The Application of Data Mining Methods In Monitoring of Ecosystems Jiri BILA and Jakub JURA Department of Instrumentation.

Slides:



Advertisements
Similar presentations
Deriving rules from data Decision Trees a.j.m.m (ton) weijters.
Advertisements

HEPTech meeting, CERN, 2nd December 2011Václav Vrba 1 Czech Technical University in Prague (CTU Prague)
Prof. Carolina Ruiz Computer Science Department Bioinformatics and Computational Biology Program WPI WELCOME TO BCB4003/CS4803 BCB503/CS583 BIOLOGICAL.
Integrating Bayesian Networks and Simpson’s Paradox in Data Mining Alex Freitas University of Kent Ken McGarry University of Sunderland.
/faculteit technologie management Introduction to Data Mining a.j.m.m. (ton) weijters (slides are partially based on an introduction of Gregory Piatetsky-Shapiro)
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
Binary Decision Diagrams1 BINARY DECISION DIAGRAMS.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 14 Slide 1 Object-oriented design 2.
SLIDE 1IS 257 – Fall 2008 Data Mining and the Weka Toolkit University of California, Berkeley School of Information IS 257: Database Management.
Methodology Conceptual Database Design
Chapter 2 Sets, Relations, and Functions SET OPERATIONS The union of A and B.
Modeling & Designing the Database
Data Mining BS/MS Project Clustering for Market Segmentation Presentation by Mike Calder.
Special Topics in Data Mining. Direct Objectives To learn data mining techniques To see their use in real-world/research applications To get an understanding.
The Inductive Software Engineering Manifesto Principles for Industrial Data Mining Paper Authored By: Menzies & Kocaganeli – Lane Dept of CS/EE, WVU Bird,
December 4, 2002 Data Modeling – James Cohen Enhanced Entity Relationship (EER) Model Presented by James Cohen.
GUHA method in Data Mining Esko Turunen Tampere University of Technology Tampere, Finland.
Information Design Which is the design of informations? Jakub Jura Engeneering Psychology 2008 Department of Instrumentation and.
Facilitating Decision making through Knowledge Capitalization of Maintenance Projects Management with KDD technique OLADEJO Bolanle F.(Ph.D) Department.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Tang: Introduction to Data Mining (with modification by Ch. Eick) I: Introduction to Data Mining A.Short Preview 1.Initial Definition of Data Mining 2.Motivation.
2 Outline of the presentation Objectives, Prerequisite and Content Brief Introduction to Lectures Discussion and Conclusion Objectives, Prerequisite and.
QUALITATIVE MODELING AND MONITORING OF THE SELECTED ECOSYSTEM VIOLATED BY PARASITIC DEHUMIDIFYING AND DEHYDRATING Jiří Bíla Czech Technical University.
1 SHIM 413 Database Applications for Healthcare Fall 2006 Slides by H. T. Bao.
Knowledge Discovery and Data Mining Evgueni Smirnov.
Presenter : Ching-ting Lin Instructor: Ming-puu Chen Developing a Usability Evaluation Method for E-learning Application: From Functional Usability to.
Knowledge Discovery and Data Mining Evgueni Smirnov.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
Data Mining By Dave Maung.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Data mining. Data mining, at its core, is the transformation of large amounts of data into meaningful patterns and rules.
Data Reduction via Instance Selection Chapter 1. Background KDD  Nontrivial process of identifying valid, novel, potentially useful, and ultimately understandable.
Concept lattices constrained by attribute dependencies Radim Bělohlávek, Vladimír Sklenář, Jiří Zacpal
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence Wednesday, January 24, 2001.
Kansas State University Department of Computing and Information Sciences CIS 798: Intelligent Systems and Machine Learning Tuesday, December 7, 1999 William.
Students’ Ratings of University Teaching: A Data Mining Analysis Chuck Dziuban Research Initiative for Teaching Effectiveness Ida Cook Department of Sociology.
1 Introduction to Data Mining C hapter 1. 2 Chapter 1 Outline Chapter 1 Outline – Background –Information is Power –Knowledge is Power –Data Mining.
Introduction to Data Mining by Yen-Hsien Lee Department of Information Management College of Management National Sun Yat-Sen University March 4, 2003.
AIM: K–8 Science Iris Weiss Eric Banilower Horizon Research, Inc.
Conceptual Modelling The Entity-Relationship (ER) Model The ER diagram Data Modelling.
Tallahassee, Florida, 2016 CIS4930 Introduction to Data Mining Midterm Review Peixiang Zhao.
Assessment Exercise Ashley Carroll FDN 5560 Dr. M. Olson June 21, 2005.
KNOWLEDGE DISCOVERY & DATA MINING Abhishek M. Mehta ROLL NO:24.
Announcements Reading for Monday –Appendix A Homework 3 – Due today Project: Steps –Due 10/4 Exam 1 – 10/6.
April 20022/CS/3X1 Database Design Design method John Wordsworth Department of Computer Science The University of Reading Room.
Czech Technical University in Prague (CTU Prague)
of Building Information Modeling
Case Study -- Weather system
SEEM3430: Information Systems Analysis and Design
Melanie Taylor Horizon Research, Inc.
Hybrid panels with I-shaped stiffeners
ER MODEL Lecture 3.
Knowledge Discovery Systems: Systems That Create Knowledge
Regularization of Evolving Polynomial Models
Data Mining Association Rules Assoc.Prof.Songül Varlı Albayrak
Neurovědy Jaký je hardware lidské mysli?
Geography Matters… to All of Us
Conceptual Data Modeling Using Entities & Relationships
Information Design Which is the design of informations?

Methodology Week 5.
Entity-Relationship Diagram (ERD)
Information Design Which is the design of informations?
C.2.10 Sample Questions.
Information Design Which is the design of informations?
C.2.8 Sample Questions.
C.2.8 Sample Questions.
LABORATORY OF PROCESS ENGINEERING
MATH 2140 Numerical Methods
Information Design Which is the design of informations?
Presentation transcript:

The Application of Data Mining Methods In Monitoring of Ecosystems Jiri BILA and Jakub JURA Department of Instrumentation and Control Engineering, Faculty of Mechanical Engineering, CTU in Prague, Technická 4, Prague 6

Monitoring of Ecosystems 11 Measuring Stations 13 variables Sampling period 6 minutes

Database system for monitoring

Data Mining Knowledge discovery in data bases is “the nontrivial process of identifying valid, novel, potentially useful, and ultimately understandable patterns in data ” Fayyad (1996).

Used Data Mining Methods Conceptual Lattice Rough Sets

Conceptual Lattice Data Mining Context C = (O, I, R) –O is a set of an objects x –I is a set of an items (attributes) y –R is a binary relation R  O  I

Conceptual Lattice Conceptual Lattice L Derived from Data Mining Context C X =  x  O  y  Y, x R y  Y =  y  I  x  X, x R y  –X is the largest set of an objects X  O –Y is the largest set of an items Y  I

Conceptual Lattice Hasse diagram T he Hasse diagram is constructed by use the partial arrangement "<„. –Edge from the H1 to H2 exist if H1 < H2 and none of element of H3 fulfil condition H1 < H3 < H2. –H1 is an antecedent of element H2 (H2 is the descendant of the element H1). –A pair of  X, Y  represents a node in Hasse diagram.

Transformace datab8ze Hasse diagram T he Hasse diagram is constructed by use the partial arrangement "<„. –Edge from the H1 to H2 exist if H1 < H2 and none of element of H3 fulfil condition H1 < H3 < H2. –H1 is an antecedent of element H2 (H2 is the descendant of the element H1). –A pair of  X, Y  represents a node in Hasse diagram.

Conceptual Lattice - Example C = (  A 0, A 1, A 2, A 3, A 4 ,  3, 4, 7, 8, 9 , R) Where: –C … context of data mining –A 0, A 1, A 2, A 3, A 4 … Monitoring Classes –3, 4, 7, 8, 9 … Situations –R … relation which is represented in the table M G

Conceptual Lattice MGMG A0A A1A1 11 A2A A3A3 111 A4A Table M G which represents relation R. Situations Monitoring Classes

Conceptual Lattice Hass diagram

Conceptual Lattice Guarantee of the rule’s reliability and validity. Support –supp(Ai, S) = (  (s  S  Ict(s, Ai))/ (  (S )) –Supp (Ai  Aj, S) = supp(Ai  Aj, S ) Confidence –Conf (Ai  Aj, S) = Supp (Ai  Aj, S) / supp(Ai)

Rule No. iRule r i Supp(r i )Conf (r i ) 1A1  A2A1  A A 1  A A1  A4A1  A A2  A3A2  A A3  A4A3  A A1 A2  A4A1 A2  A A2 A4  A4A2 A4  A A2 A3  A4A2 A3  A A2 A4  A3A2 A4  A A1 A3  A4A1 A3  A A3 A4  A1A3 A4  A

Rough Sets Relation of indiscernibility x1, x2  U, (x1 RE(A) x2 )) ⇔ (g(x1, ai) = g(x2, ai)) Where : –U … universe of elements. –A … set of attributes –V ai … sets of values –g: U x A → V

Rough Sets Which of these elements of universe U and with what certainty approach subset of X ⊂ U, in that we are interested ? Lower Approximation Upper Approximation Border set

Rough Sets Lower Approximation The Lower Approximation ( positive area PosiRE(X) ) is a set of objects which certain belong to a subset. PosiRE(X) = ∪ { Y Ⅰ (Y ∈ (U/RE)) AND (Y ⊆ X)

Rough Sets Upper Approximation The set of elements from the U, which may (possibly) belongs to X. PossRE(X) = ∪ { Y Ⅰ (Y ∈ U/RE) AND (Y ∩ X ≠ ∅) }

Rough Sets Boundary region Difference between the upper and lower approximation X. BoundRE(X) = PossRE(X) - PosiRE(X)

Rough Sets Rough Set Rough set is a subset X of universe U and this subset is defined using the upper and lower approximation (PossRE(X), PosiRE (X)) and for which: BoundRE(X)  ∅

Rough Sets Rough accuracy of aproximation.  RE (X) = card (Posi RE (X)) / card (PossRE(X))

Conclusion The paper proposed application of two data mining methods. Fragments of a monitoring system database have been used for the data support. The paper emphasises that the use of the original database content is not direct and it is necessary to transform it into forms utilisable by the selected data mining methods. The success of data mining process then strongly depends also on the definition of the monitoring classes and the “operation" situations (formulated by experts).