Overview of Knowledge Discovery in Databases Process and Data Mining for Surveillance Technologies and EWS

Development of more effective early warning systems (EWSs) for various applications have been possible during the past decade due to advancements in information, detection, data mining (DM) and surveillance technologies. These application areas include economy, banking, finance, health care, bioinformatics, production and service delivery, hazard and crime prevention and minimization of other social risks involving the environment, administrations, politics and human rights. This chapter aims to define knowledge discovery in databases (KDD) process in five steps: Data preparation, data preprocessing, DM, evaluation and interpretation, and implementation. DM is further explained in descriptive and predictive mining categories with their functions and methods used or likely to be used in EWSs. In addition to well-known structured data types, mining of advanced data types such as spatial, temporal, sequence, images, multimedia and hypertexts is also introduced. Moreover, it presents a brief survey of overview and application papers and software in the EWS literature.

[1]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[2]  Bernd Drewes Some Industrial Applications of Text Mining , 2005 .

[3]  Shusaku Tsumoto,et al.  Risk Mining in Medicine: Application of Data Mining to Medical Risk Management , 2006, WImBI.

[4]  Chung-Sheng Li,et al.  SURVEY OF EARLY WARNING SYSTEMS FOR ENVIRONMENTAL AND PUBLIC HEALTH APPLICATIONS , 2006 .

[5]  Blanca Gallego,et al.  Towards bioinformatics assisted infectious disease control , 2009, BMC Bioinformatics.

[6]  James A. M. McHugh,et al.  Mining the World Wide Web , 2001, The Information Retrieval Series.

[7]  Elisa Bertino,et al.  Web Content Filtering , 2006 .

[8]  Amanda J. C. Sharkey,et al.  On Combining Artificial Neural Nets , 1996, Connect. Sci..

[9]  Tae Yoon Kim,et al.  Usefulness of artificial neural networks for early warning system of economic crisis , 2004, Expert Syst. Appl..

[10]  Andrés Garay Acevedo,et al.  Audio Watermarking: Properties, Techniques and Evaluation , 2008 .

[11]  Mitja Peruš,et al.  Derivation of Quantum Associative Network from Hopfield-Like ANN and HNeT , 2011 .

[12]  Yu Meng,et al.  Online Mining of Risk Level of Traffic Anomalies with User~s Feedbacks , 2006, 2006 IEEE International Conference on Granular Computing.

[13]  Günther Kundt,et al.  Discovery of Health Risks and Case-Based Forecasting of Epidemics in a Health Surveillance System , 1997, PKDD.

[14]  Li Pheng Khoo,et al.  Feature extraction using rough set theory and genetic algorithms--an application for the simplification of product quality evaluation , 2002 .

[15]  Yi Peng,et al.  Knowledge-Rich Data Mining in Financial Risk Detection , 2009, ICCS.

[16]  George E. P. Box,et al.  Time Series Analysis: Box/Time Series Analysis , 2008 .

[17]  Mitja Peruš,et al.  Biological and Quantum Computing for Human Vision: Holonomic Models and Applications , 2010 .

[18]  Amir M. Hormozi,et al.  Data Mining: A Competitive Weapon for Banking and Retail Industries , 2004, Inf. Syst. Manag..

[19]  J. Guo,et al.  Risk of Hepatotoxicity Associated with the Use of Telithromycin: A Signal Detection Using Data Mining Algorithms , 2008, The Annals of pharmacotherapy.

[20]  Tzung-Pei Hong,et al.  Intelligent Agents in Supply Chain Management as an Early Warning Mechanism , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.

[21]  P. Bartels,et al.  Knowledge discovery processing and data mining in karyometry. , 2009, Analytical and quantitative cytology and histology.

[22]  Ganapati P. Patil Geoinformatic hotspot systems (GHS) for detection, prioritization, and early warning , 2005, DG.O.

[23]  Michael Malone,et al.  Mining Spatio-Temporal Information Systems , 2013 .

[24]  Gerald Schaefer,et al.  Image Analysis for Exudate Detection in Retinal Images , 2010 .

[25]  Magnus Pettersson,et al.  SPC with Applications to Churn Management , 2004 .

[26]  Takashi Onoda,et al.  Interactive Abnormal Condition Sign Discovery for Hydroelectric Power Plants , 2008, PAKDD Workshops.

[27]  Shusaku Tsumoto,et al.  Risk Mining - Overview , 2006, JSAI.

[28]  P. S. Sastry,et al.  A survey of temporal data mining , 2006 .

[29]  Menas Kafatos,et al.  An early warning system for coastal earthquakes , 2006 .

[30]  N. Chan,et al.  Data mining of resilience indicators , 2007 .

[31]  Bhavani M. Thuraisingham,et al.  Web and information security , 2002 .

[32]  Gaetano Manfredi,et al.  Earthquake Early Warning Systems , 2010 .

[34]  G. Izmirlian,et al.  Overview of Commonly Used Bioinformatics Methods and Their Applications , 2004, Annals of the New York Academy of Sciences.

[35]  Kate Smith-Miles,et al.  On the communal analysis suspicion scoring for identity crime in streaming credit applications , 2009, Eur. J. Oper. Res..

[36]  Shusaku Tsumoto,et al.  Application of data mining to medical risk management , 2006, SPIE Defense + Commercial Sensing.

[37]  Jan Vanthienen,et al.  50 years of data mining and OR: upcoming trends and challenges , 2009, J. Oper. Res. Soc..

[38]  Andrew Kusiak,et al.  Data mining: manufacturing and service applications , 2006 .