New Page 1

LA GRAMMATICA DI ENGLISH GRATIS IN VERSIONE MOBILE   INFORMATIVA PRIVACY

  NUOVA SEZIONE ELINGUE

 

Selettore risorse   

   

 

                                         IL Metodo  |  Grammatica  |  RISPOSTE GRAMMATICALI  |  Multiblog  |  INSEGNARE AGLI ADULTI  |  INSEGNARE AI BAMBINI  |  AudioBooks  |  RISORSE SFiziosE  |  Articoli  |  Tips  | testi pAralleli  |  VIDEO SOTTOTITOLATI
                                                                                         ESERCIZI :   Serie 1 - 2 - 3  - 4 - 5  SERVIZI:   Pronunciatore di inglese - Dizionario - Convertitore IPA/UK - IPA/US - Convertitore di valute in lire ed euro                                              

 

 

WIKIBOOKS
DISPONIBILI
?????????

ART
- Great Painters
BUSINESS&LAW
- Accounting
- Fundamentals of Law
- Marketing
- Shorthand
CARS
- Concept Cars
GAMES&SPORT
- Videogames
- The World of Sports

COMPUTER TECHNOLOGY
- Blogs
- Free Software
- Google
- My Computer

- PHP Language and Applications
- Wikipedia
- Windows Vista

EDUCATION
- Education
LITERATURE
- Masterpieces of English Literature
LINGUISTICS
- American English

- English Dictionaries
- The English Language

MEDICINE
- Medical Emergencies
- The Theory of Memory
MUSIC&DANCE
- The Beatles
- Dances
- Microphones
- Musical Notation
- Music Instruments
SCIENCE
- Batteries
- Nanotechnology
LIFESTYLE
- Cosmetics
- Diets
- Vegetarianism and Veganism
TRADITIONS
- Christmas Traditions
NATURE
- Animals

- Fruits And Vegetables



ARTICLES IN THE BOOK

  1. ACNielsen
  2. Advertising
  3. Affiliate marketing
  4. Ambush marketing
  5. Barriers to entry
  6. Barter
  7. Billboard
  8. Brainstorming
  9. Brand
  10. Brand blunder
  11. Brand equity
  12. Brand management
  13. Break even analysis
  14. Break even point
  15. Business model
  16. Business plan
  17. Business-to-business
  18. Buyer leverage
  19. Buying
  20. Buying center
  21. Buy one, get one free
  22. Call centre
  23. Cannibalization
  24. Capitalism
  25. Case studies
  26. Celebrity branding
  27. Chain letter
  28. Co-marketing
  29. Commodity
  30. Consumer
  31. Convenience store
  32. Co-promotion
  33. Corporate branding
  34. Corporate identity
  35. Corporate image
  36. Corporate Visual Identity Management
  37. Customer
  38. Customer satisfaction
  39. Customer service
  40. Database marketing
  41. Data mining
  42. Data warehouse
  43. Defensive marketing warfare strategies
  44. Demographics
  45. Department store
  46. Design
  47. Designer label
  48. Diffusion of innovations
  49. Direct marketing
  50. Distribution
  51. Diversification
  52. Dominance strategies
  53. Duopoly
  54. Economics
  55. Economies of scale
  56. Efficient markets hypothesis
  57. Entrepreneur
  58. Family branding
  59. Financial market
  60. Five and dime
  61. Focus group
  62. Focus strategy
  63. Free markets
  64. Free price system
  65. Global economy
  66. Good
  67. Haggling
  68. Halo effect
  69. Imperfect competition
  70. Internet marketing
  71. Logo
  72. Mail order
  73. Management
  74. Market
  75. Market economy
  76. Market form
  77. Marketing
  78. Marketing management
  79. Marketing mix
  80. Marketing orientation
  81. Marketing plan
  82. Marketing research
  83. Marketing strategy
  84. Marketplace
  85. Market research
  86. Market segment
  87. Market share
  88. Market system
  89. Market trends
  90. Mass customization
  91. Mass production
  92. Matrix scheme
  93. Media event
  94. Mind share
  95. Monopolistic competition
  96. Monopoly
  97. Monopsony
  98. Multi-level marketing
  99. Natural monopoly
  100. News conference
  101. Nielsen Ratings
  102. Oligopoly
  103. Oligopsony
  104. Online marketing
  105. Opinion poll
  106. Participant observation
  107. Perfect competition
  108. Personalized marketing
  109. Photo opportunity
  110. Planning
  111. Positioning
  112. Press kit
  113. Price points
  114. Pricing
  115. Problem solving
  116. Product
  117. Product differentiation
  118. Product lifecycle
  119. Product Lifecycle Management
  120. Product line
  121. Product management
  122. Product marketing
  123. Product placement
  124. Profit
  125. Promotion
  126. Prototyping
  127. Psychographic
  128. Publicity
  129. Public relations
  130. Pyramid scheme
  131. Qualitative marketing research
  132. Qualitative research
  133. Quantitative marketing research
  134. Questionnaire construction
  135. Real-time pricing
  136. Relationship marketing
  137. Retail
  138. Retail chain
  139. Retail therapy
  140. Risk
  141. Sales
  142. Sales promotion
  143. Service
  144. Services marketing
  145. Slogan
  146. Spam
  147. Strategic management
  148. Street market
  149. Supply and demand
  150. Supply chain
  151. Supply Chain Management
  152. Sustainable competitive advantage
  153. Tagline
  154. Target market
  155. Team building
  156. Telemarketing
  157. Testimonials
  158. Time to market
  159. Trade advertisement
  160. Trademark
  161. Unique selling proposition
  162. Value added


 

 
CONDIZIONI DI USO DI QUESTO SITO
L'utente può utilizzare il nostro sito solo se comprende e accetta quanto segue:

  • Le risorse linguistiche gratuite presentate in questo sito si possono utilizzare esclusivamente per uso personale e non commerciale con tassativa esclusione di ogni condivisione comunque effettuata. Tutti i diritti sono riservati. La riproduzione anche parziale è vietata senza autorizzazione scritta.
  • Il nome del sito EnglishGratis è esclusivamente un marchio e un nome di dominio internet che fa riferimento alla disponibilità sul sito di un numero molto elevato di risorse gratuite e non implica dunque alcuna promessa di gratuità relativamente a prodotti e servizi nostri o di terze parti pubblicizzati a mezzo banner e link, o contrassegnati chiaramente come prodotti a pagamento (anche ma non solo con la menzione "Annuncio pubblicitario"), o comunque menzionati nelle pagine del sito ma non disponibili sulle pagine pubbliche, non protette da password, del sito stesso.
  • La pubblicità di terze parti è in questo momento affidata al servizio Google AdSense che sceglie secondo automatismi di carattere algoritmico gli annunci di terze parti che compariranno sul nostro sito e sui quali non abbiamo alcun modo di influire. Non siamo quindi responsabili del contenuto di questi annunci e delle eventuali affermazioni o promesse che in essi vengono fatte!
  • L'utente, inoltre, accetta di tenerci indenni da qualsiasi tipo di responsabilità per l'uso - ed eventuali conseguenze di esso - degli esercizi e delle informazioni linguistiche e grammaticali contenute sul siti. Le risposte grammaticali sono infatti improntate ad un criterio di praticità e pragmaticità più che ad una completezza ed esaustività che finirebbe per frastornare, per l'eccesso di informazione fornita, il nostro utente. La segnalazione di eventuali errori è gradita e darà luogo ad una immediata rettifica.

     

    ENGLISHGRATIS.COM è un sito personale di
    Roberto Casiraghi e Crystal Jones
    email: robertocasiraghi at iol punto it

    Roberto Casiraghi           
    INFORMATIVA SULLA PRIVACY              Crystal Jones


    Siti amici:  Lonweb Daisy Stories English4Life Scuolitalia
    Sito segnalato da INGLESE.IT

 
 



MARKETING
This article is from:
http://en.wikipedia.org/wiki/Data_mining

All text is available under the terms of the GNU Free Documentation License: http://en.wikipedia.org/wiki/Wikipedia:Text_of_the_GNU_Free_Documentation_License 

Data mining

From Wikipedia, the free encyclopedia

 

Data mining (DM), also called Knowledge-Discovery in Databases (KDD) or Knowledge-Discovery and Data Mining, is the process of automatically searching large volumes of data for patterns using tools such as classification, association rule mining, clustering, etc.. Data mining is a complex topic and has links with multiple core fields such as computer science and adds value to rich seminal computational techniques from statistics, information retrieval, machine learning and pattern recognition.

Example

A simple example of data mining, often called Market Basket Analysis, is its use for retail sales. If a clothing store records the purchases of customers, a data mining system could identify those customers who favour silk shirts over cotton ones.

Another is that of a supermarket chain who, through analysis of transactions over a long period of time, found that beer and diapers were often bought together. Although explaining this relationship may be difficult, taking advantage of it is easier, for example by placing the high-profit diapers in the store close to the high-profit beers. (This example is questioned at Beer and Nappies -- A Data Mining Urban Legend.)

The two examples above deal with association rules within transaction-based data. Not all data is transaction based and logical or inexact rules may also be present within a database. In a manufacturing application, an inexact rule may state that 73% of products which have have a specific defect or problem, will develop a secondary problem within the next 6 months.

Use of the term

Data mining has been defined as "the nontrivial extraction of implicit, previously unknown, and potentially useful information from data" [1] and "the science of extracting useful information from large data sets or databases" [2].

It involves sorting through large amounts of data and picking out relevant information.

It is usually used by businesses and other organizations, but is increasingly used in the sciences to extract information from the enormous data sets generated by modern experimentation.

Metadata, or data about a given set of data, are often expressed in a condensed data mine-able format, or one that facilitates the practice of data mining. Common examples include executive summaries and scientific abstracts.

Although data mining is a relatively new term, the technology is not. Companies for a long time have used powerful computers to sift through volumes of data such as supermarket scanner data, and produce market research reports. Continuous innovations in computer processing power, disk storage, and statistical software are dramatically increasing the accuracy and usefulness of analysis.

Data mining identifies trends within data that go beyond simple analysis. Through the use of sophisticated algorithms, users have the ability to identify key attributes of business processes and target opportunities.

The term data mining is often used to apply to the two separate processes of knowledge discovery and prediction. Knowledge discovery provides explicit information that has a readable form and can be understood by a user. Forecasting, or predictive modeling provides predictions of future events and may be transparent and readable in some approaches (e.g. rule based systems) and opaque in others such as neural networks. Moreover, some data mining systems such as neural networks are inherently geared towards prediction rather than knowledge discovery.

Related terms

Although the term "data mining" is usually used in relation to analysis of data, like artificial intelligence, it is an umbrella term with varied meanings in a wide range of contexts. Unlike data analysis, data mining is not based or focused on an existing model which is to be tested or whose parameters are to be optimized.

In statistical analyses where there is no underlying theoretical model, data mining is often approximated via stepwise regression methods wherein the space of 2k possible relationships between a single outcome variable and k potential explanatory variables is smartly searched. With the advent of parallel computing, it became possible (when k is less than approximately 40) to examine all 2k models. This procedure is called all subsets or exhaustive regression. Some of the first applications of exhaustive regression involved the study of plant data.[3]

Data dredging

Data dredging or data fishing are terms one may use to criticize someone's data mining efforts when it is felt the patterns or causal relationships discovered are unfounded.

Data dredging is the scanning of the data for any relationships, and then when one is found coming up with an interesting explanation. The conclusions may be suspect because data sets with large numbers of variables have by chance some "interesting" relationships. Fred Schwed [4] said:

"There have always been a considerable number of people who busy themselves examining the last thousand numbers which have appeared on a roulette wheel, in search of some repeating pattern. Sadly enough, they have usually found it."

Nevertheless, determining correlations in investment analysis has proven to be very profitable for statistical arbitrage operations (such as pairs trading strategies), and correlation analysis has shown to be very useful in risk management. Indeed, finding correlations in the financial markets, when done properly, is not the same as finding false patterns in roulette wheels.

Some exploratory data work is always required in any applied statistical analysis to get a feel for the data, so sometimes the line between good statistical practice and data dredging is less than clear.

Most data mining efforts are focused on developing highly detailed models of some large data set. Other researchers have described an alternate method that involves finding the minimal differences between elements in a data set, with the goal of developing simpler models that represent relevant data. [5]

When data sets contain a big set of variables, the level of statistical significance should be proportional to the patterns that were tested. For example, if we test 100 random patterns, it is expected that one of them will be "interesting" with a statistical significance at the 0.01 level.

Cross validation is a common approach to evaluating the fitness of a model generated via data mining, where the data is divided into a training subset and a test subset to respectively build and then test the model. Common cross validation techniques include the holdout method, k-fold cross validation, and the leave-one-out method.

Privacy concerns

There are also privacy concerns associated with data mining - specifically regarding the source of the data analyzed.

Data mining government or commercial data sets for national security or law enforcement purposes has also raised privacy concerns. [6]

There are many legitimate uses of data mining. For example, a database of prescription drugs taken by a group of people could be used to find combinations of drugs exhibiting harmful interactions. Since any particular combination may occur in only 1 out of 1000 people, a great deal of data would need to be examined to discover such an interaction. A project involving pharmacies could reduce the number of drug reactions and potentially save lives. Unfortunately, there is also a huge potential for abuse of such a database.

Essentially, data mining gives information that would not be available otherwise. It must be properly interpreted to be useful. When the data collected involves individual people, there are many questions concerning privacy, legality, and ethics.

Combinatorial game data mining

  • Data mining from combinatorial game oracles:

Since the early 1990s, with the availability of oracles for certain combinatorial games, also called tablebases (e.g. for 3x3-chess) with any beginning configuration, small-board dots-and-boxes, small-board-hex, and certain endgames in chess, dots-and-boxes, and hex; a new area for data mining has been opened up. This is the extraction of human-usable strategies from these oracles. This is pattern-recognition at too high an abstraction for known Statistical Pattern Recognition algorithms or any other algorithmic approaches to be applied: at least, no one knows how to do it yet (as of January 2005). The method used is the full force of Scientific Method: extensive experimentation with the tablebases combined with intensive study of tablebase-answers to well designed problems, combined with knowledge of prior art i.e. pre-tablebase knowledge, leading to flashes of insight. Berlekamp in dots-and-boxes etc. and John Nunn in chess endgames are notable examples of people doing this work, though they were not and are not involved in tablebase generation.

Notable uses of data mining

  • Data mining has been cited as the method by which the U.S. Army unit Able Danger supposedly had identified the 9/11 attack leader, Mohamed Atta, and three other 9/11 hijackers as possible members of an al Qaeda cell operating in the U.S. more than a year before the attack.
    • See also: Able Danger, wikinews:U.S. Army intelligence had detected 9/11 terrorists year before, says officer.
    • It has been suggested that both the CIA and their Canadian counterparts, CSIS, have put this method of interpreting data to work for them as well[7], although they have not said how.

Of course, two notable pitfalls in this type of justice application are the scarcity of suspect datapoints and the learning capabilities of adversaries. The first issue is based on the simple fact that a handful of suspects within a dataset of 200 million people usually yield patterns which are scientifically questionable and often result in pointless investigative efforts. The second issue is based on the fact that as adversaries change strategy, their patterns of past behavior fail to provide clues to future activities. Hence, while data mining may well give useful results when applied to the behavior of customers shopping at discounts stores, its applications within the justice system will for ever be hindered by the scarcity of suspect data and the natural dynamic changes in adversarial strategies.

See also

  • Artificial intelligence
  • Bayesian network
  • CRISP-DM
  • Data analysis
  • Data farming
  • Descriptive statistics
  • Fuzzy logic
  • Hypothesis testing
  • Java Data Mining (JSR-73, JSR-247)
  • k-nearest neighbor algorithm
  • Machine learning
  • Pattern recognition
  • Predictive analytics
  • Preprocessing
  • Statistics

Structured Data Mining

  • Concept mining
  • Database mining
    • Relational data mining
    • Database
    • Document warehouse
    • Data warehouse
  • Graph mining
    • Molecule mining
  • Sequence mining
    • Data stream mining
    • Learning from time-varying data streams under concept drift
  • Tree mining
    • Decision tree learning
  • Web mining

Unstructured Data Mining

  • Text mining
  • Image mining

Induction algorithms

Supervised learning

  • Artificial neural network
  • Decision tree learning
  • Linear discriminant analysis
  • Logit (in reference to logistic regression)
  • Naive Bayes
  • Nearest neighbor (pattern recognition)
  • Neural network
  • Quadratic classifier
  • Random forest
  • Support Vector Machine

Unsupervised learning

  • Apriori algorithm
  • Data clustering
  • Self-organizing map (SOM)

Dimensionality reduction

  • Feature selection
    • Information gain
  • Feature extraction
    • Principal components analysis (PCA)

Application areas

  • Business intelligence
  • Business performance management
  • Discovery Science
  • Loyalty card
  • Cheminformatics
    • Quantitative structure-activity relationship
  • Bioinformatics
  • Intelligence Services

Software

  • Essbase
  • Funnelback
  • Java Data Mining
  • MATLAB
  • Microsoft Analysis Services
  • MicroStrategy
  • Neural network software
  • Oracle Database
  • PolyAnalyst
  • R
  • ROOT
  • SPSS
  • Teradata
  • Weka
  • YALE

References

  1. ^ W. Frawley and G. Piatetsky-Shapiro and C. Matheus (Fall 1992). "Knowledge Discovery in Databases: An Overview". AI Magazine: pp. 213-228. ISSN 0738-4602.
  2. ^ D. Hand, H. Mannila, P. Smyth (2001). Principles of Data Mining. MIT Press, Cambridge, MA,. ISBN 0-262-08290-X.
  3. ^ A.G. Ivakhnenko (1970). "Heuristic Self-Organization in Problems of Engineering Cybernetics". Automatica 6: pp.207–219. ISSN 0005-1098..
  4. ^ Fred Schwed, Jr (1940). Where Are the Customers' Yachts?. ISBN 0-471-11979-2..
  5. ^ T. Menzies, Y. Hu (October 2003). "Data Mining For Very Busy People". IEEE Computer: pp. 18-25. ISSN 0018-9162..
  6. ^ K.A. Taipale (December 15, 2003). "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data". Colum. Sci. & Tech. L. Rev. 5 (2). SSRN 546782 / OCLC 45263753..
  7. ^ Stephen Haag et al.. Management Information Systems for the information age, pp 28. ISBN 0-07-095569-7.

General references

  • Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Introduction to Data Mining (2005), ISBN 0-321-32136-7 (companion book site)
  • Kurt Thearling, An Introduction to Data Mining (also available is a corresponding online tutorial)
  • Richard O. Duda, Peter E. Hart, David G. Stork, Pattern Classification, Wiley Interscience, ISBN 0-471-05669-3, (see also Powerpoint slides)
  • Phiroz Bhagat, Pattern Recognition in Industry, Elsevier, ISBN 0-08-044538-1
  • Ian Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations (2000), ISBN 1-55860-552-5, (see also Free Weka software)
  • Yike Guo and Robert Grossman, editors: High Performance Data Mining: Scaling Algorithms, Applications and Systems, Kluwer Academic Publishers, 1999.
  • Dean W. Abbott, I. Philip Matkovsky, and John Elder IV, Ph.D. An Evaluation of High-end Data Mining Tools for Fraud Detection published a comparative analysis of major high-end data mining software tools that was presented at the 1998 IEEE International Conference on Systems, Man, and Cybernetics, San Diego, CA, October 12-14, 1998.
  • Mierswa, Ingo and Wurst, Michael and Klinkenberg, Ralf and Scholz, Martin and Euler, Timm: YALE: Rapid Prototyping for Complex Data Mining Tasks, in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-06), 2006.
  • Mark F. Hornick, Erik Marcade, Sunil Venkayala: "Java Data Mining: Strategy, Standard, And Practice: A Practical Guide for Architecture, Design, And Implementation" (Broché)

External links

  • Data Mining at the Open Directory Project
Retrieved from "http://en.wikipedia.org/wiki/Data_mining"