Anda di halaman 1dari 15

DSS, Mining & Warehousing

Click to edit Master subtitle style

4/15/12

Architecture
Three fundamental components of a DSS architecture are: i. The database (or knowledge base). ii. The model (the decision context and user criteria). iii. The user interface.

DSS technology levels (of hardware and software) may include: Click to edit Master subtitle style i. The actual application. ii. DSS Generator. iii. Tools. An iterative developmental approach allows for the DSS to be changed and redesigned at various
.

4/15/12

4/15/12

Classification

There are several ways to classify DSS applications. Not every DSS fits neatly into one category, but a mix of two or more architecture in one. Holsapple and Whinston classify DSS into the following six frameworks: Text-oriented DSS. Database-oriented DSS. Spreadsheet-oriented DSS. Solver-oriented DSS. Rule-oriented DSS. Compound DSS.
4/15/12

i.

ii.

iii.

iv.

v.

vi.

Applications
4/15/12

Clinical decision support system for medical diagnosis. Business and Management. Agricultural production. Forest management. National Railway.

Benefits

Improves personal efficiency Expedites problem solving (speed up the progress of problems solving in an organization) Facilitates interpersonal communication Promotes learning or training Increases organizational control Generates new evidence in support of a decision Creates a competitive advantage over competition Encourages exploration and discovery on the part of the decision maker Reveals new approaches to thinking about the problem
4/15/12

Data Mining

Data mining is the process of extracting patterns from data. Data mining is becoming an increasingly important tool to transform these data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery. The term data mining has also been used to describe data dredging and data snooping. Dredging and snooping can be used as exploratory tools when developing and clarifying hypotheses.

4/15/12

Background

As data sets have grown in size and complexity, direct hands-on data analysis has increasingly been augmented with indirect, automatic data processing. This has been aided by other discoveries in computer science, such as: Neural networks. Clustering . Genetic algorithms (1950s). Decision trees(1960s).

i.

ii.

iii.

iv.

4/15/12

Early methods of identifying patterns in data include Bayes' theorem (1700s) and Regression analysis (1800s).

Process

Knowledge Discovery in Databases (KDD) is the name coined by Gregory Piatetsky-Shapiro in 1989 to describe the process of finding interesting, interpreted, useful and novel data. There are many nuances to this process, but roughly the steps are: Pre-processing. Data mining. Classification. Clustering. Regression. Association rule learning. Results validation.

i.

ii. .

iii.

4/15/12

Applications

Games Business Science and engineering Spatial Data mining Surveillance

4/15/12

Data warehouses versus operational systems are optimized for preservation Operational systems

of data integrity and speed of recording of business transactions through use of database normalization and an entity-relationship model. The databases have very fast insert/update performance because only a small amount of data in those tables is affected each time a transaction is processed. Finally, in order to improve performance, older data are usually periodically purged from operational systems. Data warehouses are optimized for speed of data analysis. Frequently data in data warehouses are denormalised via a dimension-based model. To speed data retrieval, data warehouse data are

4/15/12

Evolution in organization use

Organizations generally start off with relatively simple use of data warehousing. Over time, more sophisticated use of data warehousing evolves. The following general stages of use of the data warehouse can be distinguished: Off line Operational Database: Data warehouses in this initial stage are developed by simply copying the data off an operational system to another server where the processing load of reporting against the copied data does not impact the operational system's performance. Off line Data Warehouse: Data warehouses at this stage are updated from data in the operational systems on a regular basis and the data warehouse data is stored in a data structure designed to facilitate

i.

ii.

4/15/12

Benefits

A data warehouse provides a common data model for all data of interest regardless of the data's source. This makes it easier to report and analyze information than it would be if multiple data models were used to retrieve information such as sales invoices, order receipts, general ledger charges, etc. Prior to loading data into the data warehouse, inconsistencies are identified and resolved. This greatly simplifies reporting and analysis. Information in the data warehouse is under the control of data warehouse users so that, even if the source system data is purged over time, the information in the warehouse can be stored safely for extended periods of time. Because they are separate from operational systems, data warehouses provide retrieval of data without slowing down operational systems. Data warehouses can work in conjunction with and, hence, enhance the value of operational business applications, notably customer

4/15/12

Disadvantages

Because data must be extracted, transformed and loaded into the warehouse, there is an element of latency in data warehouse data. Over their life, data warehouses can have high costs. Data warehouses can get outdated relatively quickly. There is a cost of delivering suboptimal information to the organization. There is often a fine line between data warehouses and operational systems. Duplicate, expensive functionality may be developed. Or, functionality may be developed in the data warehouse that, in retrospect, should have been developed in the operational systems and vice

4/15/12

Data warehouses are not the optimal environment for unstructured data.

Applications

Credit card churn analysis Insurance fraud analysis Call record analysis Logistics management.

4/15/12

Anda mungkin juga menyukai