Critically analyze experimental results

Assignment Help Computer Engineering
Reference no: EM131469155

Assignment - Data Mining Practice and Analysis

Aims

- Familiarise with some well-known data mining techniques in order to understand their working principles;
- Apply data mining techniques to domain-specific datasets;
- Review cutting-edge data mining techniques to gain good overview on current data mining technology;

Requirements (Tasks)

The whole task of this assignment consists of the following procedural steps.

Step 1 :
Set up (by your imagination of a real-like business situation or by applying an actual analysis problem case) a scenario in which you are given a set of domain-specific dataset and asked to analyze the given dataset. The purpose of the analysis might be to understand (overview or learn about) the given data or to solve a specific analytical problem - depending on the scenario you made up.

Step 2 :
Find and get your own domain-specific dataset to fit for the scenario you made up. The dataset could be unique or publicly available. Some public datasets are available from the UCI machine learning repository (https://archive.ics.uci.edu/ml/).

Step 3 :
Choose appropriate data mining techniques (algorithms) - see more details for each option in Step 4 below.
** Note: The procedural order of the above three steps can be alternated. For example, you may find an interesting dataset first and then set up a specific data-mining scenario which fits for the analysis on the dataset chosen. **

Step 4 :

You can select either of two options for this assignment.

- Option (1) - Programming-intensive Assignment

- Once you have your own domain-specific dataset and chosen data mining algorithm, then you need to design and implement the chosen algorithm in your preferred programming language.

- A series of preprocessing will be required at this step. The preprocessing procedure should be designed carefully (considering what kind of processing will be required? How? Why?) to make your data ready to be fed to your program. Some parts of this preprocessing procedure can be included in your program as a part of "pre-data-mining module".

- Your final program must become a stand-alone data-mining tool designed for your own purpose of data analysis. It is expected that your program should include the following modules (and may include more sub-modules if needed);

1) pre-data-mining module - designed for necessary preprocessing and for getting the data ready to be fed to the next module (data-mining module). You don't need to include all required pre-processing in this module. It is assumed that some initial preprocessing (e.g. cleaning noise data) can be done externally using other software tools (e.g. Excel or Weka).

2) data-mining module - the chosen data mining algorithm is implemented. You can directly borrow the algorithm from one popular existing data mining method, or you can design your own algorithm (by amending the existing one)

3) post-mining module - this module is for presenting/reporting the output result produced through previous modules. The result can be made in a simple text report or additionally in a non-text visualization way (e.g. graph, chart or diagram).

- This programming-intensive assignment still requires an analysis. Try to find all the patterns you can detect with your implemented algorithm. Try to compare and contrast the result using your chosen preprocessing scheme and algorithm with using other existing algorithm or with using other preprocessing methods.

Note: in particular for the comparison the result using your program with using other existing algorithm, you can use other existing data mining tools (e.g. Weka) to get the result using other algorithm.

- Option (2) - Analysis-intensive Assignment

- Once you have your own domain-specific dataset chosen, you need to design your own data-mining analysis scheme. This analysis scheme can consist of multiple steps of procedures:

1) Set up a strategy for preprocessing on your data.
A series of preprocessing will be required and need to be designed carefully (considering what kind of processing will be required? How? Why?). You may include multiple different preprocessing schemes for the comparison analysis.

2) Set up a strategy for data-mining.

you need to select one data mining areas (clustering, classification, association rules mining) of your choice and select AT LEAST TWO existing data mining algorithms in your chosen data mining area. For example, if you chose Clustering as your data mining area, you can apply two algorithms; DBScan and K-mean and compare the two results. Alternatively you can design a combined algorithm which applies multiple algorithms from same/different data mining areas in a series. Your strategy also can be designed to apply different parameters for one algorithm. Another strategy you can set up is to apply multiple preprocessing (attribute selection) schemes for one algorithm.

- You can choose one data mining tool (e.g. Weka) to analyze your chosen dataset. Apply the data-mining strategy (you had set up) on your chosen data (preprocessed) using the data mining tool and try to find all the patterns you can detect.

- Do various comparison experiments either by applying different data mining algorithms (or strategy) to the same chosen dataset or by applying a same algorithm to the differently pre-processed datasets.

- Critically analyze experimental results and discuss/demonstrate why a chosen algorithm (strategy) is superior/inferior to other algorithm (strategy).
Step 5 :

- You need to present an in-class presentation (15 minutes presentation + 5 minutes question) based on your chosen algorithm (strategy) and experimental test, and also you need to write a scientific paper as an experimental report.
The presentation must generally include a good overview on your project, aims/objectives, reasons of your choice, brief overview of strategy/algorithm you chosen, findings, comparison including experimental results and conclusion.

You need to write a research report paper of not more than 15 pages (for CP3403 students) or not more than 20 pages (for CP5605/CP5634 students) in length on your project to summarise your algorithm and experimental results. The report should contain all topics listed above for presentation but with more details. For CP5605/CP5634 students, you need to add in your report one additional section for a brief (mini) literature review about the data mining methods (strategy, algorithm and/or preprocessing methods) you chose for your project.

- The research paper must follow the generally accepted format of research article consisting of introduction, related work (brief review of methodologies (algorithm/strategy used), a summarized description of your experimental settings and procedures (description of data, justification of chosen data mining area, justification of chosen algorithm, preprocessing details, etc.), comparison, discussion, issues, conclusion, possible future work and a list of references. (you may add more sections if needed)

- In addition to the general components listed above, the report from "Programming-intensive option" should include a summary of your program (including the program structure, implementation details, a summarized algorithm for the main modules etc. including code if necessary).

- For "Analysis-intensive option", it is required to include a more in-depth analysis on the investigation and experimental comparison made through the project.

Reference no: EM131469155

Questions Cloud

List and define the interpersonal managerial leadership role : List and define the interpersonal managerial leadership roles. List and define the informational managerial leadership roles.
What steps might the united states take : What steps might the United States take, from the global down to organizational level, to maintain high standards to provide outstanding care-based services?
List and define the leadership theory paradigms : List and define the leadership theory paradigms. How can the shift in paradigm from management to leadership possibly help--and hurt--the management profession?
Defines the authority of warrantied contracting officers : Using the FAR and choose one (FAR) part and provide a briefing description of it's purpose. defines the authority of a warrantied contracting officers, and resp
Critically analyze experimental results : CP3403/CP5634 Assignment - The purpose of the analysis might be to understand (overview or learn about) the given data or to solve a specific analytical problem
Define the leadership theory classification : Fortune ranked Apple #1 on its list of America's and the World's Most Admired Companies,115 and Steve Jobs was ranked #1 on its Most Powerful Businesspeople.
Cognitive-developemental theory differ from learning theory : How does the Cognitive-Developemental theory differ from the Learning theory?
Describe a time you experienced a personality conflict : Describe a time you experienced a personality conflict, and how you addressed it. How emotional intelligence and understanding personality types are important?
Determine the appropriate upper and lower control limits : Determine the appropriate upper and lower control limits for the percentage of students absent.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Reasons to incorporate the venturing

Explain how are corporate ventures differentiated from other projects within the large organizations and from the entrepreneurial start-ups? List some of the reasons which incorporate the venturing has had a relatively poor track record?

  Define how much more secure is this double encryption

find two substitution ciphers. One adds a value of i to the ASCII code of the plaintext character. The other adds a value of j to the plaintext character. All additions are modulo 256.

  What is required to define a well-posed learning problem

What is required to define a well-posed learning problem? Here are two potential real-world application tasks for machine learning: a winery wishes to uncover relationships between records of the quantitative analyses of its wines from the lab and s..

  Your quality improvement circle has been assigned the task

your quality improvement circle has been assigned the task of creating a presentation regarding system security as it

  Define the facts they have learned simultaneously hold

An efficient algorithm is proposed to do this: either it produces proposed dates of birth and death for each of the n people so that all facts hold true, or it reports (correctly) that no such dates can exist. That is the facts collected by the sci..

  Concept of software integration

Explain how hospitals, manufacturing, retailing, education, construction, agribusiness, and shipping are improving efforts with their supply chain through the evolution of software.

  Network security planning

Securing a large internetwork is considered as a daunting challenge. Cloud computing and the social networks add to this complexity. In two to three (2-3) pages.

  Make instances of each class

plan a Java class named Person with fields for holding a person's name, address and telephone number.

  Write down some of the benefits that cascading style sheets

what are two site examples that have images or multimedia that are used effectively on the site? why do you think they

  Explain the operation of the mips andi instruction

In decimal and in instruction format order, what registers (if any) represent rd, rs, rt? Hint rd is not always used. If you think no registers are used, state it.

  Imagine we want to add to the sterling class

a penny may be further divided into halfpennies and farthings -> farthing worth 1/4 of a penny. There was a halfpenny coin, farthing coin, halffarthing coin.

  Demonstrate that this mac scheme is not secure

Demonstrate that this MAC scheme is not secure for variable length messages - Write pseudocode for an algorithm, F, that, given a tagging oracle

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd