Critically analyze experimental results

Assignment Help Computer Engineering
Reference no: EM131469155

Assignment - Data Mining Practice and Analysis

Aims

- Familiarise with some well-known data mining techniques in order to understand their working principles;
- Apply data mining techniques to domain-specific datasets;
- Review cutting-edge data mining techniques to gain good overview on current data mining technology;

Requirements (Tasks)

The whole task of this assignment consists of the following procedural steps.

Step 1 :
Set up (by your imagination of a real-like business situation or by applying an actual analysis problem case) a scenario in which you are given a set of domain-specific dataset and asked to analyze the given dataset. The purpose of the analysis might be to understand (overview or learn about) the given data or to solve a specific analytical problem - depending on the scenario you made up.

Step 2 :
Find and get your own domain-specific dataset to fit for the scenario you made up. The dataset could be unique or publicly available. Some public datasets are available from the UCI machine learning repository (https://archive.ics.uci.edu/ml/).

Step 3 :
Choose appropriate data mining techniques (algorithms) - see more details for each option in Step 4 below.
** Note: The procedural order of the above three steps can be alternated. For example, you may find an interesting dataset first and then set up a specific data-mining scenario which fits for the analysis on the dataset chosen. **

Step 4 :

You can select either of two options for this assignment.

- Option (1) - Programming-intensive Assignment

- Once you have your own domain-specific dataset and chosen data mining algorithm, then you need to design and implement the chosen algorithm in your preferred programming language.

- A series of preprocessing will be required at this step. The preprocessing procedure should be designed carefully (considering what kind of processing will be required? How? Why?) to make your data ready to be fed to your program. Some parts of this preprocessing procedure can be included in your program as a part of "pre-data-mining module".

- Your final program must become a stand-alone data-mining tool designed for your own purpose of data analysis. It is expected that your program should include the following modules (and may include more sub-modules if needed);

1) pre-data-mining module - designed for necessary preprocessing and for getting the data ready to be fed to the next module (data-mining module). You don't need to include all required pre-processing in this module. It is assumed that some initial preprocessing (e.g. cleaning noise data) can be done externally using other software tools (e.g. Excel or Weka).

2) data-mining module - the chosen data mining algorithm is implemented. You can directly borrow the algorithm from one popular existing data mining method, or you can design your own algorithm (by amending the existing one)

3) post-mining module - this module is for presenting/reporting the output result produced through previous modules. The result can be made in a simple text report or additionally in a non-text visualization way (e.g. graph, chart or diagram).

- This programming-intensive assignment still requires an analysis. Try to find all the patterns you can detect with your implemented algorithm. Try to compare and contrast the result using your chosen preprocessing scheme and algorithm with using other existing algorithm or with using other preprocessing methods.

Note: in particular for the comparison the result using your program with using other existing algorithm, you can use other existing data mining tools (e.g. Weka) to get the result using other algorithm.

- Option (2) - Analysis-intensive Assignment

- Once you have your own domain-specific dataset chosen, you need to design your own data-mining analysis scheme. This analysis scheme can consist of multiple steps of procedures:

1) Set up a strategy for preprocessing on your data.
A series of preprocessing will be required and need to be designed carefully (considering what kind of processing will be required? How? Why?). You may include multiple different preprocessing schemes for the comparison analysis.

2) Set up a strategy for data-mining.

you need to select one data mining areas (clustering, classification, association rules mining) of your choice and select AT LEAST TWO existing data mining algorithms in your chosen data mining area. For example, if you chose Clustering as your data mining area, you can apply two algorithms; DBScan and K-mean and compare the two results. Alternatively you can design a combined algorithm which applies multiple algorithms from same/different data mining areas in a series. Your strategy also can be designed to apply different parameters for one algorithm. Another strategy you can set up is to apply multiple preprocessing (attribute selection) schemes for one algorithm.

- You can choose one data mining tool (e.g. Weka) to analyze your chosen dataset. Apply the data-mining strategy (you had set up) on your chosen data (preprocessed) using the data mining tool and try to find all the patterns you can detect.

- Do various comparison experiments either by applying different data mining algorithms (or strategy) to the same chosen dataset or by applying a same algorithm to the differently pre-processed datasets.

- Critically analyze experimental results and discuss/demonstrate why a chosen algorithm (strategy) is superior/inferior to other algorithm (strategy).
Step 5 :

- You need to present an in-class presentation (15 minutes presentation + 5 minutes question) based on your chosen algorithm (strategy) and experimental test, and also you need to write a scientific paper as an experimental report.
The presentation must generally include a good overview on your project, aims/objectives, reasons of your choice, brief overview of strategy/algorithm you chosen, findings, comparison including experimental results and conclusion.

You need to write a research report paper of not more than 15 pages (for CP3403 students) or not more than 20 pages (for CP5605/CP5634 students) in length on your project to summarise your algorithm and experimental results. The report should contain all topics listed above for presentation but with more details. For CP5605/CP5634 students, you need to add in your report one additional section for a brief (mini) literature review about the data mining methods (strategy, algorithm and/or preprocessing methods) you chose for your project.

- The research paper must follow the generally accepted format of research article consisting of introduction, related work (brief review of methodologies (algorithm/strategy used), a summarized description of your experimental settings and procedures (description of data, justification of chosen data mining area, justification of chosen algorithm, preprocessing details, etc.), comparison, discussion, issues, conclusion, possible future work and a list of references. (you may add more sections if needed)

- In addition to the general components listed above, the report from "Programming-intensive option" should include a summary of your program (including the program structure, implementation details, a summarized algorithm for the main modules etc. including code if necessary).

- For "Analysis-intensive option", it is required to include a more in-depth analysis on the investigation and experimental comparison made through the project.

Reference no: EM131469155

Questions Cloud

List and define the interpersonal managerial leadership role : List and define the interpersonal managerial leadership roles. List and define the informational managerial leadership roles.
What steps might the united states take : What steps might the United States take, from the global down to organizational level, to maintain high standards to provide outstanding care-based services?
List and define the leadership theory paradigms : List and define the leadership theory paradigms. How can the shift in paradigm from management to leadership possibly help--and hurt--the management profession?
Defines the authority of warrantied contracting officers : Using the FAR and choose one (FAR) part and provide a briefing description of it's purpose. defines the authority of a warrantied contracting officers, and resp
Critically analyze experimental results : CP3403/CP5634 Assignment - The purpose of the analysis might be to understand (overview or learn about) the given data or to solve a specific analytical problem
Define the leadership theory classification : Fortune ranked Apple #1 on its list of America's and the World's Most Admired Companies,115 and Steve Jobs was ranked #1 on its Most Powerful Businesspeople.
Cognitive-developemental theory differ from learning theory : How does the Cognitive-Developemental theory differ from the Learning theory?
Describe a time you experienced a personality conflict : Describe a time you experienced a personality conflict, and how you addressed it. How emotional intelligence and understanding personality types are important?
Determine the appropriate upper and lower control limits : Determine the appropriate upper and lower control limits for the percentage of students absent.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd