Concept explainers
Explanation of Solution
Given: A routine is applied with the help of data mining to the transaction dataset. The transaction dataset is categorized into fraudulent and non-fraudulent that has 88 records (30 correctly) and 952 records (920 correctly), respectively.
To find:Â The classification matrix and determine the error rate.
Solution:
In the given context, classification matrix provides the most accurate measure from the dataset.
The number of C0,1 classified cases correctly is n(0,0) = 30.
The number of C0,1 classified cases incorrectly as C1,0 is n(0,1) = 58.
The number of C1,0 classified cases incorrectly as C0,1 is n(1,0) = 32.
The number of C1,0 classified cases correctly is n(1,1) = 920.
The following is the classification matrix:
By analyzing the classification matrix, the values of both fraudulent and non-fraudulent are as follows:
The actual rate of fraudulent is n(0,1) = 58.
The actual rate of non-fraudulent is n(1,0) = 32.
Total number of records present in the dataset is n = 30 + 58 + 32 + 920 = 1040.
Evaluate the rate of error present in the dataset by using the formula of error rate.
Hence, the error rate is 8.65%.
Want to see more full solutions like this?
Chapter 5 Solutions
Data Mining for Business Analytics: Concepts, Techniques, and Applications with XLMiner
- Is it feasible to display each sort of anomaly?arrow_forwardWhat exactly is deadlock? What can be done to avoid it? When it occurs, how can it be resolved?arrow_forwardWhich of the studied data structures in this course would be the most appropriate choice for the following tasks? And Why? a. An Exam Center needs to maintain a database of 3000 students' IDs who registered in a professional certification course. The goal is to find rapidly whether or not a given ID is in the database. Hence, the speed of response is very important; efficient use of memory is not important. No ordering information is required among the identification numbers. b. A transposition table is a cache of previously seen positions in a game tree generated by a computer game playing program. If a position recurs via a different sequence of moves, the value of the position is retrieved from the table, avoiding re-searching the game tree below that position.arrow_forward
- The CSM Tech organization has a substantial web presence with several publicly accessible web and application servers. You have DNS servers that handle Internet queries for all your publicly accessible resources. However, after doing some statistics analysis on your public DNS servers, you find that your servers are handling recursive lookups for clients that are not within your organization. Your public DNS servers should handle recursive queries only for your internal clients, but the servers should handle iterative (nonrecursive) queries from external sources. What do you recommend? What are the commands needed to implement the solution?arrow_forwardIn a database transaction, the two main operations are READ and WRITE operations. So, there is a need to manage these two operations in the concurrent execution of the transactions as if these operations are not performed in an interleaved manner, and the data may become inconsistent. Consider the following scheduled transactions T1, T2, T3, and T4. T1 T2 T3 T4 Reads(X) Writes(X) Reads(Y) Writes(Y) Commit Reads(X) Time Reads(X) Writes(X) Reads(Y) Rollback Writes(Y) Writes(X) Commit • Identify all pair of transactions based on the occurred problem between two transactions (specify pairs, e.g., T1 => T2; T3=> T2; T3 =>T4; etc.). • Specify the name of a problem for each detected pair of transactions. • Justify the occurred problem for each pair of transactions.arrow_forwardA multi-user database system is used to support the customer payment operations of a XYZ store. Unfortunately, the system currently does not enforce concurrent control on transactions accessing and updating the data. A particular customer had a balance due of HK$ 300 when the following three transactions related to the customer were processed at the same time: (i) Payment of HK$ 300; (ii) Purchase on credit of HK$ 150; and (iii) Merchandise return (credit) of HK$ 100. Each of the three transactions read the customer record when the balance was HK$ 300. That is, all transactions have read the record before any of them was completed. The updated customer record was returned from the transactions to the database in the order of first (i), then (ii) and finally (iii). (a) After the last transaction was completed, what balance will be recorded for the customer? (b) What balance should be actually recorded for the customer after the three transactions have been processed?arrow_forward
- To prove that a database's values are subject to arbitrary alteration, just show that they sometimes do. The use of longitudinal parity in a detection code helps to pinpoint errors. for all bits in the Oth place, another parity bit is computed and saved for all bits in the 1st position, etc.)arrow_forwardThe CSM Tech organization has a substantial web presence with several publicly accessible web and application servers. You have DNS servers that handle Internet queries for all your publicly accessible resources. However, after doing some statistical analysis on your public DNS servers, you find that your servers are handling recursive lookups for clients that are not within your organization. Your public DNS servers should handle recursive queries only for your internal clients, but the servers should handle iterative (nonrecursive) queries from external sources. What do you recommend? What are the commands needed to implement the solution?arrow_forwardYou are required to answer a number of questions related to data preparation and cleaning. In case the question is related to coding, you are required to use the functions provided in the library pandas to answer the question. (a) List four tasks that you are required to perform during the datapreparation step.(b) Suggest two ways of handling missing data and name the corresponding function provided in the library pandas that can perform the task.(c) Suggest three tasks you may have to perform during data transformation. Name the corresponding function provided in the library pandas that can perform each of the suggested tasks.(d) Name the function that can create a boolean mask on whether theelement in a pandas Series is a duplicated entry.arrow_forward
- In order to keep the responses anonymous, you plan to assign a 5-character code to each individual who receives a survey. In doing so, survey responses will be tied to codes rather than names, ensuring that the data collected is done akin to a blind study. Suppose that, for reasons tied to the software your team uses to process incoming data, you only have access to 6 unique digits: 2-7. Are you able to assign a unique code to each individual receiving the survey?arrow_forwardIf longitudinal parity is used as an error detection code, it may be shown that database values can be modified without notice. nth-bit longitudinal parity is calculated; the s is calculated and retained for all Oth bits, a second parity bit for all 1st-place bits, etc.) etc.arrow_forwardOverview: COVID-19 cases have been increased in the last period. As a result, Ministry of Health has decided to make a simple application to keep track of all citizens and their vaccination status. it is required to help the Ministry implement the required application. Requirements: After a quick meeting with the employee in charge, you got the following information: • Itis required to store the whole data in one collection • Each citizen has a unique civil ID number (national number), name and other attributes (add at least 2 attributes from your choice). In addition, it is required to store information about all doses taken by the citizen. • For each dose, the following information should be stored: manufacturer, when and where has been taken, and information about the health professional who gave it. • Each health professional has a unique civil ID number, name, and it is required to store his/her experience (in years). Moreover, you have been informed that the following operations…arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education