Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005.

Similar presentations


Presentation on theme: "Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005."— Presentation transcript:

1 Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005

2 Objective of the Unit l This unit gives an overview of various information management technologies. In addition some details of data mining will also be given.

3 Outline of the Unit l What is Information Management? l Some Information Management Technologies l Information management Applications l Data Mining

4 Revisiting the DM/IM/KM Framework Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Information Management Database Systems Information Retrieval Data Warehouse Security Distributed/ Federated Data Security Object/Multimedia Security PrivacySecure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Semantic Web Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Information Management Database Systems Information Retrieval Data Warehouse Security Distributed/ Federated Data Security Object/Multimedia Security PrivacySecure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Semantic Web Information Management Database Systems Information Retrieval Data Warehouse Security Distributed and Heterogeneous Database Security Object Database Security Privacy Secure Knowledge Digital Forensics Web Sensor Database Security Relational Database Security Inference Problem Secure Information Management Technologies Data Mining And Security Database Security Dependable Information Management Knowledge Management Information and Computer Security BiometricsSecure Digital Libraries Data Management Technologies Heterogeneous Database Management Relational Database Systems Secure Database Systems Data Warehouse Systems Peer-to-Peer Information Management Multimedia Information System Knowledge Portals Knowledge Creation and Acquisition Knowledge Mining Web Sensor Information Management Data Mining Semantic Web Expert systems and Reasoning under uncertainty Knowledge Sharing Information Management Knowledge Manipulation Distributed Databases Object Database Knowledge Models Knowledge Representation Knowledge Management Technologies Information Management Technologies Each layer builds on the technologies of the lower layers

5 What is Information Management? l Information management essentially analyzes the data and makes sense out of the data l Several technologies have to work together for effective information management - Data Warehousing: Extracting relevant data and putting this data into a repository for analysis - Data Mining: Extracting information from the data previously unknown - Multimedia: managing different media including text, images, video and audio - Web: managing the databases and libraries on the web

6 Data Warehouse Oracle DBMS for Employees Sybase DBMS for Projects Informix DBMS for Medical Data Warehouse: Data correlating Employees With Medical Benefits and Projects Could be any DBMS; Usually based on the relational data model Users Query the Warehouse

7 Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Thuraisingham 1998)

8 Multimedia Information Management Video Source Scene Change Detection Speaker Change Detection Silence Detection Commercial Detection Key Frame Selection Story Segmentation Named Entity Tagging Broadcast News Editor (BNE) Broadcast News Navigator (BNN) Video and Metadata Multimedia Database Management System Web-based Search/Browse by Program, Person, Location,... Imagery Audio Closed Caption Text Segregate Video Streams Analyze and Store Video and Metadata Story GIST Theme Frame Classifier Closed Caption Preprocess Correlation Token Detection Broadcast Detection

9 Semantic Web 0 Some Challenges: Security and Privacy cut across all layers; Integration of Services; Composability XML, XML Schemas Rules/Query Logic, Proof and Trust TRUSTTRUST Other Services RDF, Ontologies URI, UNICODE PRIVACYPRIVACY 0 Adapted from Tim Berners Lee’s description of the Semantic Web

10 Semantic Web Technologies l Web Database/Information Management - Information retrieval and Digital Libraries l XML, RDF and Ontologies - Representation information l Information Interoperability - Integrating heterogeneous data and information sources l Intelligent agents - Agents for locating resources, managing resources, querying resources and understanding web pages l Semantic Grids - Integrating semantic web with grid computing technologies

11 Secure Data Sharing Across Coalitions Export Data/Policy Component Data/Policy for Agency A Data/Policy for Coalition Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy

12 Some Emerging Information Management Technologies l Visualization - Visualization tools enable the user to better understand the information l Peer-to-Peer Information Management - Peers communicate with each other, share resources and carry out tasks l Sensor and Wireless Information Management - Autonomous sensors cooperating with one another, gathering data, fusing data and analyzing the data - Integrating wireless technologies with semantic web technologies

13 Information Management for Applications: Examples l Decision Support l E-Commerce l Collaboration l Training l Knowledge Management l Virtual Organizations and Dynamic Coalitions

14 Outline of Data Mining l What is Data Mining l Steps to Data Mining l Need for Data Mining l Example Applications l Technologies for Data Mining l Why Data Mining Now? l Preparation for Data Mining l Data Mining Tasks, Methodology, Techniques l Commercial Developments l Status, Challenges, and Directions l Example Data Mining Technique

15 Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Thuraisingham 1998)

16 Steps to Data Mining Data Sources Integrate data sources Clean/ modify data sources Mine the data Examine Results/ Prune results Report final results

17 l Large amounts of current and historical data being stored l As databases grow larger, decision-making from the data is not possible; need knowledge derived from the stored data l Data for multiple data sources and multiple domains - Medical, Financial, Military, etc. l Need to analyze the data - Support for planning (historical supply and demand trends) - Yield management (scanning airline seat reservation data to maximize yield per seat) - System performance (detect abnormal behavior in a system) - Mature database analysis (clean up the data sources) Need for Data Mining

18 Example Applications l Medical supplies company increases sales by targeting certain physicians in its advertising who are likely to buy the products l A credit bureau limits losses by selecting candidates who are likely not to default on their payment l An Intelligence agency determines abnormal behavior of its employees l An investigation agency finds fraudulent behavior of some people

19 Integration of Multiple Technologies Machine Learning Database Management Artificial Intelligence Statistics Data Mining Visualization Parallel Processing

20 Why Data Mining Now? l Large amounts of data is being produced l Data is being organized l Technologies are developing for database management, data warehousing, parallel processing, machine intelligent, etc. l It is now possible to mine the data and get patterns and trends l Interesting applications exist

21 Preparation for Data Mining l Getting the data into the right format l Data warehousing l Scrubbing and cleaning the data l Some idea of application domain l Determining the types of outcomes - e.g., Clustering, classification l Evaluation of tools l Getting the staff trained in data mining

22 Some Types of Data Mining (Data Mining Tasks) l Classification – grouping records into meaningful subclasses - e.g., Marketing organization has a list of people living in Manhattan all owning cars costing over 20K l Sequence Detection - John always buys groceries after going to the bank l Data dependency analysis – identifying potentially interesting dependencies or relationships among data items - If John, James, and Jane meet, Bill is also present l Deviation detection – discovery of significant differences between an observation and some reference - Anomalous instances - Discrepancies between observed and expected values

23 Data Mining Methodology (or Approach) l Top-down - Hypothesis testing l Validate beliefs l Bottom-up - Discover patterns - Directed l Some idea what you want to get - Undirected l Start from fresh

24 Some Data Mining Techniques l Market Basket analysis l Decision Trees l Neural networks l Link Analysis l Genetic Algorithms l Automatic Cluster Detection l Inductive logic programming

25 Commercial Developments in Data Mining: Some Products l WizSoft - WhizWhy l Hugin - Hugin l IBM - Intelligent Miner l Red Brick - DataMind l Neo Vista - Decision Series l Reduct Systems - Datalogic/R l IDIS - Information Discovery l Lockheed Martin - Recon l Nicesoft – Nicel l SAS – Enterprise Miner

26 Current Status, Challenges and Directions l Status - Data Mining is now a technology - Several prototypes and tools exist; Many or almost all of them work on relational databases l Challenges - Mining large quantities of data; Dealing with noise and uncertainty, reasoning with incomplete data l Directions - Mining multimedia and text databases, Web mining (structure, usage and content), Mining metadata, Real- time data mining

27 Example Data Mining Technique: What is Market Basket Analysis? l Market basket analysis is a collection of techniques that will discover rules such as what items are purchased together l It has roots in point of sale transactions; but has gone beyond this applications - E.g., who travels together, who is seen with whom, etc. l Market basket analysis is used as a starting point when transactions data is available and we are not sure of the patterns we are looking for - Find items that are purchased together l Essentially market basket analysis produces association rules

28 Example l PersonCountries Visited l JohnEngland, France l JamesGermany, England, Switzerland l WilliamEngland, Austria l MaryEngland, Austria, France l JaneSwitzerland, France Co-Occurrence Table England Switzerland Germany France Austria England 4 1 1 2 2 Switzerland 1 2 1 1 0 Germany 1 1 1 0 0 France 2 1 0 3 1 Austria 2 0 0 1 2

29 Example (Concluded) l England and France / England and Austria are more likely to be traveled together than any other two countries l Austria is never traveled together with Germany or Switzerland l Germany is never traveled together with Austria or France l Rule: - If a person travels to France then he/she also travels to England Support for this rule is 2 out of 5 and that is 40% since 2 trips out of five support this rule Confidence for this rule is 66% since two out of three trips that contain France also contains England That is, if France then England rule has support 40% and confidence 66% l Challenge: How to automatically generate the rules

30 Basic Process l Choosing the right set of items - Need to gather the right set of transaction data and the right level of detail, ensuring data quality l Generating rules from the data - Generate co-occurrence matrix for single items - Generate co-occurrence matrix with 2 items and use this to find rules with 2 items - Generate co-occurrence matrix with 3 items and use this to find rules with 3 items; etc. - - - l Overcoming practical limits imposed by thousand of items - Avoid combinatorial explosions

31 Association Rules l Rules that find associations in data l Example of a association rule is (x1, x2, x3}  x4 meaning that if x1, x2, and x3 are purchased x4 is also purchased l Association rules have confidence values - Strong rules are rules with confidence value above a threshold l Challenge is to improve the algorithm - E.g., Partition-based approach, sampling

32 Challenges and Directions l Performance improvements l Applying techniques for web mining including web content mining, web structure mining and web usage mining l Finding associations in text - Associations between words in a document or multiple documents


Download ppt "Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #3 Information Management and Data Mining August 29, 2005."

Similar presentations


Ads by Google