Coupled Behavior Analysis with Applications

Size: px
Start display at page:

Download "Coupled Behavior Analysis with Applications"

Transcription

1 Coupled Behavior Analysis with Applications Professor Longbing Cao ( 操 龙 兵 ) Director, Advanced Analytics Institute University of Technology Sydney, Australia www-staff.it.uts.edu.au/~lbcao

2 Agenda Why coupled behaviors? What is behavior? What are coupled behaviors? What is coupled behavior analysis (CBA)? Combined mining for high-impact behavior analysis Coupled HiddenMarkov Model-based abnormal behavior analysis Open issues and prospects

3 Why Coupled Behaviors?

4 An example Why does this stock go so crazily?

5 Short-term manipulation behaviors as cause Behavior exterior presentation Possible behavior interior driver

6 Behaviors of associated accounts as the driver of the price movement Group behaviors Group behavior interior-driven price movement

7 What makes multiple behaviors different? Key factors: Multiple actors Multiple behaviors Multiple properties Coupling relationships Organizational factors

8 How are CB handled by existing techniques? Behavior exterior analysis Time series analysis Multiple time series analysis Behavior interior analysis Frequent pattern mining Sequence analysis Coupled sequence analysis

9 Coupledbehaviors are ubiquitous Relevant projects in UTS Advanced Analytics Institute Insurance business analytics Public service business analytics Education student analytics Investment business analytics Banking business analytics Financial business analytics

10 What is Behavior? Longbing Cao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,

11 Abstract Behavior Model

12 An abstract behavior model Demographics and circumstancesof behavioral subjects and objects Associates of a behavior may form into certain behavior sequences or network; Social behavioral network consists of sequences of behaviors that are organized in terms of certain social relationships or norms. Impact, costs, risk and trust of behavior/behavior network

13 Behavior Visual Descriptor Intra-relationships within Behavior

14 Vector-oriented behavior pattern analysis Behavior performer: Subject (s), action (a), time (t), place (w) Social information: Object (o), context (e), constraints (c), associations (m) Intentional information: Subject s: goal (g), belief (b), plan (l) Behavior performance: Impact (f), status (u) New methods for vector-based behavior pattern analysis

15 Behavioral data Behavioral elements hidden or dispersed in transactional data behavioral feature space Behavioral data modeling Behavioral feature space Mapping from transactional to behavioral data Behavioral data processing Behavioral data transformation

16 Behavior informatics Concept Map Behavior Representation & Reasoning Behavior Learning & Mining

17 Behavior learning/mining process

18 What is Coupled Behavior? Longbing Cao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,

19 Relationship crossing behaviors

20 Coupling relationships From temporal aspect From inferential aspect From combinational aspect From party aspect

21 Basic Behavior Patterns Tracing: Different actions with sequential order. { a a a },,, n 1 2 Consequence: Different actions have causalities in occurrence. { ai a j } Synchronization: Different actions occur at the same time. {,, } a1 a n Combination: Different actions occur in concurrency. { a1 a,, 2 an}

22 Exclusion: Different actions occur mutually exclusively. { a a a } 1 2,, { ai a j} n Precedence: Different actions have required precedence And more to be explored Sequential Combination Parallel Combination Nested Combination Fuzzy or probabilistic Combination A B C A B C

23 What is the Coupled Behavior Analysis (CBA) problem? LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Application, IEEE Trans. Knowledge and Data Engineering. LongbingCao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,

24 Customer behaviors Customer a i snbehaviors B i : {b i1, b i2,,b in } M customers behaviors B 1 : {b 11, b 12,,b 1n } B 2 : {b 21, b 22,,b 2n } B m : {b m1, b m2,,b mn }

25 Behavior Feature Matrix

26 Behavior Intra-relationship

27 Behavior Inter-relationship

28 Behavior Relationship

29 Behavior Behavior Analysis

30 An Example of Stock Market Transactional Data Behavior Feature Matrix B1 B2 B3 B4 B5 B6 B7 B8

31 Existing approaches M customers behaviors B 1 : {sell, buy} B 2 : {buy, sell, sell} B 3 : {buy} B 4 : {buy} B 5 : {buy}

32 Complex behavior pattern analysis (sell,sell_price,volume_small,long_interval,non-frequent) % (sell,sell_price,volume_small,long_interval,non-frequent) (action_other,price_other,volume_other,interval_other,nonfrequent) % (buy_withdraw,price_other,withdraw_part,short_withdraw interval,non-frequent) % (action_other,price_other,volume_other,interval_other,non-frequent) % (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (buy_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,short_withdraw interval,non-frequent) % (buy,buy_price_lastor buy_price_limitor buy_price_sell,volume_small,long_interval,non-frequent) % (buy,buy_price_lastor buy_price_limitor buy_price_sell,volume_small,long_interval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (sell,sell_price,volume_small,long_interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (sell_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) %

33 Hierarchical clustering analysis

34 Combined Pattern Mining for High Impact Behavior Analysis Longbing Cao, Huaifeng Zhang, Yanchang Zhao, Dan Luo, Chengqi Zhang. Combined Mining: Discovering Informative Knowledge in Complex Data, accepted by IEEE Trans. SMC Part B LongbingCao. Zhao Y., Zhang, C. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , 2008.

35 Combined Pattern Pairs A combined rule pair is composed of two contrasting rules. For customers with same characteristics U, different policies/campaigns, V 1 and V 2, can result in different outcomes, T 1 and T 2.

36 Interestingness of Pattern Pairs

37 Combined Pattern Clusters Based on a combined rule pair, related combined rules can be organized into a cluster to supplement more information to the rule pair. The rules in cluster C have the same U but different V, which makes them associated with various results T.

38 Interestingness of Rule Pair/Cluster dist(): the dissimilarity between the descendants of R 1 and R 2 The interestingness of combined rule pair/cluster is decided by both the interestingness of rules and the most contrasting rules within the pair/cluster. A cluster made of contrasting confident rules is interesting, because it explains why different results occur and what can be done to produce an expected result or avoid an undesirable consequence.

39 Extended Combined Pattern Pairs

40 Conditional P-S ratio

41 Extended Combined Pattern Clusters

42 Impact

43 Combined Demographics + Behavior Analysis Longbing Cao, Huaifeng Zhang, Yanchang Zhao, Dan Luo, Chengqi Zhang. Combined Mining: Discovering Informative Knowledge in Complex Data, IEEE Trans. SMC Part B. Longbing Cao. Zhao Y., Zhang, C. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , Yanchang Zhao, Huaifeng Zhang, Longbing Cao Chengqi Zhang. Combined Pattern Mining: from Learned Rules to Actionable Knowledge, Australian AI2008.

44 Combined Pattern Mining Type A: Demographics differentiated combined pattern Customerswith the same actionsbut different demographics different classes/business impact

45 Combined Pattern Mining Type B: Actiondifferentiatedcombined pattern Customerswith the same demographicsbut taking different actions different classes/business impact

46 There were 7,711 association rules before removing redundancy of combined rules. After removing redundancy of combined rules, 2,601 rules were left, which built up 734 combined rule clusters. After removing redundancy of combined rule clusters, 98 rule clusters with 235 rules remained, which was within the capability of human beings to read.

47

48 Behavior 1 Behavior 2 Demographic 1 Low value High value Demographic 2 High value Low value

49 An Example of Extended Combined Pattern Cluster

50 Identifying high impact behavior in behavior evolution

51 Coupled Hidden Markov Model- based Abnormal Coupled Behavior Analysis LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Application, IEEE Trans. Knowledge and Data Engineering. Cao, L., OuY, Yu PS, Wei G. Detecting Abnormal Coupled Sequences and Sequence Changes in Group-based Manipulative Trading Behaviors, KDD2010.

52 Pool manipulation

53 Coupled behavior analysis

54 Construct behaviorsequences Data structure 1:

55 Data structure 2:

56 CHMM Based Coupled Sequence Modeling Coupled behavior sequences Multiple sequences Coupling relationship Behavior properties

57 CBA -CHMM

58 Framework: abnormal CBA

59

60

61 CHMM model:

62 Adaptive CHMM for Detecting Sequence Changes

63 The Algorithms

64

65 Benchmark Models HMM-B: Buy-based HMM HMM-S: Sell-based HMM HMM-T: Trade-based HMM IHMM: HMM-B + HMM-S + HMM-T CHMM: CHMM(buy, sell, trade) ACHMM: Adaptive CHMM(buy, sell, trade)

66 Evaluation Technical performance Business performance

67

68 Business Performance

69 Computational cost N-heads dynamic programming

70 Prospects

71 Sequence analysis Frequent Pattern mining Impact-oriented: - Positive - Negative - Multi-level level - Mixed - Evolution Coupled behavior analysis Group Behavior Pattern mining Event detection Community discovery

72 Novel Behavior Pattern Mining Semi-supervised coupled behavior analysis 1: Coupling relationship analysis 2: coupling-oriented Pattern mining

73 Behavior Informatics-SIG: 73 Cao, L: BI at DDDM2008 Joint with ICDM2008

74 References LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Applications, accepted by IEEE Trans. on Knowledge and Data Engineering. LongbingCao, HuaifengZhang, YanchangZhao, Dan Luo, ChengqiZhang. Combined Mining: Discovering Informative Knowledge in Complex Data, accepted by IEEE Trans. SMC Part B LongbingCao, YumingOu, Philip S YU, Gang Wei. Detecting Abnormal Coupled Sequences and Sequence Changes in Group-based Manipulative Trading Behaviors, KDD2010, LongbingCao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); , 2010 LongbingCao, YanchangZhao, ChengqiZhang. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , 2008

75 Thank you for your attention Longbing Cao www-staff.it.uts.edu.au/~lbcao

Activity Mining: Challenges and Prospects *

Activity Mining: Challenges and Prospects * Activity Mining: Challenges and Prospects * Longbing Cao Faculty of Information Technology, University of Technology Sydney, Australia lbcao@it.uts.edu.au Abstract. Activity data accumulated in real life,

More information

J.N.V.R.Swarup kumar $1 A.Tejaswi $1 G.Srinivas $2 Ajay kumar #3 $1

J.N.V.R.Swarup kumar $1 A.Tejaswi $1 G.Srinivas $2 Ajay kumar #3 $1 CRM System Using UI-AKD Approach of D 3 M J.N.V.R.Swarup kumar $1 A.Tejaswi $1 G.Srinivas $2 Ajay kumar #3 $1 Dept. of Information Technology, GITAM University, Visakhapatnam. $2 Asst.Prof, Dept. of Information

More information

Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation

Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation Yuming Ou, Longbing Cao, Chao Luo, and Chengqi Zhang Faculty of Information Technology, University of Technology, Sydney,

More information

Market Microstructure Patterns Powering Trading and Surveillance Agents

Market Microstructure Patterns Powering Trading and Surveillance Agents Market Microstructure Patterns Powering Trading and Surveillance Agents Longbing Cao (University of Technology, Sydney, Australia lbcao@it.uts.edu.au) Yuming Ou (University of Technology, Sydney, Australia

More information

THINK.CHANGE.DO. Professor Longbing CAO. Director, Advanced Analytics Institute University of Technology Sydney

THINK.CHANGE.DO. Professor Longbing CAO. Director, Advanced Analytics Institute University of Technology Sydney THINK.CHANGE.DO Professor Longbing CAO Director, Advanced Analytics Institute University of Technology Sydney References LongbingCao. Combined Mining: Analyzing Object and Pattern Relations for Discovering

More information

Graph-based Coupled Behavior Analysis: A Case Study on Detecting Collaborative Manipulations in Stock Markets

Graph-based Coupled Behavior Analysis: A Case Study on Detecting Collaborative Manipulations in Stock Markets WCCI 212 IEEE World Congress on Computational Intelligence June, 1-15, 212 - Brisbane, Australia IJCNN Graph-based Coupled Behavior Analysis: A Case Study on Detecting Collaborative Manipulations in Stock

More information

Non-IIDness Learning in Behavioral and Social Data

Non-IIDness Learning in Behavioral and Social Data The Computer Journal Advance Access published August 22, 2013 The British Computer Society 2013. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxt084

More information

MULTI AGENT-BASED DISTRIBUTED DATA MINING

MULTI AGENT-BASED DISTRIBUTED DATA MINING MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:

More information

Behavior Grouping based on Trajectories Mining. Department of Medical Informatics Shimane University, School of Medicine, Japan

Behavior Grouping based on Trajectories Mining. Department of Medical Informatics Shimane University, School of Medicine, Japan Behavior Grouping based on Trajectories Mining Shoji Hirano Shusaku Tsumoto Department of Medical Informatics Shimane University, School of Medicine, Japan 1 Introduction Outline Background, Objective,

More information

CRM System Using PA-AKD Approach of D 3 M

CRM System Using PA-AKD Approach of D 3 M CRM System Using PA-AKD Approach of D 3 M Ajay kumar #1 A.Tejaswi $2 Lakshmi Prasad Koyi &3 G.Narasinga Rao $4 S.Srinivasa Rao Illapu *5 #1 Asst.Prof, Dept of CSE/IT, Dronacharya College of Engg, Greater

More information

An Empirical Study of Application of Data Mining Techniques in Library System

An Empirical Study of Application of Data Mining Techniques in Library System An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani

More information

Investigating Clinical Care Pathways Correlated with Outcomes

Investigating Clinical Care Pathways Correlated with Outcomes Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges

More information

Introduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI

Introduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI Introduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI Yudho Giri Sucahyo, Ph.D, CISA (yudho@cs.ui.ac.id) Faculty of Computer Science, University of Indonesia Objectives

More information

Data Mining in Financial Markets and an Open Enterprise Infrastructure

Data Mining in Financial Markets and an Open Enterprise Infrastructure Data Mining in Financial Markets and an Open Enterprise Infrastructure Supporting Trading & Mining Chengqi Zhang, Longbing Cao, Jiaqi Wang, Li Lin, Jiarui Ni, Wanli Chen E-Intelligence Group at FIT, UTS

More information

International Workshop on Big Data Analytics for Advanced Databases (BIGDATA, 2016)

International Workshop on Big Data Analytics for Advanced Databases (BIGDATA, 2016) International Workshop on Big Data Analytics for Advanced Databases (BIGDATA, 2016) Call for Papers AIM and SCOPE There is an exponential growth in digital data with unprecedented new platforms derived

More information

OLAP and Data Mining. Data Warehousing and End-User Access Tools. Introducing OLAP. Introducing OLAP

OLAP and Data Mining. Data Warehousing and End-User Access Tools. Introducing OLAP. Introducing OLAP Data Warehousing and End-User Access Tools OLAP and Data Mining Accompanying growth in data warehouses is increasing demands for more powerful access tools providing advanced analytical capabilities. Key

More information

Customer Relationship Management System with USCM-AKD Approach of D 3 M

Customer Relationship Management System with USCM-AKD Approach of D 3 M Customer Relationship Management System with USCM-AKD Approach of D 3 M Ch. Raja Ramesh*, Kolusu Naga Prasad**, Hari Hara Pavan Kumar Bhuravarjula**, VVD Naveen Krishna** *Associate. Prof., Dept. of Computer

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

A Risk Management System Framework for New Product Development (NPD)

A Risk Management System Framework for New Product Development (NPD) 2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong

More information

Introduction to UTS/OLT Educational Data Mining Projects. Prof. Longbing Cao Director, Advanced Analytics Institute

Introduction to UTS/OLT Educational Data Mining Projects. Prof. Longbing Cao Director, Advanced Analytics Institute Introduction to UTS/OLT Educational Data Mining Projects Prof. Longbing Cao Director, Advanced Analytics Institute Outline Introduction to Educational Data Mining (EDM) IEEE Task Force OLT & UTS LT Projects

More information

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.

More information

Towards a Big Data Taxonomy. Bill Mandrick, PhD Data Tactics Version 26_August_2013

Towards a Big Data Taxonomy. Bill Mandrick, PhD Data Tactics Version 26_August_2013 Towards a Big Data Taxonomy Bill Mandrick, PhD Data Tactics Version 26_August_2013 Scientific Taxonomies Represent Types of Processes Types of Objects Physical Objects Information Artifacts Types of Characteristics

More information

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.

Federico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation. Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and

More information

Making confident decisions with the full spectrum of analysis capabilities

Making confident decisions with the full spectrum of analysis capabilities IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Intelligent Stock Market Assistant using Temporal Data Mining

Intelligent Stock Market Assistant using Temporal Data Mining Intelligent Stock Market Assistant using Temporal Data Mining Gerasimos Marketos 1, Konstantinos Pediaditakis 2, Yannis Theodoridis 1, and Babis Theodoulidis 2 1 Database Group, Information Systems Laboratory,

More information

Improvements In Clustering Using Affinity Propagation: A Review

Improvements In Clustering Using Affinity Propagation: A Review Journal of Multidisciplinary Engineering Science and Technology (JMEST) Improvements In Clustering Using Affinity Propagation: A Review Aniket Bombatkar Dept. of Computer Engineering Sinhgad Institute

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Model-Based Cluster Analysis for Web Users Sessions

Model-Based Cluster Analysis for Web Users Sessions Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece gpallis@ccf.auth.gr

More information

1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM)

1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM) 1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM) 2. Gene regulation tools and methods Regulatory sequences and motif discovery TF binding sites, microrna target prediction

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Association Rule Mining: Exercises and Answers

Association Rule Mining: Exercises and Answers Association Rule Mining: Exercises and Answers Contains both theoretical and practical exercises to be done using Weka. The exercises are part of the DBTech Virtual Workshop on KDD and BI. Exercise 1.

More information

Agent Services-Based Infrastructure for Online Assessment of Trading Strategies

Agent Services-Based Infrastructure for Online Assessment of Trading Strategies Agent Services-Based Infrastructure for Online Assessment of Trading Strategies Longbing Cao, Jiaqi Wang, Li Lin, Chengqi Zhang Faculty of Information Technology, University of Technology Sydney, Australia

More information

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining

Lluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining a.k.a. Data Mining II Office 319, Omega, BCN EET, office 107, TR 2, Terrassa avellido@lsi.upc.edu skype, gtalk: avellido Tels.:

More information

INNOVATION. KDD-2012 Success

INNOVATION. KDD-2012 Success INNOVATION NEWSLETTER June 2012 Issue 1 In this issue: INNOVATION KDD-2012 Success IBM Fellowship Success Student Analytics System New book: Behavior Computing, Springer COLLABORATION Policy Suggestions

More information

A Special Session on. Handling Uncertainties in Big Data by Fuzzy Systems

A Special Session on. Handling Uncertainties in Big Data by Fuzzy Systems A Special Session on Handling Uncertainties in Big Data by Fuzzy Systems organized by Jie Lu, Cheng-Ting Lin, Farookh Khadeer Hussain, Vahid Behbood, Guangquan Zhang Description The volume, variety, velocity,

More information

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland

Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data

More information

Chapter 5. Warehousing, Data Acquisition, Data. Visualization

Chapter 5. Warehousing, Data Acquisition, Data. Visualization Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives

More information

Keywords: Mobility Prediction, Location Prediction, Data Mining etc

Keywords: Mobility Prediction, Location Prediction, Data Mining etc Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Mining Approach

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association

More information

An Overview of Database management System, Data warehousing and Data Mining

An Overview of Database management System, Data warehousing and Data Mining An Overview of Database management System, Data warehousing and Data Mining Ramandeep Kaur 1, Amanpreet Kaur 2, Sarabjeet Kaur 3, Amandeep Kaur 4, Ranbir Kaur 5 Assistant Prof., Deptt. Of Computer Science,

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Analyzing price seasonality

Analyzing price seasonality Analyzing price seasonality Asfaw Negassa and Shahidur Rashid Presented at the COMESA policy seminar Food price variability: Causes, consequences, and policy options" on 25-26 January 2010 in Maputo, Mozambique

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.

More information

MASTER OF ARTS MANAGEMENT

MASTER OF ARTS MANAGEMENT The Master of Arts Management degree is taught at the world renowned Sydney Opera House. MASTER OF ARTS MANAGEMENT COURSE STRUCTURE To become eligible to graduate with a Master of Arts Management degree,

More information

An Efficient GA-Based Algorithm for Mining Negative Sequential Patterns

An Efficient GA-Based Algorithm for Mining Negative Sequential Patterns An Efficient GA-Based Algorithm for Mining Negative Sequential Patterns Zhigang Zheng 1, Yanchang Zhao 1,2,ZiyeZuo 1, and Longbing Cao 1 1 Data Sciences & Knowledge Discovery Research Lab Centre for Quantum

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

1. What are the uses of statistics in data mining? Statistics is used to Estimate the complexity of a data mining problem. Suggest which data mining

1. What are the uses of statistics in data mining? Statistics is used to Estimate the complexity of a data mining problem. Suggest which data mining 1. What are the uses of statistics in data mining? Statistics is used to Estimate the complexity of a data mining problem. Suggest which data mining techniques are most likely to be successful, and Identify

More information

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute

More information

3/17/2009. Knowledge Management BIKM eclassifier Integrated BIKM Tools

3/17/2009. Knowledge Management BIKM eclassifier Integrated BIKM Tools Paper by W. F. Cody J. T. Kreulen V. Krishna W. S. Spangler Presentation by Dylan Chi Discussion by Debojit Dhar THE INTEGRATION OF BUSINESS INTELLIGENCE AND KNOWLEDGE MANAGEMENT BUSINESS INTELLIGENCE

More information

Models of Small Group Development

Models of Small Group Development Models of Small Group Development Chapter 5 Life span approach Groups have a beginning, a growing stage, and an ending The exploration of events Groups experience multiple events (some of which happen

More information

Task Scheduling in Hadoop

Task Scheduling in Hadoop Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed

More information

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing

More information

How To Design An Intelligent Knowledge Discovery Model

How To Design An Intelligent Knowledge Discovery Model Innovative Business Using Applicable Data Mining Appalabattula Naga Venkata Veera Bhadram 1, M. Srinivasa Chakravarthy 2, Dr. Yalla Venkateswarlu 3 P.G. Student, Department of Computer Science and Engineering,

More information

ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

What is Statistic? OPRE 6301

What is Statistic? OPRE 6301 What is Statistic? OPRE 6301 In today s world...... we are constantly being bombarded with statistics and statistical information. For example: Customer Surveys Medical News Demographics Political Polls

More information

Self-Improving Supply Chains

Self-Improving Supply Chains Self-Improving Supply Chains Cyrus Hadavi Ph.D. Adexa, Inc. All Rights Reserved January 4, 2016 Self-Improving Supply Chains Imagine a world where supply chain planning systems can mold themselves into

More information

New Matrix Approach to Improve Apriori Algorithm

New Matrix Approach to Improve Apriori Algorithm New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, rehab.alwan@majancolleg.edu.om Associate

More information

Visualization. Program visualization

Visualization. Program visualization Visualization Program visualization Debugging programs without the aid of support tools can be extremely difficult. See My Hairest Bug War Stories, Marc Eisenstadt, Communications of the ACM, Vol 40, No

More information

Chapter Managing Knowledge in the Digital Firm

Chapter Managing Knowledge in the Digital Firm Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management

More information

Introduction to Data Mining

Introduction to Data Mining Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:

More information

Software Agents and Multi-Agent Systems. Keith S. Decker Department of Computer Science University of Delaware

Software Agents and Multi-Agent Systems. Keith S. Decker Department of Computer Science University of Delaware Software Agents and Multi-Agent Systems Keith S. Decker Department of Computer Science University of Delaware What is a Software Agent? Autonomous & Persistent: The main point about agents is that they

More information

INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION

INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION INVESTIGATIONS INTO EFFECTIVENESS OF AND CLASSIFIERS FOR SPAM DETECTION Upasna Attri C.S.E. Department, DAV Institute of Engineering and Technology, Jalandhar (India) upasnaa.8@gmail.com Harpreet Kaur

More information

SQL Server Administrator Introduction - 3 Days Objectives

SQL Server Administrator Introduction - 3 Days Objectives SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

Selection of Optimal Discount of Retail Assortments with Data Mining Approach

Selection of Optimal Discount of Retail Assortments with Data Mining Approach Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.

More information

Discovering process models from empirical data

Discovering process models from empirical data Discovering process models from empirical data Laura Măruşter (l.maruster@tm.tue.nl), Ton Weijters (a.j.m.m.weijters@tm.tue.nl) and Wil van der Aalst (w.m.p.aalst@tm.tue.nl) Eindhoven University of Technology,

More information

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

More information

Introduction to Data Mining

Introduction to Data Mining Bioinformatics Ying Liu, Ph.D. Laboratory for Bioinformatics University of Texas at Dallas Spring 2008 Introduction to Data Mining 1 Motivation: Why data mining? What is data mining? Data Mining: On what

More information

ACM SIGKDD Workshop on Intelligence and Security Informatics Held in conjunction with KDD-2010

ACM SIGKDD Workshop on Intelligence and Security Informatics Held in conjunction with KDD-2010 Fuzzy Association Rule Mining for Community Crime Pattern Discovery Anna L. Buczak, Christopher M. Gifford ACM SIGKDD Workshop on Intelligence and Security Informatics Held in conjunction with KDD-2010

More information

Detecting Human Behavior Patterns from Mobile Phone

Detecting Human Behavior Patterns from Mobile Phone Journal of Computational Information Systems 8: 6 (2012) 2671 2679 Available at http://www.jofcis.com Detecting Human Behavior Patterns from Mobile Phone Anqin ZHANG 1,2,, Wenjun YE 2, Yuan PENG 1,2 1

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar

More information

Data Mining Analytics for Business Intelligence and Decision Support

Data Mining Analytics for Business Intelligence and Decision Support Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing

More information

Temporal Data Mining in Hospital Information Systems: Analysis of Clinical Courses of Chronic Hepatitis

Temporal Data Mining in Hospital Information Systems: Analysis of Clinical Courses of Chronic Hepatitis Vol. 1, No. 1, Issue 1, Page 11 of 19 Copyright 2007, TSI Press Printed in the USA. All rights reserved Temporal Data Mining in Hospital Information Systems: Analysis of Clinical Courses of Chronic Hepatitis

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,

More information

Recommendations in Mobile Environments. Professor Hui Xiong Rutgers Business School Rutgers University. Rutgers, the State University of New Jersey

Recommendations in Mobile Environments. Professor Hui Xiong Rutgers Business School Rutgers University. Rutgers, the State University of New Jersey 1 Recommendations in Mobile Environments Professor Hui Xiong Rutgers Business School Rutgers University ADMA-2014 Rutgers, the State University of New Jersey Big Data 3 Big Data Application Requirements

More information

Meta-learning. Synonyms. Definition. Characteristics

Meta-learning. Synonyms. Definition. Characteristics Meta-learning Włodzisław Duch, Department of Informatics, Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore wduch@is.umk.pl (or search

More information

A Data Mining Study of Weld Quality Models Constructed with MLP Neural Networks from Stratified Sampled Data

A Data Mining Study of Weld Quality Models Constructed with MLP Neural Networks from Stratified Sampled Data A Data Mining Study of Weld Quality Models Constructed with MLP Neural Networks from Stratified Sampled Data T. W. Liao, G. Wang, and E. Triantaphyllou Department of Industrial and Manufacturing Systems

More information

72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD

72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD 72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology Paulo.gottgtroy@aut.ac.nz Abstract This paper is

More information

2.1. Data Mining for Biomedical and DNA data analysis

2.1. Data Mining for Biomedical and DNA data analysis Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: simmibagga12@gmail.com) Dr. G.N. Singh Department of Physics and

More information

Quantification and Traceability of Requirements

Quantification and Traceability of Requirements Quantification and Traceability of Requirements Gyrd Norvoll Master of Science in Computer Science Submission date: May 2007 Supervisor: Tor Stålhane, IDI Norwegian University of Science and Technology

More information

Data Mining Algorithms and Techniques Research in CRM Systems

Data Mining Algorithms and Techniques Research in CRM Systems Data Mining Algorithms and Techniques Research in CRM Systems ADELA TUDOR, ADELA BARA, IULIANA BOTHA The Bucharest Academy of Economic Studies Bucharest ROMANIA {Adela_Lungu}@yahoo.com {Bara.Adela, Iuliana.Botha}@ie.ase.ro

More information

Process Mining by Measuring Process Block Similarity

Process Mining by Measuring Process Block Similarity Process Mining by Measuring Process Block Similarity Joonsoo Bae, James Caverlee 2, Ling Liu 2, Bill Rouse 2, Hua Yan 2 Dept of Industrial & Sys Eng, Chonbuk National Univ, South Korea jsbae@chonbukackr

More information

A Big Data Workshop introducing a smarter decision methodology for your organisation through advanced analytics and career opportunity

A Big Data Workshop introducing a smarter decision methodology for your organisation through advanced analytics and career opportunity Advanced Analytics Institute (AAI) http://analytics.uts.edu.au/index.html Big Data Workshop - Smarter Decisions and Careers in Data A Big Data Workshop introducing a smarter decision methodology for your

More information

Tracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K.

Tracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K. Tracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K. Need/Opportunity / BP plc is one of the largest global companies by market capitalisation.

More information

PBL: Management Concepts. Competency: Business Environment

PBL: Management Concepts. Competency: Business Environment Competency: Business Environment 1. Explain the impact of business on the environment. 2. Explain the nature of managerial ethics and demonstrate ethical behaviors in the work place responsible behavior,

More information

Chapter 2 Literature Review

Chapter 2 Literature Review Chapter 2 Literature Review 2.1 Data Mining The amount of data continues to grow at an enormous rate even though the data stores are already vast. The primary challenge is how to make the database a competitive

More information

Fuzzy logic decision support for long-term investing in the financial market

Fuzzy logic decision support for long-term investing in the financial market Fuzzy logic decision support for long-term investing in the financial market Abstract This paper discusses the use of fuzzy logic and modeling as a decision making support for long-term investment decisions

More information

MS-40074: Microsoft SQL Server 2014 for Oracle DBAs

MS-40074: Microsoft SQL Server 2014 for Oracle DBAs MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle

More information

Data Mining for Fun and Profit

Data Mining for Fun and Profit Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools

More information

Final Year Projects at itm. Topics 2010/2011

Final Year Projects at itm. Topics 2010/2011 Final Year Projects at itm Topics 2010/2011 Chair of Information Technology in Mechanical Engineering Prof. Dr.-Ing. B. Vogel-Heuser Prof. Dr.-Ing. Frank Schiller Prof. Dr.-Ing. Klaus Bender Technische

More information

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing

Introduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition

More information

Unsupervised Data Mining (Clustering)

Unsupervised Data Mining (Clustering) Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in

More information

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will

More information

UNDERSTANDING CUSTOMERS - PROFILING AND SEGMENTATION

UNDERSTANDING CUSTOMERS - PROFILING AND SEGMENTATION UNDERSTANDING CUSTOMERS - PROFILING AND SEGMENTATION Mircea Andrei SCRIDON Babes Bolyai University of Cluj-Napoca Abstract: In any industry, the first step to finding and creating profitable customers

More information

USING THE AGGLOMERATIVE METHOD OF HIERARCHICAL CLUSTERING AS A DATA MINING TOOL IN CAPITAL MARKET 1. Vera Marinova Boncheva

USING THE AGGLOMERATIVE METHOD OF HIERARCHICAL CLUSTERING AS A DATA MINING TOOL IN CAPITAL MARKET 1. Vera Marinova Boncheva 382 [7] Reznik, A, Kussul, N., Sokolov, A.: Identification of user activity using neural networks. Cybernetics and computer techniques, vol. 123 (1999) 70 79. (in Russian) [8] Kussul, N., et al. : Multi-Agent

More information