Microsoft Word - T2 2021 BISY3001 A4 Briefing - Block.docx Unit Assessment Type Group Assignment Assessment Number A4 Assessment Name Data Mining & BI Report Weighting 25% Alignment with Unit and...

1 answer below »
attached


Microsoft Word - T2 2021 BISY3001 A4 Briefing - Block.docx Unit Assessment Type Group Assignment Assessment Number A4 Assessment Name Data Mining & BI Report Weighting 25% Alignment with Unit and Course ULO1, ULO2, ULO3, ULO4 Due Date and Time Assessment Description In this assessment, the students will extend their previous work from assessment A3 Business case understanding. Here, the students have to submit a report of the data mining process on a real-world scenario and a presentation and QA Session will be held based on the report written. The report will consist of the details of every step followed by the students. Detailed Submission Requirements Cover Page • Title • Group members Introduction • Importance of the chosen area • Why this data set is interesting • What has been done so far • Which can be done • Description of the present experiment 1. Data preparation and Feature extraction: 1.1 Select data o Task Select data 1.2 Clean data o Task Clean data o Output Data cleaning report 1.3 Construct data/ feature extraction o Task Construct data o Output Derived attributes o Activities: Derived attributes o Add new attributes to the accessed data o Activities Single-attribute transformations o Output Generated records Report (10%): Friday, 08 October 2021, 5 PM via Moodle. Presentation and QA Session (15%): Session 12, in last class. 2 Modeling 2.1 Select modeling technique o Task – Select Modelling Technique 2.2 Output Modeling technique o Record the actual modeling technique that is used. 2.3 Output Modeling assumption o Activities Define any built-in assumptions made by the technique about the data (e.g. quality, format, distribution). Compare these assumptions with those in the Data Description Report. Make sure that these assumptions hold and step back to the Data Preparation Phase if necessary. You can explain the data file here, even when it is pre prepared. 3 Generate test design 3.1 Task Generate test design o Activities Check existing test designs for each data mining goal separately. Decide on necessary steps (number of iterations, number of folds etc.). Prepare data required for test. (You can use 66% of records for model Building and rest for Testing) 3.2 Build model o Task - Build model Run the modeling tool on the prepared dataset to create one or more models. (Using Knime Tool as shown in the lab). 3.3 Output Parameter settings o Activities - Set initial parameters. Document reasons for choosing those values. o Activities - Run the selected technique on the input dataset to produce the model. Post-process data mining results (e.g. editing rules, display trees). 3.4 Output Model description o Activities - Describe any characteristics of the current model that may be useful for the future. Give a detailed description of the model and any special features. o Activities - State conclusions regarding patterns in the data (if any); sometimes the model reveals important facts about the data without a separate Assessment process (e.g. that the output or conclusion is duplicated in one of the inputs). 4 Evaluation and Conclusion Previous evaluation steps dealt with factors such as the accuracy and generality of the model. This step assesses the degree to which the model meets the business objectives and seeks to determine if there is some business reason why this model is deficient. It compares results with the evaluation criteria defined at the start of the project. A good way of defining the total outputs of a data mining project is to use the equation: RESULTS = MODELS + FINDINGS In this equation we are defining that the total output of the data mining project is not just the models (although they are, of course, important) but also findings which we define as anything (apart from the model) that is important in meeting objectives of the business (or important in leading to new questions, line of approach or side effects (e.g. data quality problems uncovered by the data mining exercise). Note: although the model is directly connected to the business questions, the findings need not be related to any questions or objective, but are important to the initiator of the project. ~ End of Assessment Details ~ Marking Criteria Activities Rank the possible actions. Select one of the possible actions. Document reasons for the choice. Content Marks Cover Page Table of contents 0.5 Executive Summary 0.5 Introduction 0.5 Data Pre-processing and feature extraction 2.5 Experiment 3 Result analysis 2.5 Conclusion 0.5 Presentation and QA 15 Rubrics Marking criteria HD D C P F ULO1: Demonstrate broad understanding of data mining and business intelligence and their benefits to business practice ULO 2: Choose and apply models and key methods for classification, prediction, reduction, exploration, affinity analysis, and customer segmentation that can be applied to data mining as part of a business intelligence strategy ULO3: Analyse appropriate models and methods for classification, prediction, reduction, exploration, affinity analysis, and customer segmentation to data mining ULO4: Propose a data mining approach using real business cases as part of a business intelligence strategy Report, presentation and QA outcome address all the tasks. Report consists of no/minor mistakes. (21-25 marks) Report, presentation and QA outcome address all the tasks. Report consists of a few number of mistakes. (18-20 marks) Report, presentation and QA outcome address most of the contents. Report consists of a few number of mistakes. (15-17 marks) Report, presentation and QA outcome address a few of the contents. Report consists of a good number of mistakes. (13-14 marks) Incomplete report. Unable to perform the experiment/dat a pre- processing/ conclude result. Unable to answer to the question of QA Session and Unable to present the work that has been done. (0-12.5 marks) Misconduct • Engaging someone else to write any part of your assessment for you is classified as misconduct. • To avoid being charged with Misconduct, students need to submit their own work. • Remember that this is a Turnitin assignment and plagiarism will be subject to severe penalties. • The AIH misconduct policy and procedure can be read on the AIH website (https://aih.nsw.edu.au/about-us/policies-procedures/). Late Submission • Late submission is not permitted, practical submission link will close after 1 hour. Special consideration • Students whose ability to submit or attend an assessment item is affected by sickness, misadventure or other circumstances beyond their control, may be eligible for special consideration. No consideration is given when the condition or event is unrelated to the student's performance in a component of the assessment, or when it is considered not to be serious. • Students applying for special consideration must submit the form within 3 days of the due date of the assessment item or exam. • The form can be obtained from the AIH website (https://aih.nsw.edu.au/current- students/student-forms/) or on-campus at Reception. • The request form must be submitted to Student Services. Supporting evidence should be attached. For further information please refer to the Student Assessment Policy and associated Procedure available on (https://aih.nsw.edu.au/about-us/policies-procedures/).
Answered 2 days AfterOct 03, 2021

Answer To: Microsoft Word - T2 2021 BISY3001 A4 Briefing - Block.docx Unit Assessment Type Group Assignment...

Swapnil answered on Oct 05 2021
121 Votes
Data Mining and Business Intelligence
Executive Summary:
A report analysing the “datasets on Fake News Detection” is presented. It aims to classifying the fake news articles on social media. The main source of the news content that can basically depends on the social media. The social media will basically release the new data resources and multiple internet sources that can give the issues which will be associated
with the news detection. The rise of news in the internet is mainly are the social media. It can generate the daily new contents and data that can be fake information provided by the internet. It also gives us the different specific platforms that can generate the news content basically published on the source of internet. It can also communicate to the different sources. The major idea is to provide the social relationships in between the social media and build the detection system for the fake news information.
Table of Contents:
1. Introduction---------------------------------------------------------------------------------------------4
2. Data Preparation----------------------------------------------------------------------------------------5
    2.1 Data Selection--------------------------------------------------------------------------------5
    2.2 Data Cleaning---------------------------------------------------------------------------------5
3. Feature Extraction--------------------------------------------------------------------------------------6
    3.1 Naive Bayes-----------------------------------------------------------------------------------6
    3.2 Support Vector Machine--------------------------------------------------------------------6
    3.3 TF-IDF (Term Frequency-Inverse Document Frequency------------------------------6
    3.4 Long Short Term Memory------------------------------------------------------------------7
4. Modelling----------------------------------------------------------------------------------------------11
5. Result---------------------------------------------------------------------------------------------------12
6. Conclusion---------------------------------------------------------------------------------------------14
7. References---------------------------------------------------------------------------------------------15
8. Appendix-----------------------------------------------------------------------------------------------16
1. Introduction:
In the world of internet, we should be using the web technology for gathering the information that is increasing daily. Th main challenge is the internet is loaded full of social media that can gives the points of enormous and posing I to the validation of the information. The main reason behind this challenge is to the current generation is that can be fake news gives the intentional by the unknown sources that can trivial for the existing methodologies to validating the trustworthiness of the news and social media. By analysing the fake news creditability, we can detect the internet usage of the users where it can be measured as the news information. There will be may techniques that can validate the news content with the error rates on the social media.
The fake news can be made up of the story that can gives the intension to social media and commercial interest to attracting the viewers and the collecting the advertisement revenue. So the people for the initiate to the fake news in the order of the influencing to the events and the circulation of the fake news can be gives the fake policies to the peoples. The problem statement for the fake news detection system can gives the research based system in the social media which can be implemented on the truthfulness of the news content. The system can be truncate the spread of the fake information that can pose the threat to the social media platforms.
We are basically leveraging the internet information on the social media that can classify the news content. The major factor for this is to the news articles and the users on the social media. In this ecosystem, once the news content is published, the news is not only validated against the authenticated sources,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here