**By: Matt Rhoads, Ed.D**

*Dr. Matt Rhoads is a Tech and Instructional Leader and Innovator with hands in Adult Ed, K-12, and Higher Education. He is the author of several books and is the host of Navigating Education – The Podcast*.

**H****ow Data Mining Works**

As discussed in the history of DM, DM is a subprocess of KDD. Therefore, in order to understand DM and how it works, a description of KDD must be given to see where DM falls within that process. This will outline how data is targeted, Â processed, and analyzed. Then, a brief discussion regarding the functionalities of DM will be described along with some of the popular techniques used by practitioners. Finally, a brief discussion regarding the software programs computers use to utilize DM along with its general applications. Â Â
**Video 1:Â**Reviews background of DM and describes many of its applications.

**Data Mining within the KDD Process**

During the KDD process, there are nine steps from beginning to end. Within this description, each step will be briefly discussed. Then, DM will be incorporated into the KDD process. Â
The first three steps of the KDD process involve finding a target set of data, selecting a subset of variables or data samples, and then the data is cleaned by organizing the subsets of data the user wants to perform an analysis on Â (Fayyad, Piatetsky-Shapiro, & Smyth, 1996).
Next, data reduction and projections occur, which allows for the number of variables to be reduced within a data set and provides for the data to be stored; figures and data representations can make up the data sets at this point of the KDD process.
Now, with all of the data sets narrowed down to the sets you want to manipulate to find a specific pattern, DM can be incorporated within the KDD process by selecting a DM technique (Fayyad et al., 1996). When DM is used, there are a variety of different types of techniques that can be used to manipulate and compute data, which includes clustering, regression, classification, summarization, outlier detection, relationship mining, social network analysis, process mining, text mining, distillation of data for human judgment, and discovery with models (Coenen, 2011; Fayyad et al., 1996; Li, 2007).
Once a DM technique is chosen by the user, they must select an algorithm to search for data patterns that are inputted into the DM technique along with the dataset(s) being mined (Fayyad et al., 1996). Then, once this occurs, the computation will begin amongst the data set, DM technique, and algorithms that will search for patterns of interests â€śin a particular representational form or a set of such representations which may include classification rules or decision trees, regression, and clusteringâ€ť (Fayyad et al., 1996, p. 42).
After the data has been computed, the last steps of KDD include interpreting the mined patterns in addition to returning to the steps of this process to manipulate the data set using a different DM technique and/or algorithm associated with that technique (Coenen, 2011; Fayyad et al., 1996; Li, 2007).
Finally, per Fayyad (1996), Â once the knowledge is discovered from the KDD process, it can be applied to the problem a user is trying to solve or it can be documented and reported to the appropriate personnel.
**In-Depth: The Data-Mining Step of the KDD Process.**Â Per Fayyad (1996) and Coenen (2011), DM within the KDD process can be broken down into two differing approaches: the statistical and logical approaches. The statistical approach is the primary approach to DM, which â€śtends to be most widely used basis for practical data mining applications given the typical presence of uncertainty in real-world data generating processesâ€ť (Fayyad, et al., 1996, p. 43). Thus, the statistical approach allows for the various DM techniques to be used and computed with the vast array of algorithms available to perform on a data set(s).

**Video 2:Â**In this video, it describes the KDD process.

**Data Mining Techniques**

Within the discipline of DM, there are a variety of different types of techniques that can be used to manipulate and compute data. These DM techniques include clustering, regression, classification, summarization, outlier detection, relationship mining, social network analysis, process mining, text mining, the distillation of data for human judgment, and discovery with models. Each of these techniques has a particular focus and use because each technique manipulates data sets differently. Therefore, depending on which DM technique you decide to use for the problem at hand, there will be different data outputs from the technique you chose to manipulate the data with.Â
**Conclusion**

DM is a major part of the KDD process. One easy way to understand this entire process is to visualize how raw data is taken, organized, and then manipulated to help solve a problem. I did not talk about each DM technique this week because I wanted to talk about specific DM techniques that can be used for problems facing educators in my next blog that I will post next week. In next weeks blog, I will provide background information regarding educational data mining and the DM techniques that can be used to help educators solve many problems they are facing on a daily basis.
**References**Coenen, F. (2011, ). Data mining: Past, present, and future. The Knowledge Engineering Review, 26, 25-29. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.185.1202&rep=rep1&type=pdf Fayyad, U., Piateksky-Shapiro, G, & Smith, P. (1996). From data mining to knowledge discovery databases. American Association for Artificial Intelligence, 17, 37-51. Li, R.. (2016). History of data mining. Retrieved from https://www.linkedin.com/pulse/history-data-mining-gregory-piatetsky-shapiro