Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005.

Slides:



Advertisements
Similar presentations
Data Mining Glen Shih CS157B Section 1 Dr. Sin-Min Lee April 4, 2006.
Advertisements

Data warehouse example
Data Mining By Archana Ketkar.
Data Mining – Intro.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
TURKISH STATISTICAL INSTITUTE INFORMATION TECHNOLOGIES DEPARTMENT (Muscat, Oman) DATA MINING.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
OLAM and Data Mining: Concepts and Techniques. Introduction Data explosion problem: –Automated data collection tools and mature database technology lead.
Data Management Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition.
Chapter 1 Introduction to Data Mining
INTRODUCTION TO DATA MINING MIS2502 Data Analytics.
1 1 Slide Introduction to Data Mining and Business Intelligence.
Introduction to Data, Information and Knowledge Management Dr. Bhavani Thuraisingham The University of Texas at Dallas Data, Information and Knowledge.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data Mining for Security Applications Dr. Bhavani Thuraisingham The University of Texas at Dallas January 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Data MINING Data mining is the process of extracting previously unknown, valid and actionable information from large data and then using the information.
Ihr Logo Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - I September.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Supporting Technologies August 27, 2008.
MIS2502: Data Analytics Advanced Analytics - Introduction.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Access Control in Data.
DATA MINING PREPARED BY RAJNIKANT MODI REFERENCE:DOUG ALEXANDER.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #17 Data Warehousing, Data.
Academic Year 2014 Spring Academic Year 2014 Spring.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Supporting Technologies: Databases, Information.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Supporting Technologies.
Waqas Haider Bangyal. 2 Source Materials “ Data Mining: Concepts and Techniques” by Jiawei Han & Micheline Kamber, Second Edition, Morgan Kaufmann, 2006.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - I.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Supporting Technologies:
Data Mining – Intro.
Data and Applications Security
MIS2502: Data Analytics Advanced Analytics - Introduction
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Introduction C.Eng 714 Spring 2010.
Data and Applications Security Introduction to Data Mining
Introduction to Data, Information and Knowledge Management
Data and Applications Security Developments and Directions
Data Warehousing and Data Mining
Information and Security Analytics
Analyzing and Securing Social Networks
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Access Control in Data Management Systems
Data and Applications Security
Data and Applications Security
Data and Applications Security
Presentation transcript:

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005

Objective of the Unit l This unit gives an overview of various information management technologies. In addition some details of data mining will also be given.

Outline of the Unit l What is Information Management? l Some Information Management Technologies l Information management Applications l Data Mining

Revisiting the DM/IM/KM Framework Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Information Management Database Systems Information Retrieval Data Warehouse Security Distributed/ Federated Data Security Object/Multimedia Security PrivacySecure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Semantic Web Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Information Management Database Systems Information Retrieval Data Warehouse Security Distributed/ Federated Data Security Object/Multimedia Security PrivacySecure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Semantic Web Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Data Management Technologies Heterogeneous Database Management Relational Database Systems Secure Database Systems Data Warehouse Systems Peer-to-Peer Information Management Multimedia Information System Knowledge Portals Knowledge Creation and Acquisition Knowledge Mining Web Sensor Information Management Data Mining Semantic Web Expert systems and Reasoning under uncertainty Knowledge Sharing Information Management Knowledge Manipulation Distributed Databases Object Database Knowledge Models Knowledge Representation Knowledge Management Technologies Information Management Technologies Each layer builds on the technologies of the lower layers

What is Information Management? l Information management essentially analyzes the data and makes sense out of the data l Several technologies have to work together for effective information management - Data Warehousing: Extracting relevant data and putting this data into a repository for analysis - Data Mining: Extracting information from the data previously unknown - Multimedia: managing different media including text, images, video and audio - Web: managing the databases and libraries on the web

Data Warehouse Oracle DBMS for Employees Sybase DBMS for Projects Informix DBMS for Medical Data Warehouse: Data correlating Employees With Medical Benefits and Projects Could be any DBMS; Usually based on the relational data model Users Query the Warehouse

Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Thuraisingham 1998)

Multimedia Information Management Video Source Scene Change Detection Speaker Change Detection Silence Detection Commercial Detection Key Frame Selection Story Segmentation Named Entity Tagging Broadcast News Editor (BNE) Broadcast News Navigator (BNN) Video and Metadata Multimedia Database Management System Web-based Search/Browse by Program, Person, Location,... Imagery Audio Closed Caption Text Segregate Video Streams Analyze and Store Video and Metadata Story GIST Theme Frame Classifier Closed Caption Preprocess Correlation Token Detection Broadcast Detection

Semantic Web 0 Some Challenges: Security and Privacy cut across all layers; Integration of Services; Composability XML, XML Schemas Rules/Query Logic, Proof and Trust TRUSTTRUST Other Services RDF, Ontologies URI, UNICODE PRIVACYPRIVACY 0 Adapted from Tim Berners Lee’s description of the Semantic Web

Semantic Web Technologies l Web Database/Information Management - Information retrieval and Digital Libraries l XML, RDF and Ontologies - Representation information l Information Interoperability - Integrating heterogeneous data and information sources l Intelligent agents - Agents for locating resources, managing resources, querying resources and understanding web pages l Semantic Grids - Integrating semantic web with grid computing technologies

Secure Data Sharing Across Coalitions Export Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy

Some Emerging Information Management Technologies l Visualization - Visualization tools enable the user to better understand the information l Peer-to-Peer Information Management - Peers communicate with each other, share resources and carry out tasks l Sensor and Wireless Information Management - Autonomous sensors cooperating with one another, gathering data, fusing data and analyzing the data - Integrating wireless technologies with semantic web technologies

Information Management for Applications: Examples l Decision Support l E-Commerce l Collaboration l Training l Knowledge Management l Virtual Organizations and Dynamic Coalitions

Outline of Data Mining l What is Data Mining l Steps to Data Mining l Need for Data Mining l Example Applications l Technologies for Data Mining l Why Data Mining Now? l Preparation for Data Mining l Data Mining Tasks, Methodology, Techniques l Commercial Developments l Status, Challenges, and Directions l Example Data Mining Technique

Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Thuraisingham 1998)

Steps to Data Mining Data Sources Integrate data sources Clean/ modify data sources Mine the data Examine Results/ Prune results Report final results

l Large amounts of current and historical data being stored l As databases grow larger, decision-making from the data is not possible; need knowledge derived from the stored data l Data for multiple data sources and multiple domains - Medical, Financial, Military, etc. l Need to analyze the data - Support for planning (historical supply and demand trends) - Yield management (scanning airline seat reservation data to maximize yield per seat) - System performance (detect abnormal behavior in a system) - Mature database analysis (clean up the data sources) Need for Data Mining

Example Applications l Medical supplies company increases sales by targeting certain physicians in its advertising who are likely to buy the products l A credit bureau limits losses by selecting candidates who are likely not to default on their payment l An Intelligence agency determines abnormal behavior of its employees l An investigation agency finds fraudulent behavior of some people

Integration of Multiple Technologies Machine Learning Database Management Artificial Intelligence Statistics Data Mining Visualization Parallel Processing

Why Data Mining Now? l Large amounts of data is being produced l Data is being organized l Technologies are developing for database management, data warehousing, parallel processing, machine intelligent, etc. l It is now possible to mine the data and get patterns and trends l Interesting applications exist

Preparation for Data Mining l Getting the data into the right format l Data warehousing l Scrubbing and cleaning the data l Some idea of application domain l Determining the types of outcomes - e.g., Clustering, classification l Evaluation of tools l Getting the staff trained in data mining

Some Types of Data Mining (Data Mining Tasks) l Classification – grouping records into meaningful subclasses - e.g., Marketing organization has a list of people living in Manhattan all owning cars costing over 20K l Sequence Detection - John always buys groceries after going to the bank l Data dependency analysis – identifying potentially interesting dependencies or relationships among data items - If John, James, and Jane meet, Bill is also present l Deviation detection – discovery of significant differences between an observation and some reference - Anomalous instances - Discrepancies between observed and expected values

Data Mining Methodology (or Approach) l Top-down - Hypothesis testing l Validate beliefs l Bottom-up - Discover patterns - Directed l Some idea what you want to get - Undirected l Start from fresh

Some Data Mining Techniques l Market Basket analysis l Decision Trees l Neural networks l Link Analysis l Genetic Algorithms l Automatic Cluster Detection l Inductive logic programming

Commercial Developments in Data Mining: Some Products l WizSoft - WhizWhy l Hugin - Hugin l IBM - Intelligent Miner l Red Brick - DataMind l Neo Vista - Decision Series l Reduct Systems - Datalogic/R l IDIS - Information Discovery l Lockheed Martin - Recon l Nicesoft – Nicel l SAS – Enterprise Miner

Current Status, Challenges and Directions l Status - Data Mining is now a technology - Several prototypes and tools exist; Many or almost all of them work on relational databases l Challenges - Mining large quantities of data; Dealing with noise and uncertainty, reasoning with incomplete data l Directions - Mining multimedia and text databases, Web mining (structure, usage and content), Mining metadata, Real- time data mining

Example Data Mining Technique: What is Market Basket Analysis? l Market basket analysis is a collection of techniques that will discover rules such as what items are purchased together l It has roots in point of sale transactions; but has gone beyond this applications - E.g., who travels together, who is seen with whom, etc. l Market basket analysis is used as a starting point when transactions data is available and we are not sure of the patterns we are looking for - Find items that are purchased together l Essentially market basket analysis produces association rules

Example l PersonCountries Visited l JohnEngland, France l JamesGermany, England, Switzerland l WilliamEngland, Austria l MaryEngland, Austria, France l JaneSwitzerland, France Co-Occurrence Table England Switzerland Germany France Austria England Switzerland Germany France Austria

Example (Concluded) l England and France / England and Austria are more likely to be traveled together than any other two countries l Austria is never traveled together with Germany or Switzerland l Germany is never traveled together with Austria or France l Rule: - If a person travels to France then he/she also travels to England Support for this rule is 2 out of 5 and that is 40% since 2 trips out of five support this rule Confidence for this rule is 66% since two out of three trips that contain France also contains England That is, if France then England rule has support 40% and confidence 66% l Challenge: How to automatically generate the rules

Basic Process l Choosing the right set of items - Need to gather the right set of transaction data and the right level of detail, ensuring data quality l Generating rules from the data - Generate co-occurrence matrix for single items - Generate co-occurrence matrix with 2 items and use this to find rules with 2 items - Generate co-occurrence matrix with 3 items and use this to find rules with 3 items; etc l Overcoming practical limits imposed by thousand of items - Avoid combinatorial explosions

Association Rules l Rules that find associations in data l Example of a association rule is (x1, x2, x3}  x4 meaning that if x1, x2, and x3 are purchased x4 is also purchased l Association rules have confidence values - Strong rules are rules with confidence value above a threshold l Challenge is to improve the algorithm - E.g., Partition-based approach, sampling

Challenges and Directions l Performance improvements l Applying techniques for web mining including web content mining, web structure mining and web usage mining l Finding associations in text - Associations between words in a document or multiple documents