SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 12 (August 2012), PP. 48-52


             Mining Techniques Used for Financial Organization
                                                   Sonika Jalhotra
                       Persuing Mtech From Subharti Institute of Technology & Engineering, Meerut



Abstract––With the increase of database applications in banking system, mining interesting information from huge
database becomes of most concern. As we know, the data processed in data mining may be obtained from many sources
in which different data types may be used. In this work we will concern the data types used in banks and various data
mining methods. Our main focus is to make Mining effective by selection of an appropriate data mining method for
different data types used in banking system. In this work four kinds of data forms for data mining and three kinds of data
mining techniques are discussed. A Data type generalization process is proposed. Using the data type generalization
process, the user can direct to the goal of application.

Keywords––Data mining, knowledge discovery database, data type forms, data mining technique.

                                              I.        INTRODUCTION
          In recent years, Banks contain amount of historical data, transactional data and relational data. Automated data
generation and gathering leads to tremendous amounts of data stored in bank’s database but we have lack of ability to extract
proper knowledge from the database. Data Mining is the automated discovery of non trivial, previously unknown, and
potentially useful knowledge embedded in database. The types of data stored in database restrict the choice of data mining
methods. In this paper we will retrieve knowledge from different type of data stored in database by using appropriate data
mining techniques.

                                             II.       RELATED WORK
          The fact is data is no use until and unless the knowledge is extracted out from it and data mining is the only way to
discover hidden knowledge from massive amount of data. In this paper we proposed a concept of effective data mining by
using appropriate data mining techniques on different types of data stored in database. Data Mining is the process of
discovering new correlations, patterns, and trends by digging into large amounts of data stored in database(warehouse).In
summary the whole process of data mining is known as KDD( Knowledge Discovery in Databases). KDD is a synonym of
data mining which comprises of three stages.
         The understanding of business and data.
         Performing the pre-process tasks.
         Data mining and reporting.

The whole process of data mining is the so-called KDD as shown in figure 1.




                            Figure 1: The KDD process and the role of data types generalization.



                                                             48
Mining Techniques Used for Financial Organization

We solve data mining problem with data transformation. Data types transformation must based on the selected data mining
method. The target of doing data transformation is to make the specified data set suitable for the organizations. The flow of
solving data mining problem with doing data transformation is shown in Figure2




Figure 2: Solving data mining problems with data transformation data types transformation must based on the selected data
                                                     mining method

    III.      ANALYSIS OF THE PROBLEM WITH DATA TYPES DURING THE MINING
           In recent years due to the rapid growth of database applications data mining techniques become more important.
So we introduced the concept of data mining methods but it is difficult to choose a data mining method to fetch data from the
data warehouse without prior knowledge of data types stored in data warehouse. This depends on the characteristics of the
data to be mined and the kind of knowledge to be found through the data mining process. Characteristics of the data focused
on the relationship of data with other data stored in database and its attributes which contribute in mining process. In
financial firms we deal with different kinds of data, each data mining technique is not suitable for the variety of data types
stored in database of these firms. So this paper focus on this problem which can adversely affect on the productivity,
performance of a financial firm if not considered properly. We now illustrate the analysis as follows.

Four kinds of data forms for data mining used in financial organizations
          Banks or Financial firms generally deal with data forms in textual, temporal, transactional, relational forms.
Different kinds of data forms are used to store different kinds of data types. We describe each kind of data forms in the
following:
     (1) Textual data forms: Textual data forms are used to represent text or documents. This kind of data forms can be
          seen as a set of characters with huge amount.
     (2) Temporal data forms: Temporal data forms are used to represent historical data (data that varies with time).
     (3) Transactional data forms: Transactions done by user such as with draw of money, transfer of money from one
          account to other etc. can be stored in transactional data forms.
     (4) Relational data forms: Relational data forms are the most widely used data forms. The basic units of relational data
          forms are relations (tables). Relations are composed of attributes, and each of which can be different data type.

Three kinds of data mining techniques cover all the data types used in financial firms
          A bank or financial firm can provide good and effective result if they use appropriate mining technique for the data
stored in database. This provides quality in work and extraction of knowledge stored in database within time limit given to
an organization. Effectiveness of data mining technique is based on the characteristics of the data to be mined and the
knowledge user try to find out, which can be divided into three kinds of techniques for a financial firm. Each data mining
technique is used for particular data type which description is given in following points:

(1) Multilevel data generalization, summarization, and characterization :
           Generalization is a process which abstract large set of relevant data in a database from a low conceptual level to
relatively high ones.

                                                             49
Mining Techniques Used for Financial Organization

           For example Data and objects in databases often contain detailed information at primitive concept levels. For
example, the customer relation in bank database may contain attributes describing low-level customer information such as
customer name, account number,, address, customer age, customer address etc. It is useful to be able to summarize a large
set or data and present it at a high conceptual level. This is also shown in figure 3




                         Figure 3 represents generalization of customer relation at conceptual level

           Knowledge to be provided: This technique observes the data stored in database with a higher view. For example
certain rules made by banks such as a time period to pay installment money for a policy or for opening new account user’s
id proof etc.
Appropriate data type: It is applied to relational databases which contain data in the form of tables.

(2) Mining association rules
          In data mining, association rule learning is used to discover interesting relations between variables in large
databases. For example if a customer want to take loan from a bank then he must also has an account on the branch of that
bank (customer must has account number)
This association is represented as
{Customer, loan} → {account number}
Association rule mining does not consider the order of attributes either within a transaction or across transaction.

Example database with 4 attributes and 4 transactions
  Transaction id            Loan number             id                      Time period to pay         Bank name
  1                         0                       1                       0                          1
  2                         1                       0                       0                          1
  3                         1                       1                       0                          1
  4                         1                       1                       1                          1

Problem of association rule mining is defined as : let I= {i1,i2,i3……….in} be a set of n binary attributes used in
association.
Let D={t1,t2,t3…….tn} be a set of transactions. Each transaction in D contains a unique transaction ID and contains a subset
of the attributes in l. A rule is defined as the implication of the form                         where                   and
                  .The set of items (for short item sets) X and Y are called antecedent and consequent of the rule
respectively.
Knowledge to be provided: This technique is used to find out the associations between items from a huge amount of
transactions.
Most Suitable data type: It is usually applied to transactional data forms.

(3) Pattern based approach
           Here we focus on how to enable the reuse of existing solutions that have been proven to be successful using Meta
process. This Meta process describes the steps needed to use a pattern for a given business process. Figure 5 visualizes the
Meta process and its steps. The First task is to define the business objectives of the application. After that a data mining
pattern is selected that matches with these business objectives. Then, the tasks of the selected pattern are specified to the
executable level according to a given specification is chosen. If it is observed that the pattern cannot be specified as
executable, the meta-process steps back to the task of choosing a new pattern.




                                                            50
Mining Techniques Used for Financial Organization

                   Figure 4: The meta-process for applying a process pattern to a given business process.




          Example-an employee of a company placing an order to another company which is owned by himself. This is done
by computing a similarity between employees and company owners based on several features such as name, address or bank
accounts. We do not go into more details of the data mining method, as this is not important for understanding our pattern
approach. Basically what is needed to apply this data mining solution to a problem is to first check if the problem is a
procurement fraud problem, second to specify which features to be used for the similarity, and third to connect the inputs and
outputs of the data mining process. For all other steps ready-to-use code is already available.

                                       Figure 5: An example of a data mining pattern




          Fig. 5 shows an example of a pattern for this approach to procurement fraud detection. In the top pool
Requirements the pre-requirements for applying this pattern are modeled. This includes checking the data mining goal
(procurement fraud detection) and the data format as well as sending data, receiving the result and sending labeled data. The
other pools Data Mining Classification, Data Mining Model Building and Data Mining contain the (partially already
specified executable) tasks of the data mining process and the respective services.

Knowledge to be provided: This technique is used to find out the pattern in database similar to the pattern in hand. It can be
divided into two kinds: text similarity search and time-series similarity search.

Most Suitable data type: Textual data forms are suitable for text similarity search and temporal data forms are suitable for
time-series similarity search.
          Concluding remarks: In this paper, we mentioned the fact that none of data mining technique can be applied to all
kinds of data types. To increase the effectiveness of an financial organization we discuss the data types used in an
organization and appropriate method to mine that data properly from the data warehouse of financial organization.

                                                    REFERENCES
  [1].    Hornick, M.F., Marcade, E., Venkayala, S.: Java Data Mining: Strategy, Standard, and Practice. Morgan
          Kaufmann, San Francisco (2006)
  [2].    Wegener, D., R•uping, S.: On Integrating Data Mining into Business Processes. In: Proc. of the 13th International
          Conference on Business Information Systems. LNBIP, vol. 47, pp. 183-194, Springer (2010)
  [3].     Codd E. F., “Providing OLAP to user-analysts : An IT mandate”, Technical Report, E.F. Codd and Asso-ciates,
          1993.

                                                             51
Mining Techniques Used for Financial Organization

[4].   Bhandari I., “Attribute Focusing: Data mining for the layman”, Research Report RC 20136, IBM T.J Watson
       Research Center.
[5].   Marban, O. Segovia, J., Menasalvas, E., Fernandez-Baizan, C.: Toward data mining engineering: A software
       engineering approach. Information Systems 34 (1) (2009)
[6].   Data       Modeling        Fundamentals:      A       Practical       Guide  for      IT      Professionals
       By Paulraj Ponniah
[7].   Atwood, D.: BPM Process Patterns: Repeatable Design for BPM Process Models. BPTrends, May (2006)
[8].   R•uping, S., Punko, N., G•unter, B., Grosskreutz, H.: Procurement Fraud Discovery using Similarity Measure
       Learning. In: Transactions on Case-based Reasoning, 1(1), pp. 37-46 (2008)




                                                      52

More Related Content

What's hot

RESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWRESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWieijjournal
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET Journal
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesijctet
 
What is Data mining? Data mining Presentation
What is Data mining? Data mining Presentation What is Data mining? Data mining Presentation
What is Data mining? Data mining Presentation Pralhad Rijal
 
Introduction to Data Mining for Newbies
Introduction to Data Mining for NewbiesIntroduction to Data Mining for Newbies
Introduction to Data Mining for NewbiesEunjeong (Lucy) Park
 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath YogiTekendra Nath Yogi
 
Using data mining in e commerce
Using data mining in e commerceUsing data mining in e commerce
Using data mining in e commerceshahabhossen
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsIJECEIAES
 
Data Mining on Twitter
Data Mining on TwitterData Mining on Twitter
Data Mining on TwitterPulkit Goyal
 
BIM Data Mining Unit2 by Tekendra Nath Yogi
 BIM Data Mining Unit2 by Tekendra Nath Yogi BIM Data Mining Unit2 by Tekendra Nath Yogi
BIM Data Mining Unit2 by Tekendra Nath YogiTekendra Nath Yogi
 

What's hot (16)

Data Mining
Data MiningData Mining
Data Mining
 
RESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEWRESEARCH IN BIG DATA – AN OVERVIEW
RESEARCH IN BIG DATA – AN OVERVIEW
 
Abstract
AbstractAbstract
Abstract
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
A literature review of modern association rule mining techniques
A literature review of modern association rule mining techniquesA literature review of modern association rule mining techniques
A literature review of modern association rule mining techniques
 
What is Data mining? Data mining Presentation
What is Data mining? Data mining Presentation What is Data mining? Data mining Presentation
What is Data mining? Data mining Presentation
 
Introduction to Data Mining for Newbies
Introduction to Data Mining for NewbiesIntroduction to Data Mining for Newbies
Introduction to Data Mining for Newbies
 
Data Mining and Its Application in Library and Information Science
Data Mining and Its Application in Library and Information ScienceData Mining and Its Application in Library and Information Science
Data Mining and Its Application in Library and Information Science
 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath Yogi
 
Using data mining in e commerce
Using data mining in e commerceUsing data mining in e commerce
Using data mining in e commerce
 
Mining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ RequestsMining the Web Data for Classifying and Predicting Users’ Requests
Mining the Web Data for Classifying and Predicting Users’ Requests
 
Lecture 04 data resource management
Lecture 04 data resource managementLecture 04 data resource management
Lecture 04 data resource management
 
Data Mining on Twitter
Data Mining on TwitterData Mining on Twitter
Data Mining on Twitter
 
Mam assign
Mam assignMam assign
Mam assign
 
Data mining
Data miningData mining
Data mining
 
BIM Data Mining Unit2 by Tekendra Nath Yogi
 BIM Data Mining Unit2 by Tekendra Nath Yogi BIM Data Mining Unit2 by Tekendra Nath Yogi
BIM Data Mining Unit2 by Tekendra Nath Yogi
 

Viewers also liked

Mozambican Experiences with Disaster Risk Reduction & Climate Change Adaptation
Mozambican Experiences with Disaster Risk Reduction & Climate Change AdaptationMozambican Experiences with Disaster Risk Reduction & Climate Change Adaptation
Mozambican Experiences with Disaster Risk Reduction & Climate Change AdaptationGlobal Risk Forum GRFDavos
 
Experiences of working for improving state of community based disaster prepar...
Experiences of working for improving state of community based disaster prepar...Experiences of working for improving state of community based disaster prepar...
Experiences of working for improving state of community based disaster prepar...Global Risk Forum GRFDavos
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Biotechnology GT survey 2011 Australia
Biotechnology GT survey 2011 AustraliaBiotechnology GT survey 2011 Australia
Biotechnology GT survey 2011 AustraliaGrant Thornton
 
Capacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceCapacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceGlobal Risk Forum GRFDavos
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141Kimmo Kolmonen
 
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...Grant Thornton
 
Continuing operations in a modern and efficient manner
Continuing operations in a modern and efficient mannerContinuing operations in a modern and efficient manner
Continuing operations in a modern and efficient mannerGlobal Risk Forum GRFDavos
 
Human settlement indices for bushfire risk in Australia
Human settlement indices for bushfire risk in AustraliaHuman settlement indices for bushfire risk in Australia
Human settlement indices for bushfire risk in AustraliaGlobal Risk Forum GRFDavos
 
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Global Risk Forum GRFDavos
 
Temporal and geographical variation of geo-hydrological risk to the populatio...
Temporal and geographical variation of geo-hydrological risk to the populatio...Temporal and geographical variation of geo-hydrological risk to the populatio...
Temporal and geographical variation of geo-hydrological risk to the populatio...Global Risk Forum GRFDavos
 
Keynote technicals daily report for 050912
Keynote technicals   daily report for 050912Keynote technicals   daily report for 050912
Keynote technicals daily report for 050912Keynote Capitals Ltd.
 
왕무 갤러리
왕무 갤러리왕무 갤러리
왕무 갤러리인호 서
 
Cheap meat never makes a good soup.
Cheap meat never makes a good soup.Cheap meat never makes a good soup.
Cheap meat never makes a good soup.Rhea Myers
 
Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Global Risk Forum GRFDavos
 
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดน
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดนสังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดน
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดนKraJeab Vickie
 
A promise is a cloud; fulfillment is rain.
A promise is a cloud; fulfillment is rain.A promise is a cloud; fulfillment is rain.
A promise is a cloud; fulfillment is rain.Rhea Myers
 

Viewers also liked (19)

Mozambican Experiences with Disaster Risk Reduction & Climate Change Adaptation
Mozambican Experiences with Disaster Risk Reduction & Climate Change AdaptationMozambican Experiences with Disaster Risk Reduction & Climate Change Adaptation
Mozambican Experiences with Disaster Risk Reduction & Climate Change Adaptation
 
Experiences of working for improving state of community based disaster prepar...
Experiences of working for improving state of community based disaster prepar...Experiences of working for improving state of community based disaster prepar...
Experiences of working for improving state of community based disaster prepar...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Biotechnology GT survey 2011 Australia
Biotechnology GT survey 2011 AustraliaBiotechnology GT survey 2011 Australia
Biotechnology GT survey 2011 Australia
 
Capacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological ResilienceCapacity Building for Social-Ecological Resilience
Capacity Building for Social-Ecological Resilience
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Proje Aciklamalari
Proje AciklamalariProje Aciklamalari
Proje Aciklamalari
 
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141
MarkkinointiviestintäsuunnitelmaKimmoKolmonen12006141
 
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...
Grant Thornton Business insight survey - 2012 Ireland "Food: the secret ingre...
 
Continuing operations in a modern and efficient manner
Continuing operations in a modern and efficient mannerContinuing operations in a modern and efficient manner
Continuing operations in a modern and efficient manner
 
Human settlement indices for bushfire risk in Australia
Human settlement indices for bushfire risk in AustraliaHuman settlement indices for bushfire risk in Australia
Human settlement indices for bushfire risk in Australia
 
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
Centre for Natural Disaster Science (CNDS) – a strategic Swedish initiative f...
 
Temporal and geographical variation of geo-hydrological risk to the populatio...
Temporal and geographical variation of geo-hydrological risk to the populatio...Temporal and geographical variation of geo-hydrological risk to the populatio...
Temporal and geographical variation of geo-hydrological risk to the populatio...
 
Keynote technicals daily report for 050912
Keynote technicals   daily report for 050912Keynote technicals   daily report for 050912
Keynote technicals daily report for 050912
 
왕무 갤러리
왕무 갤러리왕무 갤러리
왕무 갤러리
 
Cheap meat never makes a good soup.
Cheap meat never makes a good soup.Cheap meat never makes a good soup.
Cheap meat never makes a good soup.
 
Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...
 
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดน
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดนสังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดน
สังคมศึกษาศาสนาและวัฒนธรรม ม.1 เสียดินแดน
 
A promise is a cloud; fulfillment is rain.
A promise is a cloud; fulfillment is rain.A promise is a cloud; fulfillment is rain.
A promise is a cloud; fulfillment is rain.
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Business Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxBusiness Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxRupaRani28
 
notes_dmdw_chap1.docx
notes_dmdw_chap1.docxnotes_dmdw_chap1.docx
notes_dmdw_chap1.docxAbshar Fatima
 
Characterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesCharacterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesIJTET Journal
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope IJCSEIT Journal
 
6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data miningINFOGAIN PUBLICATION
 
Association rule visualization technique
Association rule visualization techniqueAssociation rule visualization technique
Association rule visualization techniquemustafasmart
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.ijceronline
 
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIESA SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIESIJCSES Journal
 
What is Data Mining.pdf
What is Data Mining.pdfWhat is Data Mining.pdf
What is Data Mining.pdfchanduvarma019
 
TTG Int.LTD Data Mining Technique
TTG Int.LTD Data Mining TechniqueTTG Int.LTD Data Mining Technique
TTG Int.LTD Data Mining TechniqueMehmet Beyaz
 
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKING
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKINGTHE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKING
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKINGcsijjournal
 
data mining and data warehousing
data mining and data warehousingdata mining and data warehousing
data mining and data warehousingSunny Gandhi
 
Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligencechirag patil
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...IRJET Journal
 
Data Mining @ Information Age
Data Mining @ Information AgeData Mining @ Information Age
Data Mining @ Information AgeIIRindia
 
Data Mining – A Perspective Approach
Data Mining – A Perspective ApproachData Mining – A Perspective Approach
Data Mining – A Perspective ApproachIRJET Journal
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Seminar Report Vaibhav
Seminar Report VaibhavSeminar Report Vaibhav
Seminar Report Vaibhav
 
Business Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptxBusiness Intelligence and Analytics Unit-2 part-A .pptx
Business Intelligence and Analytics Unit-2 part-A .pptx
 
notes_dmdw_chap1.docx
notes_dmdw_chap1.docxnotes_dmdw_chap1.docx
notes_dmdw_chap1.docx
 
Data Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope SurveyData Mining Applications And Feature Scope Survey
Data Mining Applications And Feature Scope Survey
 
Characterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining TechniquesCharacterizing and Processing of Big Data Using Data Mining Techniques
Characterizing and Processing of Big Data Using Data Mining Techniques
 
The Survey of Data Mining Applications And Feature Scope
The Survey of Data Mining Applications  And Feature Scope The Survey of Data Mining Applications  And Feature Scope
The Survey of Data Mining Applications And Feature Scope
 
6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining6 ijaems sept-2015-6-a review of data security primitives in data mining
6 ijaems sept-2015-6-a review of data security primitives in data mining
 
Association rule visualization technique
Association rule visualization techniqueAssociation rule visualization technique
Association rule visualization technique
 
Data mining
Data miningData mining
Data mining
 
An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.An Comprehensive Study of Big Data Environment and its Challenges.
An Comprehensive Study of Big Data Environment and its Challenges.
 
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIESA SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
 
What is Data Mining.pdf
What is Data Mining.pdfWhat is Data Mining.pdf
What is Data Mining.pdf
 
I1802055259
I1802055259I1802055259
I1802055259
 
TTG Int.LTD Data Mining Technique
TTG Int.LTD Data Mining TechniqueTTG Int.LTD Data Mining Technique
TTG Int.LTD Data Mining Technique
 
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKING
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKINGTHE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKING
THE EFFECTIVENESS OF DATA MINING TECHNIQUES IN BANKING
 
data mining and data warehousing
data mining and data warehousingdata mining and data warehousing
data mining and data warehousing
 
Data mining and business intelligence
Data mining and business intelligenceData mining and business intelligence
Data mining and business intelligence
 
New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...New approaches of Data Mining for the Internet of things with systems: Litera...
New approaches of Data Mining for the Internet of things with systems: Litera...
 
Data Mining @ Information Age
Data Mining @ Information AgeData Mining @ Information Age
Data Mining @ Information Age
 
Data Mining – A Perspective Approach
Data Mining – A Perspective ApproachData Mining – A Perspective Approach
Data Mining – A Perspective Approach
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 12 (August 2012), PP. 48-52 Mining Techniques Used for Financial Organization Sonika Jalhotra Persuing Mtech From Subharti Institute of Technology & Engineering, Meerut Abstract––With the increase of database applications in banking system, mining interesting information from huge database becomes of most concern. As we know, the data processed in data mining may be obtained from many sources in which different data types may be used. In this work we will concern the data types used in banks and various data mining methods. Our main focus is to make Mining effective by selection of an appropriate data mining method for different data types used in banking system. In this work four kinds of data forms for data mining and three kinds of data mining techniques are discussed. A Data type generalization process is proposed. Using the data type generalization process, the user can direct to the goal of application. Keywords––Data mining, knowledge discovery database, data type forms, data mining technique. I. INTRODUCTION In recent years, Banks contain amount of historical data, transactional data and relational data. Automated data generation and gathering leads to tremendous amounts of data stored in bank’s database but we have lack of ability to extract proper knowledge from the database. Data Mining is the automated discovery of non trivial, previously unknown, and potentially useful knowledge embedded in database. The types of data stored in database restrict the choice of data mining methods. In this paper we will retrieve knowledge from different type of data stored in database by using appropriate data mining techniques. II. RELATED WORK The fact is data is no use until and unless the knowledge is extracted out from it and data mining is the only way to discover hidden knowledge from massive amount of data. In this paper we proposed a concept of effective data mining by using appropriate data mining techniques on different types of data stored in database. Data Mining is the process of discovering new correlations, patterns, and trends by digging into large amounts of data stored in database(warehouse).In summary the whole process of data mining is known as KDD( Knowledge Discovery in Databases). KDD is a synonym of data mining which comprises of three stages.  The understanding of business and data.  Performing the pre-process tasks.  Data mining and reporting. The whole process of data mining is the so-called KDD as shown in figure 1. Figure 1: The KDD process and the role of data types generalization. 48
  • 2. Mining Techniques Used for Financial Organization We solve data mining problem with data transformation. Data types transformation must based on the selected data mining method. The target of doing data transformation is to make the specified data set suitable for the organizations. The flow of solving data mining problem with doing data transformation is shown in Figure2 Figure 2: Solving data mining problems with data transformation data types transformation must based on the selected data mining method III. ANALYSIS OF THE PROBLEM WITH DATA TYPES DURING THE MINING In recent years due to the rapid growth of database applications data mining techniques become more important. So we introduced the concept of data mining methods but it is difficult to choose a data mining method to fetch data from the data warehouse without prior knowledge of data types stored in data warehouse. This depends on the characteristics of the data to be mined and the kind of knowledge to be found through the data mining process. Characteristics of the data focused on the relationship of data with other data stored in database and its attributes which contribute in mining process. In financial firms we deal with different kinds of data, each data mining technique is not suitable for the variety of data types stored in database of these firms. So this paper focus on this problem which can adversely affect on the productivity, performance of a financial firm if not considered properly. We now illustrate the analysis as follows. Four kinds of data forms for data mining used in financial organizations Banks or Financial firms generally deal with data forms in textual, temporal, transactional, relational forms. Different kinds of data forms are used to store different kinds of data types. We describe each kind of data forms in the following: (1) Textual data forms: Textual data forms are used to represent text or documents. This kind of data forms can be seen as a set of characters with huge amount. (2) Temporal data forms: Temporal data forms are used to represent historical data (data that varies with time). (3) Transactional data forms: Transactions done by user such as with draw of money, transfer of money from one account to other etc. can be stored in transactional data forms. (4) Relational data forms: Relational data forms are the most widely used data forms. The basic units of relational data forms are relations (tables). Relations are composed of attributes, and each of which can be different data type. Three kinds of data mining techniques cover all the data types used in financial firms A bank or financial firm can provide good and effective result if they use appropriate mining technique for the data stored in database. This provides quality in work and extraction of knowledge stored in database within time limit given to an organization. Effectiveness of data mining technique is based on the characteristics of the data to be mined and the knowledge user try to find out, which can be divided into three kinds of techniques for a financial firm. Each data mining technique is used for particular data type which description is given in following points: (1) Multilevel data generalization, summarization, and characterization : Generalization is a process which abstract large set of relevant data in a database from a low conceptual level to relatively high ones. 49
  • 3. Mining Techniques Used for Financial Organization For example Data and objects in databases often contain detailed information at primitive concept levels. For example, the customer relation in bank database may contain attributes describing low-level customer information such as customer name, account number,, address, customer age, customer address etc. It is useful to be able to summarize a large set or data and present it at a high conceptual level. This is also shown in figure 3 Figure 3 represents generalization of customer relation at conceptual level Knowledge to be provided: This technique observes the data stored in database with a higher view. For example certain rules made by banks such as a time period to pay installment money for a policy or for opening new account user’s id proof etc. Appropriate data type: It is applied to relational databases which contain data in the form of tables. (2) Mining association rules In data mining, association rule learning is used to discover interesting relations between variables in large databases. For example if a customer want to take loan from a bank then he must also has an account on the branch of that bank (customer must has account number) This association is represented as {Customer, loan} → {account number} Association rule mining does not consider the order of attributes either within a transaction or across transaction. Example database with 4 attributes and 4 transactions Transaction id Loan number id Time period to pay Bank name 1 0 1 0 1 2 1 0 0 1 3 1 1 0 1 4 1 1 1 1 Problem of association rule mining is defined as : let I= {i1,i2,i3……….in} be a set of n binary attributes used in association. Let D={t1,t2,t3…….tn} be a set of transactions. Each transaction in D contains a unique transaction ID and contains a subset of the attributes in l. A rule is defined as the implication of the form where and .The set of items (for short item sets) X and Y are called antecedent and consequent of the rule respectively. Knowledge to be provided: This technique is used to find out the associations between items from a huge amount of transactions. Most Suitable data type: It is usually applied to transactional data forms. (3) Pattern based approach Here we focus on how to enable the reuse of existing solutions that have been proven to be successful using Meta process. This Meta process describes the steps needed to use a pattern for a given business process. Figure 5 visualizes the Meta process and its steps. The First task is to define the business objectives of the application. After that a data mining pattern is selected that matches with these business objectives. Then, the tasks of the selected pattern are specified to the executable level according to a given specification is chosen. If it is observed that the pattern cannot be specified as executable, the meta-process steps back to the task of choosing a new pattern. 50
  • 4. Mining Techniques Used for Financial Organization Figure 4: The meta-process for applying a process pattern to a given business process. Example-an employee of a company placing an order to another company which is owned by himself. This is done by computing a similarity between employees and company owners based on several features such as name, address or bank accounts. We do not go into more details of the data mining method, as this is not important for understanding our pattern approach. Basically what is needed to apply this data mining solution to a problem is to first check if the problem is a procurement fraud problem, second to specify which features to be used for the similarity, and third to connect the inputs and outputs of the data mining process. For all other steps ready-to-use code is already available. Figure 5: An example of a data mining pattern Fig. 5 shows an example of a pattern for this approach to procurement fraud detection. In the top pool Requirements the pre-requirements for applying this pattern are modeled. This includes checking the data mining goal (procurement fraud detection) and the data format as well as sending data, receiving the result and sending labeled data. The other pools Data Mining Classification, Data Mining Model Building and Data Mining contain the (partially already specified executable) tasks of the data mining process and the respective services. Knowledge to be provided: This technique is used to find out the pattern in database similar to the pattern in hand. It can be divided into two kinds: text similarity search and time-series similarity search. Most Suitable data type: Textual data forms are suitable for text similarity search and temporal data forms are suitable for time-series similarity search. Concluding remarks: In this paper, we mentioned the fact that none of data mining technique can be applied to all kinds of data types. To increase the effectiveness of an financial organization we discuss the data types used in an organization and appropriate method to mine that data properly from the data warehouse of financial organization. REFERENCES [1]. Hornick, M.F., Marcade, E., Venkayala, S.: Java Data Mining: Strategy, Standard, and Practice. Morgan Kaufmann, San Francisco (2006) [2]. Wegener, D., R•uping, S.: On Integrating Data Mining into Business Processes. In: Proc. of the 13th International Conference on Business Information Systems. LNBIP, vol. 47, pp. 183-194, Springer (2010) [3]. Codd E. F., “Providing OLAP to user-analysts : An IT mandate”, Technical Report, E.F. Codd and Asso-ciates, 1993. 51
  • 5. Mining Techniques Used for Financial Organization [4]. Bhandari I., “Attribute Focusing: Data mining for the layman”, Research Report RC 20136, IBM T.J Watson Research Center. [5]. Marban, O. Segovia, J., Menasalvas, E., Fernandez-Baizan, C.: Toward data mining engineering: A software engineering approach. Information Systems 34 (1) (2009) [6]. Data Modeling Fundamentals: A Practical Guide for IT Professionals By Paulraj Ponniah [7]. Atwood, D.: BPM Process Patterns: Repeatable Design for BPM Process Models. BPTrends, May (2006) [8]. R•uping, S., Punko, N., G•unter, B., Grosskreutz, H.: Procurement Fraud Discovery using Similarity Measure Learning. In: Transactions on Case-based Reasoning, 1(1), pp. 37-46 (2008) 52