SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1027
A STUDY ON DATA MINING IN SOFTWARE
Sreenivasulu Tholuchuri
MCA, Hyderabad, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data mining for software engineering is a process
of discovering software engineering data in databases. In
simple words, it’s a series of actions to extract knowledgefrom
useful patterns and relationships in hugevolumesofdatabases
and use that knowledge to improve the software engineering
process. It uses tools from artificial intelligence and statics
with database management to analyze large digital
collections, known as data sets. Data mining is widely used in
business (insurance, banking, and retail), science research
(astronomy, medicine) and government defense departments.
Key Words: Data Mining, Software Engineering, Error
Detection, Clustering, Association
1. INTRODUCTION
Data Mining also called asknowledge discoveryindatabases
or KDD for making productive use of mined knowledge in
operable way.
1.1 Early Ages
During 1980's data storage capacities in computers
increased a lot and many big companies started began to
store transactional data which resulted collections of huge
volume records, often called as data ware houses. This data
warehouses were too large to be analyzed with traditional
statistical approaches.
With the aim of knowledge discovery several computer
science workshops and conferences were held for adapting
the techniques from the field of Artificial Intelligence (AI) ---
such as neural networks, genetic algorithms, machine
learning etc. Thisled to the First International Conferenceon
Knowledge Discovery and Data Mining (FICKDD), held in
Montreal, and the launch in 1997 of the journal Data Mining
and Knowledge Discovery which was also the period when
many early data-mining companies were formed and
products were introduced.
Now a day’s vast amounts of data are collected daily.
Figuring out such data is an important need.
“We are living in the information age”is a popular saying;
however, we are actually living in the data age. Terabytes or
petabytes of data pour into our computer networks, the
World Wide Web (WWW), and various data storage devices
every day from business, society, science and engineering,
medicine, and almost every other aspect of daily life. This
explosive growth of available data volume is a result of the
computerization of our society and the fast development of
powerful data collection and storage tools. Businesses
worldwide generate gigantic data sets, including sales
transactions, stock trading records, product descriptions,
sales promotions, company profiles and performance, and
customer feedback.
For example, large stores, such as Wal-Mart, handle
hundredsof millionsof transactionsperweekatthousandsof
branches around the world. Scientific and engineering
practices generate high orders of thousands of terabytes of
data in a continuous manner, from remote sensing, process
measuring, scientific experiments, system performance,
engineeringobservations, andenvironmentsurveillance.The
medical and health industrygeneratestremendousamounts
of data from medical records, patient monitoring, and
medical imaging. Billions of Web searches supported by
search engines process thousands of terabytes of data daily.
Communities and social media have become increasingly
important data sources, producing digital pictures and
videos, blogs, Web communities, and various kinds of social
networks. The list of sources that generate huge amounts of
data is endless. This hazardous growing, universally
available, and gigantic body of data makes our time truly the
data age. Powerful and versatile tools are badly needed to
automatically uncover valuable information from the
tremendousamounts ofdata andtotransform such datainto
organized knowledge.This essentiality hasled tothe birth of
data mining.The field is young, dynamic, andpromising.Data
mining has and will continue to make great strides in our
journey from the data age toward the coming information
age.
2. DATA MINING
Data Mining ismoreappropriatelynamed“knowledgemining
from data,” which seems somewhat long. However, the
shorterterm, knowledge miningmay notreflecttheattention
on mining from large amounts of data. Though, Mining is
expressiveterm characterizing the processthat findsa small
set of precious nuggets from a great deal of raw material.
In addition, other terms have a same meaning to data
mining—for example, knowledge mining from data,
knowledge extraction, data/pattern analysis, data
archaeology, and data dredging.
Many people think data mining as a synonym for another
popularly used term, knowledge discovery from data, or
KDD, while others view data mining as merely an essential
step in the process of knowledge discovery.
The knowledge discovery process is shown in Figure below
as an iterative sequence of the following steps:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1028
1) Data cleaning (to remove inconsistent data and
noise)
2) Data integration (phase where multiple data
sources may be combined)
3) Data selection (phase where data relevant to the
analysis task are retrieved from the database)
4) Data transformation (phase where data are
transformed and consolidated into forms fitting for
mining by performing summary or aggregation
operations)
5) Data mining (an crucial process where intelligent
methods are applied to extract data patterns)
6) Pattern evaluation (phase to identify the truly
interesting patterns representing knowledgebased
on interestingness measures)
7) Knowledge presentation (phasewherevisualization
and knowledge representation techniques are used
to show mined knowledge to users)
Steps1 to 4 are different formsof data preprocessing, where
data are prepared for mining. The data mining process may
interact with the user or a knowledge base. The interesting
patterns are showed to the user and may be stored as new
knowledge in the knowledge base. The previousview shows
data mining as one step in the knowledge discovery process,
albeit an essential one because it uncovers hidden patterns
for evaluation. However, in industry, in media, and in the
research milieu, the term data mining is generally used to
refer to the entire knowledge discovery process (perhaps
because the term is shorter than knowledge discovery from
data). Therefore, we adopt a broad view of data mining
functionality: Data mining is the process of discovering
interesting patterns and knowledge from huge amounts of
data. The data sources can include databases, data
warehouses, the Web, other informationrepositories,ordata
that flow into the system dynamically.
Fig -1: Data Mining Steps
3. GOALS OF SOFTWARE ENGINEERING
Requirement Analysis: In this phase ofSEtaskgatheringof
software requirementsfromclient,analyzeanddocumenting
data are done. It’s a functional or non-functional need to be
implemented in the system. Client’sacceptanceismandatory
to proceed for further process.
Whatever document prepared in this phase is called
Software Requirement Specifications (SRS)
System Design: System design is a process of defining user
interfaces, modules, architecture and the dataforasystemto
satisfy client requirements. Here we will implement overall
product design as per client requirement different types of
SDK will be used.
Development/Programming: The source code of the
program is written in different programming languages as
per client requirement. It is called programming process in
software development. Coding reserved for actualwritingof
source code. It is a main part in the software development.
Software development organization requires good
programmers to define the standard style of code called
Coding standards. It gives a good appearance to the code
written by different software programmers. It should be
understandable, reusable which followsgood programming
practices. Naming conventions, limitation of data types and
using of variables, constants are main coding standards.
Error Detection/Bug Fixes: Error detection or bug fix is a
essential process for effective and proper software project
planning. Some data related software bugs are kept in bug
repositories. It contains information related to bugs. A bug
fix contains data and code related. There are many types of
programming bugs, design bugs, data bugsthatcreateerrors
in system implementation may require fixes that are
successfully resolved by development team.
Testing: Software testing is not a cost effective. It is the
important phase in software development. There are
different stages in testing to validate or verify software.
Verification and validation processes are concerned with
checking that software being developed meets its
specification and delivers the functionality expected by the
people paying for the software.
During testing, errorscan mask (hide) othererrors.Whenan
error leads to unexpected outputs, you can never be sure if
later output anomalies are due to a new error or are side
effects of the original error. Because analysis is a static
process, you don’t have to be concerned with interactions
between errors. Consequently, a single analysis session can
discover many errors in a system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1029
Maintenance: Good software should deliver the required
functionality and performance to the user and should be
maintainable, dependable, and usable. Software will be
written in such a way so that it can be develop to meet the
changing needs of customers. This is a demanding attribute
because software change is an impending requirement of a
changing business environment.
Agile procedures, used in the maintenance process
itself, are likely to be effective, whether or not an agile way
has been used for system development. Incremental
delivery, design for change and maintaining simplicity all
make sense when software isbeing modified. In fact,youcan
think of an agile development process as a process of
software expansion.
Fig -2: Software Engineering Tasks, Data Mining
Techniques & Data Mining in Software Engineering
4. TECHNIQUES IN DATA MINING
4.1 Association rule
Association rule mining is an examplewheretheuse
of constraints and interestingness measures can ensure the
completeness of mining. The problem of mining association
rules can be reduced to that of mining frequent item sets.
Association Rule mining approach is applied to the
records in order to discover the patterns that are possiblyto
cause high severity defects.
Max association rule mining algorithms employ a
support–confidence framework. Even though minimum
support and confidence thresholdshelp weed outorexclude
the exploration of a good number of uninteresting rules,
most of the rules generated are still not interesting to the
users. Regrettably, this isespecially true when miningatlow
support thresholds or mining for long patterns. This has
been a big obstacle for successful application of association
rule mining
4.2 Classification:
Classification is the process of finding a model (or
function) that describes and distinguishes data classes or
concepts. The models are derived based on the analysis of a
set of training data (i.e., data objects for which the class
labels are known). The model is used to predict the class
label of objects for which the class label is unknown.
A neural network, when used for categorization, is
typically a collection of neuron-like processing units with
weighted connections between the units. There are various
other methodsfor constructing classificationmodels,suchas
Bayesian classification, support vector machines, and k-
nearest-neighbor classification
Regression analysis is a statistical
technique/approach that is most often used for numeric
prediction, although othermethodsexist as well. Regression
also encompasses the identification of distribution trends
based on the available data.
The resulting classification should maximally distinguish
each class from the others, presenting an organized picture
of the data set.
4.3 Clustering:
Clustering plays a central role in customer
relationship management, whichgroupscustomersbasedon
their similarities. Using relevance mining techniques,we can
better understand features of each customer group and
develop customized customer reward programs.
Clustering techniques consider data tuples as
objects. They partition the objects into groups,orclusters,so
that objects within a cluster are “similar” to one anotherand
“dissimilar” to objects in other clusters. Similarity is
commonly defined in terms of how “close” the objects are in
space, based on a distance function. The “quality” ofacluster
may be represented by its diameter, the maximum distance
between any two objects in the cluster.
The specified set of entities to cluster needs to be
identified, before applying clustering to a software system.
The next phase is attribute selection. Max software
clustering methods at first transform a fact base to a data
table, where each row describes one entity to be clustered.
Each column containsthe value for a specific attribute. After
accomplishment of all preparation steps the clustering
algorithm can start to execute. Clustering algorithmsusedin
software engineering are: graph-theoretical algorithms,
construction algorithms, optimization algorithms,
hierarchical algorithms. For high dimensional data, many of
the existing methods fail due to the curse of dimensionality,
which contribute particular distance functions problematic
in high-dimensional spaces which led to new era of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030
clustering algorithms for high-dimensional data that focus
on subspace clustering and correlation clustering that also
looks for arbitrary rotated subspace clusters that can be
modeled by giving a correlation of their attributes.
Fig -3: Characterization of Data Mining
5. CONCLUSIONS
In this paper, I have tried to provide an analysis of Data
Mining and its origin. Why data mining is essentialinthisera
of computer world. An analyzed information aboutSoftware
Engineering and it various phases. How Data Mining in
Software Engineering is classified and Data Mining
Techniques used in processfor fruitfulknowledgediscovery.
REFERENCES
[1] Tao Xie,Jian Pei,Ahmed E. Hassan, "Mining Software
Engineering Data"
[2] Lovedeep, Varinder Kaur Atri, "Applications of Data
Mining Techniques in Software Engineering", IJEECS
[3] Jiawei Han,Micheline Kamber & Jian Pei, "Data Mining
Concepts and Techniques", Third Edition
[4] Ian Sommerville, "SOFTWARE ENGINEERING" Ninth
Edition

More Related Content

PDF
A Survey on Data Mining
PDF
IRJET- Big Data Management and Growth Enhancement
PDF
IRJET- Big Data: A Study
PDF
Data Mining – A Perspective Approach
DOCX
Big Data Analytics
PDF
elgendy2014.pdf
DOCX
Abstract
PPTX
Data mining
A Survey on Data Mining
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data: A Study
Data Mining – A Perspective Approach
Big Data Analytics
elgendy2014.pdf
Abstract
Data mining

What's hot (20)

PDF
Real World Application of Big Data In Data Mining Tools
PDF
IRJET - Big Data Analysis its Challenges
PDF
Big data – A Review
PDF
Big Data Analytics: Recent Achievements and New Challenges
PPTX
Big data with hadoop
PPTX
Big data Analytics
PDF
Data Mining With Excel 2007 And SQL Server 2008
PPTX
March Towards Big Data - Big Data Implementation, Migration, Ingestion, Manag...
PPT
A Practical Approach To Data Mining Presentation
PPTX
Data Science
DOC
Data Mining
PDF
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
PPTX
Data mining
PPTX
Introduction to-data-mining chapter 1
PPTX
Key Principles Of Data Mining
PDF
Data Mining and Business Intelligence Tools
PDF
Data mining seminar report
PDF
Lect 1 introduction
PDF
Data mining (lecture 1 & 2) conecpts and techniques
Real World Application of Big Data In Data Mining Tools
IRJET - Big Data Analysis its Challenges
Big data – A Review
Big Data Analytics: Recent Achievements and New Challenges
Big data with hadoop
Big data Analytics
Data Mining With Excel 2007 And SQL Server 2008
March Towards Big Data - Big Data Implementation, Migration, Ingestion, Manag...
A Practical Approach To Data Mining Presentation
Data Science
Data Mining
A REVIEW ON CLASSIFICATION OF DATA IMBALANCE USING BIGDATA
Data mining
Introduction to-data-mining chapter 1
Key Principles Of Data Mining
Data Mining and Business Intelligence Tools
Data mining seminar report
Lect 1 introduction
Data mining (lecture 1 & 2) conecpts and techniques
Ad

Similar to IRJET- A Study on Data Mining in Software (20)

PDF
Fundamentals of data mining and its applications
PDF
IRJET- Advances in Data Mining: Healthcare Applications
PDF
IRJET- Analysis of Big Data Technology and its Challenges
PDF
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
PDF
An Overview of General Data Mining Tools
PDF
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
PDF
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
PDF
The Big Data Importance – Tools and their Usage
PDF
Analysis of Big Data
PDF
Data Mining Concepts And Applictions Ciza Thomas Andries Engelbrecht
PDF
IRJET- Scope of Big Data Analytics in Industrial Domain
PDF
Data Mining Applications And Feature Scope Survey
PDF
2024-07-eb-big-book-of-data-engineering-3rd-edition.pdf
PDF
Advanced Analytics and Machine Learning with Data Virtualization
PDF
Chapter 1 Handoutfffffffffffffffffffffffffffffffffffff.pdf
PDF
Big Data: Privacy and Security Aspects
DOCX
Seminar Report Vaibhav
PDF
• The IoT data is characterized by its enormous size, rapid velocity, and typ...
PDF
Big Data Analytics
PDF
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Fundamentals of data mining and its applications
IRJET- Advances in Data Mining: Healthcare Applications
IRJET- Analysis of Big Data Technology and its Challenges
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
An Overview of General Data Mining Tools
Quality of Groundwater in Lingala Mandal of YSR Kadapa District, Andhraprades...
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...
The Big Data Importance – Tools and their Usage
Analysis of Big Data
Data Mining Concepts And Applictions Ciza Thomas Andries Engelbrecht
IRJET- Scope of Big Data Analytics in Industrial Domain
Data Mining Applications And Feature Scope Survey
2024-07-eb-big-book-of-data-engineering-3rd-edition.pdf
Advanced Analytics and Machine Learning with Data Virtualization
Chapter 1 Handoutfffffffffffffffffffffffffffffffffffff.pdf
Big Data: Privacy and Security Aspects
Seminar Report Vaibhav
• The IoT data is characterized by its enormous size, rapid velocity, and typ...
Big Data Analytics
Wearable Technology Orientation using Big Data Analytics for Improving Qualit...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
Mechanical Engineering MATERIALS Selection
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PPT
Project quality management in manufacturing
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lesson 3_Tessellation.pptx finite Mathematics
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Mechanical Engineering MATERIALS Selection
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT 4 Total Quality Management .pptx
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
Project quality management in manufacturing
Structs to JSON How Go Powers REST APIs.pdf
bas. eng. economics group 4 presentation 1.pptx
Model Code of Practice - Construction Work - 21102022 .pdf

IRJET- A Study on Data Mining in Software

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1027 A STUDY ON DATA MINING IN SOFTWARE Sreenivasulu Tholuchuri MCA, Hyderabad, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data mining for software engineering is a process of discovering software engineering data in databases. In simple words, it’s a series of actions to extract knowledgefrom useful patterns and relationships in hugevolumesofdatabases and use that knowledge to improve the software engineering process. It uses tools from artificial intelligence and statics with database management to analyze large digital collections, known as data sets. Data mining is widely used in business (insurance, banking, and retail), science research (astronomy, medicine) and government defense departments. Key Words: Data Mining, Software Engineering, Error Detection, Clustering, Association 1. INTRODUCTION Data Mining also called asknowledge discoveryindatabases or KDD for making productive use of mined knowledge in operable way. 1.1 Early Ages During 1980's data storage capacities in computers increased a lot and many big companies started began to store transactional data which resulted collections of huge volume records, often called as data ware houses. This data warehouses were too large to be analyzed with traditional statistical approaches. With the aim of knowledge discovery several computer science workshops and conferences were held for adapting the techniques from the field of Artificial Intelligence (AI) --- such as neural networks, genetic algorithms, machine learning etc. Thisled to the First International Conferenceon Knowledge Discovery and Data Mining (FICKDD), held in Montreal, and the launch in 1997 of the journal Data Mining and Knowledge Discovery which was also the period when many early data-mining companies were formed and products were introduced. Now a day’s vast amounts of data are collected daily. Figuring out such data is an important need. “We are living in the information age”is a popular saying; however, we are actually living in the data age. Terabytes or petabytes of data pour into our computer networks, the World Wide Web (WWW), and various data storage devices every day from business, society, science and engineering, medicine, and almost every other aspect of daily life. This explosive growth of available data volume is a result of the computerization of our society and the fast development of powerful data collection and storage tools. Businesses worldwide generate gigantic data sets, including sales transactions, stock trading records, product descriptions, sales promotions, company profiles and performance, and customer feedback. For example, large stores, such as Wal-Mart, handle hundredsof millionsof transactionsperweekatthousandsof branches around the world. Scientific and engineering practices generate high orders of thousands of terabytes of data in a continuous manner, from remote sensing, process measuring, scientific experiments, system performance, engineeringobservations, andenvironmentsurveillance.The medical and health industrygeneratestremendousamounts of data from medical records, patient monitoring, and medical imaging. Billions of Web searches supported by search engines process thousands of terabytes of data daily. Communities and social media have become increasingly important data sources, producing digital pictures and videos, blogs, Web communities, and various kinds of social networks. The list of sources that generate huge amounts of data is endless. This hazardous growing, universally available, and gigantic body of data makes our time truly the data age. Powerful and versatile tools are badly needed to automatically uncover valuable information from the tremendousamounts ofdata andtotransform such datainto organized knowledge.This essentiality hasled tothe birth of data mining.The field is young, dynamic, andpromising.Data mining has and will continue to make great strides in our journey from the data age toward the coming information age. 2. DATA MINING Data Mining ismoreappropriatelynamed“knowledgemining from data,” which seems somewhat long. However, the shorterterm, knowledge miningmay notreflecttheattention on mining from large amounts of data. Though, Mining is expressiveterm characterizing the processthat findsa small set of precious nuggets from a great deal of raw material. In addition, other terms have a same meaning to data mining—for example, knowledge mining from data, knowledge extraction, data/pattern analysis, data archaeology, and data dredging. Many people think data mining as a synonym for another popularly used term, knowledge discovery from data, or KDD, while others view data mining as merely an essential step in the process of knowledge discovery. The knowledge discovery process is shown in Figure below as an iterative sequence of the following steps:
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1028 1) Data cleaning (to remove inconsistent data and noise) 2) Data integration (phase where multiple data sources may be combined) 3) Data selection (phase where data relevant to the analysis task are retrieved from the database) 4) Data transformation (phase where data are transformed and consolidated into forms fitting for mining by performing summary or aggregation operations) 5) Data mining (an crucial process where intelligent methods are applied to extract data patterns) 6) Pattern evaluation (phase to identify the truly interesting patterns representing knowledgebased on interestingness measures) 7) Knowledge presentation (phasewherevisualization and knowledge representation techniques are used to show mined knowledge to users) Steps1 to 4 are different formsof data preprocessing, where data are prepared for mining. The data mining process may interact with the user or a knowledge base. The interesting patterns are showed to the user and may be stored as new knowledge in the knowledge base. The previousview shows data mining as one step in the knowledge discovery process, albeit an essential one because it uncovers hidden patterns for evaluation. However, in industry, in media, and in the research milieu, the term data mining is generally used to refer to the entire knowledge discovery process (perhaps because the term is shorter than knowledge discovery from data). Therefore, we adopt a broad view of data mining functionality: Data mining is the process of discovering interesting patterns and knowledge from huge amounts of data. The data sources can include databases, data warehouses, the Web, other informationrepositories,ordata that flow into the system dynamically. Fig -1: Data Mining Steps 3. GOALS OF SOFTWARE ENGINEERING Requirement Analysis: In this phase ofSEtaskgatheringof software requirementsfromclient,analyzeanddocumenting data are done. It’s a functional or non-functional need to be implemented in the system. Client’sacceptanceismandatory to proceed for further process. Whatever document prepared in this phase is called Software Requirement Specifications (SRS) System Design: System design is a process of defining user interfaces, modules, architecture and the dataforasystemto satisfy client requirements. Here we will implement overall product design as per client requirement different types of SDK will be used. Development/Programming: The source code of the program is written in different programming languages as per client requirement. It is called programming process in software development. Coding reserved for actualwritingof source code. It is a main part in the software development. Software development organization requires good programmers to define the standard style of code called Coding standards. It gives a good appearance to the code written by different software programmers. It should be understandable, reusable which followsgood programming practices. Naming conventions, limitation of data types and using of variables, constants are main coding standards. Error Detection/Bug Fixes: Error detection or bug fix is a essential process for effective and proper software project planning. Some data related software bugs are kept in bug repositories. It contains information related to bugs. A bug fix contains data and code related. There are many types of programming bugs, design bugs, data bugsthatcreateerrors in system implementation may require fixes that are successfully resolved by development team. Testing: Software testing is not a cost effective. It is the important phase in software development. There are different stages in testing to validate or verify software. Verification and validation processes are concerned with checking that software being developed meets its specification and delivers the functionality expected by the people paying for the software. During testing, errorscan mask (hide) othererrors.Whenan error leads to unexpected outputs, you can never be sure if later output anomalies are due to a new error or are side effects of the original error. Because analysis is a static process, you don’t have to be concerned with interactions between errors. Consequently, a single analysis session can discover many errors in a system.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1029 Maintenance: Good software should deliver the required functionality and performance to the user and should be maintainable, dependable, and usable. Software will be written in such a way so that it can be develop to meet the changing needs of customers. This is a demanding attribute because software change is an impending requirement of a changing business environment. Agile procedures, used in the maintenance process itself, are likely to be effective, whether or not an agile way has been used for system development. Incremental delivery, design for change and maintaining simplicity all make sense when software isbeing modified. In fact,youcan think of an agile development process as a process of software expansion. Fig -2: Software Engineering Tasks, Data Mining Techniques & Data Mining in Software Engineering 4. TECHNIQUES IN DATA MINING 4.1 Association rule Association rule mining is an examplewheretheuse of constraints and interestingness measures can ensure the completeness of mining. The problem of mining association rules can be reduced to that of mining frequent item sets. Association Rule mining approach is applied to the records in order to discover the patterns that are possiblyto cause high severity defects. Max association rule mining algorithms employ a support–confidence framework. Even though minimum support and confidence thresholdshelp weed outorexclude the exploration of a good number of uninteresting rules, most of the rules generated are still not interesting to the users. Regrettably, this isespecially true when miningatlow support thresholds or mining for long patterns. This has been a big obstacle for successful application of association rule mining 4.2 Classification: Classification is the process of finding a model (or function) that describes and distinguishes data classes or concepts. The models are derived based on the analysis of a set of training data (i.e., data objects for which the class labels are known). The model is used to predict the class label of objects for which the class label is unknown. A neural network, when used for categorization, is typically a collection of neuron-like processing units with weighted connections between the units. There are various other methodsfor constructing classificationmodels,suchas Bayesian classification, support vector machines, and k- nearest-neighbor classification Regression analysis is a statistical technique/approach that is most often used for numeric prediction, although othermethodsexist as well. Regression also encompasses the identification of distribution trends based on the available data. The resulting classification should maximally distinguish each class from the others, presenting an organized picture of the data set. 4.3 Clustering: Clustering plays a central role in customer relationship management, whichgroupscustomersbasedon their similarities. Using relevance mining techniques,we can better understand features of each customer group and develop customized customer reward programs. Clustering techniques consider data tuples as objects. They partition the objects into groups,orclusters,so that objects within a cluster are “similar” to one anotherand “dissimilar” to objects in other clusters. Similarity is commonly defined in terms of how “close” the objects are in space, based on a distance function. The “quality” ofacluster may be represented by its diameter, the maximum distance between any two objects in the cluster. The specified set of entities to cluster needs to be identified, before applying clustering to a software system. The next phase is attribute selection. Max software clustering methods at first transform a fact base to a data table, where each row describes one entity to be clustered. Each column containsthe value for a specific attribute. After accomplishment of all preparation steps the clustering algorithm can start to execute. Clustering algorithmsusedin software engineering are: graph-theoretical algorithms, construction algorithms, optimization algorithms, hierarchical algorithms. For high dimensional data, many of the existing methods fail due to the curse of dimensionality, which contribute particular distance functions problematic in high-dimensional spaces which led to new era of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030 clustering algorithms for high-dimensional data that focus on subspace clustering and correlation clustering that also looks for arbitrary rotated subspace clusters that can be modeled by giving a correlation of their attributes. Fig -3: Characterization of Data Mining 5. CONCLUSIONS In this paper, I have tried to provide an analysis of Data Mining and its origin. Why data mining is essentialinthisera of computer world. An analyzed information aboutSoftware Engineering and it various phases. How Data Mining in Software Engineering is classified and Data Mining Techniques used in processfor fruitfulknowledgediscovery. REFERENCES [1] Tao Xie,Jian Pei,Ahmed E. Hassan, "Mining Software Engineering Data" [2] Lovedeep, Varinder Kaur Atri, "Applications of Data Mining Techniques in Software Engineering", IJEECS [3] Jiawei Han,Micheline Kamber & Jian Pei, "Data Mining Concepts and Techniques", Third Edition [4] Ian Sommerville, "SOFTWARE ENGINEERING" Ninth Edition