Mining Multi Level Association Rules Using Fuzzy Logic
|
|
- Sophie Reed
- 8 years ago
- Views:
Transcription
1 Mining Multi Level Association Rules Using Fuzzy Logic Usha Rani 1, R Vijaya Praash 2, Dr. A. Govardhan 3 1 Research Scholar, JNTU, Hyderabad 2 Dept. Of Computer Science & Engineering, SR Engineering College, Warangal 3 School of Information Technology, JNTU, Hyderabad Abstract Extracting multilevel association rules in transaction databases is most commonly used tass in data mining. This paper proposes a multilevel association rule mining using fuzzy concepts. This paper uses different fuzzy membership function to retrieve efficient association rules from multi level hierarchies that exist in a transaction dataset. In general, the data can spread into many hierarchies or levels. From such datasets retrieving the association rules is a tedious tas. For this reason, in this paper we used the fuzzy-set concepts to retrieve multilevel association rules. This approach adopts a top-down progress and also incorporates fuzzy boundaries instead of sharp boundary intervals to derive large itemsets. Keywords Association Rules, Data Mining, Fuzzy Logic. I. INTRODUCTION Data mining has attracted a great deal of attention in the information industry and in society as a whole in recent years, due to the wide availability of huge amounts of data and the imminent need for turning such data into useful information and nowledge. The information and nowledge gained can be used for applications ranging from maret analysis, fraud detection, and customer retention, to production control and science exploration. An Association rule mining is an important process in data mining, which determines the co relations between items belonging to a transaction database [1][2][3]. Association rules can be used for mareting, planning and etc. For example, the association rules can be used to identify the customer buying habits in a maret-baset analysis, lie if customers buy suit, they are more liely to buy tie as well. In general, every association rule must satisfy two user specified constraints called support and confidence. The support of a rule X Y is defined as the percentage of transactions that contain X Y, where X and Y are disjoint sets of items from the given dataset [4][5]. The confidence is defined as the ratio support (X Y)/support(X). Here the aim is to find all rules that satisfy user specified minimum support and confidence values. Apriori algorithm is very widely used to algorithm to generate the association rules. The appriori algorithm will generate the rules step by step manner. However, this processing way might cause high computational costs and iterative database scans. The majority of algorithms used for association rule mining are dealt with single-concept level datasets. But most of the data can be spread into different levels. Such datasets are called multi level datasets or taxonomy datasets. Mining association rules from such datasets will give more exact, accurate and useful information to the user to gain more nowledge from the data. Relevant data item taxonomies are normally preconceived and can be symbolized using hierarchy trees. In multi level datasets, the data is available in different stages of abstraction or levels. Such levels are represented with concept hierarchies. For example, a user may not only be concerned with the associations between computer and printer", but also wants to now the association between destop PC price and laser printer price. This paper proposes a fuzzy multiple-level association rule mining algorithm for extracting implicit nowledge from multi level dataset. It integrates fuzzy set concepts, data-mining technologies and multiple-level taxonomy to find fuzzy association rules from transaction data sets. II. APRIORI ALGORITHM AND ITS PROPERTY Apriori employs an iterative approach nown as levelwise search, where -itemsets are used to explore +1- itemsets. Apriori exploits the following property: If an itemset is frequent, then all its subsets are also frequent [8]. The idea is frequent itemset must have subsets of frequent itemsets. Let -itemset is an itemset having items. Let L represent the set of frequent -itemsets and C is the set of candidate -itemsets. Therefore the algorithm to generate the frequent itemsets is follows: i. A C is a set of candidate -itemsets, which is generated by joining L -1. ii. C is a superset of L, that is, its members may or may not be frequent, but all of the frequent - itemsets are included in C. iii. All candidates having a count greater than the minimum support count are frequent and belong to L iv. The itemsets in C which that is not in L -1 are deleted. v. This process is repeated until all no more frequent -itemsets can be found. 747
2 III. MULTILEVEL ASSOCIATION RULES CONCEPT Mining association rules at multiple concept levels may, however, lead to discovery of more general and important nowledge from data. Relevant item taxonomies are usually predefined in real-world applications and can be represented as hierarchy trees. Terminal nodes on the trees represent actual items appearing in transactions; internal nodes represent classes or concepts formed from lower-level [10].All paragraphs must be indented. All paragraphs must be justified, i.e. both left-justified and right-justified. 2. Di is the i-th transaction, in the dataset, where 1 i n (n is the number of transaction), add all of the items with the identical first K digit, compute the item count for each groups in the transaction and eliminate the groups which their count are less than α where α is the predefined minimum support value in the current level. 3. Consider different membership function for different data items. Each data item has its own characteristics and its own membership function. For each transaction set D i will have an item say I j, this is a j-th item at level. This I j will have a quantitative value say Q ij. This V ij is converted into a fuzzy set say f iji. The f iji will have number of fuzzy regions for each I j this is denoted by h j. R il (1 l h j ) is the l-th fuzzy region of I j. The Q ij is defined as 4. Compute the value of each fuzzy region R il from the dataset as, Fig. I: Example taxonomy In Fig. I, the root node is at level 0, the internal nodes representing categories lie science and Fantasy, these are at level 1, the internal nodes such as Futuristic are at level 2 and the terminal nodes representing boos such as Lord of the Rings are at level 3. Only terminal nodes appear in transactions [3]. These hierarchies are encoded using sequences of numbers and the symbol * according to their positions in the hierarchy tree. For example, the internal node Science in Fig. 1 would be represented by 1-*-*, the internal node Epic by 2-1-* and the terminal node The chronicles of Narnia by [3]. IV. THE PROPOSED MODEL The proposed algorithm consist of data mining, multilevel taxonomy and a set of membership functions to explore fuzzy association rules in accordance a given transaction dataset. For this each and every item is assigned a sequence number. The proposed algorithm is 1. Use a sequence of numbers and the symbol * to encode the predefined taxonomy. The encoding is started from root with a value zero and continued to next level from left to right by incrementing one value 5. Find the maximum count value say MaxCount j among Count il values (1 l h j ), as If MaxCount j of a fuzzy region R il is equal to the minimum support threshold ( ), then place MaxCount j into l-frequent itemset. 6. If L l is null then increase by one. If r=1 then go to step 2 otherwise go to next step. 7. The following procedure is carried out for different values. i) If r = 2 produce the candidate set C 2, where C 2 is the set of candidate itemset with 2 items at level ii) If r > 2 then Generate the candidate set C r, where C r is the set of candidate itemsets with r-items on level from L r For each obtained candidate r-itemset say S with items (S 1,S 2,..., S r ) in C r i) Compute the fuzzy value of S using minimum operator of fuzzy logic, f is = min(f is1,f is2,..., f isr ) ii) Count s is the sum of fis, 1 i n iii) If Counts is greater than or equal to minimum support value then insert S into L r. 748
3 9. If L r is null then increase by one and go to the next step, otherwise increase r by one and go to step If K > p, where p is number of levels in a taxonomy then go to step 11 otherwise set r=1 and go to step Mae the fuzzy association rules for all frequent r- itemset including S = (S 1, S 2,..., S r ), r>2 as, Find all the rules X Y, where X S and Y S and X Y =, X Y =S. Compute the confidence value of all association rules by: 12. Select the rules which have confidence values greater than predefined confidence threshold value. V. AN EXAMPLE To illustrate the above algorithm, we considered a dairy sales transaction from a sales dataset, which is shown in Table I. Its taxonomy is represented in Fig II. Fig. II Dairy Sales Taxonomy This taxonomy is encoded as specified in algorithm step 1, which is represented in Fig III. Fig. III Dairy Sales Encoded Taxonomy 749 In Fig. III, the Dairy Sales transactions taxonomy is divided into 3 classes namely chesse, mil, curd. Each of these classes have sub items specifies the type of dairy and producing companies. For each class of the dairy, we consider a unique membership function. There are 3 fuzzy regions called low, middle and high are considered for these member functions. The membership function related to the mil, curd and cheese are shown in Fig. IV, Fig. V and Fig. VI respectively. Table I SIX EXAMPLE TRANSACTIONS TID Items (organic feta cheese, 1) (sil feta cheese, 4) (organic D 1 low fat mil, 4) (eagle low fat mil, 6) (organic bean curd, 7) D 2 (organic feta cheese, 3) (sil feta cheese, 3) (horizon cheddar cheese, 1) (horizon high fat mil, 5) (eagle high fat mil, 3), (horizon fruit curd, 4) (eagle fruit curd, 4) D 3 (organic low fat mil, 7) (horizon high fat mil, 8) (horizon bean curd, 5) (horizon fruit curd, 7) D 4 (organic feta cheese, 2) (organic low fat mil, 5) (horizon bean curd, 5) D 5 (organic low fat mil, 5)( eagle high fat mil, 4) D 6 (organic feta cheese, 3) (sil feta cheese, 10) The above Table I, each and every item is identified by a unique id called TID. The items are represented as pair first represent the item description from lower level to higher level and these item counts, i.e. (organic feta cheese, 1) means the organic feta cheese is available in the dataset only once. Similarly, organic beat curd is repeating in the dataset seven times. This Table I is encoded with respect to Fig 3, i.e. the item Organic Feta cheese can be encoded as 111. All the items in the Table I are encoded and represented in Table II. Table II ENCODED TRANSACTION DATA TID Items D 1 (111, 1) (112, 4) (211, 4) (212, 6) (311, 7) D 2 (111, 3) (112, 3) (121, 1) (221, 5) (222, 3) (322, 4) (321, 4) D 3 (211, 7) (221, 8) (312, 5) (322, 7) D 4 (111, 2) (211, 5) (312, 5) D 5 (211, 5) (222, 4) D 6 (111, 3) (112, 10) In Table some items are at the same level or different concept. For example (111, 1) and (112, 4) are first and second items of same hierarchy and same TID items. This can be represented as 1** and their counts are summed up in Table III.
4 TABLE III LEVEL REPRESENTATION TID Items D 1 (1**, 5) (2**, 10) (311, 7) D 2 (1**, 7) (2**, 8) (3**, 8) D 3 (2**, 15) (3**, 12) D 4 (1**, 2) (2**, 5) (3**, 5) D 5 (2**, 9) D 6 (1**, 13) Now the Table III item sets are converted into fuzzy sets based on trapezoidal equation. For example, let consider the item set (1**, 5). According to the Fig 3, this group is belongs to cheese. Similarly, the itemsets (2**, 10) is related to Mil and (3**, 8) is related to Curd respectively. Based on the Trapezoidal membership function the cheese sales are converted into 3 fuzzy regions named as low, middle and high. These are represented in the figures Fig. IV, Fig. V and Fig. VI. The fuzzy value 0.2 indicates the low, 0.8 is middle region and 1 is the high fuzzy regions. The Table IV contains the fuzzy regions for all transactions. Fig. IV: The membership functions for cheese sales Fig. V: The membership functions for Mil sales After obtaining the fuzzy regions of the three items, now we summed the fuzzy values of each region. For example, consider the 1**.Low fuzzy region. The sum of fuzzy values of this region in all transactions is obtained through the equation =1. The sum of fuzzy values for each individual region has been shown in Table V. After the above step, now the fuzzy region is selected with highest value for each group. For example the group 1** low region is equal to one, middle region is equal to 1.8 and high region is equal to 1.2. Since the value of the middle region, is 1.8, which is higher than the other two regions, the middle fuzzy region is chosen as the representative of group 1** for other processes. This tas is also carried out for other groups. Each of these values is compared with the minimum support and in case it is greater or equal with the predefined minimum support, then it is added to L 1 1. For example consider the minimum support value is 1, then the 1**.middle, 2**.middle and 3**.middle values are greater than the minimum support. Thus these values are added into L From L 1 set a two member candidate set C 2 is generated. The fuzzy membership value of each of the twomember sets inside the C 1 2 is calculated based on the predefined membership function for each individual item, for the whole transactions. For example, consider the two member set {1**.Middle, 3**. high}. The fuzzy membership value of this set for transaction D 1 is calculated as: min (0.8, 1) = 0.8. This operation must be carried out for all transactions. All the candidate and frequent itemsets generated and final result of this transaction dataset are shown in Table VI, VII, VIII, IX and X. We will find the fuzzy association rules based on the frequent itemset obtained from the previous steps. We discover all probable rules from the frequent itemset obtained in different levels with the following format. {1**=middle} {3**=high} {3**=high} {1**=middle} {3**=high} {11*=middle} {11*=middle} {3**=high} {111=low} {3**=high} {3**=high} {111=low} The confidence value of all rules are studied with predefined minimum confidence threshold and the rules, whose confidence value is bigger than or equal to the predefined minimum confidence threshold, are chosen as final rules. These are shown in Table XI. For example, if the minimum confidence value is equal to 1, the final rules shall be as follows: Fig. VI: The membership functions for Curd sales 750
5 TID TABLE IV THE LEVEL-1 FUZZY SETS TRANSFORMED FROM THE DATA IN TABLE 3 Level -1 Fuzzy set D 1 D 2 D 3 D 4 D 5 D 6 {1**=middle} {3**= high} {3**=high} {1**=middle} {11*=middle} {3**=high} TABLE V THE COUNTS OF THE LEVEL-1 FUZZY REGIONS Items Count (1**.low) 1.0 (1**.middle) 1.8 (1**.high) 1.2 (2**.low) 0.4 (2**.middle) 2.4 (2**.high) 2.2 (3**.high) 0.0 (3**.high) 0.5 (3**.high) 3.5 Table VI THE SET OF FREQUENT 1-ITEMSETS FOR LEVEL ONE Itemset Count (1**.middle) 1.8 (2**.middle) 2.4 (3**.high) 3.5 Table VII THE COUNTS OF THE LEVEL-1 FUZZY REGIONS Itemset (1**.middle, 2**.middle) (1**.middle, 3**.high) (2**.middle, 3**.high) TABLE VIII THE MEMBERSHIP VALUES FOR 1**.MIDDLE, 3**.HIGH TID 1**.middle 3**.high Min(1**.middle, 3**.high) D D D D D D Table IX THE COUNTS OF THE 2-ITEMSETS AT LEVEL 1 Itemset Count (1**.middle, 2**.middle) 1.4 (1**.middle, 3**.high) 1.8 (2**.middle, 3**.high) 1.7 Table X ALL FREQUENT ITEMSETS FOR LEVEL-1, LEVEL-2, LEVEL 3 Itemset Count (1**.middle) 1.8 (2**.middle) 2.4 (3**.high) 3.5 (1**.middle, 3**.high) 1.8 (11*.middle) 2.0 (21*.middle) 2.6 (31*.high) 2.0 (22*.middle) 2.0 (32*.high) 2.0 (11*.middle, 3**.high) 2.0 (111.low) 3.0 (211.middle) 2.6 (111.middle, 3**.high)
6 Table XI CONFIDENCE VALUE FOR ALL RULES Association rules Confidence {1** = middle} {3** = high} 1.0 {3** = high} {1** = middle} 1.0 {3** = high} {11* = middle} 0.5 {11* = middle} {3** = high} 1.0 {111 = low} {3** = high} 0.7 {3** = high} {111 = low} 1.4 VI. EXPERIMENTAL RESULTS The proposed algorithm carries out the analysis on a number of 100 sales invoices of a food stuff store and 7 of its items and based on the predefined taxonomy from 7 items and the predefined membership function per each item, carries out the mining of association rules. The predefined taxonomy in the first level includes 7 nodes that represent the items used in the test, the second level includes 14 nodes that represent the taste or different types of a specific product and in the third level it also consists of 48 nodes that represent the manufacturing companies and factories. The database transactions include the name of the product and the quantity of such products purchased. One item may not be used twice in one transaction. In order to observe the results, we first analyze the proposed algorithm with a different number of transactions and the results based on the number of rules produced and the predefined minimum support for algorithm and the minimum confidence equal to 0. 5 have been shown in Fig. VII. Fig. VII. Rules generated with different min support The results obtained based on the number of rules developed and different types of the predefined minimum confidence by the user have been shown in Fig. 8 based on the 100 transactions of the customers purchases and minimum support equal to 3. As you can see in Fig. VII, with increased number of the transactions under study, the number of mined association rules will be more and this is obvious and that s because with the increased number of the transactions, the number of frequent itemset will also increase and as a result, a greater number of rules are mined. Also considering the Fig. VIII, with increased number of the predefined. Minimum confidence value, the number of mined association rules will also decrease. Fig. VIII. Rules generated with different min support VII. CONCLUSIONS In This paper, we have employed fuzzy set concepts, multiple level taxonomy, different membership function for each item to find fuzzy Multi level association rules in a given transaction data set. The rules mined in this algorithm are desirable for a specific time interval, but it is clear that with the elapse of time, the conditions for sale of items shall be different. As an example, based on different seasons of the year, the number of sales of a series of product may be variant. Therefore in our next wor we are going to present a new method to generate such membership function dynamically to cope with the environment with changing conditions. Moreover, not only we can define the minimum support value for each individual level of the predefined taxonomy for the products but also we are able to define the minimum support for each item which maes output rules to get closer to the user s demanded rules. 752
7 REFERENCES [1] Agrawal, R., T. Imielinsi and A. Swami, Mining associations between sets of items in massive databases. In The 1993 ACM SIGMOD Conference on Management of Data, Washington DC, USA, pp: [2] Ha, I., Y. Cai and N. Cercone, Data-driven of quantitative rules in relational databases. IEEE Tram. Knowledge and Data Eng., 5: [3] Ying Lin, K., B. Chian Chien and T. Pei Hong, Mining Fuzzy Multiple-Level Association Rules from Quantitative Data. Applied Intelligence, 18: [4] Han, J. and M. Kamber, Data Mining:Concepts and Techniques. The Morgan Kaufmann Series. [5] Agrawal, R. and R. Sriant, Fast algorithms for mining association rules. 20th VLDB Conference, pp: [6] Intan, R., Mining Multidimensional Fuzzy Association Rules from a Normalized Database. International Conference on Convergence and Hybrid Information Technology. [7] Ping Huang, Y. and L. Kao, Using Fuzzy Support and Confidence Setting to Mine Interesting Association Rules. IEEE Annual Meeting, 2: [8] Khare, N., N. Adlaha and K. R. Pardasani, An Algorithm for Mining Multidimensional Fuzzy Association Rules. International Journal of Computer Science and Information Security, 5: [9] Watanabe, T., A Fast Fuzzy Association Rules Mining Algorithm Utilizing Output Field Specification. Biomedical Soft Computing and Human Sciences, 16 (2): [10] [10] Liu, B., W. Hsu and Y. Ma, Mining association rules with multiple minimum supports. Fifth ACM SIGKDD International Conference Knowledge Discovery and Data Mining, pp: [11] Pei Hong, T., T. Jung Huang and Ch. Sheng Chang, Mining Multiple-level Association Rules Based on Pre-large Concepts. I- Tech, Vienna, Austria, pp: 438. [12] Han, J. and Y. Fu, Discovery of Multiple- Level Association Rules from Large Databases. 21st Very Large Data Bases Conference, Morgan Kaufmann, pp:
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
More informationDEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India sk.obaidullah@gmail.com
More informationA Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
More informationMAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, rajalakshmi@cit.edu.in
More informationFuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology
More informationNEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE
www.arpapress.com/volumes/vol13issue3/ijrras_13_3_18.pdf NEW TECHNIQUE TO DEAL WITH DYNAMIC DATA MINING IN THE DATABASE Hebah H. O. Nasereddin Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan
More informationBinary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi
More informationSelection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
More informationFuture Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data
Volume 39 No10, February 2012 Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Rajesh V Argiddi Assit Prof Department Of Computer Science and Engineering,
More informationStatic Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
More informationMining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
More informationData Mining in the Application of Criminal Cases Based on Decision Tree
8 Journal of Computer Science and Information Technology, Vol. 1 No. 2, December 2013 Data Mining in the Application of Criminal Cases Based on Decision Tree Ruijuan Hu 1 Abstract A briefing on data mining
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationBuilding A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 raedamin@just.edu.jo Qutaibah Althebyan +962796536277 qaalthebyan@just.edu.jo Baraq Ghalib & Mohammed
More informationMining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
More informationHorizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 5 (Nov. - Dec. 2012), PP 36-41 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
More informationAn Improved Algorithm for Fuzzy Data Mining for Intrusion Detection
An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection German Florez, Susan M. Bridges, and Rayford B. Vaughn Abstract We have been using fuzzy data mining techniques to extract patterns that
More informationCollege information system research based on data mining
2009 International Conference on Machine Learning and Computing IPCSIT vol.3 (2011) (2011) IACSIT Press, Singapore College information system research based on data mining An-yi Lan 1, Jie Li 2 1 Hebei
More informationEnhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
More informationTowards the Optimization of Data Mining Execution Process in Distributed Environments
Journal of Computational Information Systems 7: 8 (2011) 2931-2939 Available at http://www.jofcis.com Towards the Optimization of Data Mining Execution Process in Distributed Environments Yan ZHANG 1,,
More informationData Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
More informationComparative Performance of Arm and Farm on a Normalised Datasets
Comparative Performance of Arm and Farm on a Normalised Datasets 1 Prachi Singh Thakur, 2 Jitendra Agrawal 1,2 School of information technology, Rajiv Gandhi Technological University, Bhopal -462036, Madhya
More informationData Mining to Recognize Fail Parts in Manufacturing Process
122 ECTI TRANSACTIONS ON ELECTRICAL ENG., ELECTRONICS, AND COMMUNICATIONS VOL.7, NO.2 August 2009 Data Mining to Recognize Fail Parts in Manufacturing Process Wanida Kanarkard 1, Danaipong Chetchotsak
More informationA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE Kasra Madadipouya 1 1 Department of Computing and Science, Asia Pacific University of Technology & Innovation ABSTRACT Today, enormous amount of data
More informationMINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
More informationA Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, kanak.saxena@gmail.com D.S. Rajpoot Registrar,
More informationA Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington
More informationInternational Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
More informationMarket Basket Analysis for a Supermarket based on Frequent Itemset Mining
www.ijcsi.org 257 Market Basket Analysis for a Supermarket based on Frequent Itemset Mining Loraine Charlet Annie M.C. 1 and Ashok Kumar D 2 1 Department of Computer Science, Government Arts College Tchy,
More informationCREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS
CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationA Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments
A Hybrid Data Mining Approach for Analysis of Patient Behaviors in RFID Environments incent S. Tseng 1, Eric Hsueh-Chan Lu 1, Chia-Ming Tsai 1, and Chun-Hung Wang 1 Department of Computer Science and Information
More informationCloud Computing Environments Parallel Data Mining Policy Research
, pp. 135-144 http://dx.doi.org/10.14257/ijgdc.2015.8.4.13 Cloud Computing Environments Parallel Data Mining Policy Research Wenwu Lian, Xiaoshu Zhu, Jie Zhang and Shangfang Li Yulin Normal University,
More informationMining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
More informationNew Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, rehab.alwan@majancolleg.edu.om Associate
More informationDiscovery of Maximal Frequent Item Sets using Subset Creation
Discovery of Maximal Frequent Item Sets using Subset Creation Jnanamurthy HK, Vishesh HV, Vishruth Jain, Preetham Kumar, Radhika M. Pai Department of Information and Communication Technology Manipal Institute
More informationCOMBINED METHODOLOGY of the CLASSIFICATION RULES for MEDICAL DATA-SETS
COMBINED METHODOLOGY of the CLASSIFICATION RULES for MEDICAL DATA-SETS V.Sneha Latha#, P.Y.L.Swetha#, M.Bhavya#, G. Geetha#, D. K.Suhasini# # Dept. of Computer Science& Engineering K.L.C.E, GreenFields-522502,
More informationAssociation Rule Mining: A Survey
Association Rule Mining: A Survey Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University, Singapore 1. DATA MINING OVERVIEW Data mining [Chen et
More informationImproving Apriori Algorithm to get better performance with Cloud Computing
Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become
More informationHow To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
More informationA Framework for Dynamic Faculty Support System to Analyze Student Course Data
A Framework for Dynamic Faculty Support System to Analyze Student Course Data J. Shana 1, T. Venkatachalam 2 1 Department of MCA, Coimbatore Institute of Technology, Affiliated to Anna University of Chennai,
More informationApplication Tool for Experiments on SQL Server 2005 Transactions
Proceedings of the 5th WSEAS Int. Conf. on DATA NETWORKS, COMMUNICATIONS & COMPUTERS, Bucharest, Romania, October 16-17, 2006 30 Application Tool for Experiments on SQL Server 2005 Transactions ŞERBAN
More informationMining Binary Expressions: Applications and Algorithms
Mining Binary Expressions: Applications and Algorithms Toon Calders Jan Paredaens Universiteit Antwerpen, Departement Wiskunde-Informatica, Universiteitsplein 1, B-2610 Wilrijk, Belgium. {calders,pareda}@uia.ua.ac.be
More informationProject Report. 1. Application Scenario
Project Report In this report, we briefly introduce the application scenario of association rule mining, give details of apriori algorithm implementation and comment on the mined rules. Also some instructions
More informationDatabase Reverse Engineering based on Association Rule Mining
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 10 Database Reverse Engineering based on Association Rule Mining Nattapon Pannurat 1, Nittaya Kerdprasop 2 and Kittisak Kerdprasop 2, 1 Faculty of Information
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationA FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING. Mahmood Hossain and Susan M. Bridges
A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING Mahmood Hossain and Susan M. Bridges Department of Computer Science Mississippi State University, MS 39762, USA E-mail: {mahmood,
More informationII. OLAP(ONLINE ANALYTICAL PROCESSING)
Association Rule Mining Method On OLAP Cube Jigna J. Jadav*, Mahesh Panchal** *( PG-CSE Student, Department of Computer Engineering, Kalol Institute of Technology & Research Centre, Gujarat, India) **
More informationDiscovering Sequential Rental Patterns by Fleet Tracking
Discovering Sequential Rental Patterns by Fleet Tracking Xinxin Jiang (B), Xueping Peng, and Guodong Long Quantum Computation and Intelligent Systems, University of Technology Sydney, Ultimo, Australia
More informationMining an Online Auctions Data Warehouse
Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance
More informationA NURSING CARE PLAN RECOMMENDER SYSTEM USING A DATA MINING APPROACH
Proceedings of the 3 rd INFORMS Workshop on Data Mining and Health Informatics (DM-HI 8) J. Li, D. Aleman, R. Sikora, eds. A NURSING CARE PLAN RECOMMENDER SYSTEM USING A DATA MINING APPROACH Lian Duan
More informationBusiness Lead Generation for Online Real Estate Services: A Case Study
Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationThe Theory of Concept Analysis and Customer Relationship Mining
The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com
More informationComparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
More informationGraph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
More informationPerformance Evaluation of some Online Association Rule Mining Algorithms for sorted and unsorted Data sets
Performance Evaluation of some Online Association Rule Mining Algorithms for sorted and unsorted Data sets Pramod S. Reader, Information Technology, M.P.Christian College of Engineering, Bhilai,C.G. INDIA.
More informationS.Thiripura Sundari*, Dr.A.Padmapriya**
Structure Of Customer Relationship Management Systems In Data Mining S.Thiripura Sundari*, Dr.A.Padmapriya** *(Department of Computer Science and Engineering, Alagappa University, Karaikudi-630 003 **
More informationComparison of Data Mining Techniques for Money Laundering Detection System
Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer
More informationComparative Study in Building of Associations Rules from Commercial Transactions through Data Mining Techniques
Third International Conference Modelling and Development of Intelligent Systems October 10-12, 2013 Lucian Blaga University Sibiu - Romania Comparative Study in Building of Associations Rules from Commercial
More informationPREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE
International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 57-69, 2008 Technomathematics Research Foundation PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE
More informationLaboratory Module 8 Mining Frequent Itemsets Apriori Algorithm
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Purpose: key concepts in mining frequent itemsets understand the Apriori algorithm run Apriori in Weka GUI and in programatic way 1 Theoretical
More informationDistributed Apriori in Hadoop MapReduce Framework
Distributed Apriori in Hadoop MapReduce Framework By Shulei Zhao (sz2352) and Rongxin Du (rd2537) Individual Contribution: Shulei Zhao: Implements centralized Apriori algorithm and input preprocessing
More informationPractical Applications of DATA MINING. Sang C Suh Texas A&M University Commerce JONES & BARTLETT LEARNING
Practical Applications of DATA MINING Sang C Suh Texas A&M University Commerce r 3 JONES & BARTLETT LEARNING Contents Preface xi Foreword by Murat M.Tanik xvii Foreword by John Kocur xix Chapter 1 Introduction
More informationVisualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR ccfong@umac.mo Abstract An e-government
More informationAN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS
AN APPROACH TO ANTICIPATE MISSING ITEMS IN SHOPPING CARTS Maddela Pradeep 1, V. Nagi Reddy 2 1 M.Tech Scholar(CSE), 2 Assistant Professor, Nalanda Institute Of Technology(NIT), Siddharth Nagar, Guntur,
More informationWeb Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
More informationBitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries
Bitmap Index an Efficient Approach to Improve Performance of Data Warehouse Queries Kale Sarika Prakash 1, P. M. Joe Prathap 2 1 Research Scholar, Department of Computer Science and Engineering, St. Peters
More informationComparison and Analysis of Various Clustering Methods in Data mining On Education data set Using the weak tool
Comparison and Analysis of Various Clustering Metho in Data mining On Education data set Using the weak tool Abstract:- Data mining is used to find the hidden information pattern and relationship between
More informationCustomer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
More informationEffective Data Mining Using Neural Networks
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,
More informationMobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
More informationIMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute
More informationUsing Data Mining Methods to Predict Personally Identifiable Information in Emails
Using Data Mining Methods to Predict Personally Identifiable Information in Emails Liqiang Geng 1, Larry Korba 1, Xin Wang, Yunli Wang 1, Hongyu Liu 1, Yonghua You 1 1 Institute of Information Technology,
More informationSchneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
More informationAn Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset P.Abinaya 1, Dr. (Mrs) D.Suganyadevi 2 M.Phil. Scholar 1, Department of Computer Science,STC,Pollachi
More informationDWMiner : A tool for mining frequent item sets efficiently in data warehouses
DWMiner : A tool for mining frequent item sets efficiently in data warehouses Bruno Kinder Almentero, Alexandre Gonçalves Evsukoff and Marta Mattoso COPPE/Federal University of Rio de Janeiro, P.O.Box
More informationMining changes in customer behavior in retail marketing
Expert Systems with Applications 28 (2005) 773 781 www.elsevier.com/locate/eswa Mining changes in customer behavior in retail marketing Mu-Chen Chen a, *, Ai-Lun Chiu b, Hsu-Hwa Chang c a Department of
More informationUsing Associative Classifiers for Predictive Analysis in Health Care Data Mining
Using Associative Classifiers for Predictive Analysis in Health Care Data Mining Sunita Soni Associate Professor Bhilai Institute of Technology, Durg-491 001, Chhattisgarh, India O.P.Vyas Professor Indian
More informationComputer Science in Education
www.ijcsi.org 290 Computer Science in Education Irshad Ullah Institute, Computer Science, GHSS Ouch Khyber Pakhtunkhwa, Chinarkot, ISO 2-alpha PK, Pakistan Abstract Computer science or computing science
More informationData quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
More informationA COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
More informationIntegrating Pattern Mining in Relational Databases
Integrating Pattern Mining in Relational Databases Toon Calders, Bart Goethals, and Adriana Prado University of Antwerp, Belgium {toon.calders, bart.goethals, adriana.prado}@ua.ac.be Abstract. Almost a
More informationWeb Usage Association Rule Mining System
Interdisciplinary Journal of Information, Knowledge, and Management Volume 6, 2011 Web Usage Association Rule Mining System Maja Dimitrijević The Advanced School of Technology, Novi Sad, Serbia dimitrijevic@vtsns.edu.rs
More informationA New Marketing Channel Management Strategy Based on Frequent Subtree Mining
A New Marketing Channel Management Strategy Based on Frequent Subtree Mining Daoping Wang Peng Gao School of Economics and Management University of Science and Technology Beijing ABSTRACT For most manufacturers,
More informationBOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL
The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University
More informationService Monitoring and Alarm Correlations
Service Monitoring and Alarm Correlations Oliver Jukić Virovitica College Virovitica, Republic of Croatia oliver.jukic@vsmti.hr Ivan Heđi Virovitica College Virovitica, Republic of Croatia ivan.hedi@vsmti.hr
More informationIncSpan: Incremental Mining of Sequential Patterns in Large Database
IncSpan: Incremental Mining of Sequential Patterns in Large Database Hong Cheng Department of Computer Science University of Illinois at Urbana-Champaign Urbana, Illinois 61801 hcheng3@uiuc.edu Xifeng
More informationSearching frequent itemsets by clustering data
Towards a parallel approach using MapReduce Maria Malek Hubert Kadima LARIS-EISTI Ave du Parc, 95011 Cergy-Pontoise, FRANCE maria.malek@eisti.fr, hubert.kadima@eisti.fr 1 Introduction and Related Work
More informationUsing customer knowledge in designing electronic catalog
Expert Systems with Applications Expert Systems with Applications 34 (2008) 119 127 www.elsevier.com/locate/eswa Using customer knowledge in designing electronic catalog Chinho Lin a, *, Chienwen Hong
More informationData Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
More informationIntrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationImplementation of Data Mining Techniques to Perform Market Analysis
Implementation of Data Mining Techniques to Perform Market Analysis B.Sabitha 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, P.Balasubramanian 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
More informationPrediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
More informationCommunity Mining from Multi-relational Networks
Community Mining from Multi-relational Networks Deng Cai 1, Zheng Shao 1, Xiaofei He 2, Xifeng Yan 1, and Jiawei Han 1 1 Computer Science Department, University of Illinois at Urbana Champaign (dengcai2,
More informationEMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH
EMPIRICAL STUDY ON SELECTION OF TEAM MEMBERS FOR SOFTWARE PROJECTS DATA MINING APPROACH SANGITA GUPTA 1, SUMA. V. 2 1 Jain University, Bangalore 2 Dayanada Sagar Institute, Bangalore, India Abstract- One
More information