Data Mining Association Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 6. Introduction to Data Mining
|
|
|
- Malcolm Pierce
- 10 years ago
- Views:
Transcription
1 Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 Association Rule Mining Given a set of transactions, find rules that will predict the occurrence of an item based on the occurrences of other items in the transaction Market-Basket transactions TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Example of Association Rules {Diaper} {Beer}, {Milk, Bread} {Eggs,Coke}, {Beer, Bread} {Milk}, Implication means co-occurrence, not causality! Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 2
2 Definition: Frequent Itemset Itemset A collection of one or more items Example: {Milk, Bread, Diaper} k-itemset An itemset that contains k items Support count (σ) Frequency of occurrence of an itemset E.g. σ({milk, Bread,Diaper}) = 2 Support Fraction of transactions that contain an itemset E.g. s({milk, Bread, Diaper}) = 2/5 Frequent Itemset An itemset whose support is greater than or equal to a minsup threshold TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 3 Definition: Association Rule Association Rule An implication expression of the form X Y, where X and Y are itemsets Example: {Milk, Diaper} {Beer} Rule Evaluation Metrics Support (s) Fraction of transactions that contain both X and Y Confidence (c) Measures how often items in Y appear in transactions that contain X s TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Example: { Milk, Diaper} Beer (Milk, Diaper, Beer) = σ T = 2 =.4 5 σ (Milk, Diaper,Beer) 2 c = = =.67 σ (Milk, Diaper) 3 Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 4
3 Association Rule Mining Task Given a set of transactions T, the goal of association rule mining is to find all rules having support minsup threshold confidence minconf threshold Brute-force approach: List all possible association rules Compute the support and confidence for each rule Prune rules that fail the minsup and minconf thresholds Computationally prohibitive! Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 5 Mining Association Rules TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Example of Rules: {Milk,Diaper} {Beer} (s=.4, c=.67) {Milk,Beer} {Diaper} (s=.4, c=.) {Diaper,Beer} {Milk} (s=.4, c=.67) {Beer} {Milk,Diaper} (s=.4, c=.67) {Diaper} {Milk,Beer} (s=.4, c=.5) {Milk} {Diaper,Beer} (s=.4, c=.5) Observations: All the above rules are binary partitions of the same itemset: {Milk, Diaper, Beer} Rules originating from the same itemset have identical support but can have different confidence Thus, we may decouple the support and confidence requirements Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 6
4 Mining Association Rules Two-step approach:. Frequent Itemset Generation Generate all itemsets whose support minsup 2. Rule Generation Generate high confidence rules from each frequent itemset, where each rule is a binary partitioning of a frequent itemset Frequent itemset generation is still computationally expensive Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 7 Frequent Itemset Generation null A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE ABCD ABCE ABDE ACDE BCDE ABCDE Given d items, there are 2 d possible candidate itemsets Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 8
5 Frequent Itemset Generation Brute-force approach: Each itemset in the lattice is a candidate frequent itemset Count the support of each candidate by scanning the database N Transactions TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke w List of Candidates Match each transaction against every candidate Complexity ~ O(NMw) => Expensive since M = 2 d!!! Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 9 M Computational Complexity Given d unique items: Total number of itemsets = 2 d Total number of possible association rules: d d d k d R = k= j= k d d + = k j If d=6, R = 62 rules Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24
6 Frequent Itemset Generation Strategies Reduce the number of candidates (M) Complete search: M=2 d Use pruning techniques to reduce M Reduce the number of transactions (N) Reduce size of N as the size of itemset increases Used by DHP and vertical-based mining algorithms Reduce the number of comparisons (NM) Use efficient data structures to store the candidates or transactions No need to match every candidate against every transaction Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due to the following property of the support measure: X, Y : ( X Y ) s( X ) s( Y ) Support of an itemset never exceeds the support of its subsets This is known as the anti-monotone property of support Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 2
7 Illustrating Apriori Principle null A B C D E AB AC AD AE BC BD BE CD CE DE Found to be Infrequent ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE ABCD ABCE ABDE ACDE BCDE Pruned supersets ABCDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 3 Illustrating Apriori Principle Item Count Bread 4 Coke 2 Milk 4 Beer 3 Diaper 4 Eggs Minimum Support = 3 Items (-itemsets) Itemset Count {Bread,Milk} 3 {Bread,Beer} 2 {Bread,Diaper} 3 {Milk,Beer} 2 {Milk,Diaper} 3 {Beer,Diaper} 3 Pairs (2-itemsets) (No need to generate candidates involving Coke or Eggs) Triplets (3-itemsets) If every subset is considered, 6 C + 6 C C 3 = 4 With support-based pruning, = 3 Item set Count {B read,m ilk,d iaper} 3 Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 4
8 Apriori Algorithm Method: Let k= Generate frequent itemsets of length Repeat until no new frequent itemsets are identified Generate length (k+) candidate itemsets from length k frequent itemsets Prune candidate itemsets containing subsets of length k that are infrequent Count the support of each candidate by scanning the DB Eliminate candidates that are infrequent, leaving only those that are frequent Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 5 Reducing Number of Comparisons Candidate counting: Scan the database of transactions to determine the support of each candidate itemset To reduce the number of comparisons, store the candidates in a hash structure Instead of matching each transaction against every candidate, match it against candidates contained in the hashed buckets Transactions Hash Structure N TID Items Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke k Buckets Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 6
9 Generate Hash Tree Suppose you have 5 candidate itemsets of length 3: { 4 5}, { 2 4}, {4 5 7}, { 2 5}, {4 5 8}, { 5 9}, { 3 6}, {2 3 4}, {5 6 7}, {3 4 5}, {3 5 6}, {3 5 7}, {6 8 9}, {3 6 7}, {3 6 8} You need: Hash function Max leaf size: max number of itemsets stored in a leaf node (if number of candidate itemsets exceeds max leaf size, split the node) Hash function 3,6,9,4,7 2,5, Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 7 Association Rule Discovery: Hash tree Hash Function Candidate Hash Tree,4,7 3,6,9 2,5,8 Hash on, 4 or Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 8
10 Association Rule Discovery: Hash tree Hash Function Candidate Hash Tree,4,7 3,6,9 2,5,8 Hash on 2, 5 or Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 9 Association Rule Discovery: Hash tree Hash Function Candidate Hash Tree,4,7 3,6,9 2,5,8 Hash on 3, 6 or Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 2
11 Subset Operation Given a transaction t, what are the possible subsets of size 3? Transaction, t Level Level Level 3 Subsets of 3 items Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 2 Subset Operation Using Hash Tree transaction Hash Function ,4,7 3,6, ,5, Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 22
12 Subset Operation Using Hash Tree transaction Hash Function ,4,7 2,5,8 3,6, Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 23 Subset Operation Using Hash Tree transaction Hash Function ,4,7 2,5,8 3,6, Match transaction against out of 5 candidates Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 24
13 Factors Affecting Complexity Choice of minimum support threshold lowering support threshold results in more frequent itemsets this may increase number of candidates and max length of frequent itemsets Dimensionality (number of items) of the data set more space is needed to store support count of each item if number of frequent items also increases, both computation and I/O costs may also increase Size of database since Apriori makes multiple passes, run time of algorithm may increase with number of transactions Average transaction width transaction width increases with denser data sets This may increase max length of frequent itemsets and traversals of hash tree (number of subsets in a transaction increases with its width) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 25 Compact Representation of Frequent Itemsets Some itemsets are redundant because they have identical support as their supersets TID A A2 A3 A4 A5 A6 A7 A8 A9 A B B2 B3 B4 B5 B6 B7 B8 B9 B C C2 C3 C4 C5 C6 C7 C8 C9 C Number of frequent itemsets Need a compact representation = = 3 k k Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 26
14 Maximal Frequent Itemset An itemset is maximal frequent if none of its immediate supersets is frequent null Maximal Itemsets A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE Infrequent Itemsets ABCD ABCE ABDE ACDE BCDE ABCD E Border Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 27 Closed Itemset An itemset is closed if none of its immediate supersets has the same support as the itemset TID Items {A,B} 2 {B,C,D} 3 {A,B,C,D} 4 {A,B,D} 5 {A,B,C,D} Itemset Support {A} 4 {B} 5 {C} 3 {D} 4 {A,B} 4 {A,C} 2 {A,D} 3 {B,C} 3 {B,D} 4 {C,D} 3 Itemset Support {A,B,C} 2 {A,B,D} 3 {A,C,D} 2 {B,C,D} 3 {A,B,C,D} 2 Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 28
15 Maximal vs Closed Itemsets TID Items ABC 2 ABCD 3 BCE 4 ACDE 5 DE null Transaction Ids A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE 2 4 ABCD ABCE ABDE ACDE BCDE Not supported by any transactions ABCDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 29 Maximal vs Closed Frequent Itemsets Minimum support = 2 null Closed but not maximal A B C D E Closed and maximal AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE 2 4 ABCD ABCE ABDE ACDE BCDE # Closed = 9 # Maximal = 4 ABCDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 3
16 Maximal vs Closed Itemsets Frequent Itemsets Closed Frequent Itemsets Maximal Frequent Itemsets Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 3 Alternative Methods for Frequent Itemset Generation Traversal of Itemset Lattice General-to-specific vs Specific-to-general Frequent itemset border null null Frequent itemset border null {a,a 2,...,a n } {a,a 2,...,a n } Frequent itemset border {a,a 2,...,a n } (a) General-to-specific (b) Specific-to-general (c) Bidirectional Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 32
17 Alternative Methods for Frequent Itemset Generation Traversal of Itemset Lattice Equivalent Classes null null A B C D A B C D AB AC AD BC BD CD AB AC BC AD BD CD ABC ABD ACD BCD ABC ABD ACD BCD ABCD ABCD (a) Prefix tree (b) Suffix tree Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 33 Alternative Methods for Frequent Itemset Generation Traversal of Itemset Lattice Breadth-first vs Depth-first (a) Breadth first (b) Depth first Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 34
18 Alternative Methods for Frequent Itemset Generation Representation of Database horizontal vs vertical data layout Horizontal Data Layout TID Items A,B,E 2 B,C,D 3 C,E 4 A,C,D 5 A,B,C,D 6 A,E 7 A,B 8 A,B,C 9 A,C,D B Vertical Data Layout A B C D E Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 35 FP-growth Algorithm Use a compressed representation of the database using an FP-tree Once an FP-tree has been constructed, it uses a recursive divide-and-conquer approach to mine the frequent itemsets Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 36
19 FP-tree construction After reading TID=: null TID Items {A,B} 2 {B,C,D} 3 {A,C,D,E} 4 {A,D,E} 5 {A,B,C} 6 {A,B,C,D} 7 {B,C} 8 {A,B,C} 9 {A,B,D} {B,C,E} A: B: After reading TID=2: null A: B: B: C: D: Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 37 FP-Tree Construction TID Items {A,B} 2 {B,C,D} 3 {A,C,D,E} 4 {A,D,E} 5 {A,B,C} 6 {A,B,C,D} 7 {B,C} 8 {A,B,C} 9 {A,B,D} {B,C,E} Transaction Database B:5 A:7 C: null D: B:3 C:3 Header table Item Pointer A B C D E C:3 D: D: D: E: E: D: Pointers are used to assist frequent itemset generation E: Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 38
20 FP-growth D: C:3 B:5 A:7 D: null C: D: D: B: C: D: Conditional Pattern base for D: P = {(A:,B:,C:), (A:,B:), (A:,C:), (A:), (B:,C:)} Recursively apply FPgrowth on P Frequent Itemsets found (with sup > ): AD, BD, CD, ACD, BCD Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 39 Tree Projection Set enumeration tree: null Possible Extension: E(A) = {B,C,D,E} A B C D E AB AC AD AE BC BD BE CD CE DE ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE Possible Extension: E(ABC) = {D,E} ABCD ABCE ABDE ACDE BCDE ABCDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 4
21 Tree Projection Items are listed in lexicographic order Each node P stores the following information: Itemset for node P List of possible lexicographic extensions of P: E(P) Pointer to projected database of its ancestor node Bitvector containing information about which transactions in the projected database contain the itemset Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 4 Projected Database Original Database: TID Items {A,B} 2 {B,C,D} 3 {A,C,D,E} 4 {A,D,E} 5 {A,B,C} 6 {A,B,C,D} 7 {B,C} 8 {A,B,C} 9 {A,B,D} {B,C,E} Projected Database for node A: TID Items {B} 2 {} 3 {C,D,E} 4 {D,E} 5 {B,C} 6 {B,C,D} 7 {} 8 {B,C} 9 {B,D} {} For each transaction T, projected transaction at node A is T E(A) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 42
22 ECLAT For each item, store a list of transaction ids (tids) Horizontal Data Layout TID Items A,B,E 2 B,C,D 3 C,E 4 A,C,D 5 A,B,C,D 6 A,E 7 A,B 8 A,B,C 9 A,C,D B Vertical Data Layout A B C D E TID-list Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 43 ECLAT Determine support of any k-itemset by intersecting tid-lists of two of its (k-) subsets. AB A B traversal approaches: top-down, bottom-up and hybrid Advantage: very fast support counting Disadvantage: intermediate tid-lists may become too large for memory Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 44
23 Rule Generation Given a frequent itemset L, find all non-empty subsets f L such that f L f satisfies the minimum confidence requirement If {A,B,C,D} is a frequent itemset, candidate rules: ABC D, ABD C, ACD B, BCD A, A BCD, B ACD, C ABD, D ABC AB CD, AC BD, AD BC, BC AD, BD AC, CD AB, If L = k, then there are 2 k 2 candidate association rules (ignoring L and L) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 45 Rule Generation How to efficiently generate rules from frequent itemsets? In general, confidence does not have an antimonotone property c(abc D) can be larger or smaller than c(ab D) But confidence of rules generated from the same itemset has an anti-monotone property e.g., L = {A,B,C,D}: c(abc D) c(ab CD) c(a BCD) Confidence is anti-monotone w.r.t. number of items on the RHS of the rule Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 46
24 Rule Generation for Apriori Algorithm Lattice of rules Low Confidence Rule ABCD=>{ } BCD=>A ACD=>B ABD=>C ABC=>D CD=>AB BD=>AC BC=>AD AD=>BC AC=>BD AB=>CD Pruned Rules D=>ABC C=>ABD B=>ACD A=>BCD Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 47 Rule Generation for Apriori Algorithm Candidate rule is generated by merging two rules that share the same prefix in the rule consequent join(cd=>ab,bd=>ac) would produce the candidate rule D => ABC CD=>AB BD=>AC Prune rule D=>ABC if its subset AD=>BC does not have high confidence D=>ABC Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 48
25 Effect of Support Distribution Many real data sets have skewed support distribution Support distribution of a retail data set Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 49 Effect of Support Distribution How to set the appropriate minsup threshold? If minsup is set too high, we could miss itemsets involving interesting rare items (e.g., expensive products) If minsup is set too low, it is computationally expensive and the number of itemsets is very large Using a single minimum support threshold may not be effective Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 5
26 Multiple Minimum Support How to apply multiple minimum supports? MS(i): minimum support for item i e.g.: MS(Milk)=5%, MS(Coke) = 3%, MS(Broccoli)=.%, MS(Salmon)=.5% MS({Milk, Broccoli}) = min (MS(Milk), MS(Broccoli)) =.% Challenge: Support is no longer anti-monotone Suppose: Support(Milk, Coke) =.5% and Support(Milk, Coke, Broccoli) =.5% {Milk,Coke} is infrequent but {Milk,Coke,Broccoli} is frequent Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 5 Multiple Minimum Support Item MS(I) Sup(I) AB ABC A.%.25% A AC AD ABD ABE B.2%.26% B AE ACD C.3%.29% C BC BD ACE ADE D.5%.5% D BE BCD E 3% 4.2% E CD CE BCE BDE DE CDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 52
27 Multiple Minimum Support Item MS(I) Sup(I) A.%.25% A AB AC AD ABC ABD ABE B.2%.26% C.3%.29% B C AE BC BD ACD ACE ADE D.5%.5% E 3% 4.2% D E BE CD CE BCD BCE BDE DE CDE Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 53 Multiple Minimum Support (Liu 999) Order the items according to their minimum support (in ascending order) e.g.: MS(Milk)=5%, MS(Coke) = 3%, MS(Broccoli)=.%, MS(Salmon)=.5% Ordering: Broccoli, Salmon, Coke, Milk Need to modify Apriori such that: L : set of frequent items F : set of items whose support is MS() where MS() is min i ( MS(i) ) C 2 : candidate itemsets of size 2 is generated from F instead of L Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 54
28 Multiple Minimum Support (Liu 999) Modifications to Apriori: In traditional Apriori, A candidate (k+)-itemset is generated by merging two frequent itemsets of size k The candidate is pruned if it contains any infrequent subsets of size k Pruning step has to be modified: Prune only if subset contains the first item e.g.: Candidate={Broccoli, Coke, Milk} (ordered according to minimum support) {Broccoli, Coke} and {Broccoli, Milk} are frequent but {Coke, Milk} is infrequent Candidate is not pruned because {Coke,Milk} does not contain the first item, i.e., Broccoli. Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 55 Pattern Evaluation Association rule algorithms tend to produce too many rules many of them are uninteresting or redundant Redundant if {A,B,C} {D} and {A,B} {D} have same support & confidence Interestingness measures can be used to prune/rank the derived patterns In the original formulation of association rules, support & confidence are the only measures used Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 56
29 Application of Interestingness Measure Interestingness Measures Patterns Knowledge Postprocessing Preprocessed Data Selected Data Featur Featur Featur e Featur e Featur e Featur e Featur e Featur e Featur e Featur e e e Prod Prod uct Prod uct Prod uct Prod uct Prod uct Prod uct Prod uct Prod uct Prod uct uct Mining Data Preprocessing Selection Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 57 Computing Interestingness Measure Given a rule X Y, information needed to compute rule interestingness can be obtained from a contingency table Contingency table for X Y X X Y f Y f f f f o+ f + T f + f + f : support of X and Y f : support of X and Y f : support of X and Y f : support of X and Y Used to define various measures support, confidence, lift, Gini, J-measure, etc. Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 58
30 Drawback of Confidence Coffee Coffee Tea Tea Association Rule: Tea Coffee Confidence= P(Coffee Tea) =.75 but P(Coffee) =.9 Although confidence is high, rule is misleading P(Coffee Tea) =.9375 Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 59 Statistical Independence Population of students 6 students know how to swim (S) 7 students know how to bike (B) 42 students know how to swim and bike (S,B) P(S B) = 42/ =.42 P(S) P(B) =.6.7 =.42 P(S B) = P(S) P(B) => Statistical independence P(S B) > P(S) P(B) => Positively correlated P(S B) < P(S) P(B) => Negatively correlated Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 6
31 Statistical-based Measures Measures that take into account statistical dependence P( Y X ) Lift = P( Y ) P( X, Y ) Interest = P( X ) P( Y ) PS = P( X, Y ) P( X ) P( Y ) P( X, Y ) P( X ) P( Y ) φ coefficient = P( X )[ P( X )] P( Y )[ P( Y )] Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 6 Example: Lift/Interest Tea Tea Coffee Coffee Association Rule: Tea Coffee Confidence= P(Coffee Tea) =.75 but P(Coffee) =.9 Lift =.75/.9=.8333 (<, therefore is negatively associated) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 62
32 Drawback of Lift & Interest X X Y Y X X Y 9 9 Y 9. Lift = =.9 Lift = =. (.)(.) (.9)(.9) Statistical independence: If P(X,Y)=P(X)P(Y) => Lift = Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 63 There are lots of measures proposed in the literature Some measures are good for certain applications, but not for others What criteria should we use to determine whether a measure is good or bad? What about Aprioristyle support based pruning? How does it affect these measures?
33 Properties of A Good Measure Piatetsky-Shapiro: 3 properties a good measure M must satisfy: M(A,B) = if A and B are statistically independent M(A,B) increase monotonically with P(A,B) when P(A) and P(B) remain unchanged M(A,B) decreases monotonically with P(A) [or P(B)] when P(A,B) and P(B) [or P(A)] remain unchanged Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 65 Comparing Different Measures examples of contingency tables: Rankings of contingency tables using various measures: Example f f f f E E E E E E E E E E Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 66
34 Property under Variable Permutation B B A p q A r s A A B p r B q s Does M(A,B) = M(B,A)? Symmetric measures: support, lift, collective strength, cosine, Jaccard, etc Asymmetric measures: confidence, conviction, Laplace, J-measure, etc Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 67 Property under Row/Column Scaling Grade-Gender Example (Mosteller, 968): Male Female Male Female High High Low 4 5 Low x x Mosteller: Underlying association should be independent of the relative number of male and female students in the samples Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 68
35 Property under Inversion Operation. Transaction Transaction N A B C D E F (a) (b) (c) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 69 Example: φ-coefficient φ-coefficient is analogous to correlation coefficient for continuous variables X X Y 6 7 Y X X Y 2 3 Y φ = = φ = =.5238 φ Coefficient is the same for both tables Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 7
36 Property under Null Addition B B A p q A r s B B A p q A r s + k Invariant measures: support, cosine, Jaccard, etc Non-invariant measures: correlation, Gini, mutual information, odds ratio, etc Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 7 Different Measures have Different Properties Symbol Measure Range P P2 P3 O O2 O3 O3' O4 Φ Correlation - Yes Yes Yes Yes No Yes Yes No λ Lambda Yes No No Yes No No* Yes No α Odds ratio Yes* Yes Yes Yes Yes Yes* Yes No Q Yule's Q - Yes Yes Yes Yes Yes Yes Yes No Y Yule's Y - Yes Yes Yes Yes Yes Yes Yes No κ Cohen's - Yes Yes Yes Yes No No Yes No M Mutual Information Yes Yes Yes Yes No No* Yes No J J-Measure Yes No No No No No No No G Gini Index Yes No No No No No* Yes No s Support No Yes No Yes No No No No c Confidence No Yes No Yes No No No Yes L Laplace No Yes No Yes No No No No V Conviction.5 No Yes No Yes** No No Yes No I Interest Yes* Yes Yes Yes No No No No IS IS (cosine).. No Yes Yes Yes No No No Yes PS Piatetsky-Shapiro's Yes Yes Yes Yes No Yes Yes No F Certainty factor - Yes Yes Yes No No No Yes No AV Added value.5 Yes Yes Yes No No No No No S Collective strength No Yes Yes Yes No Yes* Yes No ζ Jaccard.. No Yes Yes Yes No No No Yes 2 2 K Klosgen's Yes Yes Yes No No No No No Tan,Steinbach, Kumar K K Introduction 3 to Data 3 3 Mining 4/8/24 72
37 Support-based Pruning Most of the association rule mining algorithms use support measure to prune rules and itemsets Study effect of support pruning on correlation of itemsets Generate random contingency tables Compute support and pairwise correlation for each table Apply support-based pruning and examine the tables that are removed Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 73 Effect of Support-based Pruning All Itempairs Correlation Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 74
38 Effect of Support-based Pruning Support <. Support < Correlation Correlation Support <.5 3 Support-based pruning eliminates mostly negatively correlated itemsets Correlation Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 75 Effect of Support-based Pruning Investigate how support-based pruning affects other measures Steps: Generate contingency tables Rank each table according to the different measures Compute the pair-wise correlation between the measures Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 76
39 Effect of Support-based Pruning Without Support Pruning (All Pairs) Conviction Odds ratio Col Strength Correlation Interest PS CF Yule Y R eliability Kappa Klos g en Yule Q Confidence Laplace IS Support J accard Lambda Gini J-measure All Pairs (4.4%) Jaccard Correlation Mutual Info Red cells indicate correlation between the pair of measures >.85 Scatter Plot between Correlation & Jaccard Measure 4.4% pairs have correlation >.85 Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 77 Effect of Support-based Pruning.5% support 5%.5 <= s upport <=.5 (6.45%) Interest Conviction Odds ratio Col Strength Laplace Confidence Correlation Klos g en R eliability PS Yule Q CF Yule Y Kappa IS J accard Support Lambda Gini J-measure Mutual Info % pairs have correlation >.85 Jaccard Corre la tion Scatter Plot between Correlation & Jaccard Measure: Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 78
40 Effect of Support-based Pruning.5% support 3%.5 <= s upport <=.3 (76.42%) Support Interest R eliability Conviction Yule Q Odds ratio Confidence CF Yule Y Kappa Correlation Col Strength IS J accard Laplace PS Klos g en Lambda Mutual Info Gini Jaccard Corre la tion J-measure % pairs have correlation >.85 Scatter Plot between Correlation & Jaccard Measure Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 79 Subjective Interestingness Measure Objective measure: Rank patterns based on statistics computed from data e.g., 2 measures of association (support, confidence, Laplace, Gini, mutual information, Jaccard, etc). Subjective measure: Rank patterns according to user s interpretation A pattern is subjectively interesting if it contradicts the expectation of a user (Silberschatz & Tuzhilin) A pattern is subjectively interesting if it is actionable (Silberschatz & Tuzhilin) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 8
41 Interestingness via Unexpectedness Need to model expectation of users (domain knowledge) + Pattern expected to be frequent - Pattern expected to be infrequent Pattern found to be frequent Pattern found to be infrequent Expected Patterns + Unexpected Patterns Need to combine expectation of users with evidence from data (i.e., extracted patterns) Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 8 Interestingness via Unexpectedness Web Data (Cooley et al 2) Domain knowledge in the form of site structure Given an itemset F = {X, X 2,, X k } (X i : Web pages) L: number of links connecting the pages lfactor = L / (k k-) cfactor = (if graph is connected), (disconnected graph) Structure evidence = cfactor lfactor Usage evidence P( X I X = P( X X 2 2 I... I X ) k... X ) k Use Dempster-Shafer theory to combine domain knowledge and evidence from data Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24 82
Data Mining: Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar
Data Mining: Association Analysis Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar Association Rule Mining Given a set of transactions, find rules that will predict the occurrence of
Data Mining Apriori Algorithm
10 Data Mining Apriori Algorithm Apriori principle Frequent itemsets generation Association rules generation Section 6 of course book TNM033: Introduction to Data Mining 1 Association Rule Mining (ARM)
Association Analysis: Basic Concepts and Algorithms
6 Association Analysis: Basic Concepts and Algorithms Many business enterprises accumulate large quantities of data from their dayto-day operations. For example, huge amounts of customer purchase data
Mining Association Rules. Mining Association Rules. What Is Association Rule Mining? What Is Association Rule Mining? What is Association rule mining
Mining Association Rules What is Association rule mining Mining Association Rules Apriori Algorithm Additional Measures of rule interestingness Advanced Techniques 1 2 What Is Association Rule Mining?
Association Rule Mining
Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification
Unique column combinations
Unique column combinations Arvid Heise Guest lecture in Data Profiling and Data Cleansing Prof. Dr. Felix Naumann Agenda 2 Introduction and problem statement Unique column combinations Exponential search
Market Basket Analysis and Mining Association Rules
Market Basket Analysis and Mining Association Rules 1 Mining Association Rules Market Basket Analysis What is Association rule mining Apriori Algorithm Measures of rule interestingness 2 Market Basket
Frequent item set mining
Frequent item set mining Christian Borgelt Frequent item set mining is one of the best known and most popular data mining methods. Originally developed for market basket analysis, it is used nowadays for
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, [email protected]
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Purpose: key concepts in mining frequent itemsets understand the Apriori algorithm run Apriori in Weka GUI and in programatic way 1 Theoretical
Data Mining2 Advanced Aspects and Applications
Data Mining2 Advanced Aspects and Applications Fosca Giannotti and Mirco Nanni Pisa KDD Lab, ISTI-CNR & Univ. Pisa http://www-kdd.isti.cnr.it/ DIPARTIMENTO DI INFORMATICA - Università di Pisa anno accademico
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Fuzzy Association Rules
Vienna University of Economics and Business Administration Fuzzy Association Rules An Implementation in R Master Thesis Vienna University of Economics and Business Administration Author Bakk. Lukas Helm
Data Mining: Foundation, Techniques and Applications
Data Mining: Foundation, Techniques and Applications Lesson 1b :A Quick Overview of Data Mining Li Cuiping( 李 翠 平 ) School of Information Renmin University of China Anthony Tung( 鄧 锦 浩 ) School of Computing
A Data Mining Framework for Automatic Online Customer Lead Generation
A Data Mining Framework for Automatic Online Customer Lead Generation by Md. Abdur Rahman Submitted in partial fulfillment of the requirements for the degree of Master of Computer Science at Dalhousie
Project Report. 1. Application Scenario
Project Report In this report, we briefly introduce the application scenario of association rule mining, give details of apriori algorithm implementation and comment on the mined rules. Also some instructions
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
Data Mining and Knowledge Discovery, 8, 53 87, 2004 c 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
HOW TO USE MINITAB: DESIGN OF EXPERIMENTS. Noelle M. Richard 08/27/14
HOW TO USE MINITAB: DESIGN OF EXPERIMENTS 1 Noelle M. Richard 08/27/14 CONTENTS 1. Terminology 2. Factorial Designs When to Use? (preliminary experiments) Full Factorial Design General Full Factorial Design
Parallel Data Mining Algorithms for Association Rules and Clustering
Parallel Data Mining Algorithms for Association Rules and Clustering Jianwei Li Northwestern University Ying Liu DTKE Center and Grad Univ of CAS Wei-keng Liao Northwestern University Alok Choudhary Northwestern
Data Mining Classification: Decision Trees
Data Mining Classification: Decision Trees Classification Decision Trees: what they are and how they work Hunt s (TDIDT) algorithm How to select the best split How to handle Inconsistent data Continuous
MASTER'S THESIS. Mining Changes in Customer Purchasing Behavior
MASTER'S THESIS 2009:097 Mining Changes in Customer Purchasing Behavior - a Data Mining Approach Samira Madani Luleå University of Technology Master Thesis, Continuation Courses Marketing and e-commerce
Comparison of Data Mining Techniques for Money Laundering Detection System
Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Gerry Hobbs, Department of Statistics, West Virginia University
Decision Trees as a Predictive Modeling Method Gerry Hobbs, Department of Statistics, West Virginia University Abstract Predictive modeling has become an important area of interest in tasks such as credit
Chapter 4 Data Mining A Short Introduction. 2006/7, Karl Aberer, EPFL-IC, Laboratoire de systèmes d'informations répartis Data Mining - 1
Chapter 4 Data Mining A Short Introduction 2006/7, Karl Aberer, EPFL-IC, Laboratoire de systèmes d'informations répartis Data Mining - 1 1 Today's Question 1. Data Mining Overview 2. Association Rule Mining
Objective Measures for Association Pattern Analysis
Contemporary Mathematics Objective Measures for Association Pattern Analysis Michael Steinbach, Pang-Ning Tan, Hui Xiong, and Vipin Kumar Abstract. Data mining is an area of data analysis that has arisen
Lecture Notes on Database Normalization
Lecture Notes on Database Normalization Chengkai Li Department of Computer Science and Engineering The University of Texas at Arlington April 15, 2012 I decided to write this document, because many students
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
Introduction to arules A computational environment for mining association rules and frequent item sets
Introduction to arules A computational environment for mining association rules and frequent item sets Michael Hahsler Southern Methodist University Bettina Grün Johannes Kepler Universität Linz Kurt Hornik
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Data Mining: An Overview. David Madigan http://www.stat.columbia.edu/~madigan
Data Mining: An Overview David Madigan http://www.stat.columbia.edu/~madigan Overview Brief Introduction to Data Mining Data Mining Algorithms Specific Eamples Algorithms: Disease Clusters Algorithms:
Association Rule Mining: A Survey
Association Rule Mining: A Survey Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University, Singapore 1. DATA MINING OVERVIEW Data mining [Chen et
Boolean Algebra (cont d) UNIT 3 BOOLEAN ALGEBRA (CONT D) Guidelines for Multiplying Out and Factoring. Objectives. Iris Hui-Ru Jiang Spring 2010
Boolean Algebra (cont d) 2 Contents Multiplying out and factoring expressions Exclusive-OR and Exclusive-NOR operations The consensus theorem Summary of algebraic simplification Proving validity of an
Data Mining Applications in Manufacturing
Data Mining Applications in Manufacturing Dr Jenny Harding Senior Lecturer Wolfson School of Mechanical & Manufacturing Engineering, Loughborough University Identification of Knowledge - Context Intelligent
Big Data Analysis Technology
Big Data Analysis Technology Tobias Hardes (6687549) Email: [email protected] Seminar: Cloud Computing and Big Data Analysis, L.079.08013 Summer semester 2013 University of Paderborn Abstract
Index support for regular expression search. Alexander Korotkov PGCon 2012, Ottawa
Index support for regular expression search Alexander Korotkov PGCon 2012, Ottawa Introduction What is regular expressions? Regular expressions are: powerful tool for text processing based on formal language
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs Risto Vaarandi Department of Computer Engineering, Tallinn University of Technology, Estonia [email protected] Abstract. Today,
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
Data Warehousing und Data Mining
Data Warehousing und Data Mining Multidimensionale Indexstrukturen Ulf Leser Wissensmanagement in der Bioinformatik Content of this Lecture Multidimensional Indexing Grid-Files Kd-trees Ulf Leser: Data
Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP
Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP ABSTRACT In data mining modelling, data preparation
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology
Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm
Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm 1 Sanjeev Rao, 2 Priyanka Gupta 1,2 Dept. of CSE, RIMT-MAEC, Mandi Gobindgarh, Punjab, india Abstract In this paper we
RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases
998 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases Abdallah Alashqur Faculty of Information Technology Applied Science University
An Efficient Market Basket Analysis based on Adaptive Association Rule Mining with Faster Rule Generation Algorithm
An Efficient Market Basket Analysis based on Adaptive Association Rule Mining with Faster Rule Generation Algorithm Dr. M. Dhanabhakyam* & Dr. M. Punithavalli** *Assistant Professor, Department of Commerce,
Distributed Data Mining Algorithm Parallelization
Distributed Data Mining Algorithm Parallelization B.Tech Project Report By: Rishi Kumar Singh (Y6389) Abhishek Ranjan (10030) Project Guide: Prof. Satyadev Nandakumar Department of Computer Science and
Association Rule Mining: Exercises and Answers
Association Rule Mining: Exercises and Answers Contains both theoretical and practical exercises to be done using Weka. The exercises are part of the DBTech Virtual Workshop on KDD and BI. Exercise 1.
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset
Finding Frequent Itemsets using Apriori Algorihm to Detect Intrusions in Large Dataset Kamini Nalavade1, B.B. Meshram2, Abstract With the growth of hacking and exploiting tools and invention of new ways
Discovering Data Quality Rules
Discovering Data Quality Rules Fei Chiang University of Toronto [email protected] Renée J. Miller University of Toronto [email protected] ABSTRACT Dirty data is a serious problem for businesses
Distributed Apriori in Hadoop MapReduce Framework
Distributed Apriori in Hadoop MapReduce Framework By Shulei Zhao (sz2352) and Rongxin Du (rd2537) Individual Contribution: Shulei Zhao: Implements centralized Apriori algorithm and input preprocessing
Die Welt Multimedia-Reichweite
Die Welt Multimedia-Reichweite 1) Background The quantification of Die Welt s average daily audience (known as Multimedia-Reichweite, MMR) has been developed by Die Welt management, including the research
Mining Association Rules to Evade Network Intrusion in Network Audit Data
Mining Association Rules to Evade Network Intrusion in Network Audit Data Kamini Nalavade 1, B.B. Meshram 2 Abstract With the growth of hacking and exploiting tools and invention of new ways of intrusion,
Jordan University of Science & Technology Computer Science Department CS 728: Advanced Database Systems Midterm Exam First 2009/2010
Jordan University of Science & Technology Computer Science Department CS 728: Advanced Database Systems Midterm Exam First 2009/2010 Student Name: ID: Part 1: Multiple-Choice Questions (17 questions, 1
Chapter 20: Data Analysis
Chapter 20: Data Analysis Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 20: Data Analysis Decision Support Systems Data Warehousing Data Mining Classification
4. How many integers between 2004 and 4002 are perfect squares?
5 is 0% of what number? What is the value of + 3 4 + 99 00? (alternating signs) 3 A frog is at the bottom of a well 0 feet deep It climbs up 3 feet every day, but slides back feet each night If it started
A Data Mining Tutorial
A Data Mining Tutorial Presented at the Second IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN 98) 14 December 1998 Graham Williams, Markus Hegland and Stephen
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Data Preprocessing. Week 2
Data Preprocessing Week 2 Topics Data Types Data Repositories Data Preprocessing Present homework assignment #1 Team Homework Assignment #2 Read pp. 227 240, pp. 250 250, and pp. 259 263 the text book.
Benchmark Databases for Testing Big-Data Analytics In Cloud Environments
North Carolina State University Graduate Program in Operations Research Benchmark Databases for Testing Big-Data Analytics In Cloud Environments Rong Huang Rada Chirkova Yahya Fathi ICA CON 2012 April
Fast Discovery of Sequential Patterns through Memory Indexing and Database Partitioning
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 109-128 (2005) Fast Discovery of Sequential Patterns through Memory Indexing and Database Partitioning MING-YEN LIN AND SUH-YIN LEE * * Department of
Data Mining for Retail Website Design and Enhanced Marketing
Data Mining for Retail Website Design and Enhanced Marketing Inaugural-Dissertation zur Erlangung des Doktorgrades der Mathematisch-Naturwissenschaftlichen Fakultät der Heinrich-Heine-Universität Düsseldorf
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset P.Abinaya 1, Dr. (Mrs) D.Suganyadevi 2 M.Phil. Scholar 1, Department of Computer Science,STC,Pollachi
Unit 3 Boolean Algebra (Continued)
Unit 3 Boolean Algebra (Continued) 1. Exclusive-OR Operation 2. Consensus Theorem Department of Communication Engineering, NCTU 1 3.1 Multiplying Out and Factoring Expressions Department of Communication
Knowledge Discovery and Data Mining
Knowledge Discovery and Data Mining Data Mining in a nutshell Dr. Osmar R. Zaïane Fall 2007 Extract interesting knowledge (rules, regularities, patterns, constraints) from data in large collections. Knowledge
Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining
Data Mining: Exploring Data Lecture Notes for Chapter 3 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 8/05/2005 1 What is data exploration? A preliminary
Chapter 7: Association Rule Mining in Learning Management Systems
1 Chapter 7: Association Rule Mining in Learning Management Systems Enrique García 1, Cristóbal Romero 1, Sebastián Ventura 1, Carlos de Castro 1, Toon Calders 2 1 Department of Computer Science and Numerical
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
Mining Association Rules on Grid Platforms
UNIVERSITY OF TUNIS EL MANAR FACULTY OF SCIENCES OF TUNISIA Mining Association Rules on Grid Platforms Raja Tlili [email protected] Yahya Slimani [email protected] CoreGrid 11 Plan Introduction
Mining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
Enhancement of Security in Distributed Data Mining
Enhancement of Security in Distributed Data Mining Sharda Darekar 1, Prof.D.K.Chitre, 2 1,2 Department Of Computer Engineering, Terna Engineering College,Nerul,Navi Mumbai. 1 [email protected],
Database Design and Normalization
Database Design and Normalization Chapter 10 (Week 11) EE562 Slides and Modified Slides from Database Management Systems, R. Ramakrishnan 1 Computing Closure F + Example: List all FDs with: - a single
E3: PROBABILITY AND STATISTICS lecture notes
E3: PROBABILITY AND STATISTICS lecture notes 2 Contents 1 PROBABILITY THEORY 7 1.1 Experiments and random events............................ 7 1.2 Certain event. Impossible event............................
Data Mining Techniques Chapter 6: Decision Trees
Data Mining Techniques Chapter 6: Decision Trees What is a classification decision tree?.......................................... 2 Visualizing decision trees...................................................
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Chapter 13: Query Processing. Basic Steps in Query Processing
Chapter 13: Query Processing! Overview! Measures of Query Cost! Selection Operation! Sorting! Join Operation! Other Operations! Evaluation of Expressions 13.1 Basic Steps in Query Processing 1. Parsing
5. A full binary tree with n leaves contains [A] n nodes. [B] log n 2 nodes. [C] 2n 1 nodes. [D] n 2 nodes.
1. The advantage of.. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists. [A] Lists [B] Linked Lists [A] Trees [A] Queues 2. The
Chapter 26: Data Mining
Chapter 6: Data Mining (Some slides courtesy of Rich Caruana, Cornell University) Definition Data mining is the exploration and analysis of large quantities of data in order to discover valid, novel, potentially
Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining
Data Mining Cluster Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 8 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/2004 Hierarchical
DATA STRUCTURES USING C
DATA STRUCTURES USING C QUESTION BANK UNIT I 1. Define data. 2. Define Entity. 3. Define information. 4. Define Array. 5. Define data structure. 6. Give any two applications of data structures. 7. Give
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
http://www.castlelearning.com/review/teacher/assignmentprinting.aspx 5. 2 6. 2 1. 10 3. 70 2. 55 4. 180 7. 2 8. 4
of 9 1/28/2013 8:32 PM Teacher: Mr. Sime Name: 2 What is the slope of the graph of the equation y = 2x? 5. 2 If the ratio of the measures of corresponding sides of two similar triangles is 4:9, then the
