Top 10 data mining techniques in business applications: a brief survey

被引:13
|
作者
Lin, Wei-Chao [1 ]
Ke, Shih-Wen [2 ]
Tsai, Chih-Fong [3 ]
机构
[1] Asia Univ, Taichung, Taiwan
[2] Chung Yuan Christian Univ, Informat & Comp Engn, Jhongli, Taiwan
[3] Natl Cent Univ, Dept Informat Management, Jhongli, Taiwan
关键词
Data mining; Machine learning; Survey; Business applications; INTRUSION DETECTION; BANKRUPTCY PREDICTION; NEURAL-NETWORKS; CLASSIFICATION; CLASSIFIERS; ALGORITHMS; MODELS;
D O I
10.1108/K-10-2016-0302
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - Data mining is widely considered necessary in many business applications for effective decisionmaking. The importance of business data mining is reflected by the existence of numerous surveys in the literature focusing on the investigation of related works using data mining techniques for solving specific business problems. The purpose of this paper is to answer the following question: What are the widely used data mining techniques in business applications? Design/methodology/approach - The aim of this paper is to examine related surveys in the literature and thus to identify the frequently applied data mining techniques. To ensure the recent relevance and quality of the conclusions, the criterion for selecting related studies are that the works be published in reputed journals within the past 10 years. Findings - There are 33 different data mining techniques employed in eight different application areas. Most of them are supervised learning techniques and the application area where such techniques are most often seen is bankruptcy prediction, followed by the areas of customer relationship management, fraud detection, intrusion detection and recommender systems. Furthermore, the widely used ten data mining techniques for business applications are the decision tree (including C4.5 decision tree and classification and regression tree), genetic algorithm, k-nearest neighbor, multilayer perceptron neural network, naive Bayes and support vector machine as the supervised learning techniques and association rule, expectation maximization and k-means as the unsupervised learning techniques. Originality/value - The originality of this paper is to survey the recent 10 years of related survey and review articles about data mining in business applications to identify the most popular techniques.
引用
收藏
页码:1158 / 1170
页数:13
相关论文
共 50 条
  • [41] Survey on Data Mining and Predictive Analytics Techniques
    Sathishkumar, S.
    Priya, R. Devi
    Karthika, K.
    [J]. INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 971 - 981
  • [42] Data Mining Techniques for Business Intelligence in Educational System: A Case Mining
    Khan, Mohiuddin Ali
    Gharibi, Wajeb
    Pradhan, Sateesh Kumar
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [43] TOP-10 DATA MINING CASE STUDIES
    Melli, Gabor
    Wu, Xindong
    Beinat, Paul
    Bonchi, Francesco
    Cao, Longbing
    Duan, Rong
    Faloutsos, Christos
    Ghani, Rayid
    Kitts, Brendan
    Goethals, Bart
    Mclachlan, Geoff
    Pei, Jian
    Srivastava, Ashok
    Zaiane, Osmar
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY & DECISION MAKING, 2012, 11 (02) : 389 - 400
  • [44] Selection of data analysis techniques for data mining applications
    Ahluwalia, R
    Chidambaram, S
    [J]. INTELLIGENT SYSTEMS IN DESIGN AND MANUFACTURING V, 2004, 5605 : 97 - 108
  • [45] INTEGRATING DATA MINING TECHNIQUES INTO BUSINESS INTELLIGENCE SYSTEMS
    Petre, Ruxandra
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2013, : 619 - 623
  • [46] A Survey Paper on Techniques and Applications of Web Usage Mining
    Jain, Subhi
    Rawat, Ruchira
    Bhandari, Bina
    [J]. 2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING AND COMMUNICATION TECHNOLOGIES (ICETCCT), 2017, : 256 - 261
  • [47] Outlier Detection: Applications and Techniques in Data Mining
    Bansal, Rashi
    Gaur, Nishant
    Singh, Shailendra Narayan
    [J]. 2016 6TH INTERNATIONAL CONFERENCE - CLOUD SYSTEM AND BIG DATA ENGINEERING (CONFLUENCE), 2016, : 373 - 377
  • [48] Data mining techniques for information security applications
    Al-Shawi, Amany
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 221 - 229
  • [49] SolEuNet: Selected data mining techniques and applications
    Lavrac, N
    [J]. FROM DATA AND INFORMATION ANALYSIS TO KNOWLEDGE ENGINEERING, 2006, : 32 - 39
  • [50] Implementation of data mining techniques for meteorological applications
    Cofiño, AS
    Gutiérrez, JM
    Jakubiak, B
    Melonek, M
    [J]. REALIZING TERACOMPUTING, 2003, : 165 - 175