Coupled Behavior Analysis with Applications
|
|
- Christina McKinney
- 8 years ago
- Views:
Transcription
1 Coupled Behavior Analysis with Applications Professor Longbing Cao ( 操 龙 兵 ) Director, Advanced Analytics Institute University of Technology Sydney, Australia www-staff.it.uts.edu.au/~lbcao
2 Agenda Why coupled behaviors? What is behavior? What are coupled behaviors? What is coupled behavior analysis (CBA)? Combined mining for high-impact behavior analysis Coupled HiddenMarkov Model-based abnormal behavior analysis Open issues and prospects
3 Why Coupled Behaviors?
4 An example Why does this stock go so crazily?
5 Short-term manipulation behaviors as cause Behavior exterior presentation Possible behavior interior driver
6 Behaviors of associated accounts as the driver of the price movement Group behaviors Group behavior interior-driven price movement
7 What makes multiple behaviors different? Key factors: Multiple actors Multiple behaviors Multiple properties Coupling relationships Organizational factors
8 How are CB handled by existing techniques? Behavior exterior analysis Time series analysis Multiple time series analysis Behavior interior analysis Frequent pattern mining Sequence analysis Coupled sequence analysis
9 Coupledbehaviors are ubiquitous Relevant projects in UTS Advanced Analytics Institute Insurance business analytics Public service business analytics Education student analytics Investment business analytics Banking business analytics Financial business analytics
10 What is Behavior? Longbing Cao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,
11 Abstract Behavior Model
12 An abstract behavior model Demographics and circumstancesof behavioral subjects and objects Associates of a behavior may form into certain behavior sequences or network; Social behavioral network consists of sequences of behaviors that are organized in terms of certain social relationships or norms. Impact, costs, risk and trust of behavior/behavior network
13 Behavior Visual Descriptor Intra-relationships within Behavior
14 Vector-oriented behavior pattern analysis Behavior performer: Subject (s), action (a), time (t), place (w) Social information: Object (o), context (e), constraints (c), associations (m) Intentional information: Subject s: goal (g), belief (b), plan (l) Behavior performance: Impact (f), status (u) New methods for vector-based behavior pattern analysis
15 Behavioral data Behavioral elements hidden or dispersed in transactional data behavioral feature space Behavioral data modeling Behavioral feature space Mapping from transactional to behavioral data Behavioral data processing Behavioral data transformation
16 Behavior informatics Concept Map Behavior Representation & Reasoning Behavior Learning & Mining
17 Behavior learning/mining process
18 What is Coupled Behavior? Longbing Cao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,
19 Relationship crossing behaviors
20 Coupling relationships From temporal aspect From inferential aspect From combinational aspect From party aspect
21 Basic Behavior Patterns Tracing: Different actions with sequential order. { a a a },,, n 1 2 Consequence: Different actions have causalities in occurrence. { ai a j } Synchronization: Different actions occur at the same time. {,, } a1 a n Combination: Different actions occur in concurrency. { a1 a,, 2 an}
22 Exclusion: Different actions occur mutually exclusively. { a a a } 1 2,, { ai a j} n Precedence: Different actions have required precedence And more to be explored Sequential Combination Parallel Combination Nested Combination Fuzzy or probabilistic Combination A B C A B C
23 What is the Coupled Behavior Analysis (CBA) problem? LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Application, IEEE Trans. Knowledge and Data Engineering. LongbingCao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); ,
24 Customer behaviors Customer a i snbehaviors B i : {b i1, b i2,,b in } M customers behaviors B 1 : {b 11, b 12,,b 1n } B 2 : {b 21, b 22,,b 2n } B m : {b m1, b m2,,b mn }
25 Behavior Feature Matrix
26 Behavior Intra-relationship
27 Behavior Inter-relationship
28 Behavior Relationship
29 Behavior Behavior Analysis
30 An Example of Stock Market Transactional Data Behavior Feature Matrix B1 B2 B3 B4 B5 B6 B7 B8
31 Existing approaches M customers behaviors B 1 : {sell, buy} B 2 : {buy, sell, sell} B 3 : {buy} B 4 : {buy} B 5 : {buy}
32 Complex behavior pattern analysis (sell,sell_price,volume_small,long_interval,non-frequent) % (sell,sell_price,volume_small,long_interval,non-frequent) (action_other,price_other,volume_other,interval_other,nonfrequent) % (buy_withdraw,price_other,withdraw_part,short_withdraw interval,non-frequent) % (action_other,price_other,volume_other,interval_other,non-frequent) % (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (buy_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (buy_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,short_withdraw interval,non-frequent) % (buy,buy_price_lastor buy_price_limitor buy_price_sell,volume_small,long_interval,non-frequent) % (buy,buy_price_lastor buy_price_limitor buy_price_sell,volume_small,long_interval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (sell,sell_price,volume_small,long_interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (sell_withdraw,price_other,withdraw_part,long_withdraw interval,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) % (sell_withdraw,price_other,withdraw_part,long_withdrawinterval,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) (action_other,price_other,volume_other,interval_other,non-frequent) %
33 Hierarchical clustering analysis
34 Combined Pattern Mining for High Impact Behavior Analysis Longbing Cao, Huaifeng Zhang, Yanchang Zhao, Dan Luo, Chengqi Zhang. Combined Mining: Discovering Informative Knowledge in Complex Data, accepted by IEEE Trans. SMC Part B LongbingCao. Zhao Y., Zhang, C. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , 2008.
35 Combined Pattern Pairs A combined rule pair is composed of two contrasting rules. For customers with same characteristics U, different policies/campaigns, V 1 and V 2, can result in different outcomes, T 1 and T 2.
36 Interestingness of Pattern Pairs
37 Combined Pattern Clusters Based on a combined rule pair, related combined rules can be organized into a cluster to supplement more information to the rule pair. The rules in cluster C have the same U but different V, which makes them associated with various results T.
38 Interestingness of Rule Pair/Cluster dist(): the dissimilarity between the descendants of R 1 and R 2 The interestingness of combined rule pair/cluster is decided by both the interestingness of rules and the most contrasting rules within the pair/cluster. A cluster made of contrasting confident rules is interesting, because it explains why different results occur and what can be done to produce an expected result or avoid an undesirable consequence.
39 Extended Combined Pattern Pairs
40 Conditional P-S ratio
41 Extended Combined Pattern Clusters
42 Impact
43 Combined Demographics + Behavior Analysis Longbing Cao, Huaifeng Zhang, Yanchang Zhao, Dan Luo, Chengqi Zhang. Combined Mining: Discovering Informative Knowledge in Complex Data, IEEE Trans. SMC Part B. Longbing Cao. Zhao Y., Zhang, C. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , Yanchang Zhao, Huaifeng Zhang, Longbing Cao Chengqi Zhang. Combined Pattern Mining: from Learned Rules to Actionable Knowledge, Australian AI2008.
44 Combined Pattern Mining Type A: Demographics differentiated combined pattern Customerswith the same actionsbut different demographics different classes/business impact
45 Combined Pattern Mining Type B: Actiondifferentiatedcombined pattern Customerswith the same demographicsbut taking different actions different classes/business impact
46 There were 7,711 association rules before removing redundancy of combined rules. After removing redundancy of combined rules, 2,601 rules were left, which built up 734 combined rule clusters. After removing redundancy of combined rule clusters, 98 rule clusters with 235 rules remained, which was within the capability of human beings to read.
47
48 Behavior 1 Behavior 2 Demographic 1 Low value High value Demographic 2 High value Low value
49 An Example of Extended Combined Pattern Cluster
50 Identifying high impact behavior in behavior evolution
51 Coupled Hidden Markov Model- based Abnormal Coupled Behavior Analysis LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Application, IEEE Trans. Knowledge and Data Engineering. Cao, L., OuY, Yu PS, Wei G. Detecting Abnormal Coupled Sequences and Sequence Changes in Group-based Manipulative Trading Behaviors, KDD2010.
52 Pool manipulation
53 Coupled behavior analysis
54 Construct behaviorsequences Data structure 1:
55 Data structure 2:
56 CHMM Based Coupled Sequence Modeling Coupled behavior sequences Multiple sequences Coupling relationship Behavior properties
57 CBA -CHMM
58 Framework: abnormal CBA
59
60
61 CHMM model:
62 Adaptive CHMM for Detecting Sequence Changes
63 The Algorithms
64
65 Benchmark Models HMM-B: Buy-based HMM HMM-S: Sell-based HMM HMM-T: Trade-based HMM IHMM: HMM-B + HMM-S + HMM-T CHMM: CHMM(buy, sell, trade) ACHMM: Adaptive CHMM(buy, sell, trade)
66 Evaluation Technical performance Business performance
67
68 Business Performance
69 Computational cost N-heads dynamic programming
70 Prospects
71 Sequence analysis Frequent Pattern mining Impact-oriented: - Positive - Negative - Multi-level level - Mixed - Evolution Coupled behavior analysis Group Behavior Pattern mining Event detection Community discovery
72 Novel Behavior Pattern Mining Semi-supervised coupled behavior analysis 1: Coupling relationship analysis 2: coupling-oriented Pattern mining
73 Behavior Informatics-SIG: 73 Cao, L: BI at DDDM2008 Joint with ICDM2008
74 References LongbingCao, YumingOu, Philip S Yu. Coupled Behavior Analysis with Applications, accepted by IEEE Trans. on Knowledge and Data Engineering. LongbingCao, HuaifengZhang, YanchangZhao, Dan Luo, ChengqiZhang. Combined Mining: Discovering Informative Knowledge in Complex Data, accepted by IEEE Trans. SMC Part B LongbingCao, YumingOu, Philip S YU, Gang Wei. Detecting Abnormal Coupled Sequences and Sequence Changes in Group-based Manipulative Trading Behaviors, KDD2010, LongbingCao, In-depth Behavior Understanding and Use: the Behavior Informatics Approach, Information Science, 180(17); , 2010 LongbingCao, YanchangZhao, ChengqiZhang. Mining Impact-Targeted Activity Patterns in Imbalanced Data, IEEE Trans. on Knowledge and Data Engineering, 20(8): , 2008
75 Thank you for your attention Longbing Cao www-staff.it.uts.edu.au/~lbcao
Activity Mining: Challenges and Prospects *
Activity Mining: Challenges and Prospects * Longbing Cao Faculty of Information Technology, University of Technology Sydney, Australia lbcao@it.uts.edu.au Abstract. Activity data accumulated in real life,
More informationJ.N.V.R.Swarup kumar $1 A.Tejaswi $1 G.Srinivas $2 Ajay kumar #3 $1
CRM System Using UI-AKD Approach of D 3 M J.N.V.R.Swarup kumar $1 A.Tejaswi $1 G.Srinivas $2 Ajay kumar #3 $1 Dept. of Information Technology, GITAM University, Visakhapatnam. $2 Asst.Prof, Dept. of Information
More informationDomain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation
Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation Yuming Ou, Longbing Cao, Chao Luo, and Chengqi Zhang Faculty of Information Technology, University of Technology, Sydney,
More informationMarket Microstructure Patterns Powering Trading and Surveillance Agents
Market Microstructure Patterns Powering Trading and Surveillance Agents Longbing Cao (University of Technology, Sydney, Australia lbcao@it.uts.edu.au) Yuming Ou (University of Technology, Sydney, Australia
More informationTHINK.CHANGE.DO. Professor Longbing CAO. Director, Advanced Analytics Institute University of Technology Sydney
THINK.CHANGE.DO Professor Longbing CAO Director, Advanced Analytics Institute University of Technology Sydney References LongbingCao. Combined Mining: Analyzing Object and Pattern Relations for Discovering
More informationGraph-based Coupled Behavior Analysis: A Case Study on Detecting Collaborative Manipulations in Stock Markets
WCCI 212 IEEE World Congress on Computational Intelligence June, 1-15, 212 - Brisbane, Australia IJCNN Graph-based Coupled Behavior Analysis: A Case Study on Detecting Collaborative Manipulations in Stock
More informationNon-IIDness Learning in Behavioral and Social Data
The Computer Journal Advance Access published August 22, 2013 The British Computer Society 2013. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxt084
More informationMULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
More informationBehavior Grouping based on Trajectories Mining. Department of Medical Informatics Shimane University, School of Medicine, Japan
Behavior Grouping based on Trajectories Mining Shoji Hirano Shusaku Tsumoto Department of Medical Informatics Shimane University, School of Medicine, Japan 1 Introduction Outline Background, Objective,
More informationCRM System Using PA-AKD Approach of D 3 M
CRM System Using PA-AKD Approach of D 3 M Ajay kumar #1 A.Tejaswi $2 Lakshmi Prasad Koyi &3 G.Narasinga Rao $4 S.Srinivasa Rao Illapu *5 #1 Asst.Prof, Dept of CSE/IT, Dronacharya College of Engg, Greater
More informationAn Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
More informationInvestigating Clinical Care Pathways Correlated with Outcomes
Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges
More informationIntroduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI
Introduction to Data Mining and Business Intelligence Lecture 1/DMBI/IKI83403T/MTI/UI Yudho Giri Sucahyo, Ph.D, CISA (yudho@cs.ui.ac.id) Faculty of Computer Science, University of Indonesia Objectives
More informationData Mining in Financial Markets and an Open Enterprise Infrastructure
Data Mining in Financial Markets and an Open Enterprise Infrastructure Supporting Trading & Mining Chengqi Zhang, Longbing Cao, Jiaqi Wang, Li Lin, Jiarui Ni, Wanli Chen E-Intelligence Group at FIT, UTS
More informationInternational Workshop on Big Data Analytics for Advanced Databases (BIGDATA, 2016)
International Workshop on Big Data Analytics for Advanced Databases (BIGDATA, 2016) Call for Papers AIM and SCOPE There is an exponential growth in digital data with unprecedented new platforms derived
More informationOLAP and Data Mining. Data Warehousing and End-User Access Tools. Introducing OLAP. Introducing OLAP
Data Warehousing and End-User Access Tools OLAP and Data Mining Accompanying growth in data warehouses is increasing demands for more powerful access tools providing advanced analytical capabilities. Key
More informationCustomer Relationship Management System with USCM-AKD Approach of D 3 M
Customer Relationship Management System with USCM-AKD Approach of D 3 M Ch. Raja Ramesh*, Kolusu Naga Prasad**, Hari Hara Pavan Kumar Bhuravarjula**, VVD Naveen Krishna** *Associate. Prof., Dept. of Computer
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationA Risk Management System Framework for New Product Development (NPD)
2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong
More informationIntroduction to UTS/OLT Educational Data Mining Projects. Prof. Longbing Cao Director, Advanced Analytics Institute
Introduction to UTS/OLT Educational Data Mining Projects Prof. Longbing Cao Director, Advanced Analytics Institute Outline Introduction to Educational Data Mining (EDM) IEEE Task Force OLT & UTS LT Projects
More informationData Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier
Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.
More informationTowards a Big Data Taxonomy. Bill Mandrick, PhD Data Tactics Version 26_August_2013
Towards a Big Data Taxonomy Bill Mandrick, PhD Data Tactics Version 26_August_2013 Scientific Taxonomies Represent Types of Processes Types of Objects Physical Objects Information Artifacts Types of Characteristics
More informationFederico Rajola. Customer Relationship. Management in the. Financial Industry. Organizational Processes and. Technology Innovation.
Federico Rajola Customer Relationship Management in the Financial Industry Organizational Processes and Technology Innovation Second edition ^ Springer Contents 1 Introduction 1 1.1 Identification and
More informationMaking confident decisions with the full spectrum of analysis capabilities
IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationIntelligent Stock Market Assistant using Temporal Data Mining
Intelligent Stock Market Assistant using Temporal Data Mining Gerasimos Marketos 1, Konstantinos Pediaditakis 2, Yannis Theodoridis 1, and Babis Theodoulidis 2 1 Database Group, Information Systems Laboratory,
More informationImprovements In Clustering Using Affinity Propagation: A Review
Journal of Multidisciplinary Engineering Science and Technology (JMEST) Improvements In Clustering Using Affinity Propagation: A Review Aniket Bombatkar Dept. of Computer Engineering Sinhgad Institute
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
More informationModel-Based Cluster Analysis for Web Users Sessions
Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece gpallis@ccf.auth.gr
More information1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM)
1. Introduction Gene regulation Genomics and genome analyses Hidden markov model (HMM) 2. Gene regulation tools and methods Regulatory sequences and motif discovery TF binding sites, microrna target prediction
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationAssociation Rule Mining: Exercises and Answers
Association Rule Mining: Exercises and Answers Contains both theoretical and practical exercises to be done using Weka. The exercises are part of the DBTech Virtual Workshop on KDD and BI. Exercise 1.
More informationAgent Services-Based Infrastructure for Online Assessment of Trading Strategies
Agent Services-Based Infrastructure for Online Assessment of Trading Strategies Longbing Cao, Jiaqi Wang, Li Lin, Chengqi Zhang Faculty of Information Technology, University of Technology Sydney, Australia
More informationLluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining a.k.a. Data Mining II Office 319, Omega, BCN EET, office 107, TR 2, Terrassa avellido@lsi.upc.edu skype, gtalk: avellido Tels.:
More informationINNOVATION. KDD-2012 Success
INNOVATION NEWSLETTER June 2012 Issue 1 In this issue: INNOVATION KDD-2012 Success IBM Fellowship Success Student Analytics System New book: Behavior Computing, Springer COLLABORATION Policy Suggestions
More informationA Special Session on. Handling Uncertainties in Big Data by Fuzzy Systems
A Special Session on Handling Uncertainties in Big Data by Fuzzy Systems organized by Jie Lu, Cheng-Ting Lin, Farookh Khadeer Hussain, Vahid Behbood, Guangquan Zhang Description The volume, variety, velocity,
More informationData Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
More informationChapter 5. Warehousing, Data Acquisition, Data. Visualization
Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization 5-1 Learning Objectives
More informationKeywords: Mobility Prediction, Location Prediction, Data Mining etc
Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Mining Approach
More informationIntroduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
More informationAn Overview of Database management System, Data warehousing and Data Mining
An Overview of Database management System, Data warehousing and Data Mining Ramandeep Kaur 1, Amanpreet Kaur 2, Sarabjeet Kaur 3, Amandeep Kaur 4, Ranbir Kaur 5 Assistant Prof., Deptt. Of Computer Science,
More informationBusiness Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process
More informationA Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationAnalyzing price seasonality
Analyzing price seasonality Asfaw Negassa and Shahidur Rashid Presented at the COMESA policy seminar Food price variability: Causes, consequences, and policy options" on 25-26 January 2010 in Maputo, Mozambique
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.
More informationMASTER OF ARTS MANAGEMENT
The Master of Arts Management degree is taught at the world renowned Sydney Opera House. MASTER OF ARTS MANAGEMENT COURSE STRUCTURE To become eligible to graduate with a Master of Arts Management degree,
More informationAn Efficient GA-Based Algorithm for Mining Negative Sequential Patterns
An Efficient GA-Based Algorithm for Mining Negative Sequential Patterns Zhigang Zheng 1, Yanchang Zhao 1,2,ZiyeZuo 1, and Longbing Cao 1 1 Data Sciences & Knowledge Discovery Research Lab Centre for Quantum
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More information1. What are the uses of statistics in data mining? Statistics is used to Estimate the complexity of a data mining problem. Suggest which data mining
1. What are the uses of statistics in data mining? Statistics is used to Estimate the complexity of a data mining problem. Suggest which data mining techniques are most likely to be successful, and Identify
More informationIMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute
More information3/17/2009. Knowledge Management BIKM eclassifier Integrated BIKM Tools
Paper by W. F. Cody J. T. Kreulen V. Krishna W. S. Spangler Presentation by Dylan Chi Discussion by Debojit Dhar THE INTEGRATION OF BUSINESS INTELLIGENCE AND KNOWLEDGE MANAGEMENT BUSINESS INTELLIGENCE
More informationModels of Small Group Development
Models of Small Group Development Chapter 5 Life span approach Groups have a beginning, a growing stage, and an ending The exploration of events Groups experience multiple events (some of which happen
More informationTask Scheduling in Hadoop
Task Scheduling in Hadoop Sagar Mamdapure Munira Ginwala Neha Papat SAE,Kondhwa SAE,Kondhwa SAE,Kondhwa Abstract Hadoop is widely used for storing large datasets and processing them efficiently under distributed
More informationCourse 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
More informationHow To Design An Intelligent Knowledge Discovery Model
Innovative Business Using Applicable Data Mining Appalabattula Naga Venkata Veera Bhadram 1, M. Srinivasa Chakravarthy 2, Dr. Yalla Venkateswarlu 3 P.G. Student, Department of Computer Science and Engineering,
More informationISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationWhat is Statistic? OPRE 6301
What is Statistic? OPRE 6301 In today s world...... we are constantly being bombarded with statistics and statistical information. For example: Customer Surveys Medical News Demographics Political Polls
More informationSelf-Improving Supply Chains
Self-Improving Supply Chains Cyrus Hadavi Ph.D. Adexa, Inc. All Rights Reserved January 4, 2016 Self-Improving Supply Chains Imagine a world where supply chain planning systems can mold themselves into
More informationNew Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, rehab.alwan@majancolleg.edu.om Associate
More informationVisualization. Program visualization
Visualization Program visualization Debugging programs without the aid of support tools can be extremely difficult. See My Hairest Bug War Stories, Marc Eisenstadt, Communications of the ACM, Vol 40, No
More informationChapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
More informationIntroduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
More informationSoftware Agents and Multi-Agent Systems. Keith S. Decker Department of Computer Science University of Delaware
Software Agents and Multi-Agent Systems Keith S. Decker Department of Computer Science University of Delaware What is a Software Agent? Autonomous & Persistent: The main point about agents is that they
More informationINVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION
INVESTIGATIONS INTO EFFECTIVENESS OF AND CLASSIFIERS FOR SPAM DETECTION Upasna Attri C.S.E. Department, DAV Institute of Engineering and Technology, Jalandhar (India) upasnaa.8@gmail.com Harpreet Kaur
More informationSQL Server Administrator Introduction - 3 Days Objectives
SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying
More informationAn Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
More informationSelection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
More informationDiscovering process models from empirical data
Discovering process models from empirical data Laura Măruşter (l.maruster@tm.tue.nl), Ton Weijters (a.j.m.m.weijters@tm.tue.nl) and Wil van der Aalst (w.m.p.aalst@tm.tue.nl) Eindhoven University of Technology,
More informationChapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
More informationIntroduction to Data Mining
Bioinformatics Ying Liu, Ph.D. Laboratory for Bioinformatics University of Texas at Dallas Spring 2008 Introduction to Data Mining 1 Motivation: Why data mining? What is data mining? Data Mining: On what
More informationACM SIGKDD Workshop on Intelligence and Security Informatics Held in conjunction with KDD-2010
Fuzzy Association Rule Mining for Community Crime Pattern Discovery Anna L. Buczak, Christopher M. Gifford ACM SIGKDD Workshop on Intelligence and Security Informatics Held in conjunction with KDD-2010
More informationDetecting Human Behavior Patterns from Mobile Phone
Journal of Computational Information Systems 8: 6 (2012) 2671 2679 Available at http://www.jofcis.com Detecting Human Behavior Patterns from Mobile Phone Anqin ZHANG 1,2,, Wenjun YE 2, Yuan PENG 1,2 1
More informationInternational Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More informationDATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar
More informationData Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
More informationTemporal Data Mining in Hospital Information Systems: Analysis of Clinical Courses of Chronic Hepatitis
Vol. 1, No. 1, Issue 1, Page 11 of 19 Copyright 2007, TSI Press Printed in the USA. All rights reserved Temporal Data Mining in Hospital Information Systems: Analysis of Clinical Courses of Chronic Hepatitis
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,
More informationRecommendations in Mobile Environments. Professor Hui Xiong Rutgers Business School Rutgers University. Rutgers, the State University of New Jersey
1 Recommendations in Mobile Environments Professor Hui Xiong Rutgers Business School Rutgers University ADMA-2014 Rutgers, the State University of New Jersey Big Data 3 Big Data Application Requirements
More informationMeta-learning. Synonyms. Definition. Characteristics
Meta-learning Włodzisław Duch, Department of Informatics, Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore wduch@is.umk.pl (or search
More informationA Data Mining Study of Weld Quality Models Constructed with MLP Neural Networks from Stratified Sampled Data
A Data Mining Study of Weld Quality Models Constructed with MLP Neural Networks from Stratified Sampled Data T. W. Liao, G. Wang, and E. Triantaphyllou Department of Industrial and Manufacturing Systems
More information72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology Paulo.gottgtroy@aut.ac.nz Abstract This paper is
More information2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: simmibagga12@gmail.com) Dr. G.N. Singh Department of Physics and
More informationQuantification and Traceability of Requirements
Quantification and Traceability of Requirements Gyrd Norvoll Master of Science in Computer Science Submission date: May 2007 Supervisor: Tor Stålhane, IDI Norwegian University of Science and Technology
More informationData Mining Algorithms and Techniques Research in CRM Systems
Data Mining Algorithms and Techniques Research in CRM Systems ADELA TUDOR, ADELA BARA, IULIANA BOTHA The Bucharest Academy of Economic Studies Bucharest ROMANIA {Adela_Lungu}@yahoo.com {Bara.Adela, Iuliana.Botha}@ie.ase.ro
More informationProcess Mining by Measuring Process Block Similarity
Process Mining by Measuring Process Block Similarity Joonsoo Bae, James Caverlee 2, Ling Liu 2, Bill Rouse 2, Hua Yan 2 Dept of Industrial & Sys Eng, Chonbuk National Univ, South Korea jsbae@chonbukackr
More informationA Big Data Workshop introducing a smarter decision methodology for your organisation through advanced analytics and career opportunity
Advanced Analytics Institute (AAI) http://analytics.uts.edu.au/index.html Big Data Workshop - Smarter Decisions and Careers in Data A Big Data Workshop introducing a smarter decision methodology for your
More informationTracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K.
Tracking Levels of Employee Understanding and Engagement During Change Ghassan Karian Karian and Box London, U.K. Need/Opportunity / BP plc is one of the largest global companies by market capitalisation.
More informationPBL: Management Concepts. Competency: Business Environment
Competency: Business Environment 1. Explain the impact of business on the environment. 2. Explain the nature of managerial ethics and demonstrate ethical behaviors in the work place responsible behavior,
More informationChapter 2 Literature Review
Chapter 2 Literature Review 2.1 Data Mining The amount of data continues to grow at an enormous rate even though the data stores are already vast. The primary challenge is how to make the database a competitive
More informationFuzzy logic decision support for long-term investing in the financial market
Fuzzy logic decision support for long-term investing in the financial market Abstract This paper discusses the use of fuzzy logic and modeling as a decision making support for long-term investment decisions
More informationMS-40074: Microsoft SQL Server 2014 for Oracle DBAs
MS-40074: Microsoft SQL Server 2014 for Oracle DBAs Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills and experience as an Oracle
More informationData Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
More informationFinal Year Projects at itm. Topics 2010/2011
Final Year Projects at itm Topics 2010/2011 Chair of Information Technology in Mechanical Engineering Prof. Dr.-Ing. B. Vogel-Heuser Prof. Dr.-Ing. Frank Schiller Prof. Dr.-Ing. Klaus Bender Technische
More informationIntroduction to Data Mining and Machine Learning Techniques. Iza Moise, Evangelos Pournaras, Dirk Helbing
Introduction to Data Mining and Machine Learning Techniques Iza Moise, Evangelos Pournaras, Dirk Helbing Iza Moise, Evangelos Pournaras, Dirk Helbing 1 Overview Main principles of data mining Definition
More informationUnsupervised Data Mining (Clustering)
Unsupervised Data Mining (Clustering) Javier Béjar KEMLG December 01 Javier Béjar (KEMLG) Unsupervised Data Mining (Clustering) December 01 1 / 51 Introduction Clustering in KDD One of the main tasks in
More informationData Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 by Tan, Steinbach, Kumar 1 What is Cluster Analysis? Finding groups of objects such that the objects in a group will
More informationUNDERSTANDING CUSTOMERS - PROFILING AND SEGMENTATION
UNDERSTANDING CUSTOMERS - PROFILING AND SEGMENTATION Mircea Andrei SCRIDON Babes Bolyai University of Cluj-Napoca Abstract: In any industry, the first step to finding and creating profitable customers
More informationUSING THE AGGLOMERATIVE METHOD OF HIERARCHICAL CLUSTERING AS A DATA MINING TOOL IN CAPITAL MARKET 1. Vera Marinova Boncheva
382 [7] Reznik, A, Kussul, N., Sokolov, A.: Identification of user activity using neural networks. Cybernetics and computer techniques, vol. 123 (1999) 70 79. (in Russian) [8] Kussul, N., et al. : Multi-Agent
More information