THE WHATIS.COM WORD-OF-THE-DAY April 23, 2002 data preprocessing ______________ TODAY'S SPONSOR: VeriSign - The Value of Trust
Get the strongest server security-128-bit SSL encryption! Download VeriSign's FREE guide, "Securing Your Web Site for Business" and learn everything you need to know about using SSL to encrypt your e-commerce transactions for serious online security. Click here! http://WhatIs.com/r/0,,2932,00.htm?Verisign042302 ______________ TODAY'S WORD: data preprocessing See our definition with hyperlinks at http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci810056,00.html Data preprocessing describes any type of process performed on raw data to prepare it for another processing procedure. Commonly used as a preliminary data mining practice, data preprocessing transforms the data into a format that will be more easily and effectively processed for the purpose of the user, for example in a neural network. There are a number of different tools and methods used for preprocessing, including: sampling, which selects a representative subset from a large population of data; transformation, which manipulates raw data to produce a single input; denoising, which removes noise from data; normalization, which organizes data for more efficient access; and feature extraction, which pulls out specified data that is significant in some particular context. In a customer relationship management (CRM) context, data preprocessing is a component of Web mining. Web usage logs may be preprocessed to extract meaningful sets of data called user transactions, which consist of groups of URL references. User sessions may be tracked to identify the user, the Web sites requested and their order, and the length of time spent on each one. Once these have been pulled out of the raw data, they yield more useful information that can be put to the user's purposes, such as consumer research, marketing, or personalization. RELATED TERMS: data mining http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci211901,00.html neural network http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212648,00.html noise http://whatis.techtarget.com/definition/0,,sid9_gci212667,00.html normalization http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci212669,00.html customer relationship management http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci213567,00.html Web mining http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789009,00.html personalization http://searchebusiness.techtarget.com/sDefinition/0,,sid19_gci532341,00.html ______________________ SELECTED LINKS: Market Technologies has an article about "Preprocessing Data for Neural Networks." http://www.wetradefutures.com/preprocessing_data.htm A paper at DePaul University discusses data preprocessing in "Automatic Personalization Based on Web Usage Mining." http://maya.cs.depaul.edu/~mobasher/personalization/ SearchDatabase provides comprehensive links to more about "Data Warehousing and Business Intelligence." http://searchdatabase.techtarget.com/bestWebLinks/0,289521,sid13_tax281567,00.html ______________________ QUIZ #25 | Security Attacks Why should you be afraid of a smurf? And exactly what threat does a pulsing zombie pose? They're just two of the sinister computer attacks you need to watch out for. Our latest quiz just may send a shiver down your spine. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci813585,00.html ______________________________ CRITICAL SECURITY TIPS, TACTICS & TECHNIQUES - FREE It's fairly simple: If something goes wrong with your current security infrastructure, and you're on the hook to face the consequences, it won't be pretty. Don't go it alone! Stop the threat of a hack attack with expert tips, tactics and techniques at the FREE Security Decisions conference June 19-21 in Chicago, hosted by SearchSecurity. Full conference benefits at: http://ad.doubleclick.net/clk;4012996;5058249;p?http://www.securityconf.com/html/registration.htm ______________________________ RECENT ADDITIONS AND UPDATES [1] autofax http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci817623,00.html [2] I2S http://whatis.techtarget.com/definition/0,,sid9_gci817575,00.html [3] absolute value http://whatis.techtarget.com/definition/0,,sid9_gci817829,00.html [4] Media Gateway Control Protocol http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci817224,00.html [5] QXGA http://whatis.techtarget.com/definition/0,,sid9_gci817055,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Assistant Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Created by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. If you would like to sponsor this or any techtarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] Unsubscribe from 'Word of the Day' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."