SlideShare a Scribd company logo
Data Mining:
   Concepts and Techniques
                        — Chapter 8 —
       8.3 Mining sequence patterns in transactional
                       databases

                 Jiawei Han and Micheline Kamber
                 Department of Computer Science
           University of Illinois at Urbana-Champaign
                      www.cs.uiuc.edu/~hanj
      ©2006 Jiawei Han and Micheline Kamber. All rights reserved.
April 18, 2013            Data Mining: Concepts and Techniques
                                                       1
April 18, 2013   Data Mining: Concepts and Techniques
                                              2
Chapter 8. Mining Stream, Time-
       Series, and Sequence Data

      Mining data streams

      Mining time-series data

      Mining sequence patterns in
      transactional databases
      Mining sequence patterns in biological
      data
April 18, 2013     Data Mining: Concepts and Techniques
                                                3
Sequence Databases & Sequential
                  Patterns

     Transaction databases, time-series databases vs. sequence
      databases
     Frequent patterns vs. (frequent) sequential patterns
     Applications of sequential pattern mining
         Customer shopping sequences:
           
               First buy computer, then CD-ROM, and then digital
               camera, within 3 months.
         Medical treatments, natural disasters (e.g., earthquakes),
          science & eng. processes, stocks and markets, etc.
         Telephone calling patterns, Weblog click streams
         DNA sequences and gene structures
April 18, 2013              Data Mining: Concepts and Techniques
                                                         4
What Is Sequential Pattern
                      Mining?

     Given a set of sequences, find the complete set of
      frequent subsequences

                                A sequence : < (ef) (ab) (df) c b >
   A sequence database
      SID       sequence           An element may contain a set of items.
      10    <a(abc)(ac)d(cf)>      Items within an element are unordered
                                   and we list them alphabetically.
      20     <(ad)c(bc)(ae)>
      30     <(ef)(ab)(df)cb>       <a(bc)dc> is a subsequence
      40      <eg(af)cbc>           of <a(abc)(ac)d(cf)>

       Given support threshold min_sup =2, <(ab)c> is a
       sequential pattern
April 18, 2013            Data Mining: Concepts and Techniques
                                                       5
Challenges on Sequential Pattern Mining

      A huge number of possible sequential patterns are
       hidden in databases
      A mining algorithm should
          find the complete set of patterns, when possible,
           satisfying the minimum support (frequency) threshold
          be highly efficient, scalable, involving only a small
           number of database scans
          be able to incorporate various kinds of user-specific
           constraints


April 18, 2013             Data Mining: Concepts and Techniques
                                                        6
Sequential Pattern Mining Algorithms

      Concept introduction and an initial Apriori-like algorithm
           Agrawal & Srikant. Mining sequential patterns, ICDE’95
      Apriori-based method: GSP (Generalized Sequential Patterns:
       Srikant & Agrawal @ EDBT’96)
      Pattern-growth methods: FreeSpan & PrefixSpan (Han et
       al.@KDD’00; Pei, et al.@ICDE’01)
      Vertical format-based mining: SPADE (Zaki@Machine Leanining’00)
      Constraint-based sequential pattern mining (SPIRIT: Garofalakis,
       Rastogi, Shim@VLDB’99; Pei, Han, Wang @ CIKM’02)
      Mining closed sequential patterns: CloSpan (Yan, Han & Afshar
       @SDM’03)

April 18, 2013                Data Mining: Concepts and Techniques
                                                           7
The Apriori Property of Sequential
                    Patterns

     A basic property: Apriori (Agrawal & Sirkant’94)
          If a sequence S is not frequent
          Then none of the super-sequences of S is frequent
          E.g, <hb> is infrequent  so do <hab> and <(ah)b>

      Seq. ID       Sequence
                                    Given support threshold
        10         <(bd)cb(ac)>
                                    min_sup =2
        20        <(bf)(ce)b(fg)>
        30         <(ah)(bf)abf>
        40         <(be)(ce)d>
        50       <a(bd)bcb(ade)>


April 18, 2013               Data Mining: Concepts and Techniques
                                                          8
GSP—Generalized Sequential Pattern Mining

     GSP (Generalized Sequential Pattern) mining algorithm
        proposed by Agrawal and Srikant, EDBT’96

   Outline of the method

        Initially, every item in DB is a candidate of length-1

        for each level (i.e., sequences of length-k) do

            scan database to collect support count for each

             candidate sequence
           
             generate candidate length-(k+1) sequences from
             length-k frequent sequences using Apriori
        repeat until no frequent sequence or no candidate can

         be found
   Major strength: Candidate pruning by Apriori

April 18, 2013              Data Mining: Concepts and Techniques
                                                          9
Finding Length-1 Sequential Patterns

    Examine GSP using an example
    Initial candidates: all singleton sequences
       <a>, <b>, <c>, <d>, <e>, <f>, <g>, <h>
                                                   Cand    Sup
                                                   <a>      3
    Scan database once, count support for
     candidates                                    <b>      5
                                                    <c>     4
                       min_sup =2                  <d>      3
                       Seq. ID      Sequence
                         10       <(bd)cb(ac)>
                                                   <e>      3
                         20      <(bf)(ce)b(fg)>    <f>     2
                         30       <(ah)(bf)abf>     <g>     1
                         40        <(be)(ce)d>
                                                    <h>     1
                         50      <a(bd)bcb(ade)>


April 18, 2013           Data Mining: Concepts and Techniques
                                                      10
GSP: Generating Length-2 Candidates


                                               <a>     <b>     <c>    <d>    <e>    <f>
                                       <a>    <aa>    <ab>     <ac>   <ad>   <ae>   <af>
       51 length-2                     <b>    <ba>    <bb>     <bc>   <bd>   <be>   <bf>

       Candidates                      <c>    <ca>    <cb>     <cc>   <cd>   <ce>   <cf>
                                       <d>    <da>    <db>     <dc>   <dd>   <de>   <df>
                                       <e>    <ea>    <eb>     <ec>   <ed>   <ee>   <ef>
                                       <f>     <fa>   <fb>     <fc>   <fd>   <fe>   <ff>

        <a>    <b>      <c>      <d>          <e>      <f>
                                                                Without Apriori
 <a>          <(ab)>   <(ac)>   <(ad)>       <(ae)>   <(af)>
                                                                property,
 <b>                   <(bc)>   <(bd)>       <(be)>   <(bf)>
                                                                8*8+8*7/2=92
 <c>                            <(cd)>       <(ce)>   <(cf)>
 <d>                                         <(de)>   <(df)>
                                                                candidates
 <e>                                                  Apriori prunes
                                                      <(ef)>
 <f>
April 18, 2013                                     44.57% candidates
                                Data Mining: Concepts and Techniques
                                                             11
The GSP Mining Process


 5th scan: 1 cand. 1 length-5 seq.   <(bd)cba>         Cand. cannot
 pat.                                                  pass sup.
                                                       threshold
 4th scan: 8 cand. 6 length-4 seq.   <abba> <(bd)bc> …           Cand. not in DB at all
 pat.
 3rd scan: 47 cand. 19 length-3 seq. <abb> <aab> <aba> <baa> <bab> …
 pat. 20 cand. not in DB at all
 2nd scan: 51 cand. 19 length-2 seq.
 pat. 10 cand. not in DB at all       <aa> <ab> … <af> <ba> <bb> … <ff> <(ab)> … <(ef)>
 1st scan: 8 cand. 6 length-1 seq.
 pat.                                  <a> <b> <c> <d> <e> <f> <g> <h>
                                                 Seq. ID      Sequence
                                                   10       <(bd)cb(ac)>
                               min_sup =2
                                                   20       <(bf)(ce)b(fg)>
                                                   30       <(ah)(bf)abf>
                                                   40        <(be)(ce)d>
                                                   50      <a(bd)bcb(ade)>
April 18, 2013                       Data Mining: Concepts and Techniques
                                                                  12
Candidate Generate-and-test:
                    Drawbacks

     A huge set of candidate sequences generated.
         Especially 2-item candidate sequence.
     Multiple Scans of database needed.
         The length of each candidate grows by one at each
          database scan.
     Inefficient for mining long sequential patterns.
         A long pattern grow up from short patterns
         The number of short patterns is exponential to the
          length of mined patterns.
April 18, 2013             Data Mining: Concepts and Techniques
                                                        13
The SPADE Algorithm

     SPADE (Sequential PAttern Discovery using Equivalent
      Class) developed by Zaki 2001
     A vertical format sequential pattern mining method
     A sequence database is mapped to a large set of
         Item: <SID, EID>
     Sequential pattern mining is performed by
         growing the subsequences (patterns) one item at a time
          by Apriori candidate generation


April 18, 2013           Data Mining: Concepts and Techniques
                                                      14
The SPADE Algorithm




April 18, 2013       Data Mining: Concepts and Techniques
                                                  15
Bottlenecks of GSP and SPADE

     A huge set of candidates could be generated
         1,000 frequent length-1 sequences generate s huge number of
                                               1000 × 999
          length-2 candidates!    1000 ×1000 +            = 1,499,500
                                                   2
     Multiple scans of database in mining
     Breadth-first search
     Mining long sequential patterns
         Needs an exponential number of short candidates
                                                          100
                                                                100  100
          A length-100 sequential pattern needs 10
                                                          ∑ i 
                                                     30
      
                                                                 = 2 − 1 ≈ 1030
                                                          i =1      
                  candidate sequences!
April 18, 2013              Data Mining: Concepts and Techniques
                                                         16
Prefix and Suffix (Projection)


     <a>, <aa>, <a(ab)> and <a(abc)> are prefixes of
      sequence <a(abc)(ac)d(cf)>
     Given sequence <a(abc)(ac)d(cf)>


                 Prefix       Suffix (Prefix-Based Projection)
                 <a>                <(abc)(ac)d(cf)>
                 <aa>               <(_bc)(ac)d(cf)>
                 <ab>               <(_c)(ac)d(cf)>

April 18, 2013            Data Mining: Concepts and Techniques
                                                       17
Mining Sequential Patterns by Prefix
                 Projections

     Step 1: find length-1 sequential patterns
        <a>, <b>, <c>, <d>, <e>, <f>

     Step 2: divide search space. The complete set of seq. pat.
      can be partitioned into 6 subsets:
        The ones having prefix <a>;

        The ones having prefix <b>;
                                              SID     sequence
        …
                                              10  <a(abc)(ac)d(cf)>
        The ones having prefix <f>
                                              20   <(ad)c(bc)(ae)>
                                               30    <(ef)(ab)(df)cb>
                                               40      <eg(af)cbc>


April 18, 2013            Data Mining: Concepts and Techniques
                                                       18
Finding Seq. Patterns with Prefix
                     <a>

     Only need to consider projections w.r.t. <a>
         <a>-projected database: <(abc)(ac)d(cf)>, <(_d)c(bc)
          (ae)>, <(_b)(df)cb>, <(_f)cbc>

     Find all the length-2 seq. pat. Having prefix <a>: <aa>,
      <ab>, <(ab)>, <ac>, <ad>, <af>
         Further partition into 6 subsets       SID       sequence
              Having prefix <aa>;               10    <a(abc)(ac)d(cf)>
              …                                 20     <(ad)c(bc)(ae)>
                                                 30     <(ef)(ab)(df)cb>
           
               Having prefix <af>
                                                 40      <eg(af)cbc>

April 18, 2013              Data Mining: Concepts and Techniques
                                                         19
Completeness of PrefixSpan
                                       SDB
                                 SID          sequence
                                                                  Length-1 sequential patterns
                                  10   <a(abc)(ac)d(cf)>
                                                                  <a>, <b>, <c>, <d>, <e>, <f>
                                  20       <(ad)c(bc)(ae)>

                                  30       <(ef)(ab)(df)cb>

                                  40        <eg(af)cbc>

      Having prefix <a>                                              Having prefix <c>, …, <f>
                                  Having prefix <b>
  <a>-projected database
  <(abc)(ac)d(cf)>              Length-2 sequential
                                                              <b>-projected database       …
  <(_d)c(bc)(ae)>               patterns
  <(_b)(df)cb>                  <aa>, <ab>, <(ab)>,
  <(_f)cbc>                     <ac>, <ad>, <af>
                                                                    ……
 Having prefix <aa>   Having prefix <af>

  <aa>-proj. db   …    <af>-proj. db


April 18, 2013                    Data Mining: Concepts and Techniques
                                                               20
Efficiency of PrefixSpan

     No candidate sequence needs to be generated
     Projected databases keep shrinking
     Major cost of PrefixSpan: constructing projected
      databases
         Can be improved by pseudo-projections




April 18, 2013          Data Mining: Concepts and Techniques
                                                     21
Speed-up by Pseudo-projection

     Major cost of PrefixSpan: projection
         Postfixes of sequences often appear
          repeatedly in recursive projected databases
     When (projected) database can be held in main
      memory, use pointers to form projections
         Pointer to the sequence                   s=<a(abc)(ac)d(cf)>
         Offset of the postfix                              <a>
                                    s|<a>: ( , 2)   <(abc)(ac)d(cf)>
                                                             <ab>
                                  s|<ab>: ( , 4) <(_c)(ac)d(cf)>
April 18, 2013             Data Mining: Concepts and Techniques
                                                        22
Pseudo-Projection vs. Physical Projection

     Pseudo-projection avoids physically copying postfixes
         Efficient in running time and space when database
          can be held in main memory
     However, it is not efficient when database cannot fit in
      main memory
         Disk-based random accessing is very costly
     Suggested Approach:
         Integration of physical and pseudo-projection
         Swapping to pseudo-projection when the data set
          fits in memory

April 18, 2013           Data Mining: Concepts and Techniques
                                                      23
Performance on Data Set
                        C10T8S8I8




April 18, 2013         Data Mining: Concepts and Techniques
                                                    24
Performance on Data Set Gazelle




April 18, 2013   Data Mining: Concepts and Techniques
                                              25
Effect of Pseudo-Projection




April 18, 2013     Data Mining: Concepts and Techniques
                                                26
CloSpan: Mining Closed Sequential
                   Patterns
    A closed sequential pattern s:
     there exists no superpattern
     s’ such that s’ ‫ כ‬s, and s’ and
     s have the same support
    Motivation: reduces the
     number of (redundant)
     patterns but attains the same
     expressive power
  Using Backward Subpattern
   and Backward Superpattern
   pruning to prune redundant
   search space
April 18, 2013         Data Mining: Concepts and Techniques
                                                    27
CloSpan: Performance Comparison with
                  PrefixSpan




April 18, 2013   Data Mining: Concepts and Techniques
                                              28
Constraint-Based Seq.-Pattern Mining
     Constraint-based sequential pattern mining
        Constraints: User-specified, for focused mining of desired

         patterns
        How to explore efficient mining with constraints? —

         Optimization
     Classification of constraints
        Anti-monotone: E.g., value_sum(S) < 150, min(S) > 10

        Monotone: E.g., count (S) > 5, S ⊇ {PC, digital_camera}

        Succinct: E.g., length(S) ≥ 10, S ∈ {Pentium, MS/Office,

         MS/Money}
        Convertible: E.g., value_avg(S) < 25, profit_sum (S) >

         160, max(S)/avg(S) < 2, median(S) – min(S) > 5
        Inconvertible: E.g., avg(S) – median(S) = 0


April 18, 2013           Data Mining: Concepts and Techniques
                                                      29
From Sequential Patterns to Structured Patterns

     Sets, sequences, trees, graphs, and other structures
        Transaction DB: Sets of items

           {{i , i , …, i }, …}
               1 2        m
         Seq. DB: Sequences of sets:
            {<{i , i }, …, {i , i , i }>, …}
                 1 2          m n k
         Sets of Sequences:
            {{<i , i >, …, <i , i , i >}, …}
                 1 2          m n k

         Sets of trees: {t1, t2, …, tn}
         Sets of graphs (mining for frequent subgraphs):
            {g , g , …, g }
               1   2      n
     Mining structured patterns in XML documents, bio-
April 18, 2013 structures, etc.
      chemical           Data Mining: Concepts and Techniques
                                                      30
Episodes and Episode Pattern Mining

     Other methods for specifying the kinds of patterns
         Serial episodes: A → B
         Parallel episodes: A & B
         Regular expressions: (A | B)C*(D → E)
     Methods for episode pattern mining
         Variations of Apriori-like algorithms, e.g., GSP
         Database projection-based pattern growth
              Similar to the frequent pattern growth without
               candidate generation
April 18, 2013              Data Mining: Concepts and Techniques
                                                         31
Periodicity Analysis
     Periodicity is everywhere: tides, seasons, daily power
      consumption, etc.
     Full periodicity
        Every point in time contributes (precisely or

         approximately) to the periodicity
     Partial periodicit: A more general notion
        Only some segments contribute to the periodicity

            Jim reads NY Times 7:00-7:30 am every week day

     Cyclic association rules
        Associations which form cycles

     Methods
        Full periodicity: FFT, other statistical analysis methods

        Partial and cyclic periodicity: Variations of Apriori-like

         mining methods

April 18, 2013            Data Mining: Concepts and Techniques
                                                       32
Ref: Mining Sequential
                        Patterns
     R. Srikant and R. Agrawal. Mining sequential patterns: Generalizations and performance
      improvements. EDBT’96.
     H. Mannila, H Toivonen, and A. I. Verkamo. Discovery of frequent episodes in event
      sequences. DAMI:97.
     M. Zaki. SPADE: An Efficient Algorithm for Mining Frequent Sequences. Machine
      Learning, 2001.
     J. Pei, J. Han, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu. PrefixSpan: Mining Sequential
      Patterns Efficiently by Prefix-Projected Pattern Growth. ICDE'01 (TKDE’04).
     J. Pei, J. Han and W. Wang, Constraint-Based Sequential Pattern Mining in Large
      Databases, CIKM'02.
     X. Yan, J. Han, and R. Afshar. CloSpan: Mining Closed Sequential Patterns in Large
      Datasets. SDM'03.
     J. Wang and J. Han, BIDE: Efficient Mining of Frequent Closed Sequences, ICDE'04.
     H. Cheng, X. Yan, and J. Han, IncSpan: Incremental Mining of Sequential Patterns in
      Large Database, KDD'04.
     J. Han, G. Dong and Y. Yin, Efficient Mining of Partial Periodic Patterns in Time Series
      Database, ICDE'99.
     J. Yang, W. Wang, and P. S. Yu, Mining asynchronous periodic patterns in time series
      data, KDD'00.
April 18, 2013                     Data Mining: Concepts and Techniques
                                                                33
April 18, 2013   Data Mining: Concepts and Techniques
                                              34

More Related Content

What's hot

Lect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysisLect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysis
hktripathy
 
Classification Based Machine Learning Algorithms
Classification Based Machine Learning AlgorithmsClassification Based Machine Learning Algorithms
Classification Based Machine Learning Algorithms
Md. Main Uddin Rony
 
K - Nearest neighbor ( KNN )
K - Nearest neighbor  ( KNN )K - Nearest neighbor  ( KNN )
K - Nearest neighbor ( KNN )
Mohammad Junaid Khan
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olapData Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olap
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
Salah Amean
 
Data Mining: Association Rules Basics
Data Mining: Association Rules BasicsData Mining: Association Rules Basics
Data Mining: Association Rules Basics
Benazir Income Support Program (BISP)
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Machine Learning in Big Data
Machine Learning in Big DataMachine Learning in Big Data
Machine Learning in Big Data
DataWorks Summit
 
Top (10) challenging problems in data mining
Top (10) challenging problems  in data miningTop (10) challenging problems  in data mining
Top (10) challenging problems in data mining
Ahmedasbasb
 
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
error007
 
Data Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisData Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysis
DataminingTools Inc
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
DataminingTools Inc
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
mrizwan969
 
04 Classification in Data Mining
04 Classification in Data Mining04 Classification in Data Mining
04 Classification in Data Mining
Valerii Klymchuk
 
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Subrata Kumer Paul
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Salah Amean
 
Data Mining Techniques
Data Mining TechniquesData Mining Techniques
Data Mining Techniques
Houw Liong The
 
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdfMachine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
Maris R
 
Analytics in Online Retail
Analytics in Online RetailAnalytics in Online Retail
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Niko Vuokko
 
Data mining presentation.ppt
Data mining presentation.pptData mining presentation.ppt
Data mining presentation.ppt
neelamoberoi1030
 

What's hot (20)

Lect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysisLect7 Association analysis to correlation analysis
Lect7 Association analysis to correlation analysis
 
Classification Based Machine Learning Algorithms
Classification Based Machine Learning AlgorithmsClassification Based Machine Learning Algorithms
Classification Based Machine Learning Algorithms
 
K - Nearest neighbor ( KNN )
K - Nearest neighbor  ( KNN )K - Nearest neighbor  ( KNN )
K - Nearest neighbor ( KNN )
 
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
Data Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olapData Mining:  Concepts and Techniques (3rd ed.)— Chapter _04 olap
Data Mining: Concepts and Techniques (3rd ed.) — Chapter _04 olap
 
Data Mining: Association Rules Basics
Data Mining: Association Rules BasicsData Mining: Association Rules Basics
Data Mining: Association Rules Basics
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Apriori Algorithm
 
Machine Learning in Big Data
Machine Learning in Big DataMachine Learning in Big Data
Machine Learning in Big Data
 
Top (10) challenging problems in data mining
Top (10) challenging problems  in data miningTop (10) challenging problems  in data mining
Top (10) challenging problems in data mining
 
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 4 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
 
Data Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysisData Mining: Graph mining and social network analysis
Data Mining: Graph mining and social network analysis
 
Data mining: Classification and prediction
Data mining: Classification and predictionData mining: Classification and prediction
Data mining: Classification and prediction
 
Dimensionality Reduction
Dimensionality ReductionDimensionality Reduction
Dimensionality Reduction
 
04 Classification in Data Mining
04 Classification in Data Mining04 Classification in Data Mining
04 Classification in Data Mining
 
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
Chapter 6. Mining Frequent Patterns, Associations and Correlations Basic Conc...
 
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...Data Mining:  Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
Data Mining: Concepts and Techniques_ Chapter 6: Mining Frequent Patterns, ...
 
Data Mining Techniques
Data Mining TechniquesData Mining Techniques
Data Mining Techniques
 
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdfMachine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
Machine-Learning-A-Z-Course-Downloadable-Slides-V1.5.pdf
 
Analytics in Online Retail
Analytics in Online RetailAnalytics in Online Retail
Analytics in Online Retail
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Data mining presentation.ppt
Data mining presentation.pptData mining presentation.ppt
Data mining presentation.ppt
 

Viewers also liked

Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
error007
 
Introduction to data mining technique
Introduction to data mining techniqueIntroduction to data mining technique
Introduction to data mining technique
Pawneshwar Datt Rai
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Salah Amean
 
Data mining process powerpoint ppt slides.
Data mining process powerpoint ppt slides.Data mining process powerpoint ppt slides.
Data mining process powerpoint ppt slides.SlideTeam.net
 
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
error007
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesSaif Ullah
 

Viewers also liked (8)

Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
 
Introduction to data mining technique
Introduction to data mining techniqueIntroduction to data mining technique
Introduction to data mining technique
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
 
Data mining process powerpoint ppt slides.
Data mining process powerpoint ppt slides.Data mining process powerpoint ppt slides.
Data mining process powerpoint ppt slides.
 
Temporal data mining
Temporal data miningTemporal data mining
Temporal data mining
 
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.1 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 

Similar to Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber

Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
error007
 
5.3 mining sequential patterns
5.3 mining sequential patterns5.3 mining sequential patterns
5.3 mining sequential patterns
Krish_ver2
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap Shot
IOSR Journals
 
My6asso
My6assoMy6asso
My6asso
ketan533
 
06FPBasic02.pdf
06FPBasic02.pdf06FPBasic02.pdf
06FPBasic02.pdf
Alireza418370
 
C034011016
C034011016C034011016
C034011016
ijceronline
 
Mining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and CorrelationsMining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and Correlations
Justin Cletus
 
data_mining.pptx
data_mining.pptxdata_mining.pptx
data_mining.pptx
PriyankaManna8
 
Graph mining ppt
Graph mining pptGraph mining ppt
Graph mining ppt
tallalfarooq1
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
Sequential pattern mining
Sequential pattern miningSequential pattern mining
Sequential pattern miningkiran said
 
Frequent Pattern Analysis, Apriori and FP Growth Algorithm
Frequent Pattern Analysis, Apriori and FP Growth AlgorithmFrequent Pattern Analysis, Apriori and FP Growth Algorithm
Frequent Pattern Analysis, Apriori and FP Growth Algorithm
ShivarkarSandip
 
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
AshishDPatel1
 
Cvpr2010 open source vision software, intro and training part v open cv and r...
Cvpr2010 open source vision software, intro and training part v open cv and r...Cvpr2010 open source vision software, intro and training part v open cv and r...
Cvpr2010 open source vision software, intro and training part v open cv and r...zukun
 
Grill at bigdata-cloud conf
Grill at bigdata-cloud confGrill at bigdata-cloud conf
Grill at bigdata-cloud confamarsri
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesJing WANG
 
The study on mining temporal patterns and related applications in dynamic soc...
The study on mining temporal patterns and related applications in dynamic soc...The study on mining temporal patterns and related applications in dynamic soc...
The study on mining temporal patterns and related applications in dynamic soc...Thanh Hieu
 

Similar to Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber (20)

Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; KamberChapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
Chapter - 5 Data Mining Concepts and Techniques 2nd Ed slides Han &amp; Kamber
 
5.3 mining sequential patterns
5.3 mining sequential patterns5.3 mining sequential patterns
5.3 mining sequential patterns
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap Shot
 
My6asso
My6assoMy6asso
My6asso
 
06FPBasic02.pdf
06FPBasic02.pdf06FPBasic02.pdf
06FPBasic02.pdf
 
C034011016
C034011016C034011016
C034011016
 
Mining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and CorrelationsMining Frequent Patterns, Association and Correlations
Mining Frequent Patterns, Association and Correlations
 
data_mining.pptx
data_mining.pptxdata_mining.pptx
data_mining.pptx
 
05
0505
05
 
Graph mining ppt
Graph mining pptGraph mining ppt
Graph mining ppt
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
3. mining frequent patterns
3. mining frequent patterns3. mining frequent patterns
3. mining frequent patterns
 
Sequential pattern mining
Sequential pattern miningSequential pattern mining
Sequential pattern mining
 
Frequent Pattern Analysis, Apriori and FP Growth Algorithm
Frequent Pattern Analysis, Apriori and FP Growth AlgorithmFrequent Pattern Analysis, Apriori and FP Growth Algorithm
Frequent Pattern Analysis, Apriori and FP Growth Algorithm
 
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern...
 
Cvpr2010 open source vision software, intro and training part v open cv and r...
Cvpr2010 open source vision software, intro and training part v open cv and r...Cvpr2010 open source vision software, intro and training part v open cv and r...
Cvpr2010 open source vision software, intro and training part v open cv and r...
 
Grill at bigdata-cloud conf
Grill at bigdata-cloud confGrill at bigdata-cloud conf
Grill at bigdata-cloud conf
 
Is424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slidesIs424 g1 t9_proposal_slides
Is424 g1 t9_proposal_slides
 
The study on mining temporal patterns and related applications in dynamic soc...
The study on mining temporal patterns and related applications in dynamic soc...The study on mining temporal patterns and related applications in dynamic soc...
The study on mining temporal patterns and related applications in dynamic soc...
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber

  • 1. Data Mining: Concepts and Techniques — Chapter 8 — 8.3 Mining sequence patterns in transactional databases Jiawei Han and Micheline Kamber Department of Computer Science University of Illinois at Urbana-Champaign www.cs.uiuc.edu/~hanj ©2006 Jiawei Han and Micheline Kamber. All rights reserved. April 18, 2013 Data Mining: Concepts and Techniques 1
  • 2. April 18, 2013 Data Mining: Concepts and Techniques 2
  • 3. Chapter 8. Mining Stream, Time- Series, and Sequence Data Mining data streams Mining time-series data Mining sequence patterns in transactional databases Mining sequence patterns in biological data April 18, 2013 Data Mining: Concepts and Techniques 3
  • 4. Sequence Databases & Sequential Patterns  Transaction databases, time-series databases vs. sequence databases  Frequent patterns vs. (frequent) sequential patterns  Applications of sequential pattern mining  Customer shopping sequences:  First buy computer, then CD-ROM, and then digital camera, within 3 months.  Medical treatments, natural disasters (e.g., earthquakes), science & eng. processes, stocks and markets, etc.  Telephone calling patterns, Weblog click streams  DNA sequences and gene structures April 18, 2013 Data Mining: Concepts and Techniques 4
  • 5. What Is Sequential Pattern Mining?  Given a set of sequences, find the complete set of frequent subsequences A sequence : < (ef) (ab) (df) c b > A sequence database SID sequence An element may contain a set of items. 10 <a(abc)(ac)d(cf)> Items within an element are unordered and we list them alphabetically. 20 <(ad)c(bc)(ae)> 30 <(ef)(ab)(df)cb> <a(bc)dc> is a subsequence 40 <eg(af)cbc> of <a(abc)(ac)d(cf)> Given support threshold min_sup =2, <(ab)c> is a sequential pattern April 18, 2013 Data Mining: Concepts and Techniques 5
  • 6. Challenges on Sequential Pattern Mining  A huge number of possible sequential patterns are hidden in databases  A mining algorithm should  find the complete set of patterns, when possible, satisfying the minimum support (frequency) threshold  be highly efficient, scalable, involving only a small number of database scans  be able to incorporate various kinds of user-specific constraints April 18, 2013 Data Mining: Concepts and Techniques 6
  • 7. Sequential Pattern Mining Algorithms  Concept introduction and an initial Apriori-like algorithm  Agrawal & Srikant. Mining sequential patterns, ICDE’95  Apriori-based method: GSP (Generalized Sequential Patterns: Srikant & Agrawal @ EDBT’96)  Pattern-growth methods: FreeSpan & PrefixSpan (Han et al.@KDD’00; Pei, et al.@ICDE’01)  Vertical format-based mining: SPADE (Zaki@Machine Leanining’00)  Constraint-based sequential pattern mining (SPIRIT: Garofalakis, Rastogi, Shim@VLDB’99; Pei, Han, Wang @ CIKM’02)  Mining closed sequential patterns: CloSpan (Yan, Han & Afshar @SDM’03) April 18, 2013 Data Mining: Concepts and Techniques 7
  • 8. The Apriori Property of Sequential Patterns  A basic property: Apriori (Agrawal & Sirkant’94)  If a sequence S is not frequent  Then none of the super-sequences of S is frequent  E.g, <hb> is infrequent  so do <hab> and <(ah)b> Seq. ID Sequence Given support threshold 10 <(bd)cb(ac)> min_sup =2 20 <(bf)(ce)b(fg)> 30 <(ah)(bf)abf> 40 <(be)(ce)d> 50 <a(bd)bcb(ade)> April 18, 2013 Data Mining: Concepts and Techniques 8
  • 9. GSP—Generalized Sequential Pattern Mining  GSP (Generalized Sequential Pattern) mining algorithm  proposed by Agrawal and Srikant, EDBT’96  Outline of the method  Initially, every item in DB is a candidate of length-1  for each level (i.e., sequences of length-k) do  scan database to collect support count for each candidate sequence  generate candidate length-(k+1) sequences from length-k frequent sequences using Apriori  repeat until no frequent sequence or no candidate can be found  Major strength: Candidate pruning by Apriori April 18, 2013 Data Mining: Concepts and Techniques 9
  • 10. Finding Length-1 Sequential Patterns  Examine GSP using an example  Initial candidates: all singleton sequences  <a>, <b>, <c>, <d>, <e>, <f>, <g>, <h> Cand Sup <a> 3  Scan database once, count support for candidates <b> 5 <c> 4 min_sup =2 <d> 3 Seq. ID Sequence 10 <(bd)cb(ac)> <e> 3 20 <(bf)(ce)b(fg)> <f> 2 30 <(ah)(bf)abf> <g> 1 40 <(be)(ce)d> <h> 1 50 <a(bd)bcb(ade)> April 18, 2013 Data Mining: Concepts and Techniques 10
  • 11. GSP: Generating Length-2 Candidates <a> <b> <c> <d> <e> <f> <a> <aa> <ab> <ac> <ad> <ae> <af> 51 length-2 <b> <ba> <bb> <bc> <bd> <be> <bf> Candidates <c> <ca> <cb> <cc> <cd> <ce> <cf> <d> <da> <db> <dc> <dd> <de> <df> <e> <ea> <eb> <ec> <ed> <ee> <ef> <f> <fa> <fb> <fc> <fd> <fe> <ff> <a> <b> <c> <d> <e> <f> Without Apriori <a> <(ab)> <(ac)> <(ad)> <(ae)> <(af)> property, <b> <(bc)> <(bd)> <(be)> <(bf)> 8*8+8*7/2=92 <c> <(cd)> <(ce)> <(cf)> <d> <(de)> <(df)> candidates <e> Apriori prunes <(ef)> <f> April 18, 2013 44.57% candidates Data Mining: Concepts and Techniques 11
  • 12. The GSP Mining Process 5th scan: 1 cand. 1 length-5 seq. <(bd)cba> Cand. cannot pat. pass sup. threshold 4th scan: 8 cand. 6 length-4 seq. <abba> <(bd)bc> … Cand. not in DB at all pat. 3rd scan: 47 cand. 19 length-3 seq. <abb> <aab> <aba> <baa> <bab> … pat. 20 cand. not in DB at all 2nd scan: 51 cand. 19 length-2 seq. pat. 10 cand. not in DB at all <aa> <ab> … <af> <ba> <bb> … <ff> <(ab)> … <(ef)> 1st scan: 8 cand. 6 length-1 seq. pat. <a> <b> <c> <d> <e> <f> <g> <h> Seq. ID Sequence 10 <(bd)cb(ac)> min_sup =2 20 <(bf)(ce)b(fg)> 30 <(ah)(bf)abf> 40 <(be)(ce)d> 50 <a(bd)bcb(ade)> April 18, 2013 Data Mining: Concepts and Techniques 12
  • 13. Candidate Generate-and-test: Drawbacks  A huge set of candidate sequences generated.  Especially 2-item candidate sequence.  Multiple Scans of database needed.  The length of each candidate grows by one at each database scan.  Inefficient for mining long sequential patterns.  A long pattern grow up from short patterns  The number of short patterns is exponential to the length of mined patterns. April 18, 2013 Data Mining: Concepts and Techniques 13
  • 14. The SPADE Algorithm  SPADE (Sequential PAttern Discovery using Equivalent Class) developed by Zaki 2001  A vertical format sequential pattern mining method  A sequence database is mapped to a large set of  Item: <SID, EID>  Sequential pattern mining is performed by  growing the subsequences (patterns) one item at a time by Apriori candidate generation April 18, 2013 Data Mining: Concepts and Techniques 14
  • 15. The SPADE Algorithm April 18, 2013 Data Mining: Concepts and Techniques 15
  • 16. Bottlenecks of GSP and SPADE  A huge set of candidates could be generated  1,000 frequent length-1 sequences generate s huge number of 1000 × 999 length-2 candidates! 1000 ×1000 + = 1,499,500 2  Multiple scans of database in mining  Breadth-first search  Mining long sequential patterns  Needs an exponential number of short candidates 100  100  100 A length-100 sequential pattern needs 10 ∑ i  30    = 2 − 1 ≈ 1030 i =1   candidate sequences! April 18, 2013 Data Mining: Concepts and Techniques 16
  • 17. Prefix and Suffix (Projection)  <a>, <aa>, <a(ab)> and <a(abc)> are prefixes of sequence <a(abc)(ac)d(cf)>  Given sequence <a(abc)(ac)d(cf)> Prefix Suffix (Prefix-Based Projection) <a> <(abc)(ac)d(cf)> <aa> <(_bc)(ac)d(cf)> <ab> <(_c)(ac)d(cf)> April 18, 2013 Data Mining: Concepts and Techniques 17
  • 18. Mining Sequential Patterns by Prefix Projections  Step 1: find length-1 sequential patterns  <a>, <b>, <c>, <d>, <e>, <f>  Step 2: divide search space. The complete set of seq. pat. can be partitioned into 6 subsets:  The ones having prefix <a>;  The ones having prefix <b>; SID sequence  … 10 <a(abc)(ac)d(cf)>  The ones having prefix <f> 20 <(ad)c(bc)(ae)> 30 <(ef)(ab)(df)cb> 40 <eg(af)cbc> April 18, 2013 Data Mining: Concepts and Techniques 18
  • 19. Finding Seq. Patterns with Prefix <a>  Only need to consider projections w.r.t. <a>  <a>-projected database: <(abc)(ac)d(cf)>, <(_d)c(bc) (ae)>, <(_b)(df)cb>, <(_f)cbc>  Find all the length-2 seq. pat. Having prefix <a>: <aa>, <ab>, <(ab)>, <ac>, <ad>, <af>  Further partition into 6 subsets SID sequence  Having prefix <aa>; 10 <a(abc)(ac)d(cf)>  … 20 <(ad)c(bc)(ae)> 30 <(ef)(ab)(df)cb>  Having prefix <af> 40 <eg(af)cbc> April 18, 2013 Data Mining: Concepts and Techniques 19
  • 20. Completeness of PrefixSpan SDB SID sequence Length-1 sequential patterns 10 <a(abc)(ac)d(cf)> <a>, <b>, <c>, <d>, <e>, <f> 20 <(ad)c(bc)(ae)> 30 <(ef)(ab)(df)cb> 40 <eg(af)cbc> Having prefix <a> Having prefix <c>, …, <f> Having prefix <b> <a>-projected database <(abc)(ac)d(cf)> Length-2 sequential <b>-projected database … <(_d)c(bc)(ae)> patterns <(_b)(df)cb> <aa>, <ab>, <(ab)>, <(_f)cbc> <ac>, <ad>, <af> …… Having prefix <aa> Having prefix <af> <aa>-proj. db … <af>-proj. db April 18, 2013 Data Mining: Concepts and Techniques 20
  • 21. Efficiency of PrefixSpan  No candidate sequence needs to be generated  Projected databases keep shrinking  Major cost of PrefixSpan: constructing projected databases  Can be improved by pseudo-projections April 18, 2013 Data Mining: Concepts and Techniques 21
  • 22. Speed-up by Pseudo-projection  Major cost of PrefixSpan: projection  Postfixes of sequences often appear repeatedly in recursive projected databases  When (projected) database can be held in main memory, use pointers to form projections  Pointer to the sequence s=<a(abc)(ac)d(cf)>  Offset of the postfix <a> s|<a>: ( , 2) <(abc)(ac)d(cf)> <ab> s|<ab>: ( , 4) <(_c)(ac)d(cf)> April 18, 2013 Data Mining: Concepts and Techniques 22
  • 23. Pseudo-Projection vs. Physical Projection  Pseudo-projection avoids physically copying postfixes  Efficient in running time and space when database can be held in main memory  However, it is not efficient when database cannot fit in main memory  Disk-based random accessing is very costly  Suggested Approach:  Integration of physical and pseudo-projection  Swapping to pseudo-projection when the data set fits in memory April 18, 2013 Data Mining: Concepts and Techniques 23
  • 24. Performance on Data Set C10T8S8I8 April 18, 2013 Data Mining: Concepts and Techniques 24
  • 25. Performance on Data Set Gazelle April 18, 2013 Data Mining: Concepts and Techniques 25
  • 26. Effect of Pseudo-Projection April 18, 2013 Data Mining: Concepts and Techniques 26
  • 27. CloSpan: Mining Closed Sequential Patterns  A closed sequential pattern s: there exists no superpattern s’ such that s’ ‫ כ‬s, and s’ and s have the same support  Motivation: reduces the number of (redundant) patterns but attains the same expressive power  Using Backward Subpattern and Backward Superpattern pruning to prune redundant search space April 18, 2013 Data Mining: Concepts and Techniques 27
  • 28. CloSpan: Performance Comparison with PrefixSpan April 18, 2013 Data Mining: Concepts and Techniques 28
  • 29. Constraint-Based Seq.-Pattern Mining  Constraint-based sequential pattern mining  Constraints: User-specified, for focused mining of desired patterns  How to explore efficient mining with constraints? — Optimization  Classification of constraints  Anti-monotone: E.g., value_sum(S) < 150, min(S) > 10  Monotone: E.g., count (S) > 5, S ⊇ {PC, digital_camera}  Succinct: E.g., length(S) ≥ 10, S ∈ {Pentium, MS/Office, MS/Money}  Convertible: E.g., value_avg(S) < 25, profit_sum (S) > 160, max(S)/avg(S) < 2, median(S) – min(S) > 5  Inconvertible: E.g., avg(S) – median(S) = 0 April 18, 2013 Data Mining: Concepts and Techniques 29
  • 30. From Sequential Patterns to Structured Patterns  Sets, sequences, trees, graphs, and other structures  Transaction DB: Sets of items  {{i , i , …, i }, …} 1 2 m  Seq. DB: Sequences of sets:  {<{i , i }, …, {i , i , i }>, …} 1 2 m n k  Sets of Sequences:  {{<i , i >, …, <i , i , i >}, …} 1 2 m n k  Sets of trees: {t1, t2, …, tn}  Sets of graphs (mining for frequent subgraphs):  {g , g , …, g } 1 2 n  Mining structured patterns in XML documents, bio- April 18, 2013 structures, etc. chemical Data Mining: Concepts and Techniques 30
  • 31. Episodes and Episode Pattern Mining  Other methods for specifying the kinds of patterns  Serial episodes: A → B  Parallel episodes: A & B  Regular expressions: (A | B)C*(D → E)  Methods for episode pattern mining  Variations of Apriori-like algorithms, e.g., GSP  Database projection-based pattern growth  Similar to the frequent pattern growth without candidate generation April 18, 2013 Data Mining: Concepts and Techniques 31
  • 32. Periodicity Analysis  Periodicity is everywhere: tides, seasons, daily power consumption, etc.  Full periodicity  Every point in time contributes (precisely or approximately) to the periodicity  Partial periodicit: A more general notion  Only some segments contribute to the periodicity  Jim reads NY Times 7:00-7:30 am every week day  Cyclic association rules  Associations which form cycles  Methods  Full periodicity: FFT, other statistical analysis methods  Partial and cyclic periodicity: Variations of Apriori-like mining methods April 18, 2013 Data Mining: Concepts and Techniques 32
  • 33. Ref: Mining Sequential Patterns  R. Srikant and R. Agrawal. Mining sequential patterns: Generalizations and performance improvements. EDBT’96.  H. Mannila, H Toivonen, and A. I. Verkamo. Discovery of frequent episodes in event sequences. DAMI:97.  M. Zaki. SPADE: An Efficient Algorithm for Mining Frequent Sequences. Machine Learning, 2001.  J. Pei, J. Han, H. Pinto, Q. Chen, U. Dayal, and M.-C. Hsu. PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth. ICDE'01 (TKDE’04).  J. Pei, J. Han and W. Wang, Constraint-Based Sequential Pattern Mining in Large Databases, CIKM'02.  X. Yan, J. Han, and R. Afshar. CloSpan: Mining Closed Sequential Patterns in Large Datasets. SDM'03.  J. Wang and J. Han, BIDE: Efficient Mining of Frequent Closed Sequences, ICDE'04.  H. Cheng, X. Yan, and J. Han, IncSpan: Incremental Mining of Sequential Patterns in Large Database, KDD'04.  J. Han, G. Dong and Y. Yin, Efficient Mining of Partial Periodic Patterns in Time Series Database, ICDE'99.  J. Yang, W. Wang, and P. S. Yu, Mining asynchronous periodic patterns in time series data, KDD'00. April 18, 2013 Data Mining: Concepts and Techniques 33
  • 34. April 18, 2013 Data Mining: Concepts and Techniques 34