Empirical Evaluations On Real And Synthetic Datasets State Of The Art Utility Mining Algorithms
Abstract
We have considered the issue of best k high utility itemsets mining, where k is the coveted number of high utility itemsets to be mined. Two effective calculations TKU (mining Top-K Utility itemsets) and TKO (mining Top-K utility itemsets in One stage) are proposed for mining such itemsets without setting least utility limits. TKU is the initial two-stage calculation for mining top-k high utility itemsets, which joins five techniques PE, NU, MD, MC and SE to adequately raise the fringe least utility edges and further prune the hunt space. Then again, TKO is the first stage algorithm produced for top-k HUI mining, which incorporates the novel methodologies RUC, RUZ and EPB to extraordinarily enhance its execution. The proposed calculations have great versatility on extensive datasets and the execution of the proposed algorithms is near the ideal instance of the cutting edge two-stage and one-stage utility mining algorithms.
References
R. Agrawal and R. Srikant, “Fast algorithms for mining association rules,†in Proc. Int. Conf. Very Large Data Bases, 1994, pp. 487– 499.
C. Ahmed, S. Tanbeer, B. Jeong, and Y. Lee, “Efficient tree structures for high-utility pattern mining in incremental databases,†IEEE Trans. Knowl. Data Eng., vol. 21, no. 12, pp. 1708–1721, Dec. 2009.
K. Chuang, J. Huang, and M. Chen, “Mining top-k frequent patterns in the presence of the memory constraint,†VLDB J., vol. 17, pp. 1321–1344, 2008.
R. Chan, Q. Yang, and Y. Shen, “Mining high-utility itemsets,†in Proc. IEEE Int. Conf. Data Mining, 2003, pp. 19–26.
P. Fournier-Viger and V. S. Tseng, “Mining top-k sequential rules,†in Proc. Int. Conf. Adv. Data Mining Appl., 2011, pp. 180–194.
P. Fournier-Viger, C.Wu, and V. S. Tseng, “Mining top-k association rules,†in Proc. Int. Conf. Can. Conf. Adv. Artif. Intell., 2012, pp. 61–73.
P. Fournier-Viger, C. Wu, and V. S. Tseng, “Novel concise representations of high utility itemsets using generator patterns,†in Proc. Int. Conf. Adv. Data Mining Appl. Lecture Notes Comput. Sci., 2014, vol. 8933, pp. 30–43.
J. Han, J. Pei, and Y. Yin, “Mining frequent patterns without candidate generation,†in Proc. ACM SIGMOD Int. Conf. Manag. Data, 2000, pp. 1–12.
J. Han, J. Wang, Y. Lu, and P. Tzvetkov, “Mining top-k frequent closed patterns without minimum support,†in Proc. IEEE Int. Conf. Data Mining, 2002, pp. 211–218.
S. Krishnamoorthy, “Pruning strategies for mining high utility itemsets,†Expert Syst. Appl., vol. 42, no. 5, pp. 2371–2381, 2015.
C. Lin, T. Hong, G. Lan, J. Wong, and W. Lin, “Efficient updating of discovered high-utility itemsets for transaction deletion in dynamic databases,†Adv. Eng. Informat., vol. 29, no. 1, pp. 16–27, 2015.
G. Lan, T. Hong, V. S. Tseng, and S. Wang, “Applying the maximum utility measure in high utility sequential pattern mining,†Expert Syst. Appl., vol. 41, no. 11, pp. 5071–5081, 2014.
Y. Liu, W. Liao, and A. Choudhary, “A fast high utility item sets mining algorithm,†in Proc. Utility-Based Data Mining Workshop, 2005, pp. 90–99.
M. Liu and J. Qu, “Mining high utility item sets without candidate generation,†in Proc. ACM Int. Conf. Inf. Knowl. Manag., 2012, pp. 55–64.
J. Liu, K. Wang, and B. Fung, “Direct discovery of high utility item sets without candidate generation,†in Proc. IEEE Int. Conf. Data Mining, 2012, pp. 984–989.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â