without learning the underlying data values.
  • 16. Visit more self help tutorials Pick a tutorial of your choice and browse through it at your own pace. The tutorials section is free, self-guiding and will not involve any additional support. Visit us at www.dataminingtools.net