SlideShare a Scribd company logo
CmpE 274 –Business Intelligence  Technologies.
Jinal Shah (ID-005242095) Sohel Dadia (ID-005177251) Ankit Khera (ID-005226495)  Riddhi shah(ID-005359513) Vivek  Modi(Id-005208581) Parth Vora  (ID-005169100)
--Knowledge Discovery?? --KDD Process --Data Mining Algorithms --Different forms of Mining Models --Classification of Algorithms --Weka --DEMO -- Questions??????
It is a process of searching knowledge from data and it focuses on the high level application of various data mining methods. It main goal is  mining information from raw data in the context of large databases. It makes use of different  data mining algorithms to extract information.
KDD is used in machine learning, pattern-recognition, databases , AI, MIS  and lot of other applications. It does the transformation according to the measures and thresholds.  It also takes in to account the preprocessing, sub-sampling, and transformation of the database if required.
1. Data Cleaning  2. Data Integration 3. Data Selection 4. Data transformation 5. Data Mining  6. Pattern Evaluation 7. Knowledge Presentation
 
The data mining algorithm is the mechanism that creates mining models.  To create a model, an algorithm first analyzes a set of data, looking for specific patterns and trends. The algorithm then uses the results of this analysis to define the parameters of the mining model.
Decision Trees and Rules Non-linear regression and classification Methods Example-based Methods Probabilistic Graphical Dependency Models Relational Learning Models
A set of rules that describe how products are grouped together in a transaction. A decision tree that predicts whether a particular customer will buy a product. A mathematical model that forecasts sales. A set of clusters that describe how the cases in a dataset are related.
Classification algorithms  predict one or more discrete variables, based on the other attributes in the dataset.  Regression algorithms  predict one or more continuous variables, such as profit or loss, based on other attributes in the dataset.  Segmentation algorithms  divide data into groups, or clusters, of items that have similar properties.
Association algorithms  find correlations between different attributes in a dataset. The most common application of this kind of algorithm is for creating association rules, which can be used in a market basket analysis.  Sequence analysis algorithms  summarize frequent sequences or episodes in data, such as a Web path flow.
Apriori Algorithm :-  is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers, or details of a website frequentation).  Apriori uses breadth-first search and a hash tree structure to count candidate item sets efficiently.
What is Weka ? Weka is a collection of machine learning algorithms for data mining tasks. Why Weka ? Open Source. The algorithms can either be applied directly to a dataset or called from your own Java code.
It  contains tools for data pre-processing, classification, regression, clustering, association rules, and visualization. It is also well-suited for developing new machine learning schemes.
Java 1.4 (or later) is required to run Weka 3.4.x and older versions. The developer versions, starting with 3.5.3, also require Java 5.0. Platform : Windows/ Linux
 
 
 
 
http://www.cs.waikato.ac.nz/ml/weka/ http://msdn2.microsoft.com/En-US/library/ms175595.aspx http://en.wikipedia.org/wiki/Apriori_algorithm Text book “Data Mining” by Jiawei Han and Micheline Kamber
 
Ad

More Related Content

What's hot (20)

01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.01 Data Mining: Concepts and Techniques, 2nd ed.
01 Data Mining: Concepts and Techniques, 2nd ed.
Institute of Technology Telkom
 
multi dimensional data model
multi dimensional data modelmulti dimensional data model
multi dimensional data model
moni sindhu
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
3 Data Mining Tasks
3  Data Mining Tasks3  Data Mining Tasks
3 Data Mining Tasks
Mahmoud Alfarra
 
Mining Association Rules in Large Database
Mining Association Rules in Large DatabaseMining Association Rules in Large Database
Mining Association Rules in Large Database
Er. Nawaraj Bhandari
 
Language for specifying lexical Analyzer
Language for specifying lexical AnalyzerLanguage for specifying lexical Analyzer
Language for specifying lexical Analyzer
Archana Gopinath
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database system
philipsinter
 
data generalization and summarization
data generalization and summarization data generalization and summarization
data generalization and summarization
janani thirupathi
 
Data Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubeyData Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubey
Ankita Dubey
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
Avnish Patel
 
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
sumithragunasekaran
 
Kdd process
Kdd processKdd process
Kdd process
Rajesh Chandra
 
Text data mining1
Text data mining1Text data mining1
Text data mining1
KU Leuven
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbms
RituBhargava7
 
Text MIning
Text MIningText MIning
Text MIning
Prakhyath Rai
 
Web Mining & Text Mining
Web Mining & Text MiningWeb Mining & Text Mining
Web Mining & Text Mining
Hemant Sharma
 
Storage system architecture
Storage system architectureStorage system architecture
Storage system architecture
Christalin Nelson
 
multi dimensional data model
multi dimensional data modelmulti dimensional data model
multi dimensional data model
moni sindhu
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
Mining Association Rules in Large Database
Mining Association Rules in Large DatabaseMining Association Rules in Large Database
Mining Association Rules in Large Database
Er. Nawaraj Bhandari
 
Language for specifying lexical Analyzer
Language for specifying lexical AnalyzerLanguage for specifying lexical Analyzer
Language for specifying lexical Analyzer
Archana Gopinath
 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
 
Fundamentals of Database system
Fundamentals of Database systemFundamentals of Database system
Fundamentals of Database system
philipsinter
 
data generalization and summarization
data generalization and summarization data generalization and summarization
data generalization and summarization
janani thirupathi
 
Data Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubeyData Warehouses & Deployment By Ankita dubey
Data Warehouses & Deployment By Ankita dubey
Ankita Dubey
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
Avnish Patel
 
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...
sumithragunasekaran
 
Text data mining1
Text data mining1Text data mining1
Text data mining1
KU Leuven
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 
File systems versus a dbms
File systems versus a dbmsFile systems versus a dbms
File systems versus a dbms
RituBhargava7
 
Web Mining & Text Mining
Web Mining & Text MiningWeb Mining & Text Mining
Web Mining & Text Mining
Hemant Sharma
 

Viewers also liked (20)

Segmentación
Segmentación Segmentación
Segmentación
laury2295
 
American Academy Cerftifcate1
American Academy Cerftifcate1American Academy Cerftifcate1
American Academy Cerftifcate1
Elaf Al Taha
 
Propiedad civil y propiedad agraria modificado
Propiedad civil y propiedad agraria modificadoPropiedad civil y propiedad agraria modificado
Propiedad civil y propiedad agraria modificado
Millalaidelis
 
áLbum de fotografías de viryz!!
áLbum de fotografías de viryz!!áLbum de fotografías de viryz!!
áLbum de fotografías de viryz!!
angela maldonado
 
Marilin del Carmen Lopez
Marilin del Carmen LopezMarilin del Carmen Lopez
Marilin del Carmen Lopez
Marilin del Carmen Lopez
 
Nh
NhNh
Nh
miguel alejandro navarro tovar
 
การกำหนดมาตรฐานการศึกษาของสถานศึกษา
การกำหนดมาตรฐานการศึกษาของสถานศึกษาการกำหนดมาตรฐานการศึกษาของสถานศึกษา
การกำหนดมาตรฐานการศึกษาของสถานศึกษา
worapanthewaha
 
essential newborn care
essential newborn careessential newborn care
essential newborn care
Bernadette Corral
 
सुबह व शाम उसकी पाकी बयान करो
सुबह व शाम उसकी पाकी बयान करोसुबह व शाम उसकी पाकी बयान करो
सुबह व शाम उसकी पाकी बयान करो
FAHIM AKTHAR ULLAL
 
Comala Unamaravilla
Comala UnamaravillaComala Unamaravilla
Comala Unamaravilla
Vive Colima
 
Social Studies Web Sites & Technology
Social Studies Web Sites & TechnologySocial Studies Web Sites & Technology
Social Studies Web Sites & Technology
Glenn Wiebe
 
Prevencion de los trastornos de la conducta alimenticia
Prevencion de los trastornos de la conducta alimenticiaPrevencion de los trastornos de la conducta alimenticia
Prevencion de los trastornos de la conducta alimenticia
Gabriela Calva Hernandez
 
Rethinking SQL for Big Data with Apache Drill
Rethinking SQL for Big Data with Apache DrillRethinking SQL for Big Data with Apache Drill
Rethinking SQL for Big Data with Apache Drill
MapR Technologies
 
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
CIALCA
 
Czytelniczo językowa impreza dla fanów książki „igrzyska...
Czytelniczo językowa impreza dla fanów książki                      „igrzyska...Czytelniczo językowa impreza dla fanów książki                      „igrzyska...
Czytelniczo językowa impreza dla fanów książki „igrzyska...
bibliotekaszkolnag3
 
Modeling the operation of a general insurance company with system dynamics ap...
Modeling the operation of a general insurance company with system dynamics ap...Modeling the operation of a general insurance company with system dynamics ap...
Modeling the operation of a general insurance company with system dynamics ap...
Peyman Haghighattalab
 
6.2.15 Christa Evans Rogers Resume
6.2.15 Christa Evans Rogers Resume 6.2.15 Christa Evans Rogers Resume
6.2.15 Christa Evans Rogers Resume
Christa Evans Rogers
 
Next greatest generation 2011
Next greatest generation 2011Next greatest generation 2011
Next greatest generation 2011
Glenn Wiebe
 
Los tainos, primeros pobladores de las Antillas Mayores
Los tainos, primeros pobladores de las Antillas Mayores Los tainos, primeros pobladores de las Antillas Mayores
Los tainos, primeros pobladores de las Antillas Mayores
rosam24
 
Segmentación
Segmentación Segmentación
Segmentación
laury2295
 
American Academy Cerftifcate1
American Academy Cerftifcate1American Academy Cerftifcate1
American Academy Cerftifcate1
Elaf Al Taha
 
Propiedad civil y propiedad agraria modificado
Propiedad civil y propiedad agraria modificadoPropiedad civil y propiedad agraria modificado
Propiedad civil y propiedad agraria modificado
Millalaidelis
 
áLbum de fotografías de viryz!!
áLbum de fotografías de viryz!!áLbum de fotografías de viryz!!
áLbum de fotografías de viryz!!
angela maldonado
 
การกำหนดมาตรฐานการศึกษาของสถานศึกษา
การกำหนดมาตรฐานการศึกษาของสถานศึกษาการกำหนดมาตรฐานการศึกษาของสถานศึกษา
การกำหนดมาตรฐานการศึกษาของสถานศึกษา
worapanthewaha
 
सुबह व शाम उसकी पाकी बयान करो
सुबह व शाम उसकी पाकी बयान करोसुबह व शाम उसकी पाकी बयान करो
सुबह व शाम उसकी पाकी बयान करो
FAHIM AKTHAR ULLAL
 
Comala Unamaravilla
Comala UnamaravillaComala Unamaravilla
Comala Unamaravilla
Vive Colima
 
Social Studies Web Sites & Technology
Social Studies Web Sites & TechnologySocial Studies Web Sites & Technology
Social Studies Web Sites & Technology
Glenn Wiebe
 
Prevencion de los trastornos de la conducta alimenticia
Prevencion de los trastornos de la conducta alimenticiaPrevencion de los trastornos de la conducta alimenticia
Prevencion de los trastornos de la conducta alimenticia
Gabriela Calva Hernandez
 
Rethinking SQL for Big Data with Apache Drill
Rethinking SQL for Big Data with Apache DrillRethinking SQL for Big Data with Apache Drill
Rethinking SQL for Big Data with Apache Drill
MapR Technologies
 
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
Kimaru-Muchai - Communication Channels used in dissemination of soil fertilit...
CIALCA
 
Czytelniczo językowa impreza dla fanów książki „igrzyska...
Czytelniczo językowa impreza dla fanów książki                      „igrzyska...Czytelniczo językowa impreza dla fanów książki                      „igrzyska...
Czytelniczo językowa impreza dla fanów książki „igrzyska...
bibliotekaszkolnag3
 
Modeling the operation of a general insurance company with system dynamics ap...
Modeling the operation of a general insurance company with system dynamics ap...Modeling the operation of a general insurance company with system dynamics ap...
Modeling the operation of a general insurance company with system dynamics ap...
Peyman Haghighattalab
 
6.2.15 Christa Evans Rogers Resume
6.2.15 Christa Evans Rogers Resume 6.2.15 Christa Evans Rogers Resume
6.2.15 Christa Evans Rogers Resume
Christa Evans Rogers
 
Next greatest generation 2011
Next greatest generation 2011Next greatest generation 2011
Next greatest generation 2011
Glenn Wiebe
 
Los tainos, primeros pobladores de las Antillas Mayores
Los tainos, primeros pobladores de las Antillas Mayores Los tainos, primeros pobladores de las Antillas Mayores
Los tainos, primeros pobladores de las Antillas Mayores
rosam24
 
Ad

Similar to Knowledge Discovery Using Data Mining (20)

Introducing new AIOps innovations in Oracle 19c - San Jose AICUG
Introducing new AIOps innovations in Oracle 19c - San Jose AICUGIntroducing new AIOps innovations in Oracle 19c - San Jose AICUG
Introducing new AIOps innovations in Oracle 19c - San Jose AICUG
Sandesh Rao
 
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET Journal
 
Data Mining with SQL Server 2008
Data Mining with SQL Server 2008Data Mining with SQL Server 2008
Data Mining with SQL Server 2008
Peter Gfader
 
UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
Nandakumar P
 
DATA WAREHOUSING AND DATA MINING (R18A0524).pdf
DATA WAREHOUSING AND DATA MINING (R18A0524).pdfDATA WAREHOUSING AND DATA MINING (R18A0524).pdf
DATA WAREHOUSING AND DATA MINING (R18A0524).pdf
subapacet
 
Data Mining methodology
 Data Mining methodology  Data Mining methodology
Data Mining methodology
rebeccatho
 
1) Introduction to Data Analyticszz.pptx
1) Introduction to Data Analyticszz.pptx1) Introduction to Data Analyticszz.pptx
1) Introduction to Data Analyticszz.pptx
PrajwalAuti
 
Azure Machine Learning
Azure Machine LearningAzure Machine Learning
Azure Machine Learning
Mostafa
 
Nose Dive into Apache Spark ML
Nose Dive into Apache Spark MLNose Dive into Apache Spark ML
Nose Dive into Apache Spark ML
Ahmet Bulut
 
MS SQL SERVER: Introduction To Datamining Suing Sql Server
MS SQL SERVER: Introduction To Datamining Suing Sql ServerMS SQL SERVER: Introduction To Datamining Suing Sql Server
MS SQL SERVER: Introduction To Datamining Suing Sql Server
sqlserver content
 
MS Sql Server: Introduction To Datamining Suing Sql Server
MS Sql Server: Introduction To Datamining Suing Sql ServerMS Sql Server: Introduction To Datamining Suing Sql Server
MS Sql Server: Introduction To Datamining Suing Sql Server
DataminingTools Inc
 
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ NewyorksysWhat is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
NEWYORKSYS-IT SOLUTIONS
 
Data science technology overview
Data science technology overviewData science technology overview
Data science technology overview
Soojung Hong
 
data mining lecture notes for btech students+
data mining lecture notes for btech students+data mining lecture notes for btech students+
data mining lecture notes for btech students+
mrsam3062
 
Data Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture NotesData Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture Notes
FellowBuddy.com
 
Data Mining based on Hashing Technique
Data Mining based on Hashing TechniqueData Mining based on Hashing Technique
Data Mining based on Hashing Technique
ijtsrd
 
Data mining
Data miningData mining
Data mining
heba_ahmad
 
data mining
data miningdata mining
data mining
manasa polu
 
Data meets AI - AICUG - Santa Clara
Data meets AI  - AICUG - Santa ClaraData meets AI  - AICUG - Santa Clara
Data meets AI - AICUG - Santa Clara
Sandesh Rao
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
Sandeep Garg
 
Introducing new AIOps innovations in Oracle 19c - San Jose AICUG
Introducing new AIOps innovations in Oracle 19c - San Jose AICUGIntroducing new AIOps innovations in Oracle 19c - San Jose AICUG
Introducing new AIOps innovations in Oracle 19c - San Jose AICUG
Sandesh Rao
 
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
IRJET Journal
 
Data Mining with SQL Server 2008
Data Mining with SQL Server 2008Data Mining with SQL Server 2008
Data Mining with SQL Server 2008
Peter Gfader
 
UNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data MiningUNIT - 1 Part 2: Data Warehousing and Data Mining
UNIT - 1 Part 2: Data Warehousing and Data Mining
Nandakumar P
 
DATA WAREHOUSING AND DATA MINING (R18A0524).pdf
DATA WAREHOUSING AND DATA MINING (R18A0524).pdfDATA WAREHOUSING AND DATA MINING (R18A0524).pdf
DATA WAREHOUSING AND DATA MINING (R18A0524).pdf
subapacet
 
Data Mining methodology
 Data Mining methodology  Data Mining methodology
Data Mining methodology
rebeccatho
 
1) Introduction to Data Analyticszz.pptx
1) Introduction to Data Analyticszz.pptx1) Introduction to Data Analyticszz.pptx
1) Introduction to Data Analyticszz.pptx
PrajwalAuti
 
Azure Machine Learning
Azure Machine LearningAzure Machine Learning
Azure Machine Learning
Mostafa
 
Nose Dive into Apache Spark ML
Nose Dive into Apache Spark MLNose Dive into Apache Spark ML
Nose Dive into Apache Spark ML
Ahmet Bulut
 
MS SQL SERVER: Introduction To Datamining Suing Sql Server
MS SQL SERVER: Introduction To Datamining Suing Sql ServerMS SQL SERVER: Introduction To Datamining Suing Sql Server
MS SQL SERVER: Introduction To Datamining Suing Sql Server
sqlserver content
 
MS Sql Server: Introduction To Datamining Suing Sql Server
MS Sql Server: Introduction To Datamining Suing Sql ServerMS Sql Server: Introduction To Datamining Suing Sql Server
MS Sql Server: Introduction To Datamining Suing Sql Server
DataminingTools Inc
 
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ NewyorksysWhat is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
What is OLAP -Data Warehouse Concepts - IT Online Training @ Newyorksys
NEWYORKSYS-IT SOLUTIONS
 
Data science technology overview
Data science technology overviewData science technology overview
Data science technology overview
Soojung Hong
 
data mining lecture notes for btech students+
data mining lecture notes for btech students+data mining lecture notes for btech students+
data mining lecture notes for btech students+
mrsam3062
 
Data Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture NotesData Mining & Data Warehousing Lecture Notes
Data Mining & Data Warehousing Lecture Notes
FellowBuddy.com
 
Data Mining based on Hashing Technique
Data Mining based on Hashing TechniqueData Mining based on Hashing Technique
Data Mining based on Hashing Technique
ijtsrd
 
Data meets AI - AICUG - Santa Clara
Data meets AI  - AICUG - Santa ClaraData meets AI  - AICUG - Santa Clara
Data meets AI - AICUG - Santa Clara
Sandesh Rao
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
Sandeep Garg
 
Ad

Recently uploaded (20)

Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 

Knowledge Discovery Using Data Mining

  • 1. CmpE 274 –Business Intelligence Technologies.
  • 2. Jinal Shah (ID-005242095) Sohel Dadia (ID-005177251) Ankit Khera (ID-005226495) Riddhi shah(ID-005359513) Vivek Modi(Id-005208581) Parth Vora (ID-005169100)
  • 3. --Knowledge Discovery?? --KDD Process --Data Mining Algorithms --Different forms of Mining Models --Classification of Algorithms --Weka --DEMO -- Questions??????
  • 4. It is a process of searching knowledge from data and it focuses on the high level application of various data mining methods. It main goal is mining information from raw data in the context of large databases. It makes use of different data mining algorithms to extract information.
  • 5. KDD is used in machine learning, pattern-recognition, databases , AI, MIS and lot of other applications. It does the transformation according to the measures and thresholds. It also takes in to account the preprocessing, sub-sampling, and transformation of the database if required.
  • 6. 1. Data Cleaning 2. Data Integration 3. Data Selection 4. Data transformation 5. Data Mining 6. Pattern Evaluation 7. Knowledge Presentation
  • 7.  
  • 8. The data mining algorithm is the mechanism that creates mining models. To create a model, an algorithm first analyzes a set of data, looking for specific patterns and trends. The algorithm then uses the results of this analysis to define the parameters of the mining model.
  • 9. Decision Trees and Rules Non-linear regression and classification Methods Example-based Methods Probabilistic Graphical Dependency Models Relational Learning Models
  • 10. A set of rules that describe how products are grouped together in a transaction. A decision tree that predicts whether a particular customer will buy a product. A mathematical model that forecasts sales. A set of clusters that describe how the cases in a dataset are related.
  • 11. Classification algorithms predict one or more discrete variables, based on the other attributes in the dataset. Regression algorithms predict one or more continuous variables, such as profit or loss, based on other attributes in the dataset. Segmentation algorithms divide data into groups, or clusters, of items that have similar properties.
  • 12. Association algorithms find correlations between different attributes in a dataset. The most common application of this kind of algorithm is for creating association rules, which can be used in a market basket analysis. Sequence analysis algorithms summarize frequent sequences or episodes in data, such as a Web path flow.
  • 13. Apriori Algorithm :- is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers, or details of a website frequentation). Apriori uses breadth-first search and a hash tree structure to count candidate item sets efficiently.
  • 14. What is Weka ? Weka is a collection of machine learning algorithms for data mining tasks. Why Weka ? Open Source. The algorithms can either be applied directly to a dataset or called from your own Java code.
  • 15. It contains tools for data pre-processing, classification, regression, clustering, association rules, and visualization. It is also well-suited for developing new machine learning schemes.
  • 16. Java 1.4 (or later) is required to run Weka 3.4.x and older versions. The developer versions, starting with 3.5.3, also require Java 5.0. Platform : Windows/ Linux
  • 17.  
  • 18.  
  • 19.  
  • 20.  
  • 22.