Mining Multi Level Association Rules Using Fuzzy Logic

Size: px
Start display at page:

Download "Mining Multi Level Association Rules Using Fuzzy Logic"

Transcription

1 Mining Multi Level Association Rules Using Fuzzy Logic Usha Rani 1, R Vijaya Praash 2, Dr. A. Govardhan 3 1 Research Scholar, JNTU, Hyderabad 2 Dept. Of Computer Science & Engineering, SR Engineering College, Warangal 3 School of Information Technology, JNTU, Hyderabad Abstract Extracting multilevel association rules in transaction databases is most commonly used tass in data mining. This paper proposes a multilevel association rule mining using fuzzy concepts. This paper uses different fuzzy membership function to retrieve efficient association rules from multi level hierarchies that exist in a transaction dataset. In general, the data can spread into many hierarchies or levels. From such datasets retrieving the association rules is a tedious tas. For this reason, in this paper we used the fuzzy-set concepts to retrieve multilevel association rules. This approach adopts a top-down progress and also incorporates fuzzy boundaries instead of sharp boundary intervals to derive large itemsets. Keywords Association Rules, Data Mining, Fuzzy Logic. I. INTRODUCTION Data mining has attracted a great deal of attention in the information industry and in society as a whole in recent years, due to the wide availability of huge amounts of data and the imminent need for turning such data into useful information and nowledge. The information and nowledge gained can be used for applications ranging from maret analysis, fraud detection, and customer retention, to production control and science exploration. An Association rule mining is an important process in data mining, which determines the co relations between items belonging to a transaction database [1][2][3]. Association rules can be used for mareting, planning and etc. For example, the association rules can be used to identify the customer buying habits in a maret-baset analysis, lie if customers buy suit, they are more liely to buy tie as well. In general, every association rule must satisfy two user specified constraints called support and confidence. The support of a rule X Y is defined as the percentage of transactions that contain X Y, where X and Y are disjoint sets of items from the given dataset [4][5]. The confidence is defined as the ratio support (X Y)/support(X). Here the aim is to find all rules that satisfy user specified minimum support and confidence values. Apriori algorithm is very widely used to algorithm to generate the association rules. The appriori algorithm will generate the rules step by step manner. However, this processing way might cause high computational costs and iterative database scans. The majority of algorithms used for association rule mining are dealt with single-concept level datasets. But most of the data can be spread into different levels. Such datasets are called multi level datasets or taxonomy datasets. Mining association rules from such datasets will give more exact, accurate and useful information to the user to gain more nowledge from the data. Relevant data item taxonomies are normally preconceived and can be symbolized using hierarchy trees. In multi level datasets, the data is available in different stages of abstraction or levels. Such levels are represented with concept hierarchies. For example, a user may not only be concerned with the associations between computer and printer", but also wants to now the association between destop PC price and laser printer price. This paper proposes a fuzzy multiple-level association rule mining algorithm for extracting implicit nowledge from multi level dataset. It integrates fuzzy set concepts, data-mining technologies and multiple-level taxonomy to find fuzzy association rules from transaction data sets. II. APRIORI ALGORITHM AND ITS PROPERTY Apriori employs an iterative approach nown as levelwise search, where -itemsets are used to explore +1- itemsets. Apriori exploits the following property: If an itemset is frequent, then all its subsets are also frequent [8]. The idea is frequent itemset must have subsets of frequent itemsets. Let -itemset is an itemset having items. Let L represent the set of frequent -itemsets and C is the set of candidate -itemsets. Therefore the algorithm to generate the frequent itemsets is follows: i. A C is a set of candidate -itemsets, which is generated by joining L -1. ii. C is a superset of L, that is, its members may or may not be frequent, but all of the frequent - itemsets are included in C. iii. All candidates having a count greater than the minimum support count are frequent and belong to L iv. The itemsets in C which that is not in L -1 are deleted. v. This process is repeated until all no more frequent -itemsets can be found. 747

2 III. MULTILEVEL ASSOCIATION RULES CONCEPT Mining association rules at multiple concept levels may, however, lead to discovery of more general and important nowledge from data. Relevant item taxonomies are usually predefined in real-world applications and can be represented as hierarchy trees. Terminal nodes on the trees represent actual items appearing in transactions; internal nodes represent classes or concepts formed from lower-level [10].All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and right-justified. 2. Di is the i-th transaction, in the dataset, where 1 i n (n is the number of transaction), add all of the items with the identical first K digit, compute the item count for each groups in the transaction and eliminate the groups which their count are less than α where α is the predefined minimum support value in the current level. 3. Consider different membership function for different data items. Each data item has its own characteristics and its own membership function. For each transaction set D i will have an item say I j, this is a j-th item at level. This I j will have a quantitative value say Q ij. This V ij is converted into a fuzzy set say f iji. The f iji will have number of fuzzy regions for each I j this is denoted by h j. R il (1 l h j ) is the l-th fuzzy region of I j. The Q ij is defined as 4. Compute the value of each fuzzy region R il from the dataset as, Fig. I: Example taxonomy In Fig. I, the root node is at level 0, the internal nodes representing categories lie science and Fantasy, these are at level 1, the internal nodes such as Futuristic are at level 2 and the terminal nodes representing boos such as Lord of the Rings are at level 3. Only terminal nodes appear in transactions [3]. These hierarchies are encoded using sequences of numbers and the symbol * according to their positions in the hierarchy tree. For example, the internal node Science in Fig. 1 would be represented by 1-*-*, the internal node Epic by 2-1-* and the terminal node The chronicles of Narnia by [3]. IV. THE PROPOSED MODEL The proposed algorithm consist of data mining, multilevel taxonomy and a set of membership functions to explore fuzzy association rules in accordance a given transaction dataset. For this each and every item is assigned a sequence number. The proposed algorithm is 1. Use a sequence of numbers and the symbol * to encode the predefined taxonomy. The encoding is started from root with a value zero and continued to next level from left to right by incrementing one value 5. Find the maximum count value say MaxCount j among Count il values (1 l h j ), as If MaxCount j of a fuzzy region R il is equal to the minimum support threshold ( ), then place MaxCount j into l-frequent itemset. 6. If L l is null then increase by one. If r=1 then go to step 2 otherwise go to next step. 7. The following procedure is carried out for different values. i) If r = 2 produce the candidate set C 2, where C 2 is the set of candidate itemset with 2 items at level ii) If r > 2 then Generate the candidate set C r, where C r is the set of candidate itemsets with r-items on level from L r For each obtained candidate r-itemset say S with items (S 1,S 2,..., S r ) in C r i) Compute the fuzzy value of S using minimum operator of fuzzy logic, f is = min(f is1,f is2,..., f isr ) ii) Count s is the sum of fis, 1 i n iii) If Counts is greater than or equal to minimum support value then insert S into L r. 748

3 9. If L r is null then increase by one and go to the next step, otherwise increase r by one and go to step If K > p, where p is number of levels in a taxonomy then go to step 11 otherwise set r=1 and go to step Mae the fuzzy association rules for all frequent r- itemset including S = (S 1, S 2,..., S r ), r>2 as, Find all the rules X Y, where X S and Y S and X Y =, X Y =S. Compute the confidence value of all association rules by: 12. Select the rules which have confidence values greater than predefined confidence threshold value. V. AN EXAMPLE To illustrate the above algorithm, we considered a dairy sales transaction from a sales dataset, which is shown in Table I. Its taxonomy is represented in Fig II. Fig. II Dairy Sales Taxonomy This taxonomy is encoded as specified in algorithm step 1, which is represented in Fig III. Fig. III Dairy Sales Encoded Taxonomy 749 In Fig. III, the Dairy Sales transactions taxonomy is divided into 3 classes namely chesse, mil, curd. Each of these classes have sub items specifies the type of dairy and producing companies. For each class of the dairy, we consider a unique membership function. There are 3 fuzzy regions called low, middle and high are considered for these member functions. The membership function related to the mil, curd and cheese are shown in Fig. IV, Fig. V and Fig. VI respectively. Table I SIX EXAMPLE TRANSACTIONS TID Items (organic feta cheese, 1) (sil feta cheese, 4) (organic D 1 low fat mil, 4) (eagle low fat mil, 6) (organic bean curd, 7) D 2 (organic feta cheese, 3) (sil feta cheese, 3) (horizon cheddar cheese, 1) (horizon high fat mil, 5) (eagle high fat mil, 3), (horizon fruit curd, 4) (eagle fruit curd, 4) D 3 (organic low fat mil, 7) (horizon high fat mil, 8) (horizon bean curd, 5) (horizon fruit curd, 7) D 4 (organic feta cheese, 2) (organic low fat mil, 5) (horizon bean curd, 5) D 5 (organic low fat mil, 5)( eagle high fat mil, 4) D 6 (organic feta cheese, 3) (sil feta cheese, 10) The above Table I, each and every item is identified by a unique id called TID. The items are represented as pair first represent the item description from lower level to higher level and these item counts, i.e. (organic feta cheese, 1) means the organic feta cheese is available in the dataset only once. Similarly, organic beat curd is repeating in the dataset seven times. This Table I is encoded with respect to Fig 3, i.e. the item Organic Feta cheese can be encoded as 111. All the items in the Table I are encoded and represented in Table II. Table II ENCODED TRANSACTION DATA TID Items D 1 (111, 1) (112, 4) (211, 4) (212, 6) (311, 7) D 2 (111, 3) (112, 3) (121, 1) (221, 5) (222, 3) (322, 4) (321, 4) D 3 (211, 7) (221, 8) (312, 5) (322, 7) D 4 (111, 2) (211, 5) (312, 5) D 5 (211, 5) (222, 4) D 6 (111, 3) (112, 10) In Table some items are at the same level or different concept. For example (111, 1) and (112, 4) are first and second items of same hierarchy and same TID items. This can be represented as 1** and their counts are summed up in Table III.

4 TABLE III LEVEL REPRESENTATION TID Items D 1 (1**, 5) (2**, 10) (311, 7) D 2 (1**, 7) (2**, 8) (3**, 8) D 3 (2**, 15) (3**, 12) D 4 (1**, 2) (2**, 5) (3**, 5) D 5 (2**, 9) D 6 (1**, 13) Now the Table III item sets are converted into fuzzy sets based on trapezoidal equation. For example, let consider the item set (1**, 5). According to the Fig 3, this group is belongs to cheese. Similarly, the itemsets (2**, 10) is related to Mil and (3**, 8) is related to Curd respectively. Based on the Trapezoidal membership function the cheese sales are converted into 3 fuzzy regions named as low, middle and high. These are represented in the figures Fig. IV, Fig. V and Fig. VI. The fuzzy value 0.2 indicates the low, 0.8 is middle region and 1 is the high fuzzy regions. The Table IV contains the fuzzy regions for all transactions. Fig. IV: The membership functions for cheese sales Fig. V: The membership functions for Mil sales After obtaining the fuzzy regions of the three items, now we summed the fuzzy values of each region. For example, consider the 1**.Low fuzzy region. The sum of fuzzy values of this region in all transactions is obtained through the equation =1. The sum of fuzzy values for each individual region has been shown in Table V. After the above step, now the fuzzy region is selected with highest value for each group. For example the group 1** low region is equal to one, middle region is equal to 1.8 and high region is equal to 1.2. Since the value of the middle region, is 1.8, which is higher than the other two regions, the middle fuzzy region is chosen as the representative of group 1** for other processes. This tas is also carried out for other groups. Each of these values is compared with the minimum support and in case it is greater or equal with the predefined minimum support, then it is added to L 1 1. For example consider the minimum support value is 1, then the 1**.middle, 2**.middle and 3**.middle values are greater than the minimum support. Thus these values are added into L From L 1 set a two member candidate set C 2 is generated. The fuzzy membership value of each of the twomember sets inside the C 1 2 is calculated based on the predefined membership function for each individual item, for the whole transactions. For example, consider the two member set {1**.Middle, 3**. high}. The fuzzy membership value of this set for transaction D 1 is calculated as: min (0.8, 1) = 0.8. This operation must be carried out for all transactions. All the candidate and frequent itemsets generated and final result of this transaction dataset are shown in Table VI, VII, VIII, IX and X. We will find the fuzzy association rules based on the frequent itemset obtained from the previous steps. We discover all probable rules from the frequent itemset obtained in different levels with the following format. {1**=middle} {3**=high} {3**=high} {1**=middle} {3**=high} {11*=middle} {11*=middle} {3**=high} {111=low} {3**=high} {3**=high} {111=low} The confidence value of all rules are studied with predefined minimum confidence threshold and the rules, whose confidence value is bigger than or equal to the predefined minimum confidence threshold, are chosen as final rules. These are shown in Table XI. For example, if the minimum confidence value is equal to 1, the final rules shall be as follows: Fig. VI: The membership functions for Curd sales 750

5 TID TABLE IV THE LEVEL-1 FUZZY SETS TRANSFORMED FROM THE DATA IN TABLE 3 Level -1 Fuzzy set D 1 D 2 D 3 D 4 D 5 D 6 {1**=middle} {3**= high} {3**=high} {1**=middle} {11*=middle} {3**=high} TABLE V THE COUNTS OF THE LEVEL-1 FUZZY REGIONS Items Count (1**.low) 1.0 (1**.middle) 1.8 (1**.high) 1.2 (2**.low) 0.4 (2**.middle) 2.4 (2**.high) 2.2 (3**.high) 0.0 (3**.high) 0.5 (3**.high) 3.5 Table VI THE SET OF FREQUENT 1-ITEMSETS FOR LEVEL ONE Itemset Count (1**.middle) 1.8 (2**.middle) 2.4 (3**.high) 3.5 Table VII THE COUNTS OF THE LEVEL-1 FUZZY REGIONS Itemset (1**.middle, 2**.middle) (1**.middle, 3**.high) (2**.middle, 3**.high) TABLE VIII THE MEMBERSHIP VALUES FOR 1**.MIDDLE, 3**.HIGH TID 1**.middle 3**.high Min(1**.middle, 3**.high) D D D D D D Table IX THE COUNTS OF THE 2-ITEMSETS AT LEVEL 1 Itemset Count (1**.middle, 2**.middle) 1.4 (1**.middle, 3**.high) 1.8 (2**.middle, 3**.high) 1.7 Table X ALL FREQUENT ITEMSETS FOR LEVEL-1, LEVEL-2, LEVEL 3 Itemset Count (1**.middle) 1.8 (2**.middle) 2.4 (3**.high) 3.5 (1**.middle, 3**.high) 1.8 (11*.middle) 2.0 (21*.middle) 2.6 (31*.high) 2.0 (22*.middle) 2.0 (32*.high) 2.0 (11*.middle, 3**.high) 2.0 (111.low) 3.0 (211.middle) 2.6 (111.middle, 3**.high)

6 Table XI CONFIDENCE VALUE FOR ALL RULES Association rules Confidence {1** = middle} {3** = high} 1.0 {3** = high} {1** = middle} 1.0 {3** = high} {11* = middle} 0.5 {11* = middle} {3** = high} 1.0 {111 = low} {3** = high} 0.7 {3** = high} {111 = low} 1.4 VI. EXPERIMENTAL RESULTS The proposed algorithm carries out the analysis on a number of 100 sales invoices of a food stuff store and 7 of its items and based on the predefined taxonomy from 7 items and the predefined membership function per each item, carries out the mining of association rules. The predefined taxonomy in the first level includes 7 nodes that represent the items used in the test, the second level includes 14 nodes that represent the taste or different types of a specific product and in the third level it also consists of 48 nodes that represent the manufacturing companies and factories. The database transactions include the name of the product and the quantity of such products purchased. One item may not be used twice in one transaction. In order to observe the results, we first analyze the proposed algorithm with a different number of transactions and the results based on the number of rules produced and the predefined minimum support for algorithm and the minimum confidence equal to 0. 5 have been shown in Fig. VII. Fig. VII. Rules generated with different min support The results obtained based on the number of rules developed and different types of the predefined minimum confidence by the user have been shown in Fig. 8 based on the 100 transactions of the customers purchases and minimum support equal to 3. As you can see in Fig. VII, with increased number of the transactions under study, the number of mined association rules will be more and this is obvious and that s because with the increased number of the transactions, the number of frequent itemset will also increase and as a result, a greater number of rules are mined. Also considering the Fig. VIII, with increased number of the predefined. Minimum confidence value, the number of mined association rules will also decrease. Fig. VIII. Rules generated with different min support VII. CONCLUSIONS In This paper, we have employed fuzzy set concepts, multiple level taxonomy, different membership function for each item to find fuzzy Multi level association rules in a given transaction data set. The rules mined in this algorithm are desirable for a specific time interval, but it is clear that with the elapse of time, the conditions for sale of items shall be different. As an example, based on different seasons of the year, the number of sales of a series of product may be variant. Therefore in our next wor we are going to present a new method to generate such membership function dynamically to cope with the environment with changing conditions. Moreover, not only we can define the minimum support value for each individual level of the predefined taxonomy for the products but also we are able to define the minimum support for each item which maes output rules to get closer to the user s demanded rules. 752

7 REFERENCES [1] Agrawal, R., T. Imielinsi and A. Swami, Mining associations between sets of items in massive databases. In The 1993 ACM SIGMOD Conference on Management of Data, Washington DC, USA, pp: [2] Ha, I., Y. Cai and N. Cercone, Data-driven of quantitative rules in relational databases. IEEE Tram. Knowledge and Data Eng., 5: [3] Ying Lin, K., B. Chian Chien and T. Pei Hong, Mining Fuzzy Multiple-Level Association Rules from Quantitative Data. Applied Intelligence, 18: [4] Han, J. and M. Kamber, Data Mining:Concepts and Techniques. The Morgan Kaufmann Series. [5] Agrawal, R. and R. Sriant, Fast algorithms for mining association rules. 20th VLDB Conference, pp: [6] Intan, R., Mining Multidimensional Fuzzy Association Rules from a Normalized Database. International Conference on Convergence and Hybrid Information Technology. [7] Ping Huang, Y. and L. Kao, Using Fuzzy Support and Confidence Setting to Mine Interesting Association Rules. IEEE Annual Meeting, 2: [8] Khare, N., N. Adlaha and K. R. Pardasani, An Algorithm for Mining Multidimensional Fuzzy Association Rules. International Journal of Computer Science and Information Security, 5: [9] Watanabe, T., A Fast Fuzzy Association Rules Mining Algorithm Utilizing Output Field Specification. Biomedical Soft Computing and Human Sciences, 16 (2): [10] [10] Liu, B., W. Hsu and Y. Ma, Mining association rules with multiple minimum supports. Fifth ACM SIGKDD International Conference Knowledge Discovery and Data Mining, pp: [11] Pei Hong, T., T. Jung Huang and Ch. Sheng Chang, Mining Multiple-level Association Rules Based on Pre-large Concepts. I- Tech, Vienna, Austria, pp: 438. [12] Han, J. and Y. Fu, Discovery of Multiple- Level Association Rules from Large Databases. 21st Very Large Data Bases Conference, Morgan Kaufmann, pp:

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm

Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*

More information

DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE

DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India sk.obaidullah@gmail.com

More information

A Survey on Association Rule Mining in Market Basket Analysis

A Survey on Association Rule Mining in Market Basket Analysis International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey

More information

MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH

MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, rajalakshmi@cit.edu.in

More information

Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining

Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology

More information

NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE

NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE www.arpapress.com/volumes/vol13issue3/ijrras_13_3_18.pdf NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE Hebah H. O. Nasereddin Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan

More information

Binary Coded Web Access Pattern Tree in Education Domain

Binary Coded Web Access Pattern Tree in Education Domain Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi

More information

Selection of Optimal Discount of Retail Assortments with Data Mining Approach

Selection of Optimal Discount of Retail Assortments with Data Mining Approach Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.

More information

Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data

Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Volume 39 No10, February 2012 Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Rajesh V Argiddi Assit Prof Department Of Computer Science and Engineering,

More information

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge

Static Data Mining Algorithm with Progressive Approach for Mining Knowledge Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive

More information

Mining Association Rules: A Database Perspective

Mining Association Rules: A Database Perspective IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology

More information

Data Mining in the Application of Criminal Cases Based on Decision Tree

Data Mining in the Application of Criminal Cases Based on Decision Tree 8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Building A Smart Academic Advising System Using Association Rule Mining

Building A Smart Academic Advising System Using Association Rule Mining Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 raedamin@just.edu.jo Qutaibah Althebyan +962796536277 qaalthebyan@just.edu.jo Baraq Ghalib & Mohammed

More information

Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis

Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis , 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,

More information

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis

More information

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection

An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection German Florez, Susan M. Bridges, and Rayford B. Vaughn Abstract We have been using fuzzy data mining techniques to extract patterns that

More information

College information system research based on data mining

College information system research based on data mining 2009 International Conference on Machine Learning and Computing IPCSIT vol.3 (2011) (2011) IACSIT Press, Singapore College information system research based on data mining An-yi Lan 1, Jie Li 2 1 Hebei

More information

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

Enhanced Boosted Trees Technique for Customer Churn Prediction Model IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction

More information

Towards the Optimization of Data Mining Execution Process in Distributed Environments

Towards the Optimization of Data Mining Execution Process in Distributed Environments Journal of Computational Information Systems 7: 8 (2011) 2931-2939 Available at http://www.jofcis.com Towards the Optimization of Data Mining Execution Process in Distributed Environments Yan ZHANG 1,,

More information

Data Mining Approach in Security Information and Event Management

Data Mining Approach in Security Information and Event Management Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information

More information

Comparative Performance of Arm and Farm on a Normalised Datasets

Comparative Performance of Arm and Farm on a Normalised Datasets Comparative Performance of Arm and Farm on a Normalised Datasets 1 Prachi Singh Thakur, 2 Jitendra Agrawal 1,2 School of information technology, Rajiv Gandhi Technological University, Bhopal -462036, Madhya

More information

Data Mining to Recognize Fail Parts in Manufacturing Process

Data Mining to Recognize Fail Parts in Manufacturing Process 122 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.7, NO.2 August 2009 Data Mining to Recognize Fail Parts in Manufacturing Process Wanida Kanarkard 1, Danaipong Chetchotsak

More information

A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE

A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data

More information

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM

MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan

More information

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains

A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,

More information

A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery

A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington

More information

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET

International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand

More information

Market Basket Analysis for a Supermarket based on Frequent Itemset Mining

Market Basket Analysis for a Supermarket based on Frequent Itemset Mining www.ijcsi.org 257 Market Basket Analysis for a Supermarket based on Frequent Itemset Mining Loraine Charlet Annie M.C. 1 and Ashok Kumar D 2 1 Department of Computer Science, Government Arts College Tchy,

More information

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS

CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments

A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments incent S. Tseng 1, Eric Hsueh-Chan Lu 1, Chia-Ming Tsai 1, and Chun-Hung Wang 1 Department of Computer Science and Information

More information

Cloud Computing Environments Parallel Data Mining Policy Research

Cloud Computing Environments Parallel Data Mining Policy Research , pp. 135-144 http://dx.doi.org/10.14257/ijgdc.2015.8.4.13 Cloud Computing Environments Parallel Data Mining Policy Research Wenwu Lian, Xiaoshu Zhu, Jie Zhang and Shangfang Li Yulin Normal University,

More information

Mining for Web Engineering

Mining for Web Engineering Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara

More information

New Matrix Approach to Improve Apriori Algorithm

New Matrix Approach to Improve Apriori Algorithm New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, rehab.alwan@majancolleg.edu.om Associate

More information

Discovery of Maximal Frequent Item Sets using Subset Creation

Discovery of Maximal Frequent Item Sets using Subset Creation Discovery of Maximal Frequent Item Sets using Subset Creation Jnanamurthy HK, Vishesh HV, Vishruth Jain, Preetham Kumar, Radhika M. Pai Department of Information and Communication Technology Manipal Institute

More information

COMBINED METHODOLOGY of the CLASSIFICATION RULES for MEDICAL DATA-SETS

COMBINED METHODOLOGY of the CLASSIFICATION RULES for MEDICAL DATA-SETS COMBINED METHODOLOGY of the CLASSIFICATION RULES for MEDICAL DATA-SETS V.Sneha Latha#, P.Y.L.Swetha#, M.Bhavya#, G. Geetha#, D. K.Suhasini# # Dept. of Computer Science& Engineering K.L.C.E, GreenFields-522502,

More information

Association Rule Mining: A Survey

Association Rule Mining: A Survey Association Rule Mining: A Survey Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University, Singapore 1. DATA MINING OVERVIEW Data mining [Chen et

More information

Improving Apriori Algorithm to get better performance with Cloud Computing

Improving Apriori Algorithm to get better performance with Cloud Computing Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

A Framework for Dynamic Faculty Support System to Analyze Student Course Data

A Framework for Dynamic Faculty Support System to Analyze Student Course Data A Framework for Dynamic Faculty Support System to Analyze Student Course Data J. Shana 1, T. Venkatachalam 2 1 Department of MCA, Coimbatore Institute of Technology, Affiliated to Anna University of Chennai,

More information

Application Tool for Experiments on SQL Server 2005 Transactions

Application Tool for Experiments on SQL Server 2005 Transactions Proceedings of the 5th WSEAS Int. Conf. on DATA NETWORKS, COMMUNICATIONS & COMPUTERS, Bucharest, Romania, October 16-17, 2006 30 Application Tool for Experiments on SQL Server 2005 Transactions ŞERBAN

More information

Mining Binary Expressions: Applications and Algorithms

Mining Binary Expressions: Applications and Algorithms Mining Binary Expressions: Applications and Algorithms Toon Calders Jan Paredaens Universiteit Antwerpen, Departement Wiskunde-Informatica, Universiteitsplein 1, B-2610 Wilrijk, Belgium. {calders,pareda}@uia.ua.ac.be

More information

Project Report. 1. Application Scenario

Project Report. 1. Application Scenario Project Report In this report, we briefly introduce the application scenario of association rule mining, give details of apriori algorithm implementation and comment on the mined rules. Also some instructions

More information

Database Reverse Engineering based on Association Rule Mining

Database Reverse Engineering based on Association Rule Mining ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Database Reverse Engineering based on Association Rule Mining Nattapon Pannurat 1, Nittaya Kerdprasop 2 and Kittisak Kerdprasop 2, 1 Faculty of Information

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges

A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING Mahmood Hossain and Susan M. Bridges Department of Computer Science Mississippi State University, MS 39762, USA E-mail: {mahmood,

More information

II. OLAP(ONLINE ANALYTICAL PROCESSING)

II. OLAP(ONLINE ANALYTICAL PROCESSING) Association Rule Mining Method On OLAP Cube Jigna J. Jadav*, Mahesh Panchal** *( PG-CSE Student, Department of Computer Engineering, Kalol Institute of Technology & Research Centre, Gujarat, India) **

More information

Discovering Sequential Rental Patterns by Fleet Tracking

Discovering Sequential Rental Patterns by Fleet Tracking Discovering Sequential Rental Patterns by Fleet Tracking Xinxin Jiang (B), Xueping Peng, and Guodong Long Quantum Computation and Intelligent Systems, University of Technology Sydney, Ultimo, Australia

More information

Mining an Online Auctions Data Warehouse

Mining an Online Auctions Data Warehouse Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance

More information

A NURSING CARE PLAN RECOMMENDER SYSTEM USING A DATA MINING APPROACH

A NURSING CARE PLAN RECOMMENDER SYSTEM USING A DATA MINING APPROACH Proceedings of the 3 rd INFORMS Workshop on Data Mining and Health Informatics (DM-HI 8) J. Li, D. Aleman, R. Sikora, eds. A NURSING CARE PLAN RECOMMENDER SYSTEM USING A DATA MINING APPROACH Lian Duan

More information

Business Lead Generation for Online Real Estate Services: A Case Study

Business Lead Generation for Online Real Estate Services: A Case Study Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

The Theory of Concept Analysis and Customer Relationship Mining

The Theory of Concept Analysis and Customer Relationship Mining The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

Performance Evaluation of some Online Association Rule Mining Algorithms for sorted and unsorted Data sets

Performance Evaluation of some Online Association Rule Mining Algorithms for sorted and unsorted Data sets Performance Evaluation of some Online Association Rule Mining Algorithms for sorted and unsorted Data sets Pramod S. Reader, Information Technology, M.P.Christian College of Engineering, Bhilai,C.G. INDIA.

More information

S.Thiripura Sundari*, Dr.A.Padmapriya**

S.Thiripura Sundari*, Dr.A.Padmapriya** Structure Of Customer Relationship Management Systems In Data Mining S.Thiripura Sundari*, Dr.A.Padmapriya** *(Department of Computer Science and Engineering, Alagappa University, Karaikudi-630 003 **

More information

Comparison of Data Mining Techniques for Money Laundering Detection System

Comparison of Data Mining Techniques for Money Laundering Detection System Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer

More information

Comparative Study in Building of Associations Rules from Commercial Transactions through Data Mining Techniques

Comparative Study in Building of Associations Rules from Commercial Transactions through Data Mining Techniques Third International Conference Modelling and Development of Intelligent Systems October 10-12, 2013 Lucian Blaga University Sibiu - Romania Comparative Study in Building of Associations Rules from Commercial

More information

PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE

PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 57-69, 2008 Technomathematics Research Foundation PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE

More information

Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm

Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Purpose: key concepts in mining frequent itemsets understand the Apriori algorithm run Apriori in Weka GUI and in programatic way 1 Theoretical

More information

Distributed Apriori in Hadoop MapReduce Framework

Distributed Apriori in Hadoop MapReduce Framework Distributed Apriori in Hadoop MapReduce Framework By Shulei Zhao (sz2352) and Rongxin Du (rd2537) Individual Contribution: Shulei Zhao: Implements centralized Apriori algorithm and input preprocessing

More information

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING

Practical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction

More information

Visualizing e-government Portal and Its Performance in WEBVS

Visualizing e-government Portal and Its Performance in WEBVS Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government

More information

AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS

AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur,

More information

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm

More information

Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries

Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Kale Sarika Prakash 1, P. M. Joe Prathap 2 1 Research Scholar, Department of Computer Science and Engineering, St. Peters

More information

Comparison and Analysis of Various Clustering Methods in Data mining On Education data set Using the weak tool

Comparison and Analysis of Various Clustering Methods in Data mining On Education data set Using the weak tool Comparison and Analysis of Various Clustering Metho in Data mining On Education data set Using the weak tool Abstract:- Data mining is used to find the hidden information pattern and relationship between

More information

Customer Classification And Prediction Based On Data Mining Technique

Customer Classification And Prediction Based On Data Mining Technique Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor

More information

Effective Data Mining Using Neural Networks

Effective Data Mining Using Neural Networks IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT

IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute

More information

Using Data Mining Methods to Predict Personally Identifiable Information in Emails

Using Data Mining Methods to Predict Personally Identifiable Information in Emails Using Data Mining Methods to Predict Personally Identifiable Information in Emails Liqiang Geng 1, Larry Korba 1, Xin Wang, Yunli Wang 1, Hongyu Liu 1, Yonghua You 1 1 Institute of Information Technology,

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset

An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset P.Abinaya 1, Dr. (Mrs) D.Suganyadevi 2 M.Phil. Scholar 1, Department of Computer Science,STC,Pollachi

More information

DWMiner : A tool for mining frequent item sets efficiently in data warehouses

DWMiner : A tool for mining frequent item sets efficiently in data warehouses DWMiner : A tool for mining frequent item sets efficiently in data warehouses Bruno Kinder Almentero, Alexandre Gonçalves Evsukoff and Marta Mattoso COPPE/Federal University of Rio de Janeiro, P.O.Box

More information

Mining changes in customer behavior in retail marketing

Mining changes in customer behavior in retail marketing Expert Systems with Applications 28 (2005) 773 781 www.elsevier.com/locate/eswa Mining changes in customer behavior in retail marketing Mu-Chen Chen a, *, Ai-Lun Chiu b, Hsu-Hwa Chang c a Department of

More information

Using Associative Classifiers for Predictive Analysis in Health Care Data Mining

Using Associative Classifiers for Predictive Analysis in Health Care Data Mining Using Associative Classifiers for Predictive Analysis in Health Care Data Mining Sunita Soni Associate Professor Bhilai Institute of Technology, Durg-491 001, Chhattisgarh, India O.P.Vyas Professor Indian

More information

Computer Science in Education

Computer Science in Education www.ijcsi.org 290 Computer Science in Education Irshad Ullah Institute, Computer Science, GHSS Ouch Khyber Pakhtunkhwa, Chinarkot, ISO 2-alpha PK, Pakistan Abstract Computer science or computing science

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING

A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor

More information

Integrating Pattern Mining in Relational Databases

Integrating Pattern Mining in Relational Databases Integrating Pattern Mining in Relational Databases Toon Calders, Bart Goethals, and Adriana Prado University of Antwerp, Belgium {toon.calders, bart.goethals, adriana.prado}@ua.ac.be Abstract. Almost a

More information

Web Usage Association Rule Mining System

Web Usage Association Rule Mining System Interdisciplinary Journal of Information, Knowledge, and Management Volume 6, 2011 Web Usage Association Rule Mining System Maja Dimitrijević The Advanced School of Technology, Novi Sad, Serbia dimitrijevic@vtsns.edu.rs

More information

A New Marketing Channel Management Strategy Based on Frequent Subtree Mining

A New Marketing Channel Management Strategy Based on Frequent Subtree Mining A New Marketing Channel Management Strategy Based on Frequent Subtree Mining Daoping Wang Peng Gao School of Economics and Management University of Science and Technology Beijing ABSTRACT For most manufacturers,

More information

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL

BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University

More information

Service Monitoring and Alarm Correlations

Service Monitoring and Alarm Correlations Service Monitoring and Alarm Correlations Oliver Jukić Virovitica College Virovitica, Republic of Croatia oliver.jukic@vsmti.hr Ivan Heđi Virovitica College Virovitica, Republic of Croatia ivan.hedi@vsmti.hr

More information

IncSpan: Incremental Mining of Sequential Patterns in Large Database

IncSpan: Incremental Mining of Sequential Patterns in Large Database IncSpan: Incremental Mining of Sequential Patterns in Large Database Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign Urbana, Illinois 61801 hcheng3@uiuc.edu Xifeng

More information

Searching frequent itemsets by clustering data

Searching frequent itemsets by clustering data Towards a parallel approach using MapReduce Maria Malek Hubert Kadima LARIS-EISTI Ave du Parc, 95011 Cergy-Pontoise, FRANCE maria.malek@eisti.fr, hubert.kadima@eisti.fr 1 Introduction and Related Work

More information

Using customer knowledge in designing electronic catalog

Using customer knowledge in designing electronic catalog Expert Systems with Applications Expert Systems with Applications 34 (2008) 119 127 www.elsevier.com/locate/eswa Using customer knowledge in designing electronic catalog Chinho Lin a, *, Chienwen Hong

More information

Data Mining Project Report. Document Clustering. Meryem Uzun-Per

Data Mining Project Report. Document Clustering. Meryem Uzun-Per Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...

More information

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms

Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Implementation of Data Mining Techniques to Perform Market Analysis

Implementation of Data Mining Techniques to Perform Market Analysis Implementation of Data Mining Techniques to Perform Market Analysis B.Sabitha 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, P.Balasubramanian 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

Prediction of Heart Disease Using Naïve Bayes Algorithm

Prediction of Heart Disease Using Naïve Bayes Algorithm Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,

More information

Community Mining from Multi-relational Networks

Community Mining from Multi-relational Networks Community Mining from Multi-relational Networks Deng Cai 1, Zheng Shao 1, Xiaofei He 2, Xifeng Yan 1, and Jiawei Han 1 1 Computer Science Department, University of Illinois at Urbana Champaign (dengcai2,

More information

EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH

EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH SANGITA GUPTA 1, SUMA. V. 2 1 Jain University, Bangalore 2 Dayanada Sagar Institute, Bangalore, India Abstract- One

More information