Association Rule Mining
|
|
|
- Bryce Cannon
- 10 years ago
- Views:
Transcription
1 Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification Associative Classification (rule-based classification) Frequent Pattern-based Classification
2 Association Rules A Frequent pattern is a pattern (a set of items, subsequences, subgraphs, etc.) that occurs frequently in a data set. Motivation: Finding inherent regularities (associations) in data. Forms the foundation for many essential data mining tasks: Association, correlation, and causality analysis Classification: associative classification Cluster analysis: frequent pattern-based clustering First proposed by [AIS93] in the context of frequent itemsets and association rule mining for market basket analysis. Extended to many different problems: graph mining, sequential pattern mining, times series pattern mining, text mining
3 Association Rules An item (I) is: For market basket data: I is an item in the store, e.g. milk. For relational data: I is an attribute-value pair (numeric attributes should be discretized), e.g. salary=high, gender=male. A pattern (P) is a conjunction of items: P=I 1 I 2 I n (itemset) A pattern defines a group (subpopulation) of instances. Pattern P is subpattern of P if P P A rule R is A B where A and B are disjoint patterns. Support(A B)=P(A B) Confidence(A B)=P(B A)=posterior probability
4 Association Rules Framework: find all the rules that satisfy both a minimum support (min_sup) and a minimum confidence (min_conf) thresholds. Association rule mining: Find all frequent patterns (with support min_sup). Generate strong rules from the frequent patterns. The second step is straightforward: For each frequent pattern p, generate all nonempty subsets. For every non-empty subset s, output the rule s (p-s) if conf=sup(p)/sup(s) min_conf. The first step is much more difficult. Hence, we focus on frequent pattern mining.
5 Items={A,B,C,D,E,F} Association Rules Example for market basket data Transaction-id Items bought 10 A, B, D 20 A, C, D 30 A, D, E 40 B, E, F 50 B, C, D, E, F Let min_sup = 60% (3) min_conf = 50% FP= {A:3, B:3, D:4, E:3, AD:3} Association rules: A D (60%, 100%) D A (60%, 75%)
6 Association Rules Example for relational data Rule: Smoke =T Family history = T Lung cancer=t sup (Smoke =T Family history = T Lung cancer=t )= 60/200=30% conf (Smoke =T Family history = T Lung cancer=t)= 60/100=60%
7 Frequent Pattern Mining Scalable mining methods: Three major approaches: Apriori [Agrawal & Srikant 1994] Frequent pattern growth (FP-growth) [Han, Pei & Yin 2000] Vertical data format approach [Zaki 2000]
8 Apriori The Apriori property: Any subset of a frequent pattern must be frequent. If {beer, chips, nuts} is frequent, so is {beer, chips}, i.e., every transaction having {beer, chips, nuts} also contains {beer, chips}. Apriori pruning principle: If there is any pattern which is infrequent, its superset should not be generated/tested! Method (level-wise search): Initially, scan DB once to get frequent 1-itemset For each level k: Generate length (k+1) candidates from length k frequent patterns Scan DB and remove the infrequent candidates Terminate when no candidate set can be generated
9 Tid min_sup = 2 Database Items 10 A, C, D 20 B, C, E 30 A, B, C, E 40 B, E 1 st scan Apriori Itemset C 1 L 1 C 2 C 2 {A, B} 1 L 2 Itemset 2 nd scan sup {A, C} 2 {B, C} 2 {B, E} 3 {C, E} 2 C 3 Itemset 3 rd scan L 3 {B, C, E} Itemset sup {A} 2 {B} 3 {C} 3 {D} 1 {E} 3 sup {A, C} 2 {A, E} 1 {B, C} 2 {B, E} 3 {C, E} 2 Itemset sup {B, C, E} 2 Itemset sup {A} 2 {B} 3 {C} 3 {E} 3 Itemset {A, B} {A, C} {A, E} {B, C} {B, E} {C, E}
10 Apriori Candidate generation: Assume we are generating k+1 candidates at level k Step 1: self-joining two frequent k-patterns if they have the same k-1 prefix Step 2: pruning: remove a candidate if it contains any infrequent k- pattern. Example: L 3 ={abc, abd, acd, ace, bcd} Self-joining: L 3 *L 3 abc and abd abcd acd and ace acde Pruning: acde is removed because ade is not in L 3 C 4 ={abcd}
11 Apriori The bottleneck of Apriori: Huge candidate sets: To discover a frequent 100-pattern, e.g., {a 1, a 2,, a 100 }, one needs to generate candidates! Multiple scans of database: Needs (n +1 ) scans, n is the length of the longest pattern. Can we avoid candidate generation?
12 FP-growth The FP-growth algorithm: mining frequent patterns without candidate generation [Han, Pei & Yin 2000] Compress a large database into a compact Frequent-Pattern tree (FPtree) structure highly condensed, but complete for frequent pattern mining avoid costly database scans Develop an efficient, FP-tree-based frequent pattern mining method A divide-and-conquer methodology: decompose mining tasks into smaller ones Avoid candidate generation: sub-database test only!
13 FP-growth Constructing the FP-tree Steps: TID Items bought (ordered) frequent items 100 {f, a, c, d, g, i, m, p} {f, c, a, m, p} 200 {a, b, c, f, l, m, o} {f, c, a, b, m} 300 {b, f, h, j, o} {f, b} 400 {b, c, k, s, p} {c, b, p} 500 {a, f, c, e, l, p, m, n} {f, c, a, m, p} 1. Scan DB once, find frequent 1-itemset (single item pattern) 2. Order frequent items in frequency descending order 3. Scan DB again, construct FP-tree Header Table Item frequency head f 4 c 4 a 3 b 3 m 3 p 3 min_sup = 3 {} f:4 c:1 c:3 a:3 b:1 b:1 p:1 m:2 p:2 b:1 m:1
14 FP-growth Method (divide-and-conquer) For each item, construct its conditional pattern-base, and then its conditional FP-tree. Repeat the process on each newly created conditional FP-tree. Until the resulting FP-tree is empty, or it contains only one path (single path will generate all the combinations of its sub-paths, each of which is a frequent pattern)
15 FP-growth Step 1: From FP-tree to Conditional Pattern Base Starting at the frequent header table in the FP-tree Traverse the FP-tree by following the link of each frequent item Accumulate all of transformed prefix paths of that item to form a conditional pattern base Header Table Item frequency head f 4 c 4 a 3 b 3 m 3 p 3 {} f:4 c:1 c:3 a:3 b:1 b:1 p:1 m:2 b:1 p:2 m:1 Conditional pattern bases item cond. pattern base c f:3 a fc:3 b fca:1, f:1, c:1 m fca:2, fcab:1 p fcam:2, cb:1
16 FP-growth Step 2: Construct Conditional FP-tree Start from the end of the list For each pattern-base Accumulate the count for each item in the base Construct the FP-tree for the frequent items of the pattern base Example: Here we are mining for pattern m, min_sup=3 Header Table Item frequency head f 4 c 4 a 3 b 3 m 3 p 3 {} f:4 c:1 c:3 a:3 b:1 b:1 p:1 m:2 p:2 b:1 m:1 m-conditional pattern base: fca:2, fcab:1 {} f:3 c:3 a:3 m-conditional FP-tree All frequent patterns concerning m m, fm, cm, am, fcm, fam, cam, fcam
17 FP-growth FP-growth is faster than Apriori because: No candidate generation, no candidate test Use compact data structure Eliminate repeated database scan Basic operation is counting and FP-tree building (no pattern matching) Disadvantage: FP-tree may not fit in main memory!
18 Run time(sec.) FP-growth FP-growth vs. Apriori: Scalability With the Support Threshold D1 FP-grow th runtime D1 Apriori runtime Support threshold(%)
19 Correlation analysis Association rule mining often generates a huge number of rules, but a majority of them either are redundant or do not reflect the true correlation relationship among data objects. Some strong association rules (based on support and confidence ) can be misleading. Correlation analysis can reveal which strong association rules are interesting and useful.
20 Correlation analysis play basketball eat cereal [40%, 66.7%] is misleading The overall % of students eating cereal is 75% > 66.7%. play basketball not eat cereal [20%, 33.3%] is more accurate, although with lower support and confidence Contingency table Basketball Not basketball Sum (row) Cereal 2000 (40%) 1750 (35%) 3750 (75%) Not cereal 1000 (20%) 250 (5%) 1250 (25%) Sum(col.) 3000 (60%) 2000 (40%) 5000 (100%)
21 lift ( A Correlation analysis The lift score P( A B) P( B A) B) P( A) P( B) P( B) Lift = 1 A and B are independent Lift > 1 A and B are positively correlated Lift < 1 A and B are negatively correlated. Basketball Not basketball Sum (row) Cereal 2000 (40%) 1750 (35%) 3750 (75%) Not cereal 1000 (20%) 250 (5%) 1250 (25%) Sum(col.) 3000 (60%) 2000 (40%) 5000 (100%) 2000 / 5000 lift ( basketball cereal ) / 5000*3750 / / 5000 lift ( basketball cereal ) / 5000*1250 / 5000
22 Correlation analysis The χ2 test Lift calculates the correlation value, but we could not tell whether the value is statistically significant. Pearson Chi-square is the most common test for significance of the relationship between categorical variables x 2 ( O( r) E[ r]) E[ r] 2 If this value is larger than a cutoff value at a significance level (e.g. at 95% significance level), then we say all the variables are dependent (correlated), else we say all the variables are independent. Other correlation/interestingness measure: cosine, all confidence, IG
23 Correlation analysis disadvantages Problem: Evaluate each rule individually! Pr(CHD)=30% R2: Family history=yes Race=Caucasian CHD [sup=20%, conf=55%] R2 is interesting! R1: Family history=yes CHD [sup=50%, conf=60%] R2 is not interesting! We should consider the nested structure of the rules! To solve this problem, we proposed the MDR framework.
24 Constraint-based Mining Finding all the patterns in a database autonomously? unrealistic! The patterns could be too many but not focused! Data mining should be an interactive process User directs what to be mined using a data mining query language (or a graphical user interface). Constraint-based mining User flexibility: provides constraints on what to be mined Specify the task relevant data, the relevant attributes, rule templates, additional constraints System optimization: explores such constraints for efficient mining constraint-based mining.
25 Constraint-based Mining Anti-monotonic constraints are very important because they can greatly speed up the mining process. Anti-monotonicity exhibit an Apriori-like property: When a pattern violates the constraint, so does any of its superset sum(s.price) v is anti-monotone sum(s.price) v is not anti-monotone Some constraints can be converted into anti-monotone constraints by properly ordering items Example : avg(s.profit) 25 Order items in value-descending order, it becomes anit-monotone!
26 Association Rule Mining Association Rules and Frequent Patterns Frequent Pattern Mining Algorithms Apriori FP-growth Correlation Analysis Constraint-based Mining Using Frequent Patterns for Classification Associative Classification (rule-based classification) Frequent Pattern-based Classification
27 Associative classification Associative classification: build a rule-based classifier from association rules. This approach overcomes some limitations of greedy methods (e.g. decision-tree, sequential covering algorithms), which considers only one attribute at a time (found to be more accurate than C4.5). Build class association rules: Association rules in general can have any number of items in the consequent. Class association rules set the consequent to be the class label. Example: Age=youth Credit=OK buys_computer=yes [sup=20%, conf=90%]
28 Associative classification CBA CBA: Classification-Based Association [Liu et al, 1998] Use the Apriori algorithm to mine the class association rules. Classification: Organize the rules according to their confidence and support. classify a new example x by the first rule satisfying x. Contains a default rule (with lowest precedence).
29 Associative classification CMAR CMAR (Classification based on Multiple Association rules) [Li et al 2001] Use the FP-growth algorithm to mine the class association rules. Employs the CR_tree structure (prefix tree for indexing the rules) to efficiently store and retrieve rules. Apply rule pruning whenever a rule is inserted in the tree: If R1 is more general than R2 and conf(r1)>conf(r2): R2 is pruned All rules for which the antecedent and class are not positively correlated (χ2 test) are also pruned. CMAR considers multiple rules when classifying an instance and use a weighted measure to find the strongest class. CMAR is slightly more accurate and more efficient than CBA
30 Associative classification Harmony Drawback of CBA and CMAR is that the number of rules can be extremely large. Harmony [Wang et al, 2005] adopts an instance-centric approach: Find the highest confidence rule for each training instance. Build the classification model from the union of these rules. Use the FP-growth algorithm to mine the rules. Efficient mining: Naïve way: mine all frequent patterns and then extract the highest confidence rule for each instance. Harmony employs efficient pruning methods to accelerate the rule discovery: the pruning methods are incorporated within the FP-growth algorithm.
31 Frequent pattern-based classification The classification model is built in the feature space of single features as well as frequent patterns, i.e. map the data to a higher dimensional space. Feature combination can capture more underlying semantics than single features. Example: word phrases can improve the accuracy of document classification. FP-based classification been applied to many problems: Graph classification Time series classification Protein classification Text classification
32 Frequent pattern-based classification Naïve solution: given a dataset with n items (attribute-value), enumerate all 2 n items and use them for classification. Problems: Computationally infeasible. Overfitting the classifier. Solution: use only frequent patterns. Why? [Cheng et al. 2007] showed that: low-support features are not very useful for classification. The discriminative power of a pattern is closely related to its support. They derived an upper bound for information gain as a function of the support.
33 Frequent pattern-based classification IG upper bound as a function of the support The discriminative power of low-support patterns is bounded by a small value. The discriminative power of high-support patterns is bounded by a small value (e.g. stop words in text classification).
34 Frequent pattern-based classification The upper bound allows to automatically set min_sup based on an IG threshold (IG 0 ): Features with support ϴ lower than min_sup can be skipped: [Cheng et al 2007] Adapt the two phases approach: Mine frequent patterns for each class label. Select discriminative features (univariate). Feature space includes all the single features as well as the selected (discriminative) frequent patterns. Apply the classifier (e.g. SVM or C4.5) in the new feature space.
35 Tree-based frequent patterns [Fan et al. 2008] proposed building a decision tree in the space of frequent patterns as an alternative for the two phases approach [Cheng et al. 2007]. Arguments against the two phases approach: 1. The number of frequent patterns can be too large for effective feature selection in the second phase. 2. It is difficult to set the optimal min_sup threshold: low min_sup generate too many candidates and is very slow. High min_sup may miss some important patterns.
36 Tree-based frequent patterns 3. The discriminative power of each pattern is evaluated against the complete dataset (second phase), but not on subset of examples that the other chosen patterns fail to predict well. After choosing the solid line, the dashed line makes the groups purer (cannot be chosen by the batch mode)
37 Tree-based frequent patterns Method: Construct a decision tree using frequent patterns: Apply frequent pattern on the whole data Select the best frequent pattern P to divide the data into two sets: one containing P and the other not. Repeat the procedure on each subset until a stopping condition is satisfied. Decreasing the support with smaller partitions makes the algorithm able to mine patterns with very low global support.
Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
Data Mining and Knowledge Discovery, 8, 53 87, 2004 c 2004 Kluwer Academic Publishers. Manufactured in The Netherlands. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
Data Mining: Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar
Data Mining: Association Analysis Partially from: Introduction to Data Mining by Tan, Steinbach, Kumar Association Rule Mining Given a set of transactions, find rules that will predict the occurrence of
Data Mining Apriori Algorithm
10 Data Mining Apriori Algorithm Apriori principle Frequent itemsets generation Association rules generation Section 6 of course book TNM033: Introduction to Data Mining 1 Association Rule Mining (ARM)
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH
MAXIMAL FREQUENT ITEMSET GENERATION USING SEGMENTATION APPROACH M.Rajalakshmi 1, Dr.T.Purusothaman 2, Dr.R.Nedunchezhian 3 1 Assistant Professor (SG), Coimbatore Institute of Technology, India, [email protected]
Data Mining Association Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 6. Introduction to Data Mining
Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 4/8/24
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Mining Association Rules. Mining Association Rules. What Is Association Rule Mining? What Is Association Rule Mining? What is Association rule mining
Mining Association Rules What is Association rule mining Mining Association Rules Apriori Algorithm Additional Measures of rule interestingness Advanced Techniques 1 2 What Is Association Rule Mining?
Association Rule Mining: A Survey
Association Rule Mining: A Survey Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University, Singapore 1. DATA MINING OVERVIEW Data mining [Chen et
Association Analysis: Basic Concepts and Algorithms
6 Association Analysis: Basic Concepts and Algorithms Many business enterprises accumulate large quantities of data from their dayto-day operations. For example, huge amounts of customer purchase data
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset
An Efficient Frequent Item Mining using Various Hybrid Data Mining Techniques in Super Market Dataset P.Abinaya 1, Dr. (Mrs) D.Suganyadevi 2 M.Phil. Scholar 1, Department of Computer Science,STC,Pollachi
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm
Implementing Improved Algorithm Over APRIORI Data Mining Association Rule Algorithm 1 Sanjeev Rao, 2 Priyanka Gupta 1,2 Dept. of CSE, RIMT-MAEC, Mandi Gobindgarh, Punjab, india Abstract In this paper we
Scoring the Data Using Association Rules
Scoring the Data Using Association Rules Bing Liu, Yiming Ma, and Ching Kian Wong School of Computing National University of Singapore 3 Science Drive 2, Singapore 117543 {liub, maym, wongck}@comp.nus.edu.sg
SPMF: a Java Open-Source Pattern Mining Library
Journal of Machine Learning Research 1 (2014) 1-5 Submitted 4/12; Published 10/14 SPMF: a Java Open-Source Pattern Mining Library Philippe Fournier-Viger [email protected] Department
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Frequent item set mining
Frequent item set mining Christian Borgelt Frequent item set mining is one of the best known and most popular data mining methods. Originally developed for market basket analysis, it is used nowadays for
9.1. Graph Mining, Social Network Analysis, and Multirelational Data Mining. Graph Mining
9 Graph Mining, Social Network Analysis, and Multirelational Data Mining We have studied frequent-itemset mining in Chapter 5 and sequential-pattern mining in Section 3 of Chapter 8. Many scientific and
Data Mining: Foundation, Techniques and Applications
Data Mining: Foundation, Techniques and Applications Lesson 1b :A Quick Overview of Data Mining Li Cuiping( 李 翠 平 ) School of Information Renmin University of China Anthony Tung( 鄧 锦 浩 ) School of Computing
Unique column combinations
Unique column combinations Arvid Heise Guest lecture in Data Profiling and Data Cleansing Prof. Dr. Felix Naumann Agenda 2 Introduction and problem statement Unique column combinations Exponential search
PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE
International Journal of Computer Science and Applications, Vol. 5, No. 4, pp 57-69, 2008 Technomathematics Research Foundation PREDICTIVE MODELING OF INTER-TRANSACTION ASSOCIATION RULES A BUSINESS PERSPECTIVE
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
Comparison of Data Mining Techniques for Money Laundering Detection System
Comparison of Data Mining Techniques for Money Laundering Detection System Rafał Dreżewski, Grzegorz Dziuban, Łukasz Hernik, Michał Pączek AGH University of Science and Technology, Department of Computer
RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases
998 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010 RDB-MINER: A SQL-Based Algorithm for Mining True Relational Databases Abdallah Alashqur Faculty of Information Technology Applied Science University
Graph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining
Fuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining by Ashish Mangalampalli, Vikram Pudi Report No: IIIT/TR/2008/127 Centre for Data Engineering International Institute of Information Technology
Classification and Prediction
Classification and Prediction Slides for Data Mining: Concepts and Techniques Chapter 7 Jiawei Han and Micheline Kamber Intelligent Database Systems Research Lab School of Computing Science Simon Fraser
Project Report. 1. Application Scenario
Project Report In this report, we briefly introduce the application scenario of association rule mining, give details of apriori algorithm implementation and comment on the mined rules. Also some instructions
The basic data mining algorithms introduced may be enhanced in a number of ways.
DATA MINING TECHNOLOGIES AND IMPLEMENTATIONS The basic data mining algorithms introduced may be enhanced in a number of ways. Data mining algorithms have traditionally assumed data is memory resident,
Mining Association Rules: A Database Perspective
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 69 Mining Association Rules: A Database Perspective Dr. Abdallah Alashqur Faculty of Information Technology
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Market Basket Analysis and Mining Association Rules
Market Basket Analysis and Mining Association Rules 1 Mining Association Rules Market Basket Analysis What is Association rule mining Apriori Algorithm Measures of rule interestingness 2 Market Basket
Chapter 4 Data Mining A Short Introduction. 2006/7, Karl Aberer, EPFL-IC, Laboratoire de systèmes d'informations répartis Data Mining - 1
Chapter 4 Data Mining A Short Introduction 2006/7, Karl Aberer, EPFL-IC, Laboratoire de systèmes d'informations répartis Data Mining - 1 1 Today's Question 1. Data Mining Overview 2. Association Rule Mining
Using Associative Classifiers for Predictive Analysis in Health Care Data Mining
Using Associative Classifiers for Predictive Analysis in Health Care Data Mining Sunita Soni Associate Professor Bhilai Institute of Technology, Durg-491 001, Chhattisgarh, India O.P.Vyas Professor Indian
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, [email protected] D.S. Rajpoot Registrar,
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm
Laboratory Module 8 Mining Frequent Itemsets Apriori Algorithm Purpose: key concepts in mining frequent itemsets understand the Apriori algorithm run Apriori in Weka GUI and in programatic way 1 Theoretical
MASTER'S THESIS. Mining Changes in Customer Purchasing Behavior
MASTER'S THESIS 2009:097 Mining Changes in Customer Purchasing Behavior - a Data Mining Approach Samira Madani Luleå University of Technology Master Thesis, Continuation Courses Marketing and e-commerce
Big Data Analysis Technology
Big Data Analysis Technology Tobias Hardes (6687549) Email: [email protected] Seminar: Cloud Computing and Big Data Analysis, L.079.08013 Summer semester 2013 University of Paderborn Abstract
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Data Mining Techniques in Gene Expression Data Analysis. Xin Xu A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY SCHOOL OF COMPUTING
Data Mining Techniques in Gene Expression Data Analysis Xin Xu A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE 2005 Data Mining Techniques
Data Mining. Session 6 Main Theme. Frequent Patterns, Association, and Correlations. Dr. Jean-Claude Franchitti
Data Mining Session 6 Main Theme Mining Frequent Patterns, Association, and Correlations Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
Ensemble of Classifiers Based on Association Rule Mining
Ensemble of Classifiers Based on Association Rule Mining Divya Ramani, Dept. of Computer Engineering, LDRP, KSV, Gandhinagar, Gujarat, 9426786960. Harshita Kanani, Assistant Professor, Dept. of Computer
Mining Interesting Medical Knowledge from Big Data
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. II (Jan Feb. 2016), PP 06-10 www.iosrjournals.org Mining Interesting Medical Knowledge from
Distributed Apriori in Hadoop MapReduce Framework
Distributed Apriori in Hadoop MapReduce Framework By Shulei Zhao (sz2352) and Rongxin Du (rd2537) Individual Contribution: Shulei Zhao: Implements centralized Apriori algorithm and input preprocessing
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington
Improving Apriori Algorithm to get better performance with Cloud Computing
Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Using Data Mining Methods to Predict Personally Identifiable Information in Emails Liqiang Geng 1, Larry Korba 1, Xin Wang, Yunli Wang 1, Hongyu Liu 1, Yonghua You 1 1 Institute of Information Technology,
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
Information Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli ([email protected])
Data Mining for Knowledge Management. Classification
1 Data Mining for Knowledge Management Classification Themis Palpanas University of Trento http://disi.unitn.eu/~themis Data Mining for Knowledge Management 1 Thanks for slides to: Jiawei Han Eamonn Keogh
Application of Data Mining Techniques For Diabetic DataSet
Computing For Nation Development, February 25 26, 2010 Bharati Vidyapeeth s Institute of Computer Applications and Management, New Delhi Application of Data Mining Techniques For DataSet 1 Runumi Devi
Fuzzy Association Rules
Vienna University of Economics and Business Administration Fuzzy Association Rules An Implementation in R Master Thesis Vienna University of Economics and Business Administration Author Bakk. Lukas Helm
EFFECTIVE USE OF THE KDD PROCESS AND DATA MINING FOR COMPUTER PERFORMANCE PROFESSIONALS
EFFECTIVE USE OF THE KDD PROCESS AND DATA MINING FOR COMPUTER PERFORMANCE PROFESSIONALS Susan P. Imberman Ph.D. College of Staten Island, City University of New York [email protected] Abstract
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
Searching frequent itemsets by clustering data
Towards a parallel approach using MapReduce Maria Malek Hubert Kadima LARIS-EISTI Ave du Parc, 95011 Cergy-Pontoise, FRANCE [email protected], [email protected] 1 Introduction and Related Work
Case study: d60 Raptor smartadvisor. Jan Neerbek Alexandra Institute
Case study: d60 Raptor smartadvisor Jan Neerbek Alexandra Institute Agenda d60: A cloud/data mining case Cloud Data Mining Market Basket Analysis Large data sets Our solution 2 Alexandra Institute The
Chapter 6: Episode discovery process
Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing
Databases - Data Mining. (GF Royle, N Spadaccini 2006-2010) Databases - Data Mining 1 / 25
Databases - Data Mining (GF Royle, N Spadaccini 2006-2010) Databases - Data Mining 1 / 25 This lecture This lecture introduces data-mining through market-basket analysis. (GF Royle, N Spadaccini 2006-2010)
Frequent pattern mining: current status and future directions
Data Min Knowl Disc (2007) 15:55 86 DOI 10.1007/s10618-006-0059-1 Frequent pattern mining: current status and future directions Jiawei Han Hong Cheng Dong Xin Xifeng Yan Received: 22 June 2006 / Accepted:
Knowledge Based Context Awareness Network Security For Wireless Networks
Knowledge Based Context Awareness Network Security For Wireless Networks Deepa U. Mishra Department of Computer Engineering Smt. Kashibai Navale College of Engineering Pune, India Abstract - Context awareness
Data Mining: An Overview. David Madigan http://www.stat.columbia.edu/~madigan
Data Mining: An Overview David Madigan http://www.stat.columbia.edu/~madigan Overview Brief Introduction to Data Mining Data Mining Algorithms Specific Eamples Algorithms: Disease Clusters Algorithms:
Distributed Data Mining Algorithm Parallelization
Distributed Data Mining Algorithm Parallelization B.Tech Project Report By: Rishi Kumar Singh (Y6389) Abhishek Ranjan (10030) Project Guide: Prof. Satyadev Nandakumar Department of Computer Science and
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro
Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Market Basket Analysis for a Supermarket based on Frequent Itemset Mining
www.ijcsi.org 257 Market Basket Analysis for a Supermarket based on Frequent Itemset Mining Loraine Charlet Annie M.C. 1 and Ashok Kumar D 2 1 Department of Computer Science, Government Arts College Tchy,
Principles of Dat Da a t Mining Pham Tho Hoan [email protected] [email protected]. n
Principles of Data Mining Pham Tho Hoan [email protected] References [1] David Hand, Heikki Mannila and Padhraic Smyth, Principles of Data Mining, MIT press, 2002 [2] Jiawei Han and Micheline Kamber,
COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
Didacticiel Études de cas. Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka.
1 Subject Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka. This document extends a previous tutorial dedicated to the comparison of various implementations
Jordan University of Science & Technology Computer Science Department CS 728: Advanced Database Systems Midterm Exam First 2009/2010
Jordan University of Science & Technology Computer Science Department CS 728: Advanced Database Systems Midterm Exam First 2009/2010 Student Name: ID: Part 1: Multiple-Choice Questions (17 questions, 1
Associative Classification Mining for Website Phishing Classification
Associative Classification Mining for Website Phishing Classification 1 Neda Abdelhamid, 1 Aladdin Ayesh, 2 Fadi Thabtah 1 Informatics Dept, De Montfort University, Leicester, LE1 9BH Email: 1 [email protected]
Association Rules Mining: A Recent Overview
GESTS International Transactions on Computer Science and Engineering, Vol.32 (1), 2006, pp. 71-82 Association Rules Mining: A Recent Overview Sotiris Kotsiantis, Dimitris Kanellopoulos Educational Software
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs Risto Vaarandi Department of Computer Engineering, Tallinn University of Technology, Estonia [email protected] Abstract. Today,
Analysis of Customer Behavior using Clustering and Association Rules
Analysis of Customer Behavior using Clustering and Association Rules P.Isakki alias Devi, Research Scholar, Vels University,Chennai 117, Tamilnadu, India. S.P.Rajagopalan Professor of Computer Science
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
A Data Mining Tutorial
A Data Mining Tutorial Presented at the Second IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN 98) 14 December 1998 Graham Williams, Markus Hegland and Stephen
