SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 6, December 2018, pp. 4568~4576
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp4568-4576 ļ² 4568
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Generating Non-redundant Multilevel Association Rules Using
Min-max Exact Rules
R. Vijaya Prakash1
, SSVN. Sarma2
, M. Sheshikala3
1
Department of Computer Science and Engineering, S R Engineering College, India
2
Department of Computer Science and Engineering, Vaagdevi College of Engineering, India
3
Departmnt of Computer Science and Engineering, S R Engineering College, India
Article Info ABSTRACT
Article history:
Received Sep 22, 2017
Revised Jul 13, 2018
Accepted Jul 29, 2018
Association Rule mining plays an important role in the discovery of
knowledge and information. Association Rule mining discovers huge number
of rules for any dataset for different support and confidence values, among
this many of them are redundant, especially in the case of multi-level
datasets. Mining non-redundant Association Rules in multi-level dataset is a
big concern in field of Data mining. In this paper, we present a definition for
redundancy and a concise representation called Reliable Exact basis for
representing non-redundant Association Rules from multi-level datasets. The
given non-redundant Association Rules are loss less representation for any
datasets.
Keyword:
Association Rule
Frequent Itemsets
Non-Redundant Rules
Reliable Rules
Copyright Ā© 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
R. Vijaya Prakash,
Department of Computer Science and Engineering,
S R Engineering College,
Anathasagar, Hasanparthy, Warangal, Telangana, India.
Email: vijprak@hotmail.com
1. INTRODUCTION
The huge amount of the extracted rules is a big problem for Association Rule mining [21].
Especially, many of the extracted rules are considered redundant since they produce the same meaning to the
user or extracted rules can be replaced by other rules. Many efforts have been made on reducing the size of
the extracted rule set. There are number of representations of frequent patterns have been proposed, one of
them, is the closed itemsets, is of particular interest as they can be applied for generating non-redundant rules
[10], [12], [18], [23]. The use of frequent closed itemsets presents a clear promise to reduce the number of
extracted rules [13], [17], [19]. Multi-level datasets in which the items are not all at the same concept level
contain information at different abstract levels.
The approaches used to find frequent itemsets in single level datasets miss information, as they only
look at one level in the dataset. Thus techniques that consider all the levels are needed [6]-[9], [22]. However,
rules derived from multi-level datasets can have the same issues with redundancy as those from a single level
dataset. While approaches used to remove redundancy in single level datasets [13], [17], [19] can be adapted
for use in one rule at a given level gives the same information as another rule at a different level. In this
paper, we present a Reliable basis representation of non-redundant Association Rules. We then look into this
hierarchical redundancy and propose an approach from which more non-redundant rules can be derived. We
use the same definition of non-redundant rules in single level datasets, but to this definition we add a
requirement that considers the different levels of the item(s) in determining the redundancy rule. By doing so,
more redundant Association Rules can be eliminated. We also show that it is possible to derive all of the
Association Rules, without lose of information.
Int J Elec & Comp Eng ISSN: 2088-8708 ļ²
Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash)
4569
The paper is organized as follows. Section 2 briefly discusses some related work, Section 3, we
discuss the redundancy in Association Rules and present a definition to redundant rules. Experiments and
results are presented in Section 4. Finally, Section 5 concludes the paper.
2. RELATED WORK
The approaches proposed in [13], [18] make use of the closure of the Galois connection [4] to
extract non-redundant rules from frequent closed itemsets instead of from frequent itemsets. One difference
between the two approaches is the definition of redundancy. The approach proposed in [18] extracts the rules
with shorter antecedent and shorter consequent as well among rules which have the same confidence, while
the method proposed in [13] defines that the non-redundant rules are those which have minimal antecedents
and maximal consequents.
The definition proposed in [17] is like that of [13]. However, the requirement to redundancy is
relaxed, and the lesser requirement makes more rules to be considered redundant and thus eliminated. Most
importantly, [17] proved that the elimination of such redundant rules increases the belief to the extracted
rules and the capacity of the extracted non-redundant rules for solving problems. However, the work
mentioned above has only focused on datasets where all items are at the same concept level. Thus, they do
not need to consider redundancy that can occur when there is a hierarchy among the items. A multi-level
dataset is the one which has an implicit taxonomy or concept tree, like shown in Figure 1. The items in the
dataset exist at the lowest concept level but are part of ahierarchical structure and organization.
Food
BananaAppleWheatWhiteSkimmed2 percent
FruitBreadMilk
Figure 1. A Simple example of product taxonomy
In Figure 1 for an example, the frequent itemset {'Dairyland-2%-milk', 'white-bread'} is a cross-
level itemset as the first item is from the lowest level, while the second item is from a different concept level.
In fact the cross-level idea was an addition to the work being proposed. Further work proposed an approach
which included finding cross-level frequent itemsets [15]. This later work also performs more pruning of the
dataset to make finding the frequent itemsets more efficient. However, even with all this work the focus has
been on finding the frequent itemsets as efficiently as possible and the issue of quality and/or redundancy in
single level datasets. Some brief work presented by [5]-[6] discusses removing rules which are hierarchically
redundant, but it relies on the user giving an expected confidence variation margin to determine redundancy.
There appears to be a void in dealing with hierarchical redundancy in Association Rules derived from multi-
level datasets. This work attempts to fill that void and show an approach to deal with hierarchical redundancy
without losing any information.
From the beginning of Association Rule mining in [1], [3], [21], [23], [25], the first step has always
been to find the frequent patterns or itemsets. The simplest way to do this is through the use of the Apriori
algorithm [2]. However, Apriori is not designed to work on extracting frequent itemsets at multiple levels in
a multi-level dataset. It is designed for use on single level datasets. But, it has been adapted for multi-level
datasets.
One adaptation of Apriori to multi-level datasets is the ML_T2L1 algorithm [5]-[6]. The ML_T2L1
algorithm uses a transaction table that has the hierarchy information encoded into it. Each level in the dataset
is processed individually. Firstly, level 1 analyzed for large 1-itemsets using Apriori. The list of level 1 large
ļ² ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576
4570
1-itemsets is then used to filter and prune the transaction dataset of any item that does not have an ancestor in
the level 1 large 1-itemset list and remove any transaction which has no frequent items. From the level 1
large 1-itemset list, level 1 large 2-itemsets are derived. Then level 1 large 3-itemsets are derived and so on,
until there are no more frequent itemsets to discover at level 1. Since ML_T2L1 defines that only the items
that are descendant from frequent items at level 1 can be frequent themselves, the level 2 itemsets are derived
from the filtered transaction table. For level 2, the large 1-itemsets are discovered, from which the large 2-
itemsets are derived and then large 3-itemsets etc. After all the frequent itemsets are discovered at level 2, the
level 3 large 1-itemsets are discovered and so on. ML_T2L1 repeats until either all levels are searched using
Apriori or no large 1-itemsets are a found at a level.
As the original work shows [5]-[6], ML_T2L1 does not find cross-level frequent itemsets. We have
added the ability for it to do this. At each level below 1, when large 2-itemsets or later are derived the Apriori
algorithm is not restricted to just using the large n-1-itemsets at the current level, but can generate
combinations using the large itemsets from higher levels. The only restrictions on this are that the derived
frequent itemset(s) can not contain an item that has an ancestor-descendant relationship with another item
within the same itemset and that the minimum support threshold used is that of the current level being
processed.
3. GENERATION OF NON-REDUNDANT MULTI-LEVEL ASSOCIATION RULES
The use of frequent itemsets as the basis for Association Rule mining often results in the generation
of many rules. More recent work has demonstrated that the use of closed itemsets and generators can reduce
the number of rules generated [14],[16]-[18],[20]-[22]. Despite this, redundancy still exists in the rules
generated from multi-level datasets even when using some of the methods designed to remove redundancy.
This redundancy we call hierarchical redundancy. Here in this section we first introduce hierarchical
redundancy in multi-level datasets and then we detail our work to remove this redundancy without losing
information.
3.1. Hierarchical Redundancy
Whether a rule is interesting and/or useful is usually determined through the support and confidence
values that it has. However, this does not guarantee that all of the rules that have a high enough support and
confidence actually convey new information. Following is an example transaction table for a multi-level
dataset Table 1.
Table 1. Simple Multi-level Transaction Dataset.
Transaction ID Items
1 [1-1-1, 1-2-1, 2-1-1, 2-2-1]
2 [1-1-1, 2-1-1, 2-2-2, 3-2-3]
3 [1-1-2, 1-2-2, 2-2-1, 4-1-1]
4 [1-1-1, 1-2-1]
5 [1-1-1, 1-2-2, 2-1-1, 2-2-1, 4-1-3]
6 [1-1-3, 3-2-3, 5-2-4]
7 [1-3-1, 2-3-1]
8 [3-2-3, 4-1-1, 5-2-4, 7-1-3]
This simple multi-level transactional dataset has 3 levels with each item belonging to the lowest
level. The item ID in the table store/holds the hierarchy information for each item. Thus, the item 1-2-1
belongs to the first category at level 1 and for level 2 it belongs to the second sub-category of the first level 1
category. Finally, at level 3 it belongs to the first subcategory of the parent category at level 2. From this
transaction set we use the ML_T2L1 algorithm with the cross-level add-on and a minimum support value of
4 for level 1 and 3 for levels 2 and 3. From these frequent itemsets, the closed itemsets and generators are
derived Table 2. The itemsets, closed itemsets and generators come from all three levels.
Finally, from the closed itemsets and generators the Association Rules can be generated. In this
example, we use the ReliableExactRule approach presented in [17]-[18] to generate the exact basis rules. The
discovered rules are from multiple levels and include cross-level rules. The ReliableExactRule approach can
remove redundant rules, but as we will show, it does not remove hierarchy redundancy. The rules given in
Table 3 are derived from the closed itemsets and generators in Table 3 when the minimum confidence
threshold is set to 0.5 or 50% as shown in Table 3.
The ReliableExactRule algorithm lists all the rules in Table 3 as important and non-redundant.
However, we argue that there are still redundant rules. This type of redundancy is beyond what the
Int J Elec & Comp Eng ISSN: 2088-8708 ļ²
Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash)
4571
ReliableExactRule algorithm was designed for. Looking at the rules in Table 3 we claim that rule 4 is
redundant to rule 1, rule 7 is redundant to rule 5, rule 8 is redundant to rule 6 and rule 12 is redundant to
rule 10. For example, the item 2-2-1 (from rule 4) is a child of the more general/abstract item 2-2-* (from
rule 1). Thus rule 4 is in fact a more specific version of rule 1. Because we know that rule 1 says 2-2-* is
enough to fire the rule with consequent C, whereas rule 4 requires 2-2-1 to fire with consequent C, any item
that is a descendant of 2-2-* will cause a rule to fire with consequent C. It does not have to be 2-2-1. Thus
rule 4 is more restrictive. Because 2-2-1 is part of 2-2-* having rule 4 does not actually bring any new
information to the user, as the information contained in it is actually part of the information contained in rule
1. Thus rule 4 is redundant. We define hierarchical redundancy in exact Association Rules through the
following definition
Table 2. Frequent Closed Itemsets and Generators Derived from the Frequent Itemsets in Table 1
Closed Itemsets Generators
[1-*-*] [1-*-*]
[1-1-*] [1-1-*]
[1-1-1] [1-1-1]
[1-*-*, 2-2-*] [2-2-*]
[2-*-*, 1-1-*] [2-*-*, 1-1-*]
[1-1-*, 1-2-*] [1-2-*]
[1-1-*, 2-2-*] [2-2-*]
[1-*-*, 2-2-1] [2-2-1]
[2-*-*, 1-1-1] [2-*-*, 1-1-1]
[1-2-*, 1-1-1] [1-2-*, 1-1-1]
[1-*-*, 2-1-*, 2-2-*] [2-1-*]
[2-*, 1-1-*, 1-2-*] [2-*-*, 1-2-*]
[1-1-*, 1-2-*, 2-2-*] [1-2-*, 2-2-*]
[1-1-*, 2-1-*, 2-2-*] [2-1-*]
[1-*-*, 2-1-1, 2-2-*] [2-1-1]
[1-1-*, 2-1-1, 2-2-*] [2-1-1]
[1-1-*, 2-2-1, 1-2-*] [2-2-1]
[2-1-*, 1-1-1, 2-2-*] [2-1-*] [2-2-*, 1-1-1]
[2-2-*, 1-1-1, 2-1-1] [2-1-1] [2-2-*, 1-1-1]
Table 3. Exact basis Association Rules Derived from Closed Itemsets and Generators in Table 2
No. Rule Supp
1 [2-2-*] ==> [1-*-*] 0.571
2 [1-2-*] ==> [1-1-*] 0.571
3 [2-2-*] ==> [1-1-*] 0.571
4 [2-2-1] ==> [1-*-*] 0.428
5 [2-1-*] ==> [1-*-*, 2-2-*] 0.428
6 [2-1-*] ==> [1-1-*, 2-2-*] 0.428
7 [2-1-1] ==> [1-*-*, 2-2-*] 0.428
8 [2-1-1] ==> [1-1-*, 2-2-*] 0.428
9 [2-2-1] ==> [1-1-*, 1-2-*] 0.428
10 [2-1-*] ==> [1-1-1, 2-2-*] 0.428
11 [2-2-*, 1-1-1] ==> [2-1-*] 0.428
12 [2-1-1] ==> [2-2-*, 1-1-1] 0.428
13 [2-2-*, 1-1-1] ==> [2-1-1] 0.428
Definition 1: Let R1 = X1 => Y and R2 = X2 => Y be two exact Association Rules, with exactly the
same itemset Y as the consequent. Rule R1 is redundant to rule R2 if (1) the itemset X1 is made up of items
where at least one item in X1 is descendant from the items in X2 and (2) the itemset X2 is entirely made up
of items where at least one item in X2 is an ancestor of the items in X1 and (3) the other non-ancestor items
in X2 are all present in itemset X1.
From this definition, if for an exact Association Rule X1 => Y1 there does not exist any other rule
X2 => Y2 such that at least one item in X1 shares an ancestor-descendant relationship with X2 containing the
ancestor(s) and all other items X2 are present in X1, then X1 => Y1 is a non-redundant rule. To test for
redundancy, we take this definition and add another condition for a rule to be considered valid. A rule
X => Y is valid if it has no ancestor-descendant relationship between any items in itemsets X and Y. Thus,
for example 1-2-1 => 1-2-* is not a valid rule, but 1-2-1 => 1-1-3 is a valid rule. If this condition is not met
by any rule X2 => Y2 when testing to see if X1 => Y1 is redundant to X2 => Y2, then X1 => Y1 is a non-
redundant rule as X2 => Y2 is not a valid rule. Submit your manuscript electronically for review.
ļ² ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576
4572
3.2. Generating Exact Basis Rules
As previous work has shown [14, 17-18] using frequent closed itemsets in the generation of
Association Rules can reduce the quantity of discovered rules. Because we wish to remove redundancy on
top of the redundancy already being removed, our approach uses the closed itemsets and generators to
discover the non-redundant rules. [14, 17-18] have both proposed condensed/more concise bases to represent
non-redundant exact rules. Exact rules refer to rules whose confidence is 1. The proposed approach will be
extended to other rules (i.e., so called approximate rules). The following definitions outline these two bases:
Definition 2: For the Min-MaxExact (MME) basis, C is the set of the discovered frequent closed
itemsets. For each closed itemset c in C, Gc is the set of generators for c. From this the exact basis for min-
max is:MMEHR = {g ā†’ c|c āˆˆ C, g āˆˆ GC, g ā‰  c and there exists no rules gā€²ļ€ ā†’ļ€ cā€² where cā€² Ļµ C, gā€²ļ€ Ļµļ€ Gc,
c ā‰  cā€², gā€² ā‰  cā€² and g is descendant set of gā€², gā€² has no ancestor or descendant of cā€² or gā€²
Definition 8: (Reliable Exact Basis without Hierarchy Redundancy) Let C be the set of frequent
closed itemsets. For each frequent closed itemset c, let Gc be the set of minimal generators of c. The Reliable
exact basis is:
REHR = {g ā†’ c | c āˆˆ C, g āˆˆ GC, REHR = {gāˆ’ā†’ c|c āˆˆ C, g āˆˆ GC, Ā¬ (c or cā€² āˆŖ gā€²), where cā€² Ļµ C, cā€² āø¦
c, gā€² Ļµ Gc, and there exists no rules gā€² ā†’cā€² where c ā‰  cā€², gā€² ā‰  cā€² and g is descendant set of gā€², gā€² has no ancestor
or descendant of cā€² or gā€². Thus the algorithms to extract non-redundant multi-level rules using either
MinmaxExactHR or ReliableExactHR aregiven as follows:
Algorithm 1: MinmaxExactHR()
Input: C: a set of frequent closed itemsets G: a set of minimal generators. For g Ļµ G, g.closure is the closed
itemset of g.
Output: A set of non-redundant multilevel rules.
1. MinMaxExact: = ф
2. for each k=1 to v
3. for each k-generator g Ļµ Gk
4. nonRedundant = true
5. if gā‰  g closure
6. for all gā€² Ļµ G
7. if (g ā€² ā‰  g)
8. if ( gā€² is ancestor set of g ) and ((cā€² =c) or ( g= g ā€²)) and(gā€² is not ancestor set of cā€²)
9. then nonRedundant = false
10. break
14. if nonRedundant = true
15. insert {(g ā†’ c), g. supp} in MinMaxExact
20. return MinMaxExact
Algorithm 2: ReliableExactHR ()
Input: C: a set of frequent closed itemsets G: a set of minimal generators. For g Ļµ G, g.closure is the closed
itemset of g.
Output: A set of non-redundant multilevel rules.
1. ReliableExact: = ф
2. for all c Ļµ C
3. for all g Ļµ Gc
4. nonRedundant = false
5. if ļ€¢c ļƒŽ C such that cā€²ļ€ āø¦ļ€ c and c gā€² Ļµ Gc, we have (c or cā€²) āˆŖ gā€² ) āŠ† g)
6. then nonRedundant = true
7. else
8. nonRedundant = false
9. break
11. for all gā€²ļ€ āˆˆ G
12. if g ā€² ā‰  g
13. if (gā€² is ancestor set of g) and (cā€² =c or gā€² = g) and (gā€² is not ancestor set of (cā€² or gā€²) and (gā€² is not
descendant set of (cā€² or gā€²)
14. then nonRedundant = true; break
19. if nonRedundant = true
20. insert {(g ā†’ c or g, g. supp} in ReliableExact
24. return ReliableExact
Int J Elec & Comp Eng ISSN: 2088-8708 ļ²
Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash)
4573
3.3. Deriving Exact Rules from the Exact Basis Rules
The Min-MaxExact approach and ReliableExact approach have proven that they can deduce all of
the exact rules from their basis set [17]. Comparing with the Min-MaxExact approach and ReliableExact
approach, our work results in a smaller exact basis set by not only removing the redundant rules that are
removed by the Min-MaxExact approach and ReliableExact approach, but also removing the hierarchically
redundant rules. If we can recover all the hierarchically redundant rules, then we can derive all the exact rules
by using the Min-MaxExact or ReliableExact recovery algorithm. This will ensure that all the exact rules can
still be derived and by achieving this, our approach will be a lossless representation of the exact Association
Rules.
The following algorithm is designed to recover the hierarchically redundant rules from the exact
basis. By adding it to the algorithms used by Min-MaxExact and ReliableExact to derive the exact rules it is
then able for the existing ReliableExact recovery algorithm to derive all the exact rules. This is because our
algorithm will give them a basis set that includes the hierarchically redundant rules (which the ReliableExact
approach would not have removed in the first place). The basic idea is that, for each exact basis rule, first
from generators to construct all possible exact basis rules whose antecedent is a descendant of the exact basis
rule (steps 4 to 7 in Algorithm 3). These rules are potential exact basis rules that might have been eliminated
due to the ancestor-descendant relationship. Then check to make sure these potential rules are valid (steps 8
to 12), finally, from the potential exact rules to find exact basis rules. These exact basis rules have been
eliminated due to the ancestor-descendant relationship (steps 13 to 18).
Algorithm 3: DeriveExactHR ()
Input: Set of exact basis rules denoted asExactbasis,set of frequent closed itemsets C andgenerators G.
Output: Set of rules that covers the exact basisand the hierarchically redundant rules.
1. Recovered: = ļ¦
2. ļ€¢rļƒŽ Exact basis
3. CandidateBasis: = ļ¦
4. for all generator g in G
5. if any of the item x in the antecedent X of rule r: Xļƒ  Y is the ancestor of g.
6. then add all the possible subsets of g into S
8. for all s in S, check every, xļƒŽ X if x doesnā€™t have a descendant in s, add x to s to make s a descendant set
of X
9. if s has no ancestors in Y and s has no descendants in Y and for all items iļƒŽ s there are no ancestor-
descendant relations with item iļ‚¢ļƒŽ s and for all item iļƒŽ Y there are no ancestor-descendant relation with item
iļ‚¢ļƒŽ Y
10. then insert sļƒ  YinCandidateBasis
13. for all Bļƒ  D ļƒŽCandidateBasis
14. if BUD= itemset i ļƒŽC and B = gļƒŽGi
15. insert {Bļƒ  D, g. supp} in Recovered
19. return Exactbasis U Recovered
4. EXPERIMENTS
Experiments were conducted to test andevaluate the effectiveness of the proposed hierarchically
non-redundant exact basis and toconfirm that it is also a lossless basis set. This section presents and details
the experiments and their results.
4.1. Datasets
We used 6 datasets to test our approach to discover whether it reduced the size of the exact basis
rule set and to test that the basis set was lossless, meaning all the rules could be recovered. These datasets
were composed of 100, 200, 500, 2000 and 5000 transactions and are named A to F respectively. The key
statistics for these builtdatasets are detailed in Table 4.
Table 4. Obtained Frequent itemsets using Exact Basis
Dataset MME MMEHR RE REHR
A 15 10 13 9
B 106 68 80 58
C 174 134 113 89
D 577 429 383 305
E 450 405 315 287
F 725 602 91 80
ļ² ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576
4574
Where as the proposed algorithms MME reduced less number of rules compared to MMEHR. The
MMEHR algorithms considers the cross level hierarchy and contains more data, at this level it reduced the
more number of rules, it indicated that at hierarchy the data is duplicated and the proposed algorithms is
reduced those replicated dat and produced more reliable and accurate rules.
Similarly, for RE and REHR algorithms has generated the different rules at with and without cross
levels hierarchy. At cross level there will be more data so more rules are generated by REHR algorithm than
the RE algorithm where as the ML_T2L1 algorithm has generated th same rules with and without cross level
hierarchy. Thus the proposed work has generated more reliable and accurate algorithm than the ML_T2L1
algorithm.
Figure 2. Multi Level Association Rules
Figure 3. Comparison of MME, MMEHR Algorithms with Ml_T2L1
40%
50%
60%
70%
80%
90%
100%
MME ML_T2L1 MMEHR ML_T2L1
ReductionRulesin%
Comparison of MME, MMEHR Algorithms and
ML_T2L1
A
B
C
D
E
F
Int J Elec & Comp Eng ISSN: 2088-8708 ļ²
Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash)
4575
Figure 4. Comparison of RE, REHR Algorithms with Ml_T2L1
5. CONCLUSION
Redundancy in Association Rules affects the quality of the information presented and this affects
and reduces the use of the rule set. The goal of redundancy elimination is to improve the quality, thus
allowing them to better solve problems being faced. Our work aims to remove hierarchical redundancy in
multi-level datasets, thus reducing the size of the rule set to improve the quality and usefulness, without
causing the loss of any information. We have proposed an approach which removes hierarchical redundancy
through the use of frequent closed itemsets and generators. This allows it to be added to other approaches
which also remove redundant rules, thereby allowing a user to remove as much redundancy as possible. The
next step in our work is to apply this approach to the approximate basis rule set to remove redundancy there.
We will also review our work to see if there are other hierarchicalredundancies in the basis rule sets that
should be removed and will investigate what should and can be done to further improve the quality of multi-
level Association Rules.
REFERENCES
[1] Bayardo, R.J., Agrawal, R. & Gunopulos, D. ā€œConstraint-based rule mining in large,dense databasesā€. Data Mining
and Knowledge Discovery, Vol 4, pp. 217-240, 2000.
[2] Berry, M.J.A. & Linoff, G.S. ā€œData Mining Techniques for Marketing Sales and Customer Supportā€. John Wiley
and Sons, 1997.
[3] Brin, S., Motwani, R., Ullman, J.D. & Tsur, S. ā€œDynamic itemset counting and implication rules for market basket
dataā€ Proceedings of the 1997 ACM SIGMOD Conference, pp. 255-264, 1997.
[4] Ganter, B. & Wille, R. ā€œFormal Concept Analysis: Mathematical Foundationsā€, Springer-Verlag, 1999.
[5] Han, J. & Fu, Y. ā€œDiscovery of multiple-level Association Rules from large databasesā€, Proceedings of the 21st
International Conference on Very Large Databases, pp. 420-431, 1995.
[6] Han, J. & Fu, Y. ā€œMining multiple-level Association Rules in large databasesā€, IEEE Transactions on Knowledge
and Data Engineering, Vol 11 pp. 798-805, 1999.
[7] Han, J. & Fu, Y. ā€œMining multiple-level Association Rules in large databasesā€, IEEE Transactions on Knowledge
and Data Engineering, Vol 11, pp. 798-804, 2000.
[8] Hong, T.P., Lin, K.Y. & Chien, B.C. ā€œMining fuzzy multiple-level Association Rules from quantitative data.
Applied Intelligenceā€, Vol. 18, pp. 79-90, 2003.
[9] Kaya, M. & Alhajj, R. ā€œMining multi-cross-level fuzzy weighted Association Rulesā€ 2nd International IEEE
Conference on Intelligent Systems, pp. 225-230, 2004.
[10] Kryszkiewicz, M., Rybinski, H. & Gajek, M. ā€œDataless transitions between concise representations of frequent
patternsā€, Journal of Intelligent Information Systems, Vol. 22, pp. 41-70, 2004.
[11] Ng, R.T., Lakshmanan, V., Han, J. & Pang, A. ā€œExploratory mining and pruning otimizations of constrained
Association Rulesā€. Proceedings of the SIGMOD conference, pp. 13-24, 1998.
[12] Pasquier, N., Bastide, Y., Taouil, R. & Lakhal, L. ā€œEfficient mining of association rultes using closed itemset
latticesā€. Journal of Intelligent Information Systems, Vol. 24, pp. 25-46, 1999.
[13] Pasquier, N., Taouil, R., Bastide, Y., Stumme, G. & Lakhal, L. ā€œGenerating a condensed representation for
Association Rulesā€,. Journal of Intelligent Information Systems, Vol. 24, pp. 29-60, 2005.
[14] Srikant, R., Vu, Q. & Agrawal, R. ā€œMining Association Rules with item constraintsā€, Proceedings of the KDD
Conference, pp. 67-73, 1997.
50%
60%
70%
80%
90%
100%
RE ML_T2L1 REHR ML_T2L1
ReductionRulesin%
Comparison of RE, REHR Algorithms and
ML_T2L1
A
B
C
D
E
F
ļ² ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576
4576
[15] Thakur, R.S., Jain, R.C. & Pardasani, K.P. ā€œMining level-crossing Association Rules from large databasesā€,
Journal of Computer Science, pp. 76-81, 2006.
[16] Wille, R. ā€œRestructuring lattices theory: An approach based on hierarchies of concepts Ordered Setsā€, Dordrecht-
Boston, 1982.
[17] Xu, Y. & Li, Y. ā€œGenerating concise Association Rulesā€, Proceedings of the 16th
ACM Conference on Conference
on Information and Knowledge Management (CIKM07), pp. 781-790, 2007.
[18] Zaki, M.J. ā€œGenerating nonredundent Association Rulesā€, Proceedings of the KDD Conference, pp. 34-43, 2000.
[19] Zaki, M.J. ā€œMining non-redundant Association Rulesā€, Data Mining and Knowledge Discovery, Vol. 9, pp. 223-
248, 2004.
[20] Ziegler, C.N., McNee, S.M., Konstan, J.A & Lausen, G. ā€œImproving recommendation lists through topic
diversificationā€, Proceed. of the 14th
Inter. World Wide Web Conference, pp. 22-32, 2005.
[21] K Rajendra Prasad, ā€œOptimized High-Utility Itemsets Mining for Effective Association Mining Paperā€,
International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 5, pp 2911-2918.
[22] Sushil Kumar Verma, R.S. Thakur, Shailesh Jaloree .Fuzzy Association Rule Mining based Model to Predict
Studentsā€™ Performance, International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 4, pp.
2223-2231.
[23] Harco Leslie Hendric Spits Warnars, ā€œUsing Attribute Oriented Induction High Level Emerging Pattern (AOI-
HEP) to Mine Frequent Patternsā€, International Journal of Electrical and Computer Engineering (IJECE), Vol. 6,
No. 6, pp. 3037 ā€“ 3046.
[24] Benaka Santhosha S, Chitra Kiran N, ā€œA Systematic Review of Existing Data Mining Approaches Envisioned for
Knowledge Discovery from Multimediaā€, International Journal of Electrical and Computer Engineering (IJECE),
Vol. 8, No. 2, pp. 908-916, 2018.
[25] Leena Deshpande, M. Narsing Rao, ā€œConcept Drift Identification using Classifier Ensemble Approachā€,
International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 1, pp. 19-25, 2018.

More Related Content

What's hot

Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...IJECEIAES
Ā 
An effective adaptive approach for joining data in data
An effective adaptive approach for joining data in dataAn effective adaptive approach for joining data in data
An effective adaptive approach for joining data in dataeSAT Publishing House
Ā 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data miningijpla
Ā 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data csandit
Ā 
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in  DatabasesAn Effective Heuristic Approach for Hiding Sensitive Patterns in  Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in DatabasesIOSR Journals
Ā 
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARECLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CAREijistjournal
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
Ā 
An apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceAn apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceIJDKP
Ā 
QUERY INVERSION TO FIND DATA PROVENANCE
QUERY INVERSION TO FIND DATA PROVENANCE QUERY INVERSION TO FIND DATA PROVENANCE
QUERY INVERSION TO FIND DATA PROVENANCE cscpconf
Ā 
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET Journal
Ā 
Optimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsOptimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsIOSR Journals
Ā 
WEKA: Data Mining Input Concepts Instances And Attributes
WEKA: Data Mining Input Concepts Instances And AttributesWEKA: Data Mining Input Concepts Instances And Attributes
WEKA: Data Mining Input Concepts Instances And AttributesDataminingTools Inc
Ā 
J48 and JRIP Rules for E-Governance Data
J48 and JRIP Rules for E-Governance DataJ48 and JRIP Rules for E-Governance Data
J48 and JRIP Rules for E-Governance DataCSCJournals
Ā 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEaciijournal
Ā 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION ijdms
Ā 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETEditor IJMTER
Ā 
Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Dhyanendra Jain
Ā 

What's hot (19)

Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Ā 
B0930610
B0930610B0930610
B0930610
Ā 
An effective adaptive approach for joining data in data
An effective adaptive approach for joining data in dataAn effective adaptive approach for joining data in data
An effective adaptive approach for joining data in data
Ā 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data mining
Ā 
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data Mining Fuzzy Association Rules from Web Usage Quantitative Data
Mining Fuzzy Association Rules from Web Usage Quantitative Data
Ā 
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in  DatabasesAn Effective Heuristic Approach for Hiding Sensitive Patterns in  Databases
An Effective Heuristic Approach for Hiding Sensitive Patterns in Databases
Ā 
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARECLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
Ā 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Ā 
An apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distanceAn apriori based algorithm to mine association rules with inter itemset distance
An apriori based algorithm to mine association rules with inter itemset distance
Ā 
QUERY INVERSION TO FIND DATA PROVENANCE
QUERY INVERSION TO FIND DATA PROVENANCE QUERY INVERSION TO FIND DATA PROVENANCE
QUERY INVERSION TO FIND DATA PROVENANCE
Ā 
Ijetcas14 338
Ijetcas14 338Ijetcas14 338
Ijetcas14 338
Ā 
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
IRJET-Efficient Data Linkage Technique using one Class Clustering Tree for Da...
Ā 
Optimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsOptimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML Documents
Ā 
WEKA: Data Mining Input Concepts Instances And Attributes
WEKA: Data Mining Input Concepts Instances And AttributesWEKA: Data Mining Input Concepts Instances And Attributes
WEKA: Data Mining Input Concepts Instances And Attributes
Ā 
J48 and JRIP Rules for E-Governance Data
J48 and JRIP Rules for E-Governance DataJ48 and JRIP Rules for E-Governance Data
J48 and JRIP Rules for E-Governance Data
Ā 
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINEA NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
A NEW DECISION TREE METHOD FOR DATA MINING IN MEDICINE
Ā 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
Ā 
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASETSURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
SURVEY ON CLASSIFICATION ALGORITHMS USING BIG DATASET
Ā 
Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.Hiding sensitive association_rule.pdf.
Hiding sensitive association_rule.pdf.
Ā 

Similar to Generating Non-redundant Multilevel Association Rules Using Min-max Exact Rules

A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsWaqas Tariq
Ā 
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...IOSR Journals
Ā 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
Ā 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
Ā 
A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningIOSR Journals
Ā 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286Ninad Samel
Ā 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningIJMER
Ā 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIJSRD
Ā 
Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase dannyijwest
Ā 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASEIJwest
Ā 
A New Extraction Optimization Approach to Frequent 2 Item sets
A New Extraction Optimization Approach to Frequent 2 Item setsA New Extraction Optimization Approach to Frequent 2 Item sets
A New Extraction Optimization Approach to Frequent 2 Item setsijcsa
Ā 
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSA NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSijcsa
Ā 
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSA NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSijcsa
Ā 
M033059064
M033059064M033059064
M033059064ijceronline
Ā 
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...cscpconf
Ā 
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUEcscpconf
Ā 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEditor IJCATR
Ā 

Similar to Generating Non-redundant Multilevel Association Rules Using Min-max Exact Rules (20)

44 49
44 4944 49
44 49
Ā 
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
Ā 
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
An Optimal Approach to derive Disjunctive Positive and Negative Rules from As...
Ā 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Ā 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
Ā 
A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association Mining
Ā 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286
Ā 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule Mining
Ā 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule Mining
Ā 
A04010105
A04010105A04010105
A04010105
Ā 
Introduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its MethodsIntroduction To Multilevel Association Rule And Its Methods
Introduction To Multilevel Association Rule And Its Methods
Ā 
Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase Configuring Associations to Increase Trust in Product Purchase
Configuring Associations to Increase Trust in Product Purchase
Ā 
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASECONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
CONFIGURING ASSOCIATIONS TO INCREASE TRUST IN PRODUCT PURCHASE
Ā 
A New Extraction Optimization Approach to Frequent 2 Item sets
A New Extraction Optimization Approach to Frequent 2 Item setsA New Extraction Optimization Approach to Frequent 2 Item sets
A New Extraction Optimization Approach to Frequent 2 Item sets
Ā 
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSA NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
Ā 
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETSA NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
A NEW EXTRACTION OPTIMIZATION APPROACH TO FREQUENT 2 ITEMSETS
Ā 
M033059064
M033059064M033059064
M033059064
Ā 
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...
DEVELOPING A NOVEL MULTIDIMENSIONAL MULTIGRANULARITY DATA MINING APPROACH FOR...
Ā 
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUENEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
NEW ALGORITHM FOR SENSITIVE RULE HIDING USING DATA DISTORTION TECHNIQUE
Ā 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Ā 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
Ā 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
Ā 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
Ā 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
Ā 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
Ā 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
Ā 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
Ā 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
Ā 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
Ā 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
Ā 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
Ā 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
Ā 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
Ā 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
Ā 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
Ā 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
Ā 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
Ā 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
Ā 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
Ā 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
Ā 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
Ā 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
Ā 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Ā 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Ā 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
Ā 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
Ā 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
Ā 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
Ā 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
Ā 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
Ā 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
Ā 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
Ā 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
Ā 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
Ā 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Ā 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
Ā 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
Ā 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
Ā 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
Ā 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
Ā 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
Ā 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerAnamika Sarkar
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Ā 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Ā 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Ā 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ļ»æTube Exchanger
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Ā 

Generating Non-redundant Multilevel Association Rules Using Min-max Exact Rules

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 6, December 2018, pp. 4568~4576 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp4568-4576 ļ² 4568 Journal homepage: http://iaescore.com/journals/index.php/IJECE Generating Non-redundant Multilevel Association Rules Using Min-max Exact Rules R. Vijaya Prakash1 , SSVN. Sarma2 , M. Sheshikala3 1 Department of Computer Science and Engineering, S R Engineering College, India 2 Department of Computer Science and Engineering, Vaagdevi College of Engineering, India 3 Departmnt of Computer Science and Engineering, S R Engineering College, India Article Info ABSTRACT Article history: Received Sep 22, 2017 Revised Jul 13, 2018 Accepted Jul 29, 2018 Association Rule mining plays an important role in the discovery of knowledge and information. Association Rule mining discovers huge number of rules for any dataset for different support and confidence values, among this many of them are redundant, especially in the case of multi-level datasets. Mining non-redundant Association Rules in multi-level dataset is a big concern in field of Data mining. In this paper, we present a definition for redundancy and a concise representation called Reliable Exact basis for representing non-redundant Association Rules from multi-level datasets. The given non-redundant Association Rules are loss less representation for any datasets. Keyword: Association Rule Frequent Itemsets Non-Redundant Rules Reliable Rules Copyright Ā© 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: R. Vijaya Prakash, Department of Computer Science and Engineering, S R Engineering College, Anathasagar, Hasanparthy, Warangal, Telangana, India. Email: vijprak@hotmail.com 1. INTRODUCTION The huge amount of the extracted rules is a big problem for Association Rule mining [21]. Especially, many of the extracted rules are considered redundant since they produce the same meaning to the user or extracted rules can be replaced by other rules. Many efforts have been made on reducing the size of the extracted rule set. There are number of representations of frequent patterns have been proposed, one of them, is the closed itemsets, is of particular interest as they can be applied for generating non-redundant rules [10], [12], [18], [23]. The use of frequent closed itemsets presents a clear promise to reduce the number of extracted rules [13], [17], [19]. Multi-level datasets in which the items are not all at the same concept level contain information at different abstract levels. The approaches used to find frequent itemsets in single level datasets miss information, as they only look at one level in the dataset. Thus techniques that consider all the levels are needed [6]-[9], [22]. However, rules derived from multi-level datasets can have the same issues with redundancy as those from a single level dataset. While approaches used to remove redundancy in single level datasets [13], [17], [19] can be adapted for use in one rule at a given level gives the same information as another rule at a different level. In this paper, we present a Reliable basis representation of non-redundant Association Rules. We then look into this hierarchical redundancy and propose an approach from which more non-redundant rules can be derived. We use the same definition of non-redundant rules in single level datasets, but to this definition we add a requirement that considers the different levels of the item(s) in determining the redundancy rule. By doing so, more redundant Association Rules can be eliminated. We also show that it is possible to derive all of the Association Rules, without lose of information.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708 ļ² Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash) 4569 The paper is organized as follows. Section 2 briefly discusses some related work, Section 3, we discuss the redundancy in Association Rules and present a definition to redundant rules. Experiments and results are presented in Section 4. Finally, Section 5 concludes the paper. 2. RELATED WORK The approaches proposed in [13], [18] make use of the closure of the Galois connection [4] to extract non-redundant rules from frequent closed itemsets instead of from frequent itemsets. One difference between the two approaches is the definition of redundancy. The approach proposed in [18] extracts the rules with shorter antecedent and shorter consequent as well among rules which have the same confidence, while the method proposed in [13] defines that the non-redundant rules are those which have minimal antecedents and maximal consequents. The definition proposed in [17] is like that of [13]. However, the requirement to redundancy is relaxed, and the lesser requirement makes more rules to be considered redundant and thus eliminated. Most importantly, [17] proved that the elimination of such redundant rules increases the belief to the extracted rules and the capacity of the extracted non-redundant rules for solving problems. However, the work mentioned above has only focused on datasets where all items are at the same concept level. Thus, they do not need to consider redundancy that can occur when there is a hierarchy among the items. A multi-level dataset is the one which has an implicit taxonomy or concept tree, like shown in Figure 1. The items in the dataset exist at the lowest concept level but are part of ahierarchical structure and organization. Food BananaAppleWheatWhiteSkimmed2 percent FruitBreadMilk Figure 1. A Simple example of product taxonomy In Figure 1 for an example, the frequent itemset {'Dairyland-2%-milk', 'white-bread'} is a cross- level itemset as the first item is from the lowest level, while the second item is from a different concept level. In fact the cross-level idea was an addition to the work being proposed. Further work proposed an approach which included finding cross-level frequent itemsets [15]. This later work also performs more pruning of the dataset to make finding the frequent itemsets more efficient. However, even with all this work the focus has been on finding the frequent itemsets as efficiently as possible and the issue of quality and/or redundancy in single level datasets. Some brief work presented by [5]-[6] discusses removing rules which are hierarchically redundant, but it relies on the user giving an expected confidence variation margin to determine redundancy. There appears to be a void in dealing with hierarchical redundancy in Association Rules derived from multi- level datasets. This work attempts to fill that void and show an approach to deal with hierarchical redundancy without losing any information. From the beginning of Association Rule mining in [1], [3], [21], [23], [25], the first step has always been to find the frequent patterns or itemsets. The simplest way to do this is through the use of the Apriori algorithm [2]. However, Apriori is not designed to work on extracting frequent itemsets at multiple levels in a multi-level dataset. It is designed for use on single level datasets. But, it has been adapted for multi-level datasets. One adaptation of Apriori to multi-level datasets is the ML_T2L1 algorithm [5]-[6]. The ML_T2L1 algorithm uses a transaction table that has the hierarchy information encoded into it. Each level in the dataset is processed individually. Firstly, level 1 analyzed for large 1-itemsets using Apriori. The list of level 1 large
  • 3. ļ² ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576 4570 1-itemsets is then used to filter and prune the transaction dataset of any item that does not have an ancestor in the level 1 large 1-itemset list and remove any transaction which has no frequent items. From the level 1 large 1-itemset list, level 1 large 2-itemsets are derived. Then level 1 large 3-itemsets are derived and so on, until there are no more frequent itemsets to discover at level 1. Since ML_T2L1 defines that only the items that are descendant from frequent items at level 1 can be frequent themselves, the level 2 itemsets are derived from the filtered transaction table. For level 2, the large 1-itemsets are discovered, from which the large 2- itemsets are derived and then large 3-itemsets etc. After all the frequent itemsets are discovered at level 2, the level 3 large 1-itemsets are discovered and so on. ML_T2L1 repeats until either all levels are searched using Apriori or no large 1-itemsets are a found at a level. As the original work shows [5]-[6], ML_T2L1 does not find cross-level frequent itemsets. We have added the ability for it to do this. At each level below 1, when large 2-itemsets or later are derived the Apriori algorithm is not restricted to just using the large n-1-itemsets at the current level, but can generate combinations using the large itemsets from higher levels. The only restrictions on this are that the derived frequent itemset(s) can not contain an item that has an ancestor-descendant relationship with another item within the same itemset and that the minimum support threshold used is that of the current level being processed. 3. GENERATION OF NON-REDUNDANT MULTI-LEVEL ASSOCIATION RULES The use of frequent itemsets as the basis for Association Rule mining often results in the generation of many rules. More recent work has demonstrated that the use of closed itemsets and generators can reduce the number of rules generated [14],[16]-[18],[20]-[22]. Despite this, redundancy still exists in the rules generated from multi-level datasets even when using some of the methods designed to remove redundancy. This redundancy we call hierarchical redundancy. Here in this section we first introduce hierarchical redundancy in multi-level datasets and then we detail our work to remove this redundancy without losing information. 3.1. Hierarchical Redundancy Whether a rule is interesting and/or useful is usually determined through the support and confidence values that it has. However, this does not guarantee that all of the rules that have a high enough support and confidence actually convey new information. Following is an example transaction table for a multi-level dataset Table 1. Table 1. Simple Multi-level Transaction Dataset. Transaction ID Items 1 [1-1-1, 1-2-1, 2-1-1, 2-2-1] 2 [1-1-1, 2-1-1, 2-2-2, 3-2-3] 3 [1-1-2, 1-2-2, 2-2-1, 4-1-1] 4 [1-1-1, 1-2-1] 5 [1-1-1, 1-2-2, 2-1-1, 2-2-1, 4-1-3] 6 [1-1-3, 3-2-3, 5-2-4] 7 [1-3-1, 2-3-1] 8 [3-2-3, 4-1-1, 5-2-4, 7-1-3] This simple multi-level transactional dataset has 3 levels with each item belonging to the lowest level. The item ID in the table store/holds the hierarchy information for each item. Thus, the item 1-2-1 belongs to the first category at level 1 and for level 2 it belongs to the second sub-category of the first level 1 category. Finally, at level 3 it belongs to the first subcategory of the parent category at level 2. From this transaction set we use the ML_T2L1 algorithm with the cross-level add-on and a minimum support value of 4 for level 1 and 3 for levels 2 and 3. From these frequent itemsets, the closed itemsets and generators are derived Table 2. The itemsets, closed itemsets and generators come from all three levels. Finally, from the closed itemsets and generators the Association Rules can be generated. In this example, we use the ReliableExactRule approach presented in [17]-[18] to generate the exact basis rules. The discovered rules are from multiple levels and include cross-level rules. The ReliableExactRule approach can remove redundant rules, but as we will show, it does not remove hierarchy redundancy. The rules given in Table 3 are derived from the closed itemsets and generators in Table 3 when the minimum confidence threshold is set to 0.5 or 50% as shown in Table 3. The ReliableExactRule algorithm lists all the rules in Table 3 as important and non-redundant. However, we argue that there are still redundant rules. This type of redundancy is beyond what the
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708 ļ² Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash) 4571 ReliableExactRule algorithm was designed for. Looking at the rules in Table 3 we claim that rule 4 is redundant to rule 1, rule 7 is redundant to rule 5, rule 8 is redundant to rule 6 and rule 12 is redundant to rule 10. For example, the item 2-2-1 (from rule 4) is a child of the more general/abstract item 2-2-* (from rule 1). Thus rule 4 is in fact a more specific version of rule 1. Because we know that rule 1 says 2-2-* is enough to fire the rule with consequent C, whereas rule 4 requires 2-2-1 to fire with consequent C, any item that is a descendant of 2-2-* will cause a rule to fire with consequent C. It does not have to be 2-2-1. Thus rule 4 is more restrictive. Because 2-2-1 is part of 2-2-* having rule 4 does not actually bring any new information to the user, as the information contained in it is actually part of the information contained in rule 1. Thus rule 4 is redundant. We define hierarchical redundancy in exact Association Rules through the following definition Table 2. Frequent Closed Itemsets and Generators Derived from the Frequent Itemsets in Table 1 Closed Itemsets Generators [1-*-*] [1-*-*] [1-1-*] [1-1-*] [1-1-1] [1-1-1] [1-*-*, 2-2-*] [2-2-*] [2-*-*, 1-1-*] [2-*-*, 1-1-*] [1-1-*, 1-2-*] [1-2-*] [1-1-*, 2-2-*] [2-2-*] [1-*-*, 2-2-1] [2-2-1] [2-*-*, 1-1-1] [2-*-*, 1-1-1] [1-2-*, 1-1-1] [1-2-*, 1-1-1] [1-*-*, 2-1-*, 2-2-*] [2-1-*] [2-*, 1-1-*, 1-2-*] [2-*-*, 1-2-*] [1-1-*, 1-2-*, 2-2-*] [1-2-*, 2-2-*] [1-1-*, 2-1-*, 2-2-*] [2-1-*] [1-*-*, 2-1-1, 2-2-*] [2-1-1] [1-1-*, 2-1-1, 2-2-*] [2-1-1] [1-1-*, 2-2-1, 1-2-*] [2-2-1] [2-1-*, 1-1-1, 2-2-*] [2-1-*] [2-2-*, 1-1-1] [2-2-*, 1-1-1, 2-1-1] [2-1-1] [2-2-*, 1-1-1] Table 3. Exact basis Association Rules Derived from Closed Itemsets and Generators in Table 2 No. Rule Supp 1 [2-2-*] ==> [1-*-*] 0.571 2 [1-2-*] ==> [1-1-*] 0.571 3 [2-2-*] ==> [1-1-*] 0.571 4 [2-2-1] ==> [1-*-*] 0.428 5 [2-1-*] ==> [1-*-*, 2-2-*] 0.428 6 [2-1-*] ==> [1-1-*, 2-2-*] 0.428 7 [2-1-1] ==> [1-*-*, 2-2-*] 0.428 8 [2-1-1] ==> [1-1-*, 2-2-*] 0.428 9 [2-2-1] ==> [1-1-*, 1-2-*] 0.428 10 [2-1-*] ==> [1-1-1, 2-2-*] 0.428 11 [2-2-*, 1-1-1] ==> [2-1-*] 0.428 12 [2-1-1] ==> [2-2-*, 1-1-1] 0.428 13 [2-2-*, 1-1-1] ==> [2-1-1] 0.428 Definition 1: Let R1 = X1 => Y and R2 = X2 => Y be two exact Association Rules, with exactly the same itemset Y as the consequent. Rule R1 is redundant to rule R2 if (1) the itemset X1 is made up of items where at least one item in X1 is descendant from the items in X2 and (2) the itemset X2 is entirely made up of items where at least one item in X2 is an ancestor of the items in X1 and (3) the other non-ancestor items in X2 are all present in itemset X1. From this definition, if for an exact Association Rule X1 => Y1 there does not exist any other rule X2 => Y2 such that at least one item in X1 shares an ancestor-descendant relationship with X2 containing the ancestor(s) and all other items X2 are present in X1, then X1 => Y1 is a non-redundant rule. To test for redundancy, we take this definition and add another condition for a rule to be considered valid. A rule X => Y is valid if it has no ancestor-descendant relationship between any items in itemsets X and Y. Thus, for example 1-2-1 => 1-2-* is not a valid rule, but 1-2-1 => 1-1-3 is a valid rule. If this condition is not met by any rule X2 => Y2 when testing to see if X1 => Y1 is redundant to X2 => Y2, then X1 => Y1 is a non- redundant rule as X2 => Y2 is not a valid rule. Submit your manuscript electronically for review.
  • 5. ļ² ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576 4572 3.2. Generating Exact Basis Rules As previous work has shown [14, 17-18] using frequent closed itemsets in the generation of Association Rules can reduce the quantity of discovered rules. Because we wish to remove redundancy on top of the redundancy already being removed, our approach uses the closed itemsets and generators to discover the non-redundant rules. [14, 17-18] have both proposed condensed/more concise bases to represent non-redundant exact rules. Exact rules refer to rules whose confidence is 1. The proposed approach will be extended to other rules (i.e., so called approximate rules). The following definitions outline these two bases: Definition 2: For the Min-MaxExact (MME) basis, C is the set of the discovered frequent closed itemsets. For each closed itemset c in C, Gc is the set of generators for c. From this the exact basis for min- max is:MMEHR = {g ā†’ c|c āˆˆ C, g āˆˆ GC, g ā‰  c and there exists no rules gā€²ļ€ ā†’ļ€ cā€² where cā€² Ļµ C, gā€²ļ€ Ļµļ€ Gc, c ā‰  cā€², gā€² ā‰  cā€² and g is descendant set of gā€², gā€² has no ancestor or descendant of cā€² or gā€² Definition 8: (Reliable Exact Basis without Hierarchy Redundancy) Let C be the set of frequent closed itemsets. For each frequent closed itemset c, let Gc be the set of minimal generators of c. The Reliable exact basis is: REHR = {g ā†’ c | c āˆˆ C, g āˆˆ GC, REHR = {gāˆ’ā†’ c|c āˆˆ C, g āˆˆ GC, Ā¬ (c or cā€² āˆŖ gā€²), where cā€² Ļµ C, cā€² āø¦ c, gā€² Ļµ Gc, and there exists no rules gā€² ā†’cā€² where c ā‰  cā€², gā€² ā‰  cā€² and g is descendant set of gā€², gā€² has no ancestor or descendant of cā€² or gā€². Thus the algorithms to extract non-redundant multi-level rules using either MinmaxExactHR or ReliableExactHR aregiven as follows: Algorithm 1: MinmaxExactHR() Input: C: a set of frequent closed itemsets G: a set of minimal generators. For g Ļµ G, g.closure is the closed itemset of g. Output: A set of non-redundant multilevel rules. 1. MinMaxExact: = ф 2. for each k=1 to v 3. for each k-generator g Ļµ Gk 4. nonRedundant = true 5. if gā‰  g closure 6. for all gā€² Ļµ G 7. if (g ā€² ā‰  g) 8. if ( gā€² is ancestor set of g ) and ((cā€² =c) or ( g= g ā€²)) and(gā€² is not ancestor set of cā€²) 9. then nonRedundant = false 10. break 14. if nonRedundant = true 15. insert {(g ā†’ c), g. supp} in MinMaxExact 20. return MinMaxExact Algorithm 2: ReliableExactHR () Input: C: a set of frequent closed itemsets G: a set of minimal generators. For g Ļµ G, g.closure is the closed itemset of g. Output: A set of non-redundant multilevel rules. 1. ReliableExact: = ф 2. for all c Ļµ C 3. for all g Ļµ Gc 4. nonRedundant = false 5. if ļ€¢c ļƒŽ C such that cā€²ļ€ āø¦ļ€ c and c gā€² Ļµ Gc, we have (c or cā€²) āˆŖ gā€² ) āŠ† g) 6. then nonRedundant = true 7. else 8. nonRedundant = false 9. break 11. for all gā€²ļ€ āˆˆ G 12. if g ā€² ā‰  g 13. if (gā€² is ancestor set of g) and (cā€² =c or gā€² = g) and (gā€² is not ancestor set of (cā€² or gā€²) and (gā€² is not descendant set of (cā€² or gā€²) 14. then nonRedundant = true; break 19. if nonRedundant = true 20. insert {(g ā†’ c or g, g. supp} in ReliableExact 24. return ReliableExact
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708 ļ² Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash) 4573 3.3. Deriving Exact Rules from the Exact Basis Rules The Min-MaxExact approach and ReliableExact approach have proven that they can deduce all of the exact rules from their basis set [17]. Comparing with the Min-MaxExact approach and ReliableExact approach, our work results in a smaller exact basis set by not only removing the redundant rules that are removed by the Min-MaxExact approach and ReliableExact approach, but also removing the hierarchically redundant rules. If we can recover all the hierarchically redundant rules, then we can derive all the exact rules by using the Min-MaxExact or ReliableExact recovery algorithm. This will ensure that all the exact rules can still be derived and by achieving this, our approach will be a lossless representation of the exact Association Rules. The following algorithm is designed to recover the hierarchically redundant rules from the exact basis. By adding it to the algorithms used by Min-MaxExact and ReliableExact to derive the exact rules it is then able for the existing ReliableExact recovery algorithm to derive all the exact rules. This is because our algorithm will give them a basis set that includes the hierarchically redundant rules (which the ReliableExact approach would not have removed in the first place). The basic idea is that, for each exact basis rule, first from generators to construct all possible exact basis rules whose antecedent is a descendant of the exact basis rule (steps 4 to 7 in Algorithm 3). These rules are potential exact basis rules that might have been eliminated due to the ancestor-descendant relationship. Then check to make sure these potential rules are valid (steps 8 to 12), finally, from the potential exact rules to find exact basis rules. These exact basis rules have been eliminated due to the ancestor-descendant relationship (steps 13 to 18). Algorithm 3: DeriveExactHR () Input: Set of exact basis rules denoted asExactbasis,set of frequent closed itemsets C andgenerators G. Output: Set of rules that covers the exact basisand the hierarchically redundant rules. 1. Recovered: = ļ¦ 2. ļ€¢rļƒŽ Exact basis 3. CandidateBasis: = ļ¦ 4. for all generator g in G 5. if any of the item x in the antecedent X of rule r: Xļƒ  Y is the ancestor of g. 6. then add all the possible subsets of g into S 8. for all s in S, check every, xļƒŽ X if x doesnā€™t have a descendant in s, add x to s to make s a descendant set of X 9. if s has no ancestors in Y and s has no descendants in Y and for all items iļƒŽ s there are no ancestor- descendant relations with item iļ‚¢ļƒŽ s and for all item iļƒŽ Y there are no ancestor-descendant relation with item iļ‚¢ļƒŽ Y 10. then insert sļƒ  YinCandidateBasis 13. for all Bļƒ  D ļƒŽCandidateBasis 14. if BUD= itemset i ļƒŽC and B = gļƒŽGi 15. insert {Bļƒ  D, g. supp} in Recovered 19. return Exactbasis U Recovered 4. EXPERIMENTS Experiments were conducted to test andevaluate the effectiveness of the proposed hierarchically non-redundant exact basis and toconfirm that it is also a lossless basis set. This section presents and details the experiments and their results. 4.1. Datasets We used 6 datasets to test our approach to discover whether it reduced the size of the exact basis rule set and to test that the basis set was lossless, meaning all the rules could be recovered. These datasets were composed of 100, 200, 500, 2000 and 5000 transactions and are named A to F respectively. The key statistics for these builtdatasets are detailed in Table 4. Table 4. Obtained Frequent itemsets using Exact Basis Dataset MME MMEHR RE REHR A 15 10 13 9 B 106 68 80 58 C 174 134 113 89 D 577 429 383 305 E 450 405 315 287 F 725 602 91 80
  • 7. ļ² ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576 4574 Where as the proposed algorithms MME reduced less number of rules compared to MMEHR. The MMEHR algorithms considers the cross level hierarchy and contains more data, at this level it reduced the more number of rules, it indicated that at hierarchy the data is duplicated and the proposed algorithms is reduced those replicated dat and produced more reliable and accurate rules. Similarly, for RE and REHR algorithms has generated the different rules at with and without cross levels hierarchy. At cross level there will be more data so more rules are generated by REHR algorithm than the RE algorithm where as the ML_T2L1 algorithm has generated th same rules with and without cross level hierarchy. Thus the proposed work has generated more reliable and accurate algorithm than the ML_T2L1 algorithm. Figure 2. Multi Level Association Rules Figure 3. Comparison of MME, MMEHR Algorithms with Ml_T2L1 40% 50% 60% 70% 80% 90% 100% MME ML_T2L1 MMEHR ML_T2L1 ReductionRulesin% Comparison of MME, MMEHR Algorithms and ML_T2L1 A B C D E F
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708 ļ² Generating Non-redundant Multilevel Association Rules Using ā€¦ (R. Vijaya Prakash) 4575 Figure 4. Comparison of RE, REHR Algorithms with Ml_T2L1 5. CONCLUSION Redundancy in Association Rules affects the quality of the information presented and this affects and reduces the use of the rule set. The goal of redundancy elimination is to improve the quality, thus allowing them to better solve problems being faced. Our work aims to remove hierarchical redundancy in multi-level datasets, thus reducing the size of the rule set to improve the quality and usefulness, without causing the loss of any information. We have proposed an approach which removes hierarchical redundancy through the use of frequent closed itemsets and generators. This allows it to be added to other approaches which also remove redundant rules, thereby allowing a user to remove as much redundancy as possible. The next step in our work is to apply this approach to the approximate basis rule set to remove redundancy there. We will also review our work to see if there are other hierarchicalredundancies in the basis rule sets that should be removed and will investigate what should and can be done to further improve the quality of multi- level Association Rules. REFERENCES [1] Bayardo, R.J., Agrawal, R. & Gunopulos, D. ā€œConstraint-based rule mining in large,dense databasesā€. Data Mining and Knowledge Discovery, Vol 4, pp. 217-240, 2000. [2] Berry, M.J.A. & Linoff, G.S. ā€œData Mining Techniques for Marketing Sales and Customer Supportā€. John Wiley and Sons, 1997. [3] Brin, S., Motwani, R., Ullman, J.D. & Tsur, S. ā€œDynamic itemset counting and implication rules for market basket dataā€ Proceedings of the 1997 ACM SIGMOD Conference, pp. 255-264, 1997. [4] Ganter, B. & Wille, R. ā€œFormal Concept Analysis: Mathematical Foundationsā€, Springer-Verlag, 1999. [5] Han, J. & Fu, Y. ā€œDiscovery of multiple-level Association Rules from large databasesā€, Proceedings of the 21st International Conference on Very Large Databases, pp. 420-431, 1995. [6] Han, J. & Fu, Y. ā€œMining multiple-level Association Rules in large databasesā€, IEEE Transactions on Knowledge and Data Engineering, Vol 11 pp. 798-805, 1999. [7] Han, J. & Fu, Y. ā€œMining multiple-level Association Rules in large databasesā€, IEEE Transactions on Knowledge and Data Engineering, Vol 11, pp. 798-804, 2000. [8] Hong, T.P., Lin, K.Y. & Chien, B.C. ā€œMining fuzzy multiple-level Association Rules from quantitative data. Applied Intelligenceā€, Vol. 18, pp. 79-90, 2003. [9] Kaya, M. & Alhajj, R. ā€œMining multi-cross-level fuzzy weighted Association Rulesā€ 2nd International IEEE Conference on Intelligent Systems, pp. 225-230, 2004. [10] Kryszkiewicz, M., Rybinski, H. & Gajek, M. ā€œDataless transitions between concise representations of frequent patternsā€, Journal of Intelligent Information Systems, Vol. 22, pp. 41-70, 2004. [11] Ng, R.T., Lakshmanan, V., Han, J. & Pang, A. ā€œExploratory mining and pruning otimizations of constrained Association Rulesā€. Proceedings of the SIGMOD conference, pp. 13-24, 1998. [12] Pasquier, N., Bastide, Y., Taouil, R. & Lakhal, L. ā€œEfficient mining of association rultes using closed itemset latticesā€. Journal of Intelligent Information Systems, Vol. 24, pp. 25-46, 1999. [13] Pasquier, N., Taouil, R., Bastide, Y., Stumme, G. & Lakhal, L. ā€œGenerating a condensed representation for Association Rulesā€,. Journal of Intelligent Information Systems, Vol. 24, pp. 29-60, 2005. [14] Srikant, R., Vu, Q. & Agrawal, R. ā€œMining Association Rules with item constraintsā€, Proceedings of the KDD Conference, pp. 67-73, 1997. 50% 60% 70% 80% 90% 100% RE ML_T2L1 REHR ML_T2L1 ReductionRulesin% Comparison of RE, REHR Algorithms and ML_T2L1 A B C D E F
  • 9. ļ² ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4568 - 4576 4576 [15] Thakur, R.S., Jain, R.C. & Pardasani, K.P. ā€œMining level-crossing Association Rules from large databasesā€, Journal of Computer Science, pp. 76-81, 2006. [16] Wille, R. ā€œRestructuring lattices theory: An approach based on hierarchies of concepts Ordered Setsā€, Dordrecht- Boston, 1982. [17] Xu, Y. & Li, Y. ā€œGenerating concise Association Rulesā€, Proceedings of the 16th ACM Conference on Conference on Information and Knowledge Management (CIKM07), pp. 781-790, 2007. [18] Zaki, M.J. ā€œGenerating nonredundent Association Rulesā€, Proceedings of the KDD Conference, pp. 34-43, 2000. [19] Zaki, M.J. ā€œMining non-redundant Association Rulesā€, Data Mining and Knowledge Discovery, Vol. 9, pp. 223- 248, 2004. [20] Ziegler, C.N., McNee, S.M., Konstan, J.A & Lausen, G. ā€œImproving recommendation lists through topic diversificationā€, Proceed. of the 14th Inter. World Wide Web Conference, pp. 22-32, 2005. [21] K Rajendra Prasad, ā€œOptimized High-Utility Itemsets Mining for Effective Association Mining Paperā€, International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 5, pp 2911-2918. [22] Sushil Kumar Verma, R.S. Thakur, Shailesh Jaloree .Fuzzy Association Rule Mining based Model to Predict Studentsā€™ Performance, International Journal of Electrical and Computer Engineering (IJECE), Vol. 7, No. 4, pp. 2223-2231. [23] Harco Leslie Hendric Spits Warnars, ā€œUsing Attribute Oriented Induction High Level Emerging Pattern (AOI- HEP) to Mine Frequent Patternsā€, International Journal of Electrical and Computer Engineering (IJECE), Vol. 6, No. 6, pp. 3037 ā€“ 3046. [24] Benaka Santhosha S, Chitra Kiran N, ā€œA Systematic Review of Existing Data Mining Approaches Envisioned for Knowledge Discovery from Multimediaā€, International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 2, pp. 908-916, 2018. [25] Leena Deshpande, M. Narsing Rao, ā€œConcept Drift Identification using Classifier Ensemble Approachā€, International Journal of Electrical and Computer Engineering (IJECE), Vol. 8, No. 1, pp. 19-25, 2018.