SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 166
Review over Sequential Rule Mining
Bharat Parmar1
Prof. Gajendra Singh Chandel2
1,2
Department of Computer Science
1,2
Sri Satya Sai Institute of Science and Technology, Indore, Bhopal, India
Abstract— Data mining is a very popular research topic over
the years. Sequential pattern mining or sequential rule
mining is very useful application of data mining for the
prediction purpose. In this paper, we have presented a
review over sequential rule cum sequential pattern mining.
The advantages & drawbacks of each popular sequential
mining method is discussed in brief.
Keywords: Data mining, Sequential Rule Mining, sequence
databases
I. INTRODUCTION
Recent developments in computing and automation
technologies have resulted in computerizing business and
scientific applications in various areas. Turing the
massive amounts of accumulated information into
knowledge is attracting researchers in numerous
domains as well as databases, machine learning,
statistics, and so on. From the views of information
researchers, the stress is on discovering meaningful
patterns hidden in the massive data sets. Hence, a central
issue for knowledge discovery in databases, additionally the
main focus of this thesis, is to develop economical and
scalable mining algorithms as integrated tools for
management systems.
II. LITERATURE SURVEY
Sequential rule mining has been applied in many
domains like stock exchange analysis (Das & Lin [4],
Hsieh, Wu & Yang [11]), weather observation (Hamilton
& Karimi, [8]) and drought management (Harms &
Tadesse, [9], Deogun & Jiang, [5]).
The most known approach for sequential rule
mining is that of Mannila & Verkano [13] and alternative
researchers later on that aim at discovering partly ordered
sets of events showing often within a time window during
a sequence of events. Given these “frequent episodes”, a
trivial algorithmic rule will derive sequential rules
respecting a lowest confidence and support (Mannila [13]).
These rules are of the shape X⇒Y, where X and Y are 2 sets
of events, and are taken as“if event(s) X seems, event(s) Y
can possibly occur with a given confidence.
However, their work can only get rules during
a single sequence of events. Alternative works that extract
sequential rules from one sequence of events are the
algorithms of Hamilton & Karimi [8], Hsieh, Wu & Yang
[11] and Deogun & Jiang [5], that respectively discover
rules between many events and one event, between 2
events, and between many events.
Contrarily to those works that discover rules during
a single sequence of events, some works are designed for
mining sequential rules in many sequences (Das & Lin [4];
Harms & Tadesse [9]). as an example, Das & Lin [4]
discovers rules where the left a part of a rule can have
multiple events, however the correct half still needs to
contain one event. This may be a significant limitation, as
in real-life applications, sequential relationships
may involve many events. Moreover, the
algorithmic rule of Das & Lin [4] is extremely inefficient
because it tests all potential rules, with none strategy for
pruning the search space. To our information, only the
algorithm of Harms & Tadesse [9] discovers sequential rules
from sequence databases, and doesn't limit the quantity of
events contained in every rule. It searches for rules with a
confidence and a support higher or equal to user-specified
thresholds. The support of a rule is here outlined
because the number of times that the correct half occurs
when the left part inside user-defined time windows.
However, one necessary limitation of the
algorithms of Das & Lin [4] and Harms & Tadesse [9]
comes from the actual fact that they're designed for mining
rules occurring often in sequences. As a consequence,
these algorithms are inadequate for locating rules common
to several sequences. We have a tendency to illustrate this
with an example. Think about a sequence information
where every sequence corresponds to a client, and every
event represents the items bought throughout a specific day.
Suppose that one desires to mine sequential rules that are
common to several customers. The algorithms of Das & Lin
[4] and Harms [9] are inappropriate since a rule that seems
again and again within the same sequence might have a high
support even though it doesn't seem in any other sequences.
A second example is that the application domain of this
paper. we've designed an intelligent tutoring agent that
records a sequence of events for every of its executions.
We want that the tutoring agent discovers sequential
rules between events, common to many of its executions, in
order that the agent can thereafter use the principles for
prediction throughout its following execution.
In general, we might categorise the mining
approaches into the generate- and-test framework and also
the pattern-growth one, for sequence databases of horizontal
layout. Typifying the previous approaches [1,2 , 3], the
GSP (Generalized sequential Pattern) algorithm [3]
generates potential patterns (called candidates), scans every
information sequence within the database to calculate the
frequencies of candidates (called supports), then
identifies candidates having sufficient supports for
sequential patterns. These patterns in current database pass
become seeds for generating candidates within the next pass.
This generate-and- test method is continual till no
additional new candidates are generated. Once candidates
cannot fit in memory in a batch, GSP again scans the data to
check the remaining candidates that haven't been loaded.
Then, GSP scans for more than k times of the on-disk
database if the maximum size of the discovered patterns is k,
that incurs high value of disk reading. Despite that GSP was
smart at candidate pruning, the quantity of candidates
continues to be terribly large that might impair the mining
efficiency.
The AIS (Agrawal, Imielinski, Swami) algorithm
put forth by Agrawal [3] was the forerunner of all the
Review over Sequential Rule Mining
(IJSRD/Vol. 2/Issue 08/2014/040)
All rights reserved by www.ijsrd.com 167
algorithms used to generate the frequent itemsets and
assured association rules, the description of that has been
given at the side of the introduction of mining problem. The
algorithm contains of 2 phases, the primary section
constitutes the generation of the frequent itemsets. This is
often followed by the generation of the confident and
frequent association rules within the second section. The
exploitation of the monotonicity property of the support of
itemsets and therefore the confidence of association rules
led to the improvement of the algorithm and it was renamed
Apriori in a later purpose of time by Agrawal [15,16].
Although variety of algorithms were put forth following the
introduction of Apriori algorithm, a majority of them treated
the optimisation of one or a lot of steps of the Apriori
bearing the similar general structure. aboard Apriori,
Agrawal [15] planned the AprioriTid and AprioriHybrid
algorithms further. Apriori outperforms AIS on issues of
assorted sizes. It beats by a factor of two for high minimum
support and more than an order magnitude for low levels of
support. SETM (SET-oriented Mining of association
rules) [17] was perpetually outperformed by AIS.
AprioriTid performed equivalently well as Apriori for
smaller problem sizes but performance degraded twice slow
when applied to large issues.
The support count procedure of the Apriori
algorithm has attracted voluminous research due to the
very fact that the performance of the algorithm principally
depends on this aspect. Park et al. proposed an optimisation,
known as DHP (Direct Hashing and Pruning) supposed
towards limiting the number of candidate itemstes, shortly
following the Apriori algorithms mentioned above. Brin et
al place forth the DIC algorithm that partitions the database
into intervals of a fixed size therefore to reduce the number
of traversals through the database [18]. Another algorithm
known as the CARMA lgorithm (Continuous
Association Rule Mining Algorithm) employs the same
technique so as to limit the interval size to one.
The PrefixSpan (Prefix-projected sequential pattern
mining) algorithm [4], representing the pattern-growth
methodology [5, 4, 6], finds the frequent items after
scanning the sequence data for a single time. The data is
now projected, according to the frequent items, into many
small size databases. Finally, the whole set of sequential
patterns is found by recursively growing subsequence
fragments in every projected database. Two optimizations
for minimizing disk projections were represented in [4].
The bi-level projection technique, handling large
databases, scans every data sequence two times within the
(projected) information in order that fewer and smaller
projected databases are produced. The pseudo- projection
method, avoiding real projections, maintains the sequence-
postfix of every data sequence during a projection by a
pointer-offset pair. However, according to [4], most of the
mining performance may be achieved only if the database
size is reduced to the dimensions accommodable by the
main memory by using pseudo-projection after using bi-
level optimisation. Though PrefixSpan with success
discovered patterns using the divide-and-conquer strategy,
the value of disk I/O could be high because of the creation
and process of the projected sub- databases.
Besides the horizontal layout, the sequence
database is reworked into a vertical format consisting of
items’ id-lists [7, 8, 9]. The id list of any item could be a list
of (sequence id & timestamp) pairs showing the occurring
timestamps of the item in this sequence. Looking
within the lattice shaped by id-list intersections, the
SPADE (Sequential Pattern Discovery using
Equivalence classes) algorithm [9] completed the mining in
three passes of database scanning. Nevertheless, extra
computation time is needed to rework a database of
horizontal layout to vertical format that additionally needs
extra space for storing many times larger than that of the
initial sequence database.
With fast price down and therefore the proof
of the rise in installed memory size, several little or
medium sized databases can match into the main memory.
as an example, a platform with 256MB memory might hold
a database with one million sequences of total size of
189MB. Pattern mining executed directly in memory, and
presently be possible. However, a present method finds the
patterns either through multiple scans of the database or by
iterative data projections, and hence needing abundant disk
operations. The mining efficiency may be improved if the
excessive disk I/O is reduced by enhancing memory
utilization within the discovering process.
CMRules: an association rule mining based
mostly algorithm for the invention of sequential rules.
The users will specify min_sup as a parameter to a
sequential pattern mining algorithm. There are 2 major
difficulties in sequential pattern mining:
(1) effectiveness: the mining could return a large
variety of patterns, several of that can be
uninteresting to users, and
(2) efficiency: it usually takes substantial process
time and space for mining the whole set of
sequential patterns during a large sequence
database.
To prevent these major issues, users may use
constraint based sequential pattern mining for targeted
mining of desired patterns. Constraints can be
antimonotone, monotone, succinct, convertibl or
inconvertible. Anti- monotonicity means that “if an item-
set doesn't satisfy the constraint rule, then any of its
supersets does not satisfy”. Monotonicity means that “if any
item-set satisfies the rule constraint, then it’s all supersets
will be satisfied”. Concision means “All and only those
patterns, make sure to satisfy the rule, may be
obtained”. These may be created by dynamical order of
components in the set anti-monotonic or monotonic
constraints. Inconvertible constraints are those that are not
convertible.
In the context of constraint-based sequential pattern
mining, (Srikant & Agrawal, [23]) generalized the scope
of the Apriori-based sequential pattern mining to
incorporate the shortage of time, sliding time windows,
and user- defined taxonomy. Mining frequent episodes
during a sequence of events studied by (Mannila, Toivonen,
& Verkamo, [13]) also can be viewed as a constrained
mining problem, since episodes are basically constraints on
events in the acyclic graphs type. The classical framework
on sequential pattern mining and frequent pattern mining
relies on the anti-monotonic Apriori property of frequent
patterns. A breadth-first, level-by-level search may be
conducted to search out the whole set of patterns.
Review over Sequential Rule Mining
(IJSRD/Vol. 2/Issue 08/2014/040)
All rights reserved by www.ijsrd.com 168
Performance of typical constraint-based
sequential patternmining algorithms dramatically degrades
in case of mining long sequential patterns in dense databases
or when the exploitation low minimum supports.
Additionally, the algorithms might minimize the no. of
patterns however unimportant patterns are still found in
result patterns. Yun, [32] uses weight constraints to
minimize the no. of unimportant patterns. Throughout the
mining procedure, they assume not only supports but also
weights of patterns. Based on the framework, they present a
weighted sequential pattern mining algorithm (WSpan).
(Chen, Cao, Li, & Qian, 2008) incorporate user-
defined robust aggregate constraints so the discovered
information better meets user desires [19]. They propose a
completely unique algorithm referred to as PTAC
(sequential frequent Patterns mining with tough aggregate
Constraints) to minimize the value of using robust aggregate
constraints by incorporating 2 effective methods. One
avoids checking data items one by one by utilizing the
options of “promising-ness” exhibited by another items and
validity of the corresponding prefix. The other items avoids
constructing an redundant projected database by effectively
pruning those unfortunate new patterns that can, otherwise,
work as new prefixes.
Masseglia, Poncelet, & Teisseire [20] propose an
approach referred to as GTC (Graph for Time Constraints)
for mining time constraint dependent patterns (as given in
GSP algorithm) in very massive databases. It’s depends
on the concept that handling time constraints in earlier
stage of the data information mining method may be
extremely helpful. one amongst the most important new
options of their approach is that handling of time constraints
may be simply taken under consideration in traditional
level-wise approaches since it's distributed before and
individually from the enumeration step of a data sequence.
Shasha, Chirn, Shapiro, Marr, Wang, & Zhang
checked out the existing problem of discovering
approximate structural patterns from a genetic sequences
database [21]. Besides the minimum support threshold, their
solution permits the users to specify:
(1) the required type of patterns as sequences of
consecutive symbols separated by variable length
don’t cares,
(2) a lower bound value on the length of the discovered
patterns, and
(3) an upper bound value on the edit distance allowed
between a well-mined pattern and data sequence
that contains it.
Their algorithm uses a random sample of the input
sequences to create a main memory data structure, termed
generalized suffix tree, that's wont to acquire an initial set
of candidate pattern segments and separate candidates
that are unlikely to be frequent supported their occurrence
counts in the sample. The whole database is then scanned
and filtered to verify that the remaining candidates are so
frequent answers to the user question.
III. CONCLUSION
Sequential rule mining has been applied in many
domains like stock exchange analysis, weather observation
and drought management. In this paper, we have proposed
a survey or review of sequential rule mining.
REFERENCES
[1] Rakesh Agrawal, Swami, A., & T. Imielminski, 1993,
Mining Association Rules Between Sets of Items in
Large Databases, SIGMOD Conference, pp. 207-216
[2] Rakesh Agrawal, & Ramakrishnan Srikant, 1995,
Mining Sequential Patterns. Proc. Int. Conf. on Data
Engineering, pp. 3-14.
[3] Han, J. Cheung, Wong, Y., , Ng. V., & D.W.
1996, Maintenance of discovered association rules
in large databases: An incremental updating
technique. Proc. ICDE 1996, 106-114.
[4] King Ip Lin., Heikki Mannila, Gautam Das,
Gopal Renganathan, & Padhraic Smyth, 1998. Rule
Discovery from Time Series. Proc. 4th Int. Conf. on
Knowledge Discovery and Data Mining.
[5] Liying Jiang & Jiternder S Deogun, 2005.
Prediction Mining – An Approach to Mining
Association Rules for Prediction. Proceeding of
RSFDGrC 2005 Conference, pp.98-108.
[6] Faghihi, U., Fournier-Viger, P., Nkambou, R. &
Poirier, P., 2010. The Combination of a Causal
Learning and an Emotional Learning Mechanism for
Improved Cognitive Tutoring Agent. Proceedings of
IEA-AIE 2010 (in press).
[7] Kabanza, F., Nkambou, R. & Belghith, K. 2005.
Path-planning for Autonomous Training on Robot
Manipulators in Space. Proc. 19th Intern. Joint Conf.
on Artificial Intelligence, 35-38.
[8] Hamilton, H. J. & Karimi, K. 2005. The TIMERS II
Algorithm for the Discovery of Causality. Proc. 9th
Pacific-Asia Conference on Knowledge Discovery
and Data Mining, 744-750.
[9] Harms, S. K., Deogun, J. & Tadesse, T. 2002.
Discovering Sequential Association Rules with
Constraints and Time Lags in Multiple Sequences
Proc. 13th Int. Symp. on Methodologies for
Intelligent Systems, pp. .373-376.
[10]Hegland, M. 2007. The Apriori Algorithm – A
Tutorial. Mathematics and Computation. Imaging
Science and Information Processing, 11:209-262.
[11] Hsieh, Y. L., Yang, D.-L. & Wu, J. 2006. Using
Data Mining to Study Upstream and Downstream
Causal Realtionship in Stock Market. Proc. 2006
Joint Conference on Information Sciences.
[12]Laxman, S. & Sastry, P. 2006. A survey of temporal
data mining. Sadhana 3: 173-198.
[13]Mannila, H., Toivonen & H., Verkano, A.I. 1997.
Discovery of frequent episodes in event sequences.
Data Mining and Knowledge Discovery, 1(1): 259-
289.
[14]Gregory Piatetsky-Shapiro and William
Frawley, eds., Knowledge Discovery in
Databases, AAAI/MIT Press, 1991.
[15]Rakesh Agrawal, and Ramakrishnan Srikant, 1994.
“Fast Algorithms for Mining Association Rules”, In
Proceedings of the 20th Int. Conf. Very Large Data
Bases, pp. 487-499.
[16]Rakesh Agrawal, & Ramakrishnan Srikant., 1995.
“Mining generalized association rules”. In: Dayal U,
Gray P M D, Nishio Seds. Proceedings of the
International Conference on Very Large Databases.
Review over Sequential Rule Mining
(IJSRD/Vol. 2/Issue 08/2014/040)
All rights reserved by www.ijsrd.com 169
San Francisco, CA: Morgan Kanfman Press, pp. 406-
419.
[17]M. Houtsma, and Arun Swami, 1995. “Set-
Oriented Mining for Association Rules in
Relational Databases”. IEEE International
Conference on Data Engineering, pp. 25–33.
[18]S. Brin, R. Motwani, J.D. Ullman, and S. Tsur, 1997.
“Dynamic itemset counting and implication rules for
market basket data”. In Proceedings of the 1997
ACM SIGMOD International Conference on
Management of Data, volume 26(2) of SIGMOD
Record, pp. 255–264. ACM Press.
[19]Chen, E., Cao, H., Li, Q., & Qian, T. (2008). Efficient
strategies for tough aggregate constraint-based
sequential pattern mining. Inf. Sci., 178(6),1498-
1518.
[20]Masseglia, F., Poncelet, P., & Teisseire, M. (2003).
Incremental mining of sequential patterns in large
databases. Data Knowl. Eng., 46(1), 97–121.
[21]Srikant, R., & Agrawal, R. (1996).
Mining Sequential Patterns: Generalizations and
Performance Improvements. Proceedings of the 5th
International Conference on Extending Database
Technology: Advances in Database Technology.
[22]Yun, U. (2008). A new framework for detecting
weighted sequential patterns in large sequence
databases. Know.-Based Syst., 21(2), 110-122.

More Related Content

What's hot

A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
Editor IJMTER
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
DataminingTools Inc
 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data mining
ijpla
 
A Survey on Frequent Patterns To Optimize Association Rules
A Survey on Frequent Patterns To Optimize Association RulesA Survey on Frequent Patterns To Optimize Association Rules
A Survey on Frequent Patterns To Optimize Association Rules
IRJET Journal
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Salah Amean
 
Ijtra130516
Ijtra130516Ijtra130516
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MININGSTORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
csandit
 
Mining frequent patterns association
Mining frequent patterns associationMining frequent patterns association
Mining frequent patterns association
DeepaR42
 
An improvised tree algorithm for association rule mining using transaction re...
An improvised tree algorithm for association rule mining using transaction re...An improvised tree algorithm for association rule mining using transaction re...
An improvised tree algorithm for association rule mining using transaction re...
Editor IJCATR
 
Associations1
Associations1Associations1
Associations1mancnilu
 
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Ijcatr04051004
Ijcatr04051004Ijcatr04051004
Ijcatr04051004
Editor IJCATR
 
Application of data mining tools for
Application of data mining tools forApplication of data mining tools for
Application of data mining tools for
IJDKP
 
Mining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce FrameworkMining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce Framework
IRJET Journal
 
B017550814
B017550814B017550814
B017550814
IOSR Journals
 
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
error007
 
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
IOSR Journals
 
Mining Frequent Item set Using Genetic Algorithm
Mining Frequent Item set Using Genetic AlgorithmMining Frequent Item set Using Genetic Algorithm
Mining Frequent Item set Using Genetic Algorithm
ijsrd.com
 

What's hot (20)

A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
 
Comparative study of frequent item set in data mining
Comparative study of frequent item set in data miningComparative study of frequent item set in data mining
Comparative study of frequent item set in data mining
 
A Survey on Frequent Patterns To Optimize Association Rules
A Survey on Frequent Patterns To Optimize Association RulesA Survey on Frequent Patterns To Optimize Association Rules
A Survey on Frequent Patterns To Optimize Association Rules
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
 
Ijtra130516
Ijtra130516Ijtra130516
Ijtra130516
 
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MININGSTORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
STORAGE GROWING FORECAST WITH BACULA BACKUP SOFTWARE CATALOG DATA MINING
 
Mining frequent patterns association
Mining frequent patterns associationMining frequent patterns association
Mining frequent patterns association
 
An improvised tree algorithm for association rule mining using transaction re...
An improvised tree algorithm for association rule mining using transaction re...An improvised tree algorithm for association rule mining using transaction re...
An improvised tree algorithm for association rule mining using transaction re...
 
Associations1
Associations1Associations1
Associations1
 
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
An Efficient and Scalable UP-Growth Algorithm with Optimized Threshold (min_u...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
50120140503019
5012014050301950120140503019
50120140503019
 
Ijcatr04051004
Ijcatr04051004Ijcatr04051004
Ijcatr04051004
 
Application of data mining tools for
Application of data mining tools forApplication of data mining tools for
Application of data mining tools for
 
Mining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce FrameworkMining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce Framework
 
B017550814
B017550814B017550814
B017550814
 
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.2 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
 
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in La...
 
Mining Frequent Item set Using Genetic Algorithm
Mining Frequent Item set Using Genetic AlgorithmMining Frequent Item set Using Genetic Algorithm
Mining Frequent Item set Using Genetic Algorithm
 

Viewers also liked

Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Wil van der Aalst
 
Sequential pattern mining
Sequential pattern miningSequential pattern mining
Sequential pattern miningkiran said
 
Process Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisProcess Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and Analysis
Wil van der Aalst
 
Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?
Wil van der Aalst
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
Wil van der Aalst
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
Wil van der Aalst
 
5.3 mining sequential patterns
5.3 mining sequential patterns5.3 mining sequential patterns
5.3 mining sequential patterns
Krish_ver2
 
Process Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data MiningProcess Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data Mining
Wil van der Aalst
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
Wil van der Aalst
 
Process Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - IntroductionProcess Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - Introduction
Wil van der Aalst
 

Viewers also liked (10)

Process Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniquesProcess Mining - Chapter 6 - Advanced Process Discovery_techniques
Process Mining - Chapter 6 - Advanced Process Discovery_techniques
 
Sequential pattern mining
Sequential pattern miningSequential pattern mining
Sequential pattern mining
 
Process Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and AnalysisProcess Mining - Chapter 2 - Process Modeling and Analysis
Process Mining - Chapter 2 - Process Modeling and Analysis
 
Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?Event Logs: What kind of data does process mining require?
Event Logs: What kind of data does process mining require?
 
Process Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional PerspectivesProcess Mining - Chapter 8 - Mining Additional Perspectives
Process Mining - Chapter 8 - Mining Additional Perspectives
 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
 
5.3 mining sequential patterns
5.3 mining sequential patterns5.3 mining sequential patterns
5.3 mining sequential patterns
 
Process Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data MiningProcess Mining - Chapter 3 - Data Mining
Process Mining - Chapter 3 - Data Mining
 
Process Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big DataProcess Mining: Understanding and Improving Desire Lines in Big Data
Process Mining: Understanding and Improving Desire Lines in Big Data
 
Process Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - IntroductionProcess Mining - Chapter 1 - Introduction
Process Mining - Chapter 1 - Introduction
 

Similar to Review Over Sequential Rule Mining

A Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining TechniquesA Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining Techniques
ijsrd.com
 
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
BRNSSPublicationHubI
 
A Brief Overview On Frequent Pattern Mining Algorithms
A Brief Overview On Frequent Pattern Mining AlgorithmsA Brief Overview On Frequent Pattern Mining Algorithms
A Brief Overview On Frequent Pattern Mining Algorithms
Sara Alvarez
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap Shot
IOSR Journals
 
Fast Sequential Rule Mining
Fast Sequential Rule MiningFast Sequential Rule Mining
Fast Sequential Rule Mining
ijsrd.com
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
IOSR Journals
 
K355662
K355662K355662
K355662
IJERA Editor
 
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
IAEME Publication
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
ijsrd.com
 
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Association of Scientists, Developers and Faculties
 
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
IJDKP
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
IOSR Journals
 
Fp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalabilityFp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalability
Dr.Manmohan Singh
 
D0352630
D0352630D0352630
D0352630
iosrjournals
 
A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association Mining
IOSR Journals
 

Similar to Review Over Sequential Rule Mining (20)

A Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining TechniquesA Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining Techniques
 
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
Hadoop Map-Reduce To Generate Frequent Item Set on Large Datasets Using Impro...
 
A Brief Overview On Frequent Pattern Mining Algorithms
A Brief Overview On Frequent Pattern Mining AlgorithmsA Brief Overview On Frequent Pattern Mining Algorithms
A Brief Overview On Frequent Pattern Mining Algorithms
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
 
Ijariie1129
Ijariie1129Ijariie1129
Ijariie1129
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap Shot
 
Fast Sequential Rule Mining
Fast Sequential Rule MiningFast Sequential Rule Mining
Fast Sequential Rule Mining
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
 
K355662
K355662K355662
K355662
 
K355662
K355662K355662
K355662
 
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
A NOVEL APPROACH TO MINE FREQUENT PATTERNS FROM LARGE VOLUME OF DATASET USING...
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
 
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
Study on Positive and Negative Rule Based Mining Techniques for E-Commerce Ap...
 
50120130405016 2
50120130405016 250120130405016 2
50120130405016 2
 
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
AN ENHANCED FREQUENT PATTERN GROWTH BASED ON MAPREDUCE FOR MINING ASSOCIATION...
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
 
Ad03301810188
Ad03301810188Ad03301810188
Ad03301810188
 
Fp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalabilityFp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalability
 
D0352630
D0352630D0352630
D0352630
 
A Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association MiningA Quantified Approach for large Dataset Compression in Association Mining
A Quantified Approach for large Dataset Compression in Association Mining
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Review Over Sequential Rule Mining

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 166 Review over Sequential Rule Mining Bharat Parmar1 Prof. Gajendra Singh Chandel2 1,2 Department of Computer Science 1,2 Sri Satya Sai Institute of Science and Technology, Indore, Bhopal, India Abstract— Data mining is a very popular research topic over the years. Sequential pattern mining or sequential rule mining is very useful application of data mining for the prediction purpose. In this paper, we have presented a review over sequential rule cum sequential pattern mining. The advantages & drawbacks of each popular sequential mining method is discussed in brief. Keywords: Data mining, Sequential Rule Mining, sequence databases I. INTRODUCTION Recent developments in computing and automation technologies have resulted in computerizing business and scientific applications in various areas. Turing the massive amounts of accumulated information into knowledge is attracting researchers in numerous domains as well as databases, machine learning, statistics, and so on. From the views of information researchers, the stress is on discovering meaningful patterns hidden in the massive data sets. Hence, a central issue for knowledge discovery in databases, additionally the main focus of this thesis, is to develop economical and scalable mining algorithms as integrated tools for management systems. II. LITERATURE SURVEY Sequential rule mining has been applied in many domains like stock exchange analysis (Das & Lin [4], Hsieh, Wu & Yang [11]), weather observation (Hamilton & Karimi, [8]) and drought management (Harms & Tadesse, [9], Deogun & Jiang, [5]). The most known approach for sequential rule mining is that of Mannila & Verkano [13] and alternative researchers later on that aim at discovering partly ordered sets of events showing often within a time window during a sequence of events. Given these “frequent episodes”, a trivial algorithmic rule will derive sequential rules respecting a lowest confidence and support (Mannila [13]). These rules are of the shape X⇒Y, where X and Y are 2 sets of events, and are taken as“if event(s) X seems, event(s) Y can possibly occur with a given confidence. However, their work can only get rules during a single sequence of events. Alternative works that extract sequential rules from one sequence of events are the algorithms of Hamilton & Karimi [8], Hsieh, Wu & Yang [11] and Deogun & Jiang [5], that respectively discover rules between many events and one event, between 2 events, and between many events. Contrarily to those works that discover rules during a single sequence of events, some works are designed for mining sequential rules in many sequences (Das & Lin [4]; Harms & Tadesse [9]). as an example, Das & Lin [4] discovers rules where the left a part of a rule can have multiple events, however the correct half still needs to contain one event. This may be a significant limitation, as in real-life applications, sequential relationships may involve many events. Moreover, the algorithmic rule of Das & Lin [4] is extremely inefficient because it tests all potential rules, with none strategy for pruning the search space. To our information, only the algorithm of Harms & Tadesse [9] discovers sequential rules from sequence databases, and doesn't limit the quantity of events contained in every rule. It searches for rules with a confidence and a support higher or equal to user-specified thresholds. The support of a rule is here outlined because the number of times that the correct half occurs when the left part inside user-defined time windows. However, one necessary limitation of the algorithms of Das & Lin [4] and Harms & Tadesse [9] comes from the actual fact that they're designed for mining rules occurring often in sequences. As a consequence, these algorithms are inadequate for locating rules common to several sequences. We have a tendency to illustrate this with an example. Think about a sequence information where every sequence corresponds to a client, and every event represents the items bought throughout a specific day. Suppose that one desires to mine sequential rules that are common to several customers. The algorithms of Das & Lin [4] and Harms [9] are inappropriate since a rule that seems again and again within the same sequence might have a high support even though it doesn't seem in any other sequences. A second example is that the application domain of this paper. we've designed an intelligent tutoring agent that records a sequence of events for every of its executions. We want that the tutoring agent discovers sequential rules between events, common to many of its executions, in order that the agent can thereafter use the principles for prediction throughout its following execution. In general, we might categorise the mining approaches into the generate- and-test framework and also the pattern-growth one, for sequence databases of horizontal layout. Typifying the previous approaches [1,2 , 3], the GSP (Generalized sequential Pattern) algorithm [3] generates potential patterns (called candidates), scans every information sequence within the database to calculate the frequencies of candidates (called supports), then identifies candidates having sufficient supports for sequential patterns. These patterns in current database pass become seeds for generating candidates within the next pass. This generate-and- test method is continual till no additional new candidates are generated. Once candidates cannot fit in memory in a batch, GSP again scans the data to check the remaining candidates that haven't been loaded. Then, GSP scans for more than k times of the on-disk database if the maximum size of the discovered patterns is k, that incurs high value of disk reading. Despite that GSP was smart at candidate pruning, the quantity of candidates continues to be terribly large that might impair the mining efficiency. The AIS (Agrawal, Imielinski, Swami) algorithm put forth by Agrawal [3] was the forerunner of all the
  • 2. Review over Sequential Rule Mining (IJSRD/Vol. 2/Issue 08/2014/040) All rights reserved by www.ijsrd.com 167 algorithms used to generate the frequent itemsets and assured association rules, the description of that has been given at the side of the introduction of mining problem. The algorithm contains of 2 phases, the primary section constitutes the generation of the frequent itemsets. This is often followed by the generation of the confident and frequent association rules within the second section. The exploitation of the monotonicity property of the support of itemsets and therefore the confidence of association rules led to the improvement of the algorithm and it was renamed Apriori in a later purpose of time by Agrawal [15,16]. Although variety of algorithms were put forth following the introduction of Apriori algorithm, a majority of them treated the optimisation of one or a lot of steps of the Apriori bearing the similar general structure. aboard Apriori, Agrawal [15] planned the AprioriTid and AprioriHybrid algorithms further. Apriori outperforms AIS on issues of assorted sizes. It beats by a factor of two for high minimum support and more than an order magnitude for low levels of support. SETM (SET-oriented Mining of association rules) [17] was perpetually outperformed by AIS. AprioriTid performed equivalently well as Apriori for smaller problem sizes but performance degraded twice slow when applied to large issues. The support count procedure of the Apriori algorithm has attracted voluminous research due to the very fact that the performance of the algorithm principally depends on this aspect. Park et al. proposed an optimisation, known as DHP (Direct Hashing and Pruning) supposed towards limiting the number of candidate itemstes, shortly following the Apriori algorithms mentioned above. Brin et al place forth the DIC algorithm that partitions the database into intervals of a fixed size therefore to reduce the number of traversals through the database [18]. Another algorithm known as the CARMA lgorithm (Continuous Association Rule Mining Algorithm) employs the same technique so as to limit the interval size to one. The PrefixSpan (Prefix-projected sequential pattern mining) algorithm [4], representing the pattern-growth methodology [5, 4, 6], finds the frequent items after scanning the sequence data for a single time. The data is now projected, according to the frequent items, into many small size databases. Finally, the whole set of sequential patterns is found by recursively growing subsequence fragments in every projected database. Two optimizations for minimizing disk projections were represented in [4]. The bi-level projection technique, handling large databases, scans every data sequence two times within the (projected) information in order that fewer and smaller projected databases are produced. The pseudo- projection method, avoiding real projections, maintains the sequence- postfix of every data sequence during a projection by a pointer-offset pair. However, according to [4], most of the mining performance may be achieved only if the database size is reduced to the dimensions accommodable by the main memory by using pseudo-projection after using bi- level optimisation. Though PrefixSpan with success discovered patterns using the divide-and-conquer strategy, the value of disk I/O could be high because of the creation and process of the projected sub- databases. Besides the horizontal layout, the sequence database is reworked into a vertical format consisting of items’ id-lists [7, 8, 9]. The id list of any item could be a list of (sequence id & timestamp) pairs showing the occurring timestamps of the item in this sequence. Looking within the lattice shaped by id-list intersections, the SPADE (Sequential Pattern Discovery using Equivalence classes) algorithm [9] completed the mining in three passes of database scanning. Nevertheless, extra computation time is needed to rework a database of horizontal layout to vertical format that additionally needs extra space for storing many times larger than that of the initial sequence database. With fast price down and therefore the proof of the rise in installed memory size, several little or medium sized databases can match into the main memory. as an example, a platform with 256MB memory might hold a database with one million sequences of total size of 189MB. Pattern mining executed directly in memory, and presently be possible. However, a present method finds the patterns either through multiple scans of the database or by iterative data projections, and hence needing abundant disk operations. The mining efficiency may be improved if the excessive disk I/O is reduced by enhancing memory utilization within the discovering process. CMRules: an association rule mining based mostly algorithm for the invention of sequential rules. The users will specify min_sup as a parameter to a sequential pattern mining algorithm. There are 2 major difficulties in sequential pattern mining: (1) effectiveness: the mining could return a large variety of patterns, several of that can be uninteresting to users, and (2) efficiency: it usually takes substantial process time and space for mining the whole set of sequential patterns during a large sequence database. To prevent these major issues, users may use constraint based sequential pattern mining for targeted mining of desired patterns. Constraints can be antimonotone, monotone, succinct, convertibl or inconvertible. Anti- monotonicity means that “if an item- set doesn't satisfy the constraint rule, then any of its supersets does not satisfy”. Monotonicity means that “if any item-set satisfies the rule constraint, then it’s all supersets will be satisfied”. Concision means “All and only those patterns, make sure to satisfy the rule, may be obtained”. These may be created by dynamical order of components in the set anti-monotonic or monotonic constraints. Inconvertible constraints are those that are not convertible. In the context of constraint-based sequential pattern mining, (Srikant & Agrawal, [23]) generalized the scope of the Apriori-based sequential pattern mining to incorporate the shortage of time, sliding time windows, and user- defined taxonomy. Mining frequent episodes during a sequence of events studied by (Mannila, Toivonen, & Verkamo, [13]) also can be viewed as a constrained mining problem, since episodes are basically constraints on events in the acyclic graphs type. The classical framework on sequential pattern mining and frequent pattern mining relies on the anti-monotonic Apriori property of frequent patterns. A breadth-first, level-by-level search may be conducted to search out the whole set of patterns.
  • 3. Review over Sequential Rule Mining (IJSRD/Vol. 2/Issue 08/2014/040) All rights reserved by www.ijsrd.com 168 Performance of typical constraint-based sequential patternmining algorithms dramatically degrades in case of mining long sequential patterns in dense databases or when the exploitation low minimum supports. Additionally, the algorithms might minimize the no. of patterns however unimportant patterns are still found in result patterns. Yun, [32] uses weight constraints to minimize the no. of unimportant patterns. Throughout the mining procedure, they assume not only supports but also weights of patterns. Based on the framework, they present a weighted sequential pattern mining algorithm (WSpan). (Chen, Cao, Li, & Qian, 2008) incorporate user- defined robust aggregate constraints so the discovered information better meets user desires [19]. They propose a completely unique algorithm referred to as PTAC (sequential frequent Patterns mining with tough aggregate Constraints) to minimize the value of using robust aggregate constraints by incorporating 2 effective methods. One avoids checking data items one by one by utilizing the options of “promising-ness” exhibited by another items and validity of the corresponding prefix. The other items avoids constructing an redundant projected database by effectively pruning those unfortunate new patterns that can, otherwise, work as new prefixes. Masseglia, Poncelet, & Teisseire [20] propose an approach referred to as GTC (Graph for Time Constraints) for mining time constraint dependent patterns (as given in GSP algorithm) in very massive databases. It’s depends on the concept that handling time constraints in earlier stage of the data information mining method may be extremely helpful. one amongst the most important new options of their approach is that handling of time constraints may be simply taken under consideration in traditional level-wise approaches since it's distributed before and individually from the enumeration step of a data sequence. Shasha, Chirn, Shapiro, Marr, Wang, & Zhang checked out the existing problem of discovering approximate structural patterns from a genetic sequences database [21]. Besides the minimum support threshold, their solution permits the users to specify: (1) the required type of patterns as sequences of consecutive symbols separated by variable length don’t cares, (2) a lower bound value on the length of the discovered patterns, and (3) an upper bound value on the edit distance allowed between a well-mined pattern and data sequence that contains it. Their algorithm uses a random sample of the input sequences to create a main memory data structure, termed generalized suffix tree, that's wont to acquire an initial set of candidate pattern segments and separate candidates that are unlikely to be frequent supported their occurrence counts in the sample. The whole database is then scanned and filtered to verify that the remaining candidates are so frequent answers to the user question. III. CONCLUSION Sequential rule mining has been applied in many domains like stock exchange analysis, weather observation and drought management. In this paper, we have proposed a survey or review of sequential rule mining. REFERENCES [1] Rakesh Agrawal, Swami, A., & T. Imielminski, 1993, Mining Association Rules Between Sets of Items in Large Databases, SIGMOD Conference, pp. 207-216 [2] Rakesh Agrawal, & Ramakrishnan Srikant, 1995, Mining Sequential Patterns. Proc. Int. Conf. on Data Engineering, pp. 3-14. [3] Han, J. Cheung, Wong, Y., , Ng. V., & D.W. 1996, Maintenance of discovered association rules in large databases: An incremental updating technique. Proc. ICDE 1996, 106-114. [4] King Ip Lin., Heikki Mannila, Gautam Das, Gopal Renganathan, & Padhraic Smyth, 1998. Rule Discovery from Time Series. Proc. 4th Int. Conf. on Knowledge Discovery and Data Mining. [5] Liying Jiang & Jiternder S Deogun, 2005. Prediction Mining – An Approach to Mining Association Rules for Prediction. Proceeding of RSFDGrC 2005 Conference, pp.98-108. [6] Faghihi, U., Fournier-Viger, P., Nkambou, R. & Poirier, P., 2010. The Combination of a Causal Learning and an Emotional Learning Mechanism for Improved Cognitive Tutoring Agent. Proceedings of IEA-AIE 2010 (in press). [7] Kabanza, F., Nkambou, R. & Belghith, K. 2005. Path-planning for Autonomous Training on Robot Manipulators in Space. Proc. 19th Intern. Joint Conf. on Artificial Intelligence, 35-38. [8] Hamilton, H. J. & Karimi, K. 2005. The TIMERS II Algorithm for the Discovery of Causality. Proc. 9th Pacific-Asia Conference on Knowledge Discovery and Data Mining, 744-750. [9] Harms, S. K., Deogun, J. & Tadesse, T. 2002. Discovering Sequential Association Rules with Constraints and Time Lags in Multiple Sequences Proc. 13th Int. Symp. on Methodologies for Intelligent Systems, pp. .373-376. [10]Hegland, M. 2007. The Apriori Algorithm – A Tutorial. Mathematics and Computation. Imaging Science and Information Processing, 11:209-262. [11] Hsieh, Y. L., Yang, D.-L. & Wu, J. 2006. Using Data Mining to Study Upstream and Downstream Causal Realtionship in Stock Market. Proc. 2006 Joint Conference on Information Sciences. [12]Laxman, S. & Sastry, P. 2006. A survey of temporal data mining. Sadhana 3: 173-198. [13]Mannila, H., Toivonen & H., Verkano, A.I. 1997. Discovery of frequent episodes in event sequences. Data Mining and Knowledge Discovery, 1(1): 259- 289. [14]Gregory Piatetsky-Shapiro and William Frawley, eds., Knowledge Discovery in Databases, AAAI/MIT Press, 1991. [15]Rakesh Agrawal, and Ramakrishnan Srikant, 1994. “Fast Algorithms for Mining Association Rules”, In Proceedings of the 20th Int. Conf. Very Large Data Bases, pp. 487-499. [16]Rakesh Agrawal, & Ramakrishnan Srikant., 1995. “Mining generalized association rules”. In: Dayal U, Gray P M D, Nishio Seds. Proceedings of the International Conference on Very Large Databases.
  • 4. Review over Sequential Rule Mining (IJSRD/Vol. 2/Issue 08/2014/040) All rights reserved by www.ijsrd.com 169 San Francisco, CA: Morgan Kanfman Press, pp. 406- 419. [17]M. Houtsma, and Arun Swami, 1995. “Set- Oriented Mining for Association Rules in Relational Databases”. IEEE International Conference on Data Engineering, pp. 25–33. [18]S. Brin, R. Motwani, J.D. Ullman, and S. Tsur, 1997. “Dynamic itemset counting and implication rules for market basket data”. In Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, volume 26(2) of SIGMOD Record, pp. 255–264. ACM Press. [19]Chen, E., Cao, H., Li, Q., & Qian, T. (2008). Efficient strategies for tough aggregate constraint-based sequential pattern mining. Inf. Sci., 178(6),1498- 1518. [20]Masseglia, F., Poncelet, P., & Teisseire, M. (2003). Incremental mining of sequential patterns in large databases. Data Knowl. Eng., 46(1), 97–121. [21]Srikant, R., & Agrawal, R. (1996). Mining Sequential Patterns: Generalizations and Performance Improvements. Proceedings of the 5th International Conference on Extending Database Technology: Advances in Database Technology. [22]Yun, U. (2008). A new framework for detecting weighted sequential patterns in large sequence databases. Know.-Based Syst., 21(2), 110-122.