Data Mining Chapter 1 Notes
Data Mining Chapter 1 Notes
Welcome Everyone to
Data Mining Course
Course Information
Number of
analysts
From: R. Grossman, C. Kamath, V. Kumar, “Data Mining for Scientific and Engineering Applications”
What is (not) Data Mining?
l Prediction Methods
– Use some variables to predict unknown or
future values of other variables.
l Description Methods
– Find human-interpretable patterns
(correlations, trends, clusters, anomalies) that
summarizes the underlying relationship
between data.
From [Fayyad, et.al.] Advances in Knowledge Discovery and Data Mining, 1996
Data Mining Tasks...
l Classification [Predictive]
l Clustering [Descriptive]
l Association Rule Discovery [Descriptive]
l Sequential Pattern Discovery [Descriptive]
l Regression [Predictive]
l Deviation Detection [Predictive]
Classification: Definition
a a
r ic r ic
u ou
ego ego tin
t t n as
ca ca co c l
l l s s
Test
Set
Learn Model
Training Classifier
Set
Classification: Application 1
l Direct Marketing
– Goal: Reduce cost of mailing by targeting a set of
consumers likely to buy a new cell-phone product.
– Approach:
u Use the data for a similar product introduced before.
u We know which customers decided to buy and which
decided otherwise. This {buy, don’t buy} decision forms the
class attribute.
u Collect various demographic, lifestyle, and company-
interaction related information about all such customers.
– Type of business, where they stay, how much they earn, etc.
u Usethis information as input attributes to learn a classifier
model.
From [Berry & Linoff] Data Mining Techniques, 1997
Classification: Application 2
l Fraud Detection
– Goal: Predict fraudulent cases in credit card
transactions.
– Approach:
u Use credit card transactions and the information on its
account-holder as attributes.
– When does a customer buy, what does he buy, how often he pays on
time, etc
u Label past transactions as fraud or fair transactions. This
forms the class attribute.
u Learn a model for the class of the transactions.
u Use this model to detect fraud by observing credit card
transactions on an account.
Classification: Application 3
l Customer Attrition/Churn:
– Goal: To predict whether a customer is likely to
be lost to a competitor.
– Approach:
u Use detailed record of transactions with each of
the past and present customers, to find attributes.
– How often the customer calls, where he calls, what time-of-the
day he calls most, his financial status, marital status, etc.
u Label the customers as loyal or disloyal.
u Find a model for loyalty.
l Market Segmentation:
– Goal: subdivide a market into distinct subsets of
customers where any subset may conceivably be
selected as a market target to be reached with a
distinct marketing mix.
– Approach:
u Collect different attributes of customers based on their
geographical and lifestyle related information.
u Find clusters of similar customers.
u Measure the clustering quality by observing buying patterns
of customers in same cluster vs. those from different
clusters.
Clustering: Application 2
l Document Clustering:
– Goal: To find groups of documents that are
similar to each other based on the important
terms appearing in them.
– Approach: To identify frequently occurring
terms in each document. Form a similarity
measure based on the frequencies of different
terms. Use it to cluster.
– Gain: Information Retrieval can utilize the
clusters to relate a new document or search
term to clustered documents.
Illustrating Document Clustering
Rules Discovered:
{Milk} --> {Coke}
{Diaper, Milk} --> {Beer}
Association Rule Discovery: Application 1
l Inventory Management:
– Goal: A consumer appliance repair company wants to
anticipate the nature of repairs on its consumer
products and keep the service vehicles equipped with
right parts to reduce on number of visits to consumer
households.
– Approach: Process the data on tools and parts
required in previous repairs at different consumer
locations and discover the co-occurrence patterns.
Sequential Pattern Discovery:
Definition
l Given is a set of objects, with each object associated with its own timeline of
events, find rules that predict strong sequential dependencies among different
events.
(A B) (C) (D E)
– Network Intrusion
Detection
Typical network traffic at University level may reach over 100 million connections per day