SlideShare a Scribd company logo
1 of 13
Download to read offline
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 195
Efficient Mining of Association Rules in Oscillatory-based Data
Mohammad Saniee Abadeh saniee@modares.ac.ir
Assistant professor, Faculty of Electrical and Computer Engineering
Tarbiat Modares University
Tehran, 14115-143, Iran
Mojtaba Ala mojtaba.ala@gmail.com
Computer Engineering Department
Payame Noor University
Tehran, Iran
Abstract
Association rules are one of the most researched areas of data mining. Finding frequent patterns
is an important step in association rules mining which is very time consuming and costly. In this
paper, an effective method for mining association rules in the data with the oscillatory value (up,
down) is presented, such as the stock price variation in stock exchange, which, just a few
numbers of the counts of itemsets are searched from the database, and the counts of the rest of
itemsets are computed using the relationships that exist between these types of data. Also, the
strategy of pruning is used to decrease the searching space and increase the rate of the mining
process. Thus, there is no need to investigate the entire frequent patterns from the database.
This takes less time to find frequent patterns. By executing the MR-Miner (an acronym for “Math
Rules-Miner”) algorithm, its performance on the real stock data is analyzed and shown. Our
experiments show that the MR-Miner algorithm can find association rules very efficiently in the
data based on Oscillatory value type.
Keywords: Data Mining, Association Rules, Frequent Patterns, Stock.
1. INTRODUCTION
Association rules mining is an important problem in the data mining filed which deals with
exploring the association and hidden relationships between itemsets within a transaction [2]. For
example, an association rule may be like this: “If the stock prices of Transfo and Parsian go
down, at 80% of probability, the price of Iran Khodro goes down”. This rule is seen in 40% of the
transactions. In this example, the probability posed is called “confidence” and the percentage of
the transactions cover this rule is called “support”.
Several algorithms have been proposed for mining association rules. Among these, the best
approaches are including: Apriori approach [1], [2], which was first introduced by Agrawal in 1993.
This approach operates on the basis of the candidate generation; and, searching {there} is done
through the method of breadth-first so that the network of itemsets is searched from one level to
another one. Eclat’s approach was presented by Zaki et al. in 1997 [5]. FP-growth approach was
presented by Han et al. four years later [4]. In this approach (FP-growth), discovering frequent
patterns is done without candidate generation through using FP-tree where searching is done by
depth-first. Recently, several algorithms have also been introduced for this purpose such as [3],
[12] which were presented by Borgelt et al.
Mining association rules is very useful in the financial issues and the capital market such as the
stock market [7], [8], [9], [10], [11]. Data such as stock data include the oscillatory value type. In
this paper, an effective method about the data with the oscillatory value type is presented in
which, unlike the available algorithms that all frequent itemsets are mined from the database, just
a few numbers of the counts of itemsets are searched from the database, and the counts of the
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 196
rest of itemsets are computed using the relationships that exist between these types of data. The
method consists of two important stages. In the first stage, the frequencies of some patterns is
searched via a database; and, in the second stage, the other frequent patterns are computed by
the frequencies of the patterns which was obtained in the first stage.
The remainder of the paper is organized as follows: In section 2, issues related to mining
association rules are described in the data with the oscillatory value type. In Section 3, the MR-
Miner algorithm is introduced; the experiments results are presented in Section 4; and, Section 5
includes the conclusion of this paper.
2. DEFINITIONS
In this section, some concepts associated with mining association rules in the data with the
oscillatory value type are described. Before doing so, we will first give some definitions.
Definition 1 Let and be two “items”, in this case , where and .
Definition 2 Let and be two “patterns” for
. , where for .
Definition 3 In a transaction database , the number of transactions is shown by . Let be a
pattern, the frequency of is shown by and the support of is shown by
. If is less than the user-specified minimum support, “minsup”, α
will be called a “frequent pattern”.
Definition 4 The number of items in a pattern is called the length of the pattern. A pattern with
the length of is called “k-pattern” (or k-itemset).
Example The length of is equal to 4.
Definition 5 The number of items in a transaction is called the length of the transactions. The
length of transactions is shown by .
Definition 6 An association rule is like , where: (1). Both and are frequent
patterns; (2). ; and, (3). is not less than the user-specified minimum
confidence. The confidence of a rule is defined as .
Oscillatory value: the value of an attribute in a transaction represents an increase or decrease in
it. In the analysis of association on this type of data, only increase or decrease, are important in
the numerical values showing the oscillation. Therefore, the numerical values turn into the "Up" or
"Down".
TABLE 1: Stock market data
Taking stock market database as an example, association rule mining can be used to analyze the
share price movement. The stock prices variation in the stock market database is the oscillatory
value type. As it is shown in Table 1, several trades are considered in the stock market database
Attribute/stock symbol
TID/date
INFODLGMALBZ
UpDownUp20100903
DownDownUp20100904
DownUpDown20100905
UpUpUp20100906
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 197
of a transaction every day and the date of that day is used as its transaction ID (TID). Each
attribute is the changes in stock price of a company accepted in a stock market which has two
values: "Up" or "Down". "Up" indicates the increase of price in one stock, and "Down" indicates
the decrease of price in one stock, which are shown briefly with the numbers of 1 and 2,
respectively.
3. THE MR-MINER ALGORITHM
In this section, the MR-Miner algorithm is presented and the details of the method are shown step
by step. The MR-Miner algorithm is made of the combination of four major functions of the
Candidate, SeekDB, Prune2 and Compute. The Algorithm and its functions are shown in Figures
1, 3, 4, 6.
3.1. The MR-Miner Algorithm
To discover frequent itemsets, the main idea in this method is in such a way that: first,
of the candidate itemsets are generated; then, the other 3 itemsets are generated
by each of these k-itemsets for . There is a relationship between the counts of all obtained
4 itemsets so that by finding the frequency of 1 itemset from the database, the counts of the other
3 itemsets can be computed by Equation 6, with no need to the database. Of course, some of
these candidate itemsets are pruned by the Prune2 function according to Figure 4.
Algorithm: MR-Miner(transaction database D, minsup)
F = Candidate(D);
SeekDB( , D);
Compute( , |D|);
For( k = 2; ≠ ∅; k++ )
if(k>=3)
Purn2( , );
end if
=SeekDB( , D);
Compute( , );
for (each itemset i in )
if (i.Count < minsup)
Delete i from ;
end if
end for
F ;
end for
Output All Frequent Patterns F;
FIGURE 1: The MR-Miner algorithm
In general, the MR-Miner algorithm consists of the following four phases.
PHASE I: Determination of candidate itemsets
PHASE II: Pruning based on the candidate frequent itemsets
PHASE III: Counting some itemsets via the database
PHASE IV: Computing the rest of itemsets, with no need to the database
The following presents the detailed method phase by phase.
3.2. PHASE I: Determination of Candidate Itemsets
First, the candidate patterns are generated in two stages: In the first stage, all itemsets
are generated for . To do this, 1-itemsets are generated by the
available attributes in the transaction database corresponding to Figure 1; then, 2-itemsets are
generated by joining 1-itemsets; similarly, the k-itemsets are generated by joining (k-1)-itemsets.
All the generated itemsets include items with value of 1 (up). In the second stage, using each
generated k-itemsets , of the other itemsets are generated. To generate these
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 198
itemsets, the value of 2 is used in k-2 of their first items. The generated itemsets, in these two
stages, are called candidate itemsets.
Second stage
{}
First stage
K= 0
K= 1
k= 2
K= 3
FIGURE 2: Generation of the candidate itemsets.
To generate candidate 1-itemsets , we need to have the attributes u from the database
which are considered as the input of the Candidate function, and the Join function which is similar
to the function of candidate generation in Apriori approach, has generated k-itemsets for
by joining (k-1)-itemsets. Finally, for each generated itemset, other itemsets are
generated by of the first items. Figure 3 shows the Candidate function.
Function: Candidate(transaction database D)
= ∅;
for (each attribute a of D )
Generate 1-Itemset c by a(1);
{c};
end for
for (k = 2; ≠ ∅; k++)
= Join( );
end for
if (k>2)
for (each Itemset c in )
Generate all c’ by c: c c’=
then j is optional element from {1,2} and
then j=1}
{c’};
end for
end if
return Canadidate Patterns C;
FIGURE 3: The candidate itemset generation function
3.3. PHASE II: Pruning Based on the Candidate Frequent Itemsets
In the MR-Miner algorithm, the strategy of pruning is used to decrease the searching space and
increase the rate of the mining process. Considering that all subsets of frequent k-itemsets are
frequent, if the (k-2)-subset from any candidate frequent k-itemsets is not frequent, this candidate
itemset and other itemsets which should be made by that, will also not be frequent and will
be deleted in this stage.
The code that is shown in Figure 4, with a survey of itemsets in the level of k-1 and k-2 delete a
number of infrequent k-patterns and in this way the searching space will decrease.
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 199
Function: Prune2(k-Itemsets , (k-1)-Itemsets , minsup)
for (each itemset i in )
find (k-2)-subset s of i in
if (s or s.Count <= minsup)
Delete i in
else
find (k-1)-subset s of i in
if (s or s.Count <= minsup)
Delete i in
end if
end if
end for
Return Patterns
FIGURE 4: The Prune2 function
3.4. PHASE III: Counting Some Itemsets Via the Database
In this phase, some itemsets are counted via the database and their frequent patterns available
are determined. This section of the algorithm, the database and the candidate itemsets with
the length of k are received as input and the counts of patterns return as output. This is done by
the SeekDB function. Similar to Apriori algorithm, this stage has searched the database once at
any level.
3.5. PHASE IV: Computing the Rest of Itemsets, With no Need to the Database
The itemset is generated for each candidate itemset with the length of 1. To
simplify, it can be assumed , .
Considering that each attribute u is one of the two values of increase or decrease, and the
number of whole values of one attribute is equal to the number of the whole transactions, we
have for each attribute u:
So, we have for each 1-itemset :
So, to calculate the counts of the itemsets with the length of 1, all are searched from the
database and all can be computed by Equation 2.
Also, for each candidate itemset with the length of higher than 1, there is other itemsets
which should be generated, and their frequency should be computed.
For , other itemsets are generated by each of candidate 2-itemsets according to the
Figure 5. There is a shared 1-itemset for all two 2-itemsets shown in Figure 5.
(2)
(1)
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 200
FIGURE 5: Relationship between 2-itemsets
Considering the available relationships in Figure 5, we have:
We can extend Equation 3 for itemsets with the length more than 2. Let be the itemset
generated by a candidate itemset with the length of k such that and let be the
itemset with the length of such that . Regarding Equation 3, we have:
So, for their counts, we have:
Finally, to compute the counts of k-itemsets , , , we have:
Thus, by any candidate k-itemsets , 3 k-itemsets are generated which, at
every level, by searching the frequency of the itemset from the database, the counts of the
itemsets via Equation 6, are computed. Figure 6 shows the Compute function.
(4)
(3)
(6)
(5)
Generate
Candidate k-itemset
Shared (k-1)-itemset
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 201
Function: Compute( , ,|D|)
for (each k-itemset i in )
=i;
if (k = 1)
.Count = |D| - .Count;
;
else
Find in
Generate , , by
;
;
;
;
end if
end for
Return
FIGURE 6: The Compute function
4. PERFORMANCE STUDY
We evaluated the performance of the MR-Miner algorithm on two synthetic datasets and three
real datasets with various parameters. The data of Tehran Stock Exchange were collected from
Tehran Securities Exchange Technology Management Company (TSETMC). We compared
proposed algorithm with the Apriori algorithm. Apriori algorithm is a very useful and well-known
algorithm and has been used in many articles related to mining association in exchange data in
the recent years [8], [9], [10]. All experiments were running on a computer with a Pentium
3.06GHz processing, 1GB of main memory, 500GB of hard disk capacity and the operating
system of Microsoft Windows XP. Both algorithms have been implemented using C# in the
environment of Microsoft Visual Studio 2008.
Parameters
Real-life datasets Synthetic datasets
Dataset 1 Dataset 2 Dataset 3 Dataset 4 Dataset 5
Number of transaction
Length of transaction
2000
6
2000
10
2000
16
5000
10
10000
10
TABLE 2: Sets of the parameters for 5 datasets
We generated two synthetic datasets, dataset 4 and dataset 5, using the parameters shown in
Table 2, and, the first three are real stock data.
4.1.Experiment on Synthetic Data
In this section, we compare the MR-Miner algorithm with the Apriori Algorithm by varying one
parameter, which maintaining the other parameter at the default values shown in Table 2.
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 202
FIGURE 7: Minimum support versus run time, Dataset 4
FIGURE 8: Minimum support versus run time, Dataset 5
Figures 7, 8 and 9 have shown the minimum support versus the run time. In Figure 8, the
minimum support was investigated versus the run time with the lower minimum support for
dataset 5. In this case, more itemsets were mined. By decreasing the amount of minimum
support, the proposed algorithm had much less linear increase compared to the Apriori algorithm.
Also, by increasing the minimum support, the run time on the dataset 4 is shown in Figures 7 and
9.
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 203
FIGURE 9: Minimum support versus run time, Dataset 4
Figure 10 shows the effect of increasing the number of transactions versus the run time on the
dataset 2, 4 and 5. 2000, 5000 and 10000 were considered as the numbers of transactions. The
minimum support of 20% was used for all datasets. The run time of both algorithms will increase
versus increasing the number of transactions, so that the proposed algorithm will need 3 times
less run time than the Apriori algorithm.
FIGURE 10: Number of transactions versus run time, with minsup = 20%
We also investigated the effect of the length of a transaction on both algorithms. The results are
shown in Figure 11. In both algorithms, the run time had increased by increasing the length of
transaction. Therefore, under the same support, more itemsets would be generated if the length
of transactions increased. So, more candidate itemsets should be generated. In the proposed
algorithm, since computing the entire frequent itemsets from database is not needed, by
increasing the length of transactions, 3 times less time is needed than the Apriori algorithm.
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 204
FIGURE 11: Length of transactions versus run time, with minsup = 16%
4.2.Experiments on Real Data
We now compare the MR-Miner algorithm and Apriori algorithm by mining three datasets 1, 2, 3.
The datasets are included the stock price changes of eight companies: Iran Khodro, Jaber Ebne
Hayyan Pharmacy, Tehran Cement, Mines & Metals Development, Isfahan Petrochemicals, Iran
Transfo, Kashan Amirkabir Steel and Parsian Bank. The data were related to the trading days
from March 2001 to June 2011.
Figures 12 to 14, illustrate the run time versus the minimum support for Dataset 2 and Dataset 3.
The MR-Miner algorithm runs 3-4 times faster than the Apriori algorithm for real data.
FIGURE 12: Minimum support versus run time, Dataset 2
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 205
FIGURE 13: Minimum support versus run time, Dataset 3
FIGURE 14: Minimum support versus run time, Dataset 3
In summary, the proposed algorithm was implemented faster than the Apriori algorithm on all
datasets. The results had shown that the MR-Miner algorithm had operated better than the Apriori
algorithm in all cases. Considering that the presented algorithm is an absolute algorithm and does
not use the sampling methods, the accuracy of this algorithm likes that of the Apriori algorithm is
100%.
When mining the Tehran stock exchange data, some interesting rules were found. For Dataset 3,
a sample rule found was “BTRNS(2), BPAR(2) → STEH(2)”. That is, if Transfo and Parsian fall,
then Tehran Cement will fall with support =22% and confidence=75%. Also a sample rule found
was “IKCO(1), BTRNS(2) → STEH(2)”. That is, if Iran Khodro rise, and Transfo falls, then Tehran
Cement will fall with support=19% and confidence 67%. It should be noted that the association
rules have a lower support on this type of attributes.
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 206
TABLE 3: Some of the association rules extracted from real data of Tehran stock exchange
Table 3 shows more association in decreasing the stock prices of the analyzed companies on the
Tehran exchange data, such as rules 2, 3, 4, 6, 8 and 9 in Table 3 which can be seen with a more
powerful support whereas the associations of stock price increase can be seen with a less
support, such as rules 5, 10, 11, 12, 13 and 14.
5. CONCLUSION AND FUTURE WORK
In this paper, using the available relationship between the counts of itemsets inside the data with
the oscillating value type, a new algorithm was implemented on the basis of generation of the
candidate patterns. In the MR-Miner algorithm, based on relationship between the counts of
itemsets in this type of data, many counts of itemsets were computed via the counts of other
itemsets and with no need to searching the database. On the other hand, pruning strategy was
used to reduce the searching space effectively. Thus, much less time was spent to find frequent
patterns. By conducting experiments on the real data and synthetic data, it was shown that the
presented algorithm had operated much faster than the basic Apriori algorithm.
Although we have shown that the proposed algorithm can efficiently mine association rules on the
data with the oscillatory value type, there are still some issues that should be addressed in future
researches, as we may extend the proposed algorithm from the frequent patterns to the closed
frequent patterns. In order to have more decrease on the search space, a more effective function
of prune can be implemented.
ACKNOWLEDGMENTS
We are grateful to Roholla Yosefian for his fruitful contributions on the mathematics issues and
we are also grateful to our best friends Hamid Mohammadi and Fareed Mohammadi whose their
help was encouraging.
REFERENCES
[1] R. Agrawal, T. Imielienski and A. Swami. “Mining Association Rules between Sets of Items
in Large Databases”, in Proc. Management of Data, 1993, pp 207–216.
[2] R. Agrawal, R. Srikant, “Fast Algorithm for Mining Association Rules”, in Proc. VLDB,
Santiago de chile, 1994.
[3] C. Borgelt and X. Yang, “Finding Closed Frequent Item Sets by Intersecting Transactions”,
in Proc. 14th Int. Conf. on Extending Database Technology (EDBT 2011, Uppsala,
Sweden), 2011.
No Rules Support Confidence
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
DBJR(1)--> STEH(2)
PESF(2)--> STEH(2)
BTRNS(2)--> STEH(2)
BPAR(2)--> STEH(2)
DBJR(1), PESF(1)--> IKCO(1)
BTRNS(2), FAJR(2)--> STEH(2)
BTRNS(2), BPAR(2)--> STEH(2)
FAJR(2), BPAR(2)--> STEH(2)
BTRNS(2), BPAR(2) --> MADN(2)
IKCO(1), DBJR(1)--> MADN(1)
DBJR(1), MADN(1)--> IKCO(1)
MADN(1), FAJR(1)--> IKCO(1)
PESF(1), MADN(1)--> BPAR(1)
MADN(1), FAJR(1)--> BPAR(1)
DBJR(1), STEH(2)--> IKCO(1)
IKCO(1), BTRNS(2)--> STEH(2)
PESF(1), STEH(2)--> BTRNS(2)
30%
33%
39%
34%
21%
24%
22%
23%
23%
19%
19%
18%
18%
19%
18%
19%
19%
61%
73%
66%
71%
71%
68%
75%
75%
77%
61%
75%
73%
65%
75%
61%
67%
63%
Mohammad Saniee Abadeh & Mojtaba Ala
International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 207
[4] J. Han, H. Pei and Y. Yin, “Mining Frequent Patterns without Candidate Generation”. In
Proc. the Management of Data (SIGMOD'00, Dallas, TX), New York, NY, USA, ACM
Press, pp. 1-12, 2000.
[5] M. Zaki, S. Parthasarathy, M. Ogihara and W. Li, “New Algorithms for Fast Discovery of
Association Rules”, In Proc. 3rd Int. Conf. on Knowledge Discovery and Data Mining
(KDD'97, Newport Beach, CA), AAAI Press, pp. 283-296, 1997.
[6] Claudio Lucchese, Salvatore and Raffaele Perego, “Fast and Memory Efficient Mining of
Frequent Closed Itemsets”, in Proc Knowledge and Data Engineering, pp. 21-36, 2006.
[7] Anthony J.T. Lee and Chun-Sheng Wang, “An Efficient Algorithm for Mining Frequent Inter-
Transaction Patterns”, Information Sciences 177, pp. 3453-3476, 2007.
[8] Shu-hsien Liao, Pei-hui Chu and Tzu-kang Teng, “Mining the co-movement in the Taiwan
Stock Funds Market”, Expert Systems with Applications, Volume 38, Issue 5, pp. 5276-
5288, 2011.
[9] Sung Hoon Na and So Young Sohn, “Forecasting Changes in Korea Composite Stock
Price Index (KOSPI) using Association Rules”, Expert Systems with Applications, Volume
38, Issue 7, pp. 9046-9049, 2011.
[10] Hulyi Tan Cai and H.J. Yong Li, “Frequent Patterns of Investment Behaviors in Shanghai
Stock Market”, Science and Software Engineering, Volume 04, pp. 325-328, 2008.
[11] Vladimir Boginski, Sergiy Butenko and Panos M. Pardalos, “Mining Market Data: A
Network Approach”, Computers & Operations Research, Volume 33, Issue 11, pp. 3171-
3184, 2006.
[12] Borgelt, C., Yang, X., Nogales-Cadenas, R., Carmona-Saez, P., Pascual-Montano, A.
“Finding Closed Frequent Item Sets by Intersecting Transactions”, In. 14th. Extending
Database Technology, ACM Press, New York, pp. 367-376, 2011.

More Related Content

What's hot

A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsWaqas Tariq
 
Analysis and Comparative of Sorting Algorithms
Analysis and Comparative of Sorting AlgorithmsAnalysis and Comparative of Sorting Algorithms
Analysis and Comparative of Sorting Algorithmsijtsrd
 
ADS Introduction
ADS IntroductionADS Introduction
ADS IntroductionNagendraK18
 
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithmpaperpublications3
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesEditor IJMTER
 
A classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningA classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningIOSR Journals
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...eSAT Journals
 
Data Structure and Algorithms
Data Structure and AlgorithmsData Structure and Algorithms
Data Structure and Algorithmsiqbalphy1
 
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...Majid_ahmed
 
BASICS OF DATA STRUCTURE
BASICS OF DATA STRUCTUREBASICS OF DATA STRUCTURE
BASICS OF DATA STRUCTUREVENNILAV6
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATAacijjournal
 
Automation Tool Development to Improve Machine Results using Data Analysis
Automation Tool Development to Improve Machine Results using Data AnalysisAutomation Tool Development to Improve Machine Results using Data Analysis
Automation Tool Development to Improve Machine Results using Data AnalysisIRJET Journal
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemslaxmanLaxman03209
 

What's hot (20)

Ej36829834
Ej36829834Ej36829834
Ej36829834
 
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in MultidatasetsA Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
A Novel preprocessing Algorithm for Frequent Pattern Mining in Multidatasets
 
Analysis and Comparative of Sorting Algorithms
Analysis and Comparative of Sorting AlgorithmsAnalysis and Comparative of Sorting Algorithms
Analysis and Comparative of Sorting Algorithms
 
The Short-term Swap Rate Models in China
The Short-term Swap Rate Models in ChinaThe Short-term Swap Rate Models in China
The Short-term Swap Rate Models in China
 
ADS Introduction
ADS IntroductionADS Introduction
ADS Introduction
 
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining Techniques
 
Data Structures & Algorithms
Data Structures & AlgorithmsData Structures & Algorithms
Data Structures & Algorithms
 
Binary Sort
Binary SortBinary Sort
Binary Sort
 
A classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningA classification of methods for frequent pattern mining
A classification of methods for frequent pattern mining
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...
 
Data Structure and Algorithms
Data Structure and AlgorithmsData Structure and Algorithms
Data Structure and Algorithms
 
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...
A Comparative Study of AI Techniques for Solving Hybrid Flow Shop (HFS) Sched...
 
Introduction to data structure and algorithms
Introduction to data structure and algorithmsIntroduction to data structure and algorithms
Introduction to data structure and algorithms
 
K044055762
K044055762K044055762
K044055762
 
BASICS OF DATA STRUCTURE
BASICS OF DATA STRUCTUREBASICS OF DATA STRUCTURE
BASICS OF DATA STRUCTURE
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
 
Linear search-and-binary-search
Linear search-and-binary-searchLinear search-and-binary-search
Linear search-and-binary-search
 
Automation Tool Development to Improve Machine Results using Data Analysis
Automation Tool Development to Improve Machine Results using Data AnalysisAutomation Tool Development to Improve Machine Results using Data Analysis
Automation Tool Development to Improve Machine Results using Data Analysis
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problems
 

Viewers also liked

Fooling the company – The Corporate Jester As Driving Force For Organizationa...
Fooling the company – The Corporate Jester As Driving Force For Organizationa...Fooling the company – The Corporate Jester As Driving Force For Organizationa...
Fooling the company – The Corporate Jester As Driving Force For Organizationa...Waqas Tariq
 
Advancement of Android from Ancient Time to Present Time and Contribution of ...
Advancement of Android from Ancient Time to Present Time and Contribution of ...Advancement of Android from Ancient Time to Present Time and Contribution of ...
Advancement of Android from Ancient Time to Present Time and Contribution of ...Waqas Tariq
 
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot Arm
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot ArmDesign Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot Arm
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot ArmWaqas Tariq
 
Toc Approach for Supply Chain Performance Enhancement
Toc Approach for Supply Chain Performance EnhancementToc Approach for Supply Chain Performance Enhancement
Toc Approach for Supply Chain Performance EnhancementWaqas Tariq
 
An Artificial Neural Network Model for Neonatal Disease Diagnosis
An Artificial Neural Network Model for Neonatal Disease DiagnosisAn Artificial Neural Network Model for Neonatal Disease Diagnosis
An Artificial Neural Network Model for Neonatal Disease DiagnosisWaqas Tariq
 
A Supply Chain Design Approach to Petroleum Distribution
A Supply Chain Design Approach to Petroleum DistributionA Supply Chain Design Approach to Petroleum Distribution
A Supply Chain Design Approach to Petroleum DistributionWaqas Tariq
 
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...Waqas Tariq
 
Reflecting upon Management Systems: Content analysis and synthesis
Reflecting upon Management Systems: Content analysis and synthesisReflecting upon Management Systems: Content analysis and synthesis
Reflecting upon Management Systems: Content analysis and synthesisWaqas Tariq
 
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...Waqas Tariq
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
 
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Waqas Tariq
 
The Comprehension Modes of Visual Elements: How People Know About the Content...
The Comprehension Modes of Visual Elements: How People Know About the Content...The Comprehension Modes of Visual Elements: How People Know About the Content...
The Comprehension Modes of Visual Elements: How People Know About the Content...Waqas Tariq
 
Clustering Using Shared Reference Points Algorithm Based On a Sound Data Model
Clustering Using Shared Reference Points Algorithm Based On a Sound Data ModelClustering Using Shared Reference Points Algorithm Based On a Sound Data Model
Clustering Using Shared Reference Points Algorithm Based On a Sound Data ModelWaqas Tariq
 
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...Waqas Tariq
 
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...Waqas Tariq
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryWaqas Tariq
 
Design of Success Criteria Based Evaluation Model for Assessing the Research ...
Design of Success Criteria Based Evaluation Model for Assessing the Research ...Design of Success Criteria Based Evaluation Model for Assessing the Research ...
Design of Success Criteria Based Evaluation Model for Assessing the Research ...Waqas Tariq
 
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...Waqas Tariq
 

Viewers also liked (18)

Fooling the company – The Corporate Jester As Driving Force For Organizationa...
Fooling the company – The Corporate Jester As Driving Force For Organizationa...Fooling the company – The Corporate Jester As Driving Force For Organizationa...
Fooling the company – The Corporate Jester As Driving Force For Organizationa...
 
Advancement of Android from Ancient Time to Present Time and Contribution of ...
Advancement of Android from Ancient Time to Present Time and Contribution of ...Advancement of Android from Ancient Time to Present Time and Contribution of ...
Advancement of Android from Ancient Time to Present Time and Contribution of ...
 
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot Arm
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot ArmDesign Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot Arm
Design Adaptive Fuzzy Inference Sliding Mode Algorithm: Applied to Robot Arm
 
Toc Approach for Supply Chain Performance Enhancement
Toc Approach for Supply Chain Performance EnhancementToc Approach for Supply Chain Performance Enhancement
Toc Approach for Supply Chain Performance Enhancement
 
An Artificial Neural Network Model for Neonatal Disease Diagnosis
An Artificial Neural Network Model for Neonatal Disease DiagnosisAn Artificial Neural Network Model for Neonatal Disease Diagnosis
An Artificial Neural Network Model for Neonatal Disease Diagnosis
 
A Supply Chain Design Approach to Petroleum Distribution
A Supply Chain Design Approach to Petroleum DistributionA Supply Chain Design Approach to Petroleum Distribution
A Supply Chain Design Approach to Petroleum Distribution
 
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...
Cross Border Virtual Entrepreneurship: Design of Flexible Entrepreneurship Co...
 
Reflecting upon Management Systems: Content analysis and synthesis
Reflecting upon Management Systems: Content analysis and synthesisReflecting upon Management Systems: Content analysis and synthesis
Reflecting upon Management Systems: Content analysis and synthesis
 
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...
On line Tuning Premise and Consequence FIS: Design Fuzzy Adaptive Fuzzy Slidi...
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in Mauritius
 
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...
 
The Comprehension Modes of Visual Elements: How People Know About the Content...
The Comprehension Modes of Visual Elements: How People Know About the Content...The Comprehension Modes of Visual Elements: How People Know About the Content...
The Comprehension Modes of Visual Elements: How People Know About the Content...
 
Clustering Using Shared Reference Points Algorithm Based On a Sound Data Model
Clustering Using Shared Reference Points Algorithm Based On a Sound Data ModelClustering Using Shared Reference Points Algorithm Based On a Sound Data Model
Clustering Using Shared Reference Points Algorithm Based On a Sound Data Model
 
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...
Manager’s Preferences Modeling within Multi-Criteria Flowshop Scheduling Prob...
 
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...
Position Control of Robot Manipulator: Design a Novel SISO Adaptive Sliding M...
 
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance HistoryA Novel Hybrid Voter Using Genetic Algorithm and Performance History
A Novel Hybrid Voter Using Genetic Algorithm and Performance History
 
Design of Success Criteria Based Evaluation Model for Assessing the Research ...
Design of Success Criteria Based Evaluation Model for Assessing the Research ...Design of Success Criteria Based Evaluation Model for Assessing the Research ...
Design of Success Criteria Based Evaluation Model for Assessing the Research ...
 
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...
Impact of Merger on Stress Level of Employees (A Case Study of Erstwhile Bank...
 

Similar to Efficient Mining of Association Rules in Oscillatory-based Data

Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...Editor IJCATR
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)inventionjournals
 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286Ninad Samel
 
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...IAEME Publication
 
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Gurdal Ertek
 
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...iosrjce
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
13 Munmun Kalita 104-109
13         Munmun Kalita          104-10913         Munmun Kalita          104-109
13 Munmun Kalita 104-109Munmun Kalita
 
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsComparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsIJCI JOURNAL
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Editor IJARCET
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
A boolean modeling for improving
A boolean modeling for improvingA boolean modeling for improving
A boolean modeling for improvingcsandit
 
Fast Sequential Rule Mining
Fast Sequential Rule MiningFast Sequential Rule Mining
Fast Sequential Rule Miningijsrd.com
 

Similar to Efficient Mining of Association Rules in Oscillatory-based Data (20)

Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...
Combining Neural Network and Firefly Algorithm to Predict Stock Price in Tehr...
 
International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)International Journal of Mathematics and Statistics Invention (IJMSI)
International Journal of Mathematics and Statistics Invention (IJMSI)
 
J0945761
J0945761J0945761
J0945761
 
Ad03301810188
Ad03301810188Ad03301810188
Ad03301810188
 
5 parallel implementation 06299286
5 parallel implementation 062992865 parallel implementation 06299286
5 parallel implementation 06299286
 
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...Re-Mining Association Mining Results through Visualization, Data Envelopment ...
Re-Mining Association Mining Results through Visualization, Data Envelopment ...
 
R01732105109
R01732105109R01732105109
R01732105109
 
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
13 Munmun Kalita 104-109
13         Munmun Kalita          104-10913         Munmun Kalita          104-109
13 Munmun Kalita 104-109
 
J017114852
J017114852J017114852
J017114852
 
Comparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streamsComparative analysis of association rule generation algorithms in data streams
Comparative analysis of association rule generation algorithms in data streams
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084Volume 2-issue-6-2081-2084
Volume 2-issue-6-2081-2084
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Ag35183189
Ag35183189Ag35183189
Ag35183189
 
A boolean modeling for improving
A boolean modeling for improvingA boolean modeling for improving
A boolean modeling for improving
 
Fast Sequential Rule Mining
Fast Sequential Rule MiningFast Sequential Rule Mining
Fast Sequential Rule Mining
 

More from Waqas Tariq

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI designWaqas Tariq
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesWaqas Tariq
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaWaqas Tariq
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
 

More from Waqas Tariq (20)

The Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a WidgetThe Use of Java Swing’s Components to Develop a Widget
The Use of Java Swing’s Components to Develop a Widget
 
3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image3D Human Hand Posture Reconstruction Using a Single 2D Image
3D Human Hand Posture Reconstruction Using a Single 2D Image
 
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...
 
A Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab DisabledA Proposed Web Accessibility Framework for the Arab Disabled
A Proposed Web Accessibility Framework for the Arab Disabled
 
Real Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor FilterReal Time Blinking Detection Based on Gabor Filter
Real Time Blinking Detection Based on Gabor Filter
 
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...
 
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...
 
Collaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational KnolwedgeCollaborative Learning of Organisational Knolwedge
Collaborative Learning of Organisational Knolwedge
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI design
 
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardDevelopment of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 Board
 
An overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer InterfaceAn overview on Advanced Research Works on Brain-Computer Interface
An overview on Advanced Research Works on Brain-Computer Interface
 
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...
 
Principles of Good Screen Design in Websites
Principles of Good Screen Design in WebsitesPrinciples of Good Screen Design in Websites
Principles of Good Screen Design in Websites
 
Progress of Virtual Teams in Albania
Progress of Virtual Teams in AlbaniaProgress of Virtual Teams in Albania
Progress of Virtual Teams in Albania
 
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...
 
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...
 
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...
 
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorDynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text Editor
 
An Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity RemovalAn Improved Approach for Word Ambiguity Removal
An Improved Approach for Word Ambiguity Removal
 
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Parameters Optimization for Improving ASR Performance in Adverse Real World N...
Parameters Optimization for Improving ASR Performance in Adverse Real World N...
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Efficient Mining of Association Rules in Oscillatory-based Data

  • 1. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 195 Efficient Mining of Association Rules in Oscillatory-based Data Mohammad Saniee Abadeh saniee@modares.ac.ir Assistant professor, Faculty of Electrical and Computer Engineering Tarbiat Modares University Tehran, 14115-143, Iran Mojtaba Ala mojtaba.ala@gmail.com Computer Engineering Department Payame Noor University Tehran, Iran Abstract Association rules are one of the most researched areas of data mining. Finding frequent patterns is an important step in association rules mining which is very time consuming and costly. In this paper, an effective method for mining association rules in the data with the oscillatory value (up, down) is presented, such as the stock price variation in stock exchange, which, just a few numbers of the counts of itemsets are searched from the database, and the counts of the rest of itemsets are computed using the relationships that exist between these types of data. Also, the strategy of pruning is used to decrease the searching space and increase the rate of the mining process. Thus, there is no need to investigate the entire frequent patterns from the database. This takes less time to find frequent patterns. By executing the MR-Miner (an acronym for “Math Rules-Miner”) algorithm, its performance on the real stock data is analyzed and shown. Our experiments show that the MR-Miner algorithm can find association rules very efficiently in the data based on Oscillatory value type. Keywords: Data Mining, Association Rules, Frequent Patterns, Stock. 1. INTRODUCTION Association rules mining is an important problem in the data mining filed which deals with exploring the association and hidden relationships between itemsets within a transaction [2]. For example, an association rule may be like this: “If the stock prices of Transfo and Parsian go down, at 80% of probability, the price of Iran Khodro goes down”. This rule is seen in 40% of the transactions. In this example, the probability posed is called “confidence” and the percentage of the transactions cover this rule is called “support”. Several algorithms have been proposed for mining association rules. Among these, the best approaches are including: Apriori approach [1], [2], which was first introduced by Agrawal in 1993. This approach operates on the basis of the candidate generation; and, searching {there} is done through the method of breadth-first so that the network of itemsets is searched from one level to another one. Eclat’s approach was presented by Zaki et al. in 1997 [5]. FP-growth approach was presented by Han et al. four years later [4]. In this approach (FP-growth), discovering frequent patterns is done without candidate generation through using FP-tree where searching is done by depth-first. Recently, several algorithms have also been introduced for this purpose such as [3], [12] which were presented by Borgelt et al. Mining association rules is very useful in the financial issues and the capital market such as the stock market [7], [8], [9], [10], [11]. Data such as stock data include the oscillatory value type. In this paper, an effective method about the data with the oscillatory value type is presented in which, unlike the available algorithms that all frequent itemsets are mined from the database, just a few numbers of the counts of itemsets are searched from the database, and the counts of the
  • 2. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 196 rest of itemsets are computed using the relationships that exist between these types of data. The method consists of two important stages. In the first stage, the frequencies of some patterns is searched via a database; and, in the second stage, the other frequent patterns are computed by the frequencies of the patterns which was obtained in the first stage. The remainder of the paper is organized as follows: In section 2, issues related to mining association rules are described in the data with the oscillatory value type. In Section 3, the MR- Miner algorithm is introduced; the experiments results are presented in Section 4; and, Section 5 includes the conclusion of this paper. 2. DEFINITIONS In this section, some concepts associated with mining association rules in the data with the oscillatory value type are described. Before doing so, we will first give some definitions. Definition 1 Let and be two “items”, in this case , where and . Definition 2 Let and be two “patterns” for . , where for . Definition 3 In a transaction database , the number of transactions is shown by . Let be a pattern, the frequency of is shown by and the support of is shown by . If is less than the user-specified minimum support, “minsup”, α will be called a “frequent pattern”. Definition 4 The number of items in a pattern is called the length of the pattern. A pattern with the length of is called “k-pattern” (or k-itemset). Example The length of is equal to 4. Definition 5 The number of items in a transaction is called the length of the transactions. The length of transactions is shown by . Definition 6 An association rule is like , where: (1). Both and are frequent patterns; (2). ; and, (3). is not less than the user-specified minimum confidence. The confidence of a rule is defined as . Oscillatory value: the value of an attribute in a transaction represents an increase or decrease in it. In the analysis of association on this type of data, only increase or decrease, are important in the numerical values showing the oscillation. Therefore, the numerical values turn into the "Up" or "Down". TABLE 1: Stock market data Taking stock market database as an example, association rule mining can be used to analyze the share price movement. The stock prices variation in the stock market database is the oscillatory value type. As it is shown in Table 1, several trades are considered in the stock market database Attribute/stock symbol TID/date INFODLGMALBZ UpDownUp20100903 DownDownUp20100904 DownUpDown20100905 UpUpUp20100906
  • 3. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 197 of a transaction every day and the date of that day is used as its transaction ID (TID). Each attribute is the changes in stock price of a company accepted in a stock market which has two values: "Up" or "Down". "Up" indicates the increase of price in one stock, and "Down" indicates the decrease of price in one stock, which are shown briefly with the numbers of 1 and 2, respectively. 3. THE MR-MINER ALGORITHM In this section, the MR-Miner algorithm is presented and the details of the method are shown step by step. The MR-Miner algorithm is made of the combination of four major functions of the Candidate, SeekDB, Prune2 and Compute. The Algorithm and its functions are shown in Figures 1, 3, 4, 6. 3.1. The MR-Miner Algorithm To discover frequent itemsets, the main idea in this method is in such a way that: first, of the candidate itemsets are generated; then, the other 3 itemsets are generated by each of these k-itemsets for . There is a relationship between the counts of all obtained 4 itemsets so that by finding the frequency of 1 itemset from the database, the counts of the other 3 itemsets can be computed by Equation 6, with no need to the database. Of course, some of these candidate itemsets are pruned by the Prune2 function according to Figure 4. Algorithm: MR-Miner(transaction database D, minsup) F = Candidate(D); SeekDB( , D); Compute( , |D|); For( k = 2; ≠ ∅; k++ ) if(k>=3) Purn2( , ); end if =SeekDB( , D); Compute( , ); for (each itemset i in ) if (i.Count < minsup) Delete i from ; end if end for F ; end for Output All Frequent Patterns F; FIGURE 1: The MR-Miner algorithm In general, the MR-Miner algorithm consists of the following four phases. PHASE I: Determination of candidate itemsets PHASE II: Pruning based on the candidate frequent itemsets PHASE III: Counting some itemsets via the database PHASE IV: Computing the rest of itemsets, with no need to the database The following presents the detailed method phase by phase. 3.2. PHASE I: Determination of Candidate Itemsets First, the candidate patterns are generated in two stages: In the first stage, all itemsets are generated for . To do this, 1-itemsets are generated by the available attributes in the transaction database corresponding to Figure 1; then, 2-itemsets are generated by joining 1-itemsets; similarly, the k-itemsets are generated by joining (k-1)-itemsets. All the generated itemsets include items with value of 1 (up). In the second stage, using each generated k-itemsets , of the other itemsets are generated. To generate these
  • 4. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 198 itemsets, the value of 2 is used in k-2 of their first items. The generated itemsets, in these two stages, are called candidate itemsets. Second stage {} First stage K= 0 K= 1 k= 2 K= 3 FIGURE 2: Generation of the candidate itemsets. To generate candidate 1-itemsets , we need to have the attributes u from the database which are considered as the input of the Candidate function, and the Join function which is similar to the function of candidate generation in Apriori approach, has generated k-itemsets for by joining (k-1)-itemsets. Finally, for each generated itemset, other itemsets are generated by of the first items. Figure 3 shows the Candidate function. Function: Candidate(transaction database D) = ∅; for (each attribute a of D ) Generate 1-Itemset c by a(1); {c}; end for for (k = 2; ≠ ∅; k++) = Join( ); end for if (k>2) for (each Itemset c in ) Generate all c’ by c: c c’= then j is optional element from {1,2} and then j=1} {c’}; end for end if return Canadidate Patterns C; FIGURE 3: The candidate itemset generation function 3.3. PHASE II: Pruning Based on the Candidate Frequent Itemsets In the MR-Miner algorithm, the strategy of pruning is used to decrease the searching space and increase the rate of the mining process. Considering that all subsets of frequent k-itemsets are frequent, if the (k-2)-subset from any candidate frequent k-itemsets is not frequent, this candidate itemset and other itemsets which should be made by that, will also not be frequent and will be deleted in this stage. The code that is shown in Figure 4, with a survey of itemsets in the level of k-1 and k-2 delete a number of infrequent k-patterns and in this way the searching space will decrease.
  • 5. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 199 Function: Prune2(k-Itemsets , (k-1)-Itemsets , minsup) for (each itemset i in ) find (k-2)-subset s of i in if (s or s.Count <= minsup) Delete i in else find (k-1)-subset s of i in if (s or s.Count <= minsup) Delete i in end if end if end for Return Patterns FIGURE 4: The Prune2 function 3.4. PHASE III: Counting Some Itemsets Via the Database In this phase, some itemsets are counted via the database and their frequent patterns available are determined. This section of the algorithm, the database and the candidate itemsets with the length of k are received as input and the counts of patterns return as output. This is done by the SeekDB function. Similar to Apriori algorithm, this stage has searched the database once at any level. 3.5. PHASE IV: Computing the Rest of Itemsets, With no Need to the Database The itemset is generated for each candidate itemset with the length of 1. To simplify, it can be assumed , . Considering that each attribute u is one of the two values of increase or decrease, and the number of whole values of one attribute is equal to the number of the whole transactions, we have for each attribute u: So, we have for each 1-itemset : So, to calculate the counts of the itemsets with the length of 1, all are searched from the database and all can be computed by Equation 2. Also, for each candidate itemset with the length of higher than 1, there is other itemsets which should be generated, and their frequency should be computed. For , other itemsets are generated by each of candidate 2-itemsets according to the Figure 5. There is a shared 1-itemset for all two 2-itemsets shown in Figure 5. (2) (1)
  • 6. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 200 FIGURE 5: Relationship between 2-itemsets Considering the available relationships in Figure 5, we have: We can extend Equation 3 for itemsets with the length more than 2. Let be the itemset generated by a candidate itemset with the length of k such that and let be the itemset with the length of such that . Regarding Equation 3, we have: So, for their counts, we have: Finally, to compute the counts of k-itemsets , , , we have: Thus, by any candidate k-itemsets , 3 k-itemsets are generated which, at every level, by searching the frequency of the itemset from the database, the counts of the itemsets via Equation 6, are computed. Figure 6 shows the Compute function. (4) (3) (6) (5) Generate Candidate k-itemset Shared (k-1)-itemset
  • 7. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 201 Function: Compute( , ,|D|) for (each k-itemset i in ) =i; if (k = 1) .Count = |D| - .Count; ; else Find in Generate , , by ; ; ; ; end if end for Return FIGURE 6: The Compute function 4. PERFORMANCE STUDY We evaluated the performance of the MR-Miner algorithm on two synthetic datasets and three real datasets with various parameters. The data of Tehran Stock Exchange were collected from Tehran Securities Exchange Technology Management Company (TSETMC). We compared proposed algorithm with the Apriori algorithm. Apriori algorithm is a very useful and well-known algorithm and has been used in many articles related to mining association in exchange data in the recent years [8], [9], [10]. All experiments were running on a computer with a Pentium 3.06GHz processing, 1GB of main memory, 500GB of hard disk capacity and the operating system of Microsoft Windows XP. Both algorithms have been implemented using C# in the environment of Microsoft Visual Studio 2008. Parameters Real-life datasets Synthetic datasets Dataset 1 Dataset 2 Dataset 3 Dataset 4 Dataset 5 Number of transaction Length of transaction 2000 6 2000 10 2000 16 5000 10 10000 10 TABLE 2: Sets of the parameters for 5 datasets We generated two synthetic datasets, dataset 4 and dataset 5, using the parameters shown in Table 2, and, the first three are real stock data. 4.1.Experiment on Synthetic Data In this section, we compare the MR-Miner algorithm with the Apriori Algorithm by varying one parameter, which maintaining the other parameter at the default values shown in Table 2.
  • 8. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 202 FIGURE 7: Minimum support versus run time, Dataset 4 FIGURE 8: Minimum support versus run time, Dataset 5 Figures 7, 8 and 9 have shown the minimum support versus the run time. In Figure 8, the minimum support was investigated versus the run time with the lower minimum support for dataset 5. In this case, more itemsets were mined. By decreasing the amount of minimum support, the proposed algorithm had much less linear increase compared to the Apriori algorithm. Also, by increasing the minimum support, the run time on the dataset 4 is shown in Figures 7 and 9.
  • 9. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 203 FIGURE 9: Minimum support versus run time, Dataset 4 Figure 10 shows the effect of increasing the number of transactions versus the run time on the dataset 2, 4 and 5. 2000, 5000 and 10000 were considered as the numbers of transactions. The minimum support of 20% was used for all datasets. The run time of both algorithms will increase versus increasing the number of transactions, so that the proposed algorithm will need 3 times less run time than the Apriori algorithm. FIGURE 10: Number of transactions versus run time, with minsup = 20% We also investigated the effect of the length of a transaction on both algorithms. The results are shown in Figure 11. In both algorithms, the run time had increased by increasing the length of transaction. Therefore, under the same support, more itemsets would be generated if the length of transactions increased. So, more candidate itemsets should be generated. In the proposed algorithm, since computing the entire frequent itemsets from database is not needed, by increasing the length of transactions, 3 times less time is needed than the Apriori algorithm.
  • 10. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 204 FIGURE 11: Length of transactions versus run time, with minsup = 16% 4.2.Experiments on Real Data We now compare the MR-Miner algorithm and Apriori algorithm by mining three datasets 1, 2, 3. The datasets are included the stock price changes of eight companies: Iran Khodro, Jaber Ebne Hayyan Pharmacy, Tehran Cement, Mines & Metals Development, Isfahan Petrochemicals, Iran Transfo, Kashan Amirkabir Steel and Parsian Bank. The data were related to the trading days from March 2001 to June 2011. Figures 12 to 14, illustrate the run time versus the minimum support for Dataset 2 and Dataset 3. The MR-Miner algorithm runs 3-4 times faster than the Apriori algorithm for real data. FIGURE 12: Minimum support versus run time, Dataset 2
  • 11. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 205 FIGURE 13: Minimum support versus run time, Dataset 3 FIGURE 14: Minimum support versus run time, Dataset 3 In summary, the proposed algorithm was implemented faster than the Apriori algorithm on all datasets. The results had shown that the MR-Miner algorithm had operated better than the Apriori algorithm in all cases. Considering that the presented algorithm is an absolute algorithm and does not use the sampling methods, the accuracy of this algorithm likes that of the Apriori algorithm is 100%. When mining the Tehran stock exchange data, some interesting rules were found. For Dataset 3, a sample rule found was “BTRNS(2), BPAR(2) → STEH(2)”. That is, if Transfo and Parsian fall, then Tehran Cement will fall with support =22% and confidence=75%. Also a sample rule found was “IKCO(1), BTRNS(2) → STEH(2)”. That is, if Iran Khodro rise, and Transfo falls, then Tehran Cement will fall with support=19% and confidence 67%. It should be noted that the association rules have a lower support on this type of attributes.
  • 12. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 206 TABLE 3: Some of the association rules extracted from real data of Tehran stock exchange Table 3 shows more association in decreasing the stock prices of the analyzed companies on the Tehran exchange data, such as rules 2, 3, 4, 6, 8 and 9 in Table 3 which can be seen with a more powerful support whereas the associations of stock price increase can be seen with a less support, such as rules 5, 10, 11, 12, 13 and 14. 5. CONCLUSION AND FUTURE WORK In this paper, using the available relationship between the counts of itemsets inside the data with the oscillating value type, a new algorithm was implemented on the basis of generation of the candidate patterns. In the MR-Miner algorithm, based on relationship between the counts of itemsets in this type of data, many counts of itemsets were computed via the counts of other itemsets and with no need to searching the database. On the other hand, pruning strategy was used to reduce the searching space effectively. Thus, much less time was spent to find frequent patterns. By conducting experiments on the real data and synthetic data, it was shown that the presented algorithm had operated much faster than the basic Apriori algorithm. Although we have shown that the proposed algorithm can efficiently mine association rules on the data with the oscillatory value type, there are still some issues that should be addressed in future researches, as we may extend the proposed algorithm from the frequent patterns to the closed frequent patterns. In order to have more decrease on the search space, a more effective function of prune can be implemented. ACKNOWLEDGMENTS We are grateful to Roholla Yosefian for his fruitful contributions on the mathematics issues and we are also grateful to our best friends Hamid Mohammadi and Fareed Mohammadi whose their help was encouraging. REFERENCES [1] R. Agrawal, T. Imielienski and A. Swami. “Mining Association Rules between Sets of Items in Large Databases”, in Proc. Management of Data, 1993, pp 207–216. [2] R. Agrawal, R. Srikant, “Fast Algorithm for Mining Association Rules”, in Proc. VLDB, Santiago de chile, 1994. [3] C. Borgelt and X. Yang, “Finding Closed Frequent Item Sets by Intersecting Transactions”, in Proc. 14th Int. Conf. on Extending Database Technology (EDBT 2011, Uppsala, Sweden), 2011. No Rules Support Confidence 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 DBJR(1)--> STEH(2) PESF(2)--> STEH(2) BTRNS(2)--> STEH(2) BPAR(2)--> STEH(2) DBJR(1), PESF(1)--> IKCO(1) BTRNS(2), FAJR(2)--> STEH(2) BTRNS(2), BPAR(2)--> STEH(2) FAJR(2), BPAR(2)--> STEH(2) BTRNS(2), BPAR(2) --> MADN(2) IKCO(1), DBJR(1)--> MADN(1) DBJR(1), MADN(1)--> IKCO(1) MADN(1), FAJR(1)--> IKCO(1) PESF(1), MADN(1)--> BPAR(1) MADN(1), FAJR(1)--> BPAR(1) DBJR(1), STEH(2)--> IKCO(1) IKCO(1), BTRNS(2)--> STEH(2) PESF(1), STEH(2)--> BTRNS(2) 30% 33% 39% 34% 21% 24% 22% 23% 23% 19% 19% 18% 18% 19% 18% 19% 19% 61% 73% 66% 71% 71% 68% 75% 75% 77% 61% 75% 73% 65% 75% 61% 67% 63%
  • 13. Mohammad Saniee Abadeh & Mojtaba Ala International Journal of Artificial Intelligence and Expert Systems (IJAE), Volume (2) : Issue (5) : 2011 207 [4] J. Han, H. Pei and Y. Yin, “Mining Frequent Patterns without Candidate Generation”. In Proc. the Management of Data (SIGMOD'00, Dallas, TX), New York, NY, USA, ACM Press, pp. 1-12, 2000. [5] M. Zaki, S. Parthasarathy, M. Ogihara and W. Li, “New Algorithms for Fast Discovery of Association Rules”, In Proc. 3rd Int. Conf. on Knowledge Discovery and Data Mining (KDD'97, Newport Beach, CA), AAAI Press, pp. 283-296, 1997. [6] Claudio Lucchese, Salvatore and Raffaele Perego, “Fast and Memory Efficient Mining of Frequent Closed Itemsets”, in Proc Knowledge and Data Engineering, pp. 21-36, 2006. [7] Anthony J.T. Lee and Chun-Sheng Wang, “An Efficient Algorithm for Mining Frequent Inter- Transaction Patterns”, Information Sciences 177, pp. 3453-3476, 2007. [8] Shu-hsien Liao, Pei-hui Chu and Tzu-kang Teng, “Mining the co-movement in the Taiwan Stock Funds Market”, Expert Systems with Applications, Volume 38, Issue 5, pp. 5276- 5288, 2011. [9] Sung Hoon Na and So Young Sohn, “Forecasting Changes in Korea Composite Stock Price Index (KOSPI) using Association Rules”, Expert Systems with Applications, Volume 38, Issue 7, pp. 9046-9049, 2011. [10] Hulyi Tan Cai and H.J. Yong Li, “Frequent Patterns of Investment Behaviors in Shanghai Stock Market”, Science and Software Engineering, Volume 04, pp. 325-328, 2008. [11] Vladimir Boginski, Sergiy Butenko and Panos M. Pardalos, “Mining Market Data: A Network Approach”, Computers & Operations Research, Volume 33, Issue 11, pp. 3171- 3184, 2006. [12] Borgelt, C., Yang, X., Nogales-Cadenas, R., Carmona-Saez, P., Pascual-Montano, A. “Finding Closed Frequent Item Sets by Intersecting Transactions”, In. 14th. Extending Database Technology, ACM Press, New York, pp. 367-376, 2011.