Data Mining Algorithms and Techniques

Author(s):  
Ambika P.

Integration of data mining tasks in day-to-day life has become popular and common. Everyday people are confronted with opportunities and challenges with targeted advertising, and data mining techniques will help the businesses to become more efficient by reducing processing cost. This goal of this chapter is to provide a comprehensive review about data mining, data mining techniques, popular algorithms, and their impact on fog computing. This chapter also gives further research directions on data mining on fog computing.

Author(s):  
G. Ramadevi ◽  
Srujitha Yeruva ◽  
P. Sravanthi ◽  
P. Eknath Vamsi ◽  
S. Jaya Prakash

In a digitized world, data is growing exponentially and it is difficult to analyze the data and give the results. Data mining techniques play an important role in healthcare sector - BigData. By making use of Data mining algorithms it is possible to analyze, detect and predict the presence of disease which helps doctors to detect the disease early and in decision making. The objective of data mining techniques used is to design an automated tool that notifies the patient’s treatment history disease and medical data to doctors. Data mining techniques are very much useful in analyzing medical data to achieve meaningful and practical patterns. This project works on diabetes medical data, classification and clustering algorithms like (OPTICS, NAIVEBAYES, and BRICH) are implemented and the efficiency of the same is examined.


2021 ◽  
Author(s):  
Esma Ergüner Özkoç

Data mining techniques provide benefits in many areas such as medicine, sports, marketing, signal processing as well as data and network security. However, although data mining techniques used in security subjects such as intrusion detection, biometric authentication, fraud and malware classification, “privacy” has become a serious problem, especially in data mining applications that involve the collection and sharing of personal data. For these reasons, the problem of protecting privacy in the context of data mining differs from traditional data privacy protection, as data mining can act as both a friend and foe. Chapter covers the previously developed privacy preserving data mining techniques in two parts: (i) techniques proposed for input data that will be subject to data mining and (ii) techniques suggested for processed data (output of the data mining algorithms). Also presents attacks against the privacy of data mining applications. The chapter conclude with a discussion of next-generation privacy-preserving data mining applications at both the individual and organizational levels.


Author(s):  
S. Thilagamani ◽  
A. Jayanthiladevi ◽  
N. Arunkumar

Different methods are used to mine the large amount of data presents in databases, data warehouses, and data repositories. The methods used for mining include clustering, classification, prediction, regression, and association rule. This chapter explores data mining algorithms and fog computing.


Author(s):  
Ali Bayır ◽  
Sevinç Gülseçen ◽  
Gökhan Türkmen

Political elections are influenced by a number of factors such as political tendencies, voters' perceptions, and preferences. The results of a political election could also be based on specific attributes of candidates: age, gender, occupancy, education, etc. Although it is very difficult to understand all the factors which could have influenced the outcome of the election, many of the attributes mentioned above could be included in a data set, and by using current data mining techniques, undiscovered patterns can be revealed. Despite unpredictability of human behaviors and/or choices involved, data mining techniques still could help in predicting the election outcomes. In this study, the results of the survey prepared by KONDA Research and Consultancy Company before 2011 elections in Turkey were used as raw data. This study may help in understanding how data mining methods and techniques could be used in political sciences research. The study may also reveal whether voting tendencies in elections could be a factor for the outcome of the election.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-86 ◽  
Author(s):  
Nayem Rahman

Much of the research in data mining and knowledge discovery has focused on the development of efficient data mining algorithms. Researchers and practitioners have developed data mining techniques to solve diverse real-world data mining problems. But there is no single source that identifies which techniques solve what problems and how, the advantages and limitations, and real-life use-cases. Lately, identifying data mining techniques and corresponding problems that they solve has drawn significant attention. In this paper, the author describes the progress made in developing data mining techniques and then classify them in terms of data mining problems taxonomy to help assist practitioners in using appropriate data mining techniques that solve business problems. This will allow researchers to expand the body of knowledge in this discipline. This article proposes a data mining problems taxonomy based on data mining techniques being used. Prominent data mining problems include classification, optimization, prediction, partitioning, relationship, pattern matching, recommendation, ranking, sequential patterns and anomaly detection. The data mining techniques that are used to solve these data mining problems in general fall under top 10 data mining algorithms.


2020 ◽  
Vol 20 (2) ◽  
pp. 36
Author(s):  
Dedi Gunawan

Nowadays, data from various sources are gathered and stored in databases. The collection of the data does not give a significant impact unless the database owner conducts certain data analysis such as using data mining techniques to the databases. Presently, the development of data mining techniques and algorithms provides significant benefits for the information extraction process in terms of the quality, accuracy, and precision results. Realizing the fact that performing data mining tasks using some available data mining algorithms may disclose sensitive information of data subject in the databases, an action to protect privacy should be taken into account by the data owner. Therefore, privacy preserving data mining (PPDM) is becoming an emerging field of study in the data mining research group. The main purpose of PPDM is to investigate the side effects of data mining methods that originate from the penetration into the privacy of individuals and organizations. In addition, it guarantees that the data miners cannot reveal any personal sensitive information contained in a database, while at the same time data utility of a sanitized database does not significantly differ from that of the original one. In this paper, we present a wide view of current PPDM techniques by classifying them based on their taxonomy techniques to differentiate the characteristics of each approach. The review of the PPDM methods is described comprehensively to provide a profound understanding of the methods along with advantages, challenges, and future development for researchers and practitioners.


Author(s):  
Jun Zhang ◽  
Jie Wang ◽  
Shuting Xu

Data mining technologies have now been used in commercial, industrial, and governmental businesses, for various purposes, ranging from increasing profitability to enhancing national security. The widespread applications of data mining technologies have raised concerns about trade secrecy of corporations and privacy of innocent people contained in the datasets collected and used for the data mining purpose. It is necessary that data mining technologies designed for knowledge discovery across corporations and for security purpose towards general population have sufficient privacy awareness to protect the corporate trade secrecy and individual private information. Unfortunately, most standard data mining algorithms are not very efficient in terms of privacy protection, as they were originally developed mainly for commercial applications, in which different organizations collect and own their private databases, and mine their private databases for specific commercial purposes. In the cases of inter-corporation and security data mining applications, data mining algorithms may be applied to datasets containing sensitive or private information. Data warehouse owners and government agencies may potentially have access to many databases collected from different sources and may extract any information from these databases. This potentially unlimited access to data and information raises the fear of possible abuse and promotes the call for privacy protection and due process of law. Privacy-preserving data mining techniques have been developed to address these concerns (Fung et al., 2007; Zhang, & Zhang, 2007). The general goal of the privacy-preserving data mining techniques is defined as to hide sensitive individual data values from the outside world or from unauthorized persons, and simultaneously preserve the underlying data patterns and semantics so that a valid and efficient decision model based on the distorted data can be constructed. In the best scenarios, this new decision model should be equivalent to or even better than the model using the original data from the viewpoint of decision accuracy. There are currently at least two broad classes of approaches to achieving this goal. The first class of approaches attempts to distort the original data values so that the data miners (analysts) have no means (or greatly reduced ability) to derive the original values of the data. The second is to modify the data mining algorithms so that they allow data mining operations on distributed datasets without knowing the exact values of the data or without direct accessing the original datasets. This article only discusses the first class of approaches. Interested readers may consult (Clifton et al., 2003) and the references therein for discussions on distributed data mining approaches.


Author(s):  
Usha Gupta ◽  
Kamlesh Sharma

Data mining plays a vital role in converting the medical data like text, image, and graphs into meaningful new data, which helps to take the better decision. In this chapter, an overview of the current research is discussed using the data mining techniques for the finding, analysis, and prediction of various diseases. The focus of this study is to identify the well-performing data mining algorithms used on medical and clinical databases. Multiple algorithms have been identified: text-based mining, association rule-based mining, pattern-based mining, keyword-based mining, machine learning, neural network support vector machine, apriori algorithm, k-means clustering, and natural language. Analyses of the algorithm show that there is no single algorithm or model more suitable for diagnosing or predicting diseases. In some scenarios, some algorithms work very well but not in another data set. There are many examples in clinical or medical research where the combination of different algorithms gives good results.


Author(s):  
Durgadevi Mullaivanan ◽  
Kalpana R.

In recent days, data mining has become very popular, and numerous research works have been carried out of using data mining techniques in the healthcare sector. The healthcare transactions generate a massive amount of data which are very voluminous and complex to be processed. Therefore, data mining techniques have been employed, which provides a practical methodology for transforming the massive amount of data into efficient knowledge for the process of decision making. Prediction and classification are the two forms of data analysis methods. However, it is still difficult to explore the complete literature in the healthcare domain. This chapter reviews the research overview that is done in the healthcare sector utilizing different data mining methodologies for prediction and classification of diverse diseases. Also, a detailed comparison of reviewed methods takes place for better understanding of the existing models. An extensive experimental study is also performed to analyze the performance of data mining algorithms.


Sign in / Sign up

Export Citation Format

Share Document