And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

Size: px
Start display at page:

Download "And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,"

Transcription

1 (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat 2 1 Faculty of Compute Engineeing, Islamic Azad Univesity, Najafabad banch, Ian, And Ph.D. Candidate of Compute Science, Univesity of Puta Malaysia 2 Faculty of Compute Science and Infomation Technology, Univesity of Puta Malaysia (UPM), Selango, Malaysia. Abstact Cetainly, nowadays knowledge discovey o extacting knowledge fom lage amount of data is a desiable task in competitive businesses. Data mining is a main step in knowledge discovey pocess. Meanwhile fequent pattens play cental ole in data mining tasks such as clusteing, classification, and association analysis. Identifying all fequent pattens is the most time consuming pocess due to a massive numbe of candidate pattens. Fo the past decade thee have been an inceasing numbe of efficient algoithms to mine the fequent pattens. Howeve educing the numbe of candidate pattens and compaisons fo suppot counting ae still two poblems in this field which have made the fequent patten mining one of the active eseach themes in data mining. A easonable solution is identifying a small candidate patten set fom which can geneate all fequent pattens. In this pape, a method is poposed based on a new candidate set called candidate head set o H which foms a small set of candidate pattens. The expeimental esults veify the accuacy of the poposed method and eduction of the numbe of candidate pattens and compaisons. Keywods- Data mining; Fequent pattens; Maximal fequent pattens; Candidate patten I. INTRODUCTION The explosive gowth of data in all business, govenment and scientific applications ceates enomous hidden knowledge in thei databases. Cetainly, in this decade knowledge discovey o extacting knowledge fom lage amount of data is a desiable task in competitive businesses. Fo example, daily a lage amount of puchase data called maket basket tansactions ae collected in the cashie countes of huge makets. The maket management systems ae inteested in analyzing the puchase data to undestand moe about the behavio of thei customes. The association analysis can epesent inteesting elationships hidden in lage data set in the fom of association ules. Fo example, 75% of customes who buy diapes also buy oange juice. These ules can be used to identify new oppotunities fo coss-selling makets poducts to thei customes. The association analysis is also useful in othe applications such as web mining scientific applications. Data mining theefoe appeas to addess the need of sifting useful infomation such as inteesting elationships hidden in lage databases. As shown in Figue 1, data mining is an essential step in the pocess of knowledge discovey fom data (KDD) to extact data pattens. It is a composite pocess of multiple disciplines including statistics, database systems, machine leaning, intelligent computing and infomation technology. Figue 1. Data mining as a main step in KDD pocess Since the fist intoducing [2], fequent pattens mining plays an impotant ole in data mining tasks such as clusteing, classification, pediction and especially association analysis. Fequent pattens ae itemsets o substuctues that exist in a data set with fequency no less than a use specified theshold. Identifying all fequent pattens is the most time consuming pocess due to a massive numbe of candidate pattens. In geneal, 2 i -1 candidate pattens can be geneated fom a data set contains i items. Theefoe the computational equiements fo fequent pattens mining ae vey expensive. Fo the past decade thee have been an inceasing numbe of efficient algoithms to mine the fequent pattens by satisfying the minimum suppot theshold. They ae almost based on thee fundamental fequent pattens mining methodologies: Apioi, FP-tee and Eclat [9]. The Apioibased algoithms significantly educe the size of candidate sets using the Apioi pinciple that says all subsets of an infequent itemset must be infequent. But they still suffe fom the geneate-and-test stategy. They mine fequent pattens by geneating candidates and checking thei fequency against the tansaction database. The FP-tee keeps only fequent items espect to the minimum suppot theshold by two database scan. Recently some FP-tee-based algoithms have been developed to captue the content of the tansaction database only by one database scan which can be vey useful fo incemental updating of fequent pattens [12]. They usually tavese the tee to mine fequent pattens without candidate geneation in same fashion. Only a few of them can fit the 1Coesponding Autho 230

2 content of the tansaction database in memoy to eliminate the database escanning and the mining model estuctuing. Meanwhile educing the numbe of candidate pattens and the compaisons fo suppot counting ae still two poblems in this field which have made the fequent patten mining one of the active eseach themes in data mining. A easonable solution is identifying a small candidate patten set fom which can geneate all fequent pattens. In this pape, a method is poposed based on a new candidate set called candidate head set o H which fom a small set of candidate pattens. It is an impovement of ou pevious method pesented fo maximal fequent patten mining [13]. The poposed method is based on pime numbe chaacteistics fo fequent patten mining including a data tansfomation technique, an efficient tee stuctue called Pime-based encoded and Compessed Tee o PC_Tee and mining algoithm PC_Mine. The salient diffeence is that mining pocess makes use of the candidate head set and its popeties to educe the numbe of the candidate sets and compaisons. The PC_Mine algoithm stives to find long pomising pattens duing of the initial steps based on the candidate head set and its popeties. Consequently, it punes the seach space efficiently. The est of this pape is oganized as follows. Section 2 intoduces the poblem and eviews some efficient elated woks. The poposed method is descibed in section 3. The expeimental esults and evaluation show in section 4. Finally, section 5 contains the conclusions and futue woks. (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, contains a numbe of shote fequent sub-pattens. Given the itemset lattice shown in Figue 2, which pesents the list of all possible itemsets fo L= {A, B, C, D, E}. A bute-foce appoach fo mining fequent itemsets is to count the suppot evey candidate itemsets in the lattice stuctue. It needs to compae each itemsets against evey tansaction. Obviously, this appoach can be vey expensive and it needs O (NML) compaisons, whee N is the numbe of tansactions, M is equal 2 i -1 candidate itemsets fo i items and L is maximum length of tansactions. Theefoe thee ae two main ideas to educe the computational complexity of fequent itemsets mining. Fistly, educing the numbe of candidate itemsets and secondly educing the numbe of tansactions those must be compaed to count the suppot of the candidate itemsets. II. PROBLEM DEFINITION AND RELATED WORK Simply, fequent pattens ae itemsets o substuctues that exist in a dataset with fequency no less than a use specified theshold. The fist definition of fequent itemset was intoduced fo mining tansaction databases (Agawal et al. 1993). A. Poblem Definition Let L= {i 1, i 2 i n } be a set of items and D be a tansaction database whee each tansaction T is a set of items and D be the numbe of tansactions in D. Given X= {i j i k } be a subset of L (j k and 1 j, k n) is called a patten. The suppot of the patten X o Sup (X) in D is the numbe of tansactions in D that contains X. The patten X will be called fequent if its suppot is no less than a use specified suppot theshold min_sup σ (0 σ D ). The poblem of fequent patten mining is finding all fequent pattens fom dataset D with espect to specified min_sup σ. Vaious kinds of fequent pattens can be mined fom diffeent kinds of data sets. In this eseach, we use itemsets (sets of items) as a data set and the poposed method is fo fequent itemset mining, that is, the mining of fequent itemsets fom tansactional data sets. Howeve, it can be extended fo othe kinds of fequent pattens. The complexity of fequent pattens mining fom a lage amount of data is geneating a huge numbe of pattens satisfying the minimum suppot theshold, especially when min_sup σ is specified low. This is because, all sub-patten of a fequent patten ae fequent as well. Theefoe a long patten Figue 2. The itemset lattice fo item set L= {A, B, C, D, E} B. Related wok the Agawal and Sikant [3] intoduced an inteesting popety called Apioi pinciple, to educe the numbe of candidate sets among fequent k-itemsets: if a k-itemset is fequent then all of its sub-itemsets must also be fequent. The Apioi algoithm find the fequent 1-itemsets by fist scanning the database, then geneating the candidate fequent 2-itemsets by using the fequent 1-itemsets, and check them against the database to find the fequent 2-itemsets. This pocess is iteates until it can not geneate any fequent k-itemsets fo some k. The Apioi algoithm has been extended by seveal extension fo impoving efficiency and scalability. The most impotant impovement of the Apioi which intoduced new technique o method such as patitioning technique [16], hashing technique [14], sampling appoach [17], dynamic itemset counting [5], use the Apioi pinciple appoach as well. In many cases, the Apioi appoach showed a good pefomance to educe the size of candidate sets. Howeve, in condition with a lage numbe of fequent pattens o low minimum suppot thesholds, it almost suffes inheently fom two poblems; multiple database scans that ae costly and geneating lots of candidates [9]

3 Han et al. [8] poposed fequent patten tee o FP-Tee as a pefix-based tee stuctue, and an algoithm called FP-gowth. The FP-Tee stoes only the fequent items in a fequencydescending ode. The highly compact natue of FP-tee enhances the pefomance of the FP-gowth. The FP-Tee constuction equies two data scans. The FP-gowth unlike the Apioi algoithm mines the complete set of fequent pattens without candidate geneation. Thee have been intoduced many extensions based on the FP-Tee appoach such as depthfist geneation by Agawal et al. [1], H-Mine by Pei et al. [15], aay-based implementation of pefix-tee-stuctue by Gahne and Zhu [7] and CanTee by leung et al [10]. The expeimental esults showed that FP-Tee and almost all its extensions have a high compactness ate fo dense data set. Howeve, they need a lage amount of memoy fo spase data set whee pobability fo shaing common paths is low [10, 12]. The pesentation of data which will be mined is an essential consideation in almost all algoithms. The mining algoithms can be classified accoding to two hoizontal and vetical database layouts. Both the Apioi and FP-gowth methods use hoizontal data fomat (i.e., {TID: itemset}) to mine fequent pattens. Zaki [18] poposed Eclat algoithm o Equivalence CLASS Tansfomation by using the vetical data fomat (i.e., {item: TID_set}). The Eclat uses the lattice theoy to epesent the database items. The esults showed that Eclat outpefoms Apioi significantly. Howeve, it needs an additional convesion step. This is because most databases use a hoizontal fomat. Moeove, it uses a Boolean powe set lattice that needs to much space to stoe the labels and tid-lists. Consequently, thee have been intoduced some efficient algoithms based on vetical layout. The Flex [11] is a lexicogaphic tee designed in vetical layout to stoe patten X and list of tansaction identifie whee patten X appeas. Its stuctue is esticted test-and-geneation instead of Apioi-like is esticted geneation-and-test. Thus nodes geneated ae cetainly fequent. The Flex tee is constucted in depth-fist fashion. The expeimental esults showed the Flex is an efficient algoithm to find long and maximal fequent pattens. Howeve, it needs a lage amount of memoy especially to stoe the list of tansaction identifie. (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Vol. 6, No.3, 2009 technique, an efficient tee stuctue called Pime-based encoded and Compessed Tee o PC_Tee and mining algoithm PC_Mine. The salient diffeence is that mining pocess makes use of the candidate head set and its popeties to educe the numbe of candidate sets and compaisons. In fact the PC_Mine algoithm pune the seach space by using the candidate head set and it finds the most pomising candidate set efficiently. This section is followed by eviewing of the data tansfomation technique and the PC_Tee. Then the candidate head set and its popeties ae explained to show how they can use in the PC_Mine algoithm to educe the numbe of candidate sets. A. Data Tansfomation Technique As shown in Fig 1 the data tansfomation is an essential pocess in data pepocessing step which can educe the size of database. Obviously, educing of the size of database can enhance the pefomance of mining algoithms. Ou method uses a pime-based data tansfomation technique to educe the size of tansaction database. It tansfoms each tansaction into a positive intege called Tansaction Value (TV) duing of the PC_Tee constuction as follows: Given tansaction T = (tid, X) whee tid is the tansaction-id and X = {i j i k } is the tansaction-items o patten X. While the PC_Tee algoithm scans tansaction T, the tansfome pocedue consides a pime numbe p fo each item i in patten X, and then TV tid is computed by Equation 1 whee T= (tid, X), X = {i j i k } and i is pesented by p. = k tid p j TV (1) The data tansfomation technique utilizes Equation 1 based on simple following definitions: A positive intege N can be expessed by unique poduct N = pm1 pm2 K pm whee 1 2 p i is pime numbe, p 1 p p 2 pl p and mi is a positive intege, called the multiplicity of p [6]. i III. PROPOSED METHOD Based on elated woks esults, educing the numbe of candidate sets and compaisons (to count the suppot) ae two effective way to enhance the pefomance of mining pocess. They showed using the Apioi pinciple can educe the numbe of candidate sets and well-oganized tee stuctue such as FP-Tee which captues the content of the tansaction database educes the numbe of compaisons of the suppot counting. Theefoe, in this eseach, we aim to use both the Apioi pinciple and well-oganized tee stuctue in ou poposed method. We poposed a method by using a simple and effective tee stuctue fo maximal fequent patten mining which can captue all content of the tansaction database [13]. This eseach poposes an impovement of pevious vesion using a new efficient candidate set called candidate head set based on the Apioi pinciple to educe the numbe of candidate sets. The poposed method is also based on pime numbe chaacteistics including a data tansfomation Fo example, N = 1800=2 3 * 32 * 52. Fundamentally, thee is no duplicated item in tansaction T. Hence we estict the multiplicity only to m i = 1 without losing any significant infomation. Theefoe N can be poduced by P P K 1 2 P. To facilitate the tansfomation pocess used in ou method, let s examine it though an example. Let item set L= {A, B, C, D, E, F} and the tansaction database, DB, be the fist two columns of Table 1 with eight tansactions. The fouth column of Table 1 shows TV tid tansfomed fo all tansactions. Geneally the aveage length of items used in the benchmak datasets is smalle than those in the eal applications. Fo example custome puchase tansaction T c = (3, { , , }) fom a maket can be pesented by thid tansaction T= (3, {A, B, E}) in Table 1. Although, the length of items in tansaction T c is bigge than T but both T and T c can be tansfomed into the same TV 66 by using ou data tansfomation technique. Hence it is an item-length 232

4 (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, independent tansfomation technique. The expeiments TV ( n ) R = ( oot, n, n,..., n ) whee 0 j i. It means j j 0 1 j showed that by applying this data tansfomation technique, the size of eal tansaction databases can be educed moe than any TV stoed in nodes of the sub half [13]. descendant R = ( oot, n, n,..., n ) can be divided by TV TABLE I. TRANSACTION DATABASE DB AND ITS TRANSACTION VALUES TID Items Tansfomed TV 1 A, B, C, D, E 2, 3, 5, 7, A, B, C, D, F 2, 3, 5, 7, A, B, E 2, 3, A, C, D, E 2, 5, 7, C, D, F 5, 7, A, C, D, F 2, 5, 7, A, C, D 2, 5, C, D, F 5, 7, B. PC_Tee constuction Thee have been intoduced seveal methods to educe the complexity of fequent patten mining pocess using welloganized tee stuctue. Thus the tee stuctues have been consideed as a basic stuctue in pevious data mining eseach [8, 10-13]. Recently, we intoduced a novel tee stuctue called Pime-based encoded and Compessed Tee o PC_Tee [13].It is vey simple but still poweful to captue the content of tansaction database efficiently. Unlike the pevious methods, the PC_Tee is based on pime numbe chaacteistics. Moeove PC_Tee has some nice popeties which used to pune the seach space duing of mining pocess. Let s eview the PC_Tee. A PC_Tee consists of one oot labeled as null and some nodes that fom sub tees as childen of the oot. The node stuctue consists of seveal fields: value, local-count, globalcount, status and link. The value field stoes the TV made by the data tansfomation technique duing of insetion pocedue in the PC_Tee constuction algoithm. In fact, the value field egistes which tansaction this node epesents. The localcount field egistes the numbe of individual tansaction epesented by its node in the whole of tansaction database. It is set to 1 duing inseting cuent TV in a new node and o if thee is a node with same TV then the value of its local-count field is inceased by 1. Hence thee is no duplicated TV in the PC_Tee. The global-count field egistes fequency of its TV in its sub tee (descendant) to use in the suppot computing function of its TV. The status field is to keep tacking of tavesing which is changed fom 0 to 1 when a node visited in the tavesing pocedue. The link field is to fom sub tees. The PC_Tee constuction algoithm foms a PC_Tee by inseting TV(s) based on definitions below: Definition 1: TV of the oot is assumed null and can be divided by all TVs. Definition 2: Sub tee R = ( oot, n, n,..., n ) is a sub i 0 1 i descendant if only if stoed in node n j. j 0 1 j Definition 3: Sub descendant R = ( oot, n, n,..., n ) is a descendant if n i is a leaf. i 0 1 i Definition 4: In a PC_Tee, If TV (n ) = TV (n s ) then = s. The insetion pocedue inceases local - count field of node n by 1 if the cuent TV is equal with TV of n. Based on definition 1-4, the PC_Tee can be constucted by algoithm 1 as follow: Algoithm 1 (PC_Tee constuction). Input: A tansaction database DB. Output: The PC_Tee of DB. Method: The PC_Tee is constucted as follows. 1. Ceate the oot of the PC_Tee and label it as null. 2. Fo each tansaction T in DB, inset T into the PC_Tee as follow: 2.1. Scan T fom input file, tansfom T into its TV and update the item fequency table Add TV in the tee as follows If TV can be an element of existent descendant R then inset TV as follows. If thee is a node in R with same TV then incease its local-count and global-count fields and its childen s global-count field by 1; else ceate a new node, with its local-count field initialized to 1. Link the new node to its paent and childen. Incease its childen s global-count field by 1 and set its global-count field by summation value of its local-count field and values of its paent s global-count field Else; the TV cannot be an element of existent descendants. Ceate a new node, with its local-count and global-count initialized to 1. Link the new node to the oot as its paent and to its childen. Incease its childen s global-count field by 1. Figue 3 shows the PC_Tee constucted fo tansaction database shown in Table 1. Each node pesents a TV o patten followed by two numbes afte : to indicate the local-count and global-count espectively. Thee ae seveal impotant popeties of PC_Tee that can be deived fom the PC_Tee constuction pocedue. Popety 1: In the PC_Tee, all nodes ae aanged accoding to TV-descending ode. Popety 2: Impotant pocedues used in the PC_Tee algoithm ae almost done only by two simple mathematic opeations poduct and division. Obviously using mathematic opeations will enhance the pefomance instead of sting opeations

5 Figue 3. Step by step PC_Tee constuction C. PC_Mine algoithm using candidate head set In ou pevious wok [13], the PC_Tee was mined by the PC_Mine algoithm in a top-down tavesing fashion. It finds the maximal fequent pattens as the smallest epesentative set fom which all fequent pattens can be deived. The PC_Mine makes use fom supeset and subset puning to enhance the pefomance of maximal fequent patten mining. The weakness of PC_Mine is that it consides all sub tees o descendants with same possibility duing of tavesing. To solve this weakness, the PC_Mine is impoved by an efficient heuistic called candidate head set denote H to educe the effective banch facto of the PC_Tee as follows. Without consideing the oot, let R = ( n, n,..., n ) be a 0 1 i descendant in the PC_Tee, the node n 0 as the fist node of the descendant R that egistes the biggest TV in R is called head of the descendant R. In othe wod the immediate childen of the oot make the head set. Definition 6 candidate head: the positive intege h = p 1 K p which made by poduct pime j numbes p 1 K p is the candidate head of the descendant R j if only if h is the lagest subset of n 0 and sup( p ) min_ sup, 1 k k j. Accoding to the data tansfomation technique used in the PC_Tee constuction, TV (n 0 ) is a poduct of pime numbes p 1 K p which thei fequency egiste in the item k fequency table(see Table 2) by step 2.1 of the algoithm1. Using this table and the minimum suppot theshold, infequent pime numbes can be emoved fom TV (n 0 ) as head of descendant R to make its candidate head. Definition 7 candidate head set: Let R = R, K, R ) be the ( 0 j descendant set of the PC_Tee, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, H = { h h is candidate head of R, 0 j such that if h, h H and h h h = h } is candidate head set of the s PC_Tee. s s Based on above definitions, the PC_Tee has some inteesting popeties which will facilitate fequent-patten mining. Given σ as min_sup and patten P and Q have been epesented by TV (P) and TV (Q) in descendant R espectively. Popety 3: P, Q R, sup( P) p sup( Q) if and only if TV ( Q) TV ( P) (i.e. TV (P) can be divided by TV (Q)). σ Popety 4: sup (P) and sup (P s paents in its descendants) p σ if and only if P is a maximal fequent patten. Now, this is possible to use the candidate head set to find a smalle candidate set fom which the maximal fequent pattens can be deived. Consequently all fequent pattens can be geneated by the maximal fequent patten set. Theefoe, based on the candidate head set definition and above popeties, we have the following algoithm fo fequent patten mining using PC_Tee. Algoithm 2 (PC_Mine: Mining fequent pattens fom the PC_Tee by candidate head set) Input: A tansaction database DB, epesented by PC_Tee and minimum suppot theshold σ. Output: The complete set of fequent Pattens of DB. Method: The PC_Mine mines fequent pattens as follows. 1: Make the candidate head set H by using the item fequency table. 2: Let k max denote the maximum size of itemsets in H. 3: F = F = { f sup( f ) min_ sup, f = 1}. 4: k = k 1 max 5: fo k downto 2 do 6: H k = { f f H, f = k}. 7: fo each f H and f F do k 8: if Sup ( f ) min_sup // popety 4 and coollay 1 // 9: F=F U all subsets of f. 10: else if k>2 then 11: add all (k-1)-subsets of f to H. 12: end if 13: end fo 14: end fo The coectness and completeness of the pocess in the PC_Mine algoithm should be justified. This is accomplished by fist intoducing impotant lemma and coollay as follow: 234

6 Lemma 1: Let U k i=1 H = H consist of all k-candidate head i sets, then the complete set of the fequent itemsets can be geneated by H. Rationale: Let F be the fequent items in DB, n be head of the descendant R and h (n) is the set of fequent items in n, i.e., h (n) = n F. Accoding to candidate head set definition, h (n) is the candidate head of the descendant R and belongs to H. In othe wod the candidate head set H used in the PC_Mine algoithm includes all fequent items. The elationship among the candidate head set H, fequent and maximal fequent itemsets ae shown in Figue 4. Figue 4. Relationship among candidate head set, fequent and maximal fequent itemsets Coollay 1: The complete set of the fequent itemsets F can be geneated by k U H ) i U 1 ( F i= 2 whee F 1 is set of 1-length fequent itemsets which can be deived fom item fequency table made in the PC_Tee algoithm. The numbe of the candidate head sets is vey smalle than the fequent and even maximal fequent itemsets. Howeve, Figue 4 shows that the candidate head set is a supeset of fequent and maximal itemsets. To illustate let s examine the mining pocess. In the PC_Mine algoithm, the line 3 makes 1-fequent itemsets by using the item fequency table which made duing the tee constuction pocess. In oute fo-loop between lines 5-14, all k-candidate heads (k>2) ae made and investigated espectively. Then duing of line 7-13 all fequent itemsets ae geneated by using maximal fequent itemsets found in line 8 based on popety 4. Accoding to the elationship shown in Figue 4 and steps of the PC_Mine algoithm which investigate all candidate heads; theefoe thee is no missing fequent itemsets. The PC_Mine algoithm make use fom supeset infequent puning based on the candidate head set intoduced in this eseach which is an effective way to eliminate some of the candidate itemsets. In fact the candidate head set definition is based on the Apioi pinciple which all subsets of a fequent itemset must also be fequent. Fo instance thee ae = 63 possible candidate itemsets in the tansaction database DB (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, pesented in Table1. The PC_Mine uses the fequency of items computed in step 2.1 of the PC_Tee algoithm to find the candidate head set. Table 2 shows the fequency of items of DB. Consequently, items B and E ae infequent when min_sup=4. Theefoe, the PC_Mine stats mining with candidate head set H includes only 4-candidate itemset ACDF and the PC_Mine only examined 6 candidate itemsets {ACDF, ACD, ACF, ADF, CDF, AF}. Above definitions and PC_Mine algoithm show that using the candidate head set can educe the numbe of candidate itemsets. Moeove the expeimental esults suppot the accuacy and efficiency of ou method. IV. EXPERIMENTAL RESULTS In this section, we evaluate the accuacy and pefomance of ou method by seveal expeiments. All expeiments wee pefomed in a time-shaing envionment in a 2.4 GHz PC with 2 GB memoy. We used seveal spase and dense datasets which used in pevious woks as benchmak datasets. The synthetic spase datasets ae geneated by the pogam developed at IBM Almaden Reseach Cente [3] and eal dense datasets ae download fom UC Ivine Machine Leaning Repositoy [4]. The esults epoted in figues wee computed by the aveage of multiple uns. Accoding to the space limitation and the poblem specifications, only the esults of expeiments by using synthetic spase dataset T10I5D100K and eal dense dataset mushoom which ae the most popula benchmak datasets in this field ae pesented in this pape. The numbe of tansactions, the aveage tansaction length, the numbe of items and the aveage fequent patten length of T10I5D100k ae set to 100k, 10, 1000 and 4 espectively. The mushoom dataset consists of the chaacteistics of vaious mushoom species. The numbe of ecods, the numbe of items and the aveage ecod length ae set to 8124, 119 and 23 espectively. The fist expeiment is to poof the accuacy of the poposed method. Howeve the coectness and completeness of the pocess in the PC_Mine algoithm was justified in pevious section. The numbe of fequent pattens mined by the PC_Mine algoithm vesus suppot using T10I5D100k and mushoom datasets is shown in Figues 5 and 6 espectively. We compaed all fequent pattens mined by the poposed method using the candidate head set with those mined by the Apioi algoithm in seveal datasets. They wee exactly equal. The second expeiment evaluates the numbe of the candidate sets geneated by the PC_Mine and Apioi which is one of the most efficient algoithms in tem of candidacy eduction. Figue 7 shows the numbe of candidate sets geneated by PC_Mine and Apioi algoithms vesus diffeent minimum suppot thesholds ove dataset T10I5D100k. The efficiency of using the candidate head set in the PC_Mine algoithm is veified by thid expeiment which compaes the un time vesus the suppot. Figue 8 and 9 pesent the efficiency of the PC_Mine algoithm using the candidate head set vesus the Apioi algoithm in T10I5D100k and mushoom datasets ove diffeent minimum suppot thesholds espectively

7 (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, T10I5D100K T10I5D100k #Fequent Pattens Run time (sec) PC_Mine Apioi Suppot (%) Suppot(%) Figue 5. #Fequent Pattens Vs. Suppot Figue 8. Run time Vs. Suppot #Fequent Pattens Mushoom Suppot (%) Run time (sec) PC_Mine Apioi Mushoom Suppot(%) Figue 6. #Fequent Pattens Vs. Suppot Figue 9. Run time Vs. Suppot Candidate sets T10I4D100k geneated by PC_Mine Candidate sets geneated by Apioi Suppot(%) Figue 7. The numbe of candidate sets Vs. Suppot V. CONCLUSION AND FUTURE WORKS In this pape we intoduced the candidate head set to educe the numbe of candidate sets in mining pocess. Ou pevious method [13] was impoved by using the candidate head sets to popose an efficient method fo fequent patten mining. The expeimental esults veified the accuacy and efficiency compaing with the Apioi algoithm which is one of the most efficient algoithms in tem of candidacy eduction. Paticulaly, we intoduced a new method based on pime numbe chaacteistics using candidate head sets to find completed fequent pattens by using maximal fequent pattens. The poposed method can be impoved fo incemental mining of fequent pattens whee database tansactions can be inseted, deleted, and/o modified incementally. Moeove it can be impoved fo inteactive mining of fequent pattens whee minimum suppot theshold can be changed to find new coelation between pattens without eunning the mining pocess fom scatch

8 REFERENCES [1]. Agawal, R.C., C.C. Aggawal, and V.V.V. Pasad, "A tee pojection algoithm fo geneation of fequent item sets", Jounal of Paallel and Distibuted Computing, Vol. (3): p [2]. Agawal, R., T. Imieli ski, and A. Swami, "Mining association ules between sets of items in lage databases", ACM SIGMOD Recod, Vol. (2): p [3]. Agawal, R. and R. Sikant. "Fast algoithms fo mining association ules", Poc. 20th Int. Conf. Vey Lage Data Bases, VLDB, 1994 [4]. Blake, C. and C. Mez. Uci epositoy of machine leaning databases, univesity of califonia ivine, ivine, ca [5]. Bin, S., et al. "Dynamic itemset counting and implication ules fo maket basket data", poc. ACM-SIGMOD int. conf. management of data (SIGMOD 97), 1997 [6]. Comen, T.T., C.E. Leiseson, and R.L. Rivest, Intoduction to algoithms. 1990: MIT Pess Cambidge, MA, USA. [7]. Gahne, G. and J. Zhu. "Efficiently using pefix-tees in mining fequent itemsets", Poc. ICDM 03 int. wokshop on fequent itemset mining implementations (FIMI 03) [8]. Han, J., J. Pei, and Y. Yin. "Mining fequent pattens without candidate geneation", Poc. ACM-SIGMOD int. conf. management of data (SIGMOD 00), 2000 [9]. Han, J., et al., "Fequent patten mining: Cuent status and futue diections", Data Mining and Knowledge Discovey, Vol. (1): p [10]. Leung, C.K.S., Q.I. Khan, and T. Hoque. "Cantee: A tee stuctue fo efficient incemental mining of fequent pattens", Poc. ICDM 2005, 2005 [11]. Mustapha, N., et al., "Fast discovey of long pattens fo association ules", Intenational Jounal of Compute Mathematics, Vol. (8): p [12]. Nadimi-Shahaki, M., et al. "Incemental updating of fequent patten: Basic algoithms", Poceedings of the second Intenational Confeence on Infomation Systems Technology and Management ( ICISTM' 08), 2008 [13]. Nadimi-Shahaki, M., et al., PC_Tee: Pime-based and compessed tee fo maximal fequent pattens mining, Advances in electical engineeing and computational science, S.-l. Ao and L. Gelman, Editos, 2009, Spinge. ch. 42, p [14]. Pak, J.S., M.S. Chen, and P.S. Yu, "An effective hash-based algoithm fo mining association ules", int. conf. management of data (SIGMOD 95), Vol. (2): p [15]. Pei, J., et al. "Pefixspan: Mining sequential pattens efficiently by pefix-pojected patten gowth", Poc. int. conf. data engineeing (ICDE 01), 2001 [16]. Savasee, A., E. Omiecinski, and S. Navathe. "An efficient algoithm fo mining association ules in lage databases", int. conf. vey lage data bases (VLDB 95), 1995 [17]. Toivonen, H. "Sampling lage databases fo association ules", Poc. int. conf. vey lage data bases (VLDB 96), 1996 [18]. Zaki, M.J., "Scalable algoithms fo association mining", IEEE Tansactions on Knowledge and Data Engineeing, Vol. (3): p (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, 237

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

PC Tree: Prime-Based and Compressed Tree for Maximal Frequent Patterns Mining

PC Tree: Prime-Based and Compressed Tree for Maximal Frequent Patterns Mining Chapter 42 PC Tree: Prime-Based and Compressed Tree for Maximal Frequent Patterns Mining Mohammad Nadimi-Shahraki, Norwati Mustapha, Md Nasir B Sulaiman, and Ali B Mamat Abstract Knowledge discovery or

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch

Image Registration among UAV Image Sequence and Google Satellite Image Under Quality Mismatch 0 th Intenational Confeence on ITS Telecommunications Image Registation among UAV Image Sequence and Google Satellite Image Unde Quality Mismatch Shih-Ming Huang and Ching-Chun Huang Depatment of Electical

More information

Detection and tracking of ships using a stereo vision system

Detection and tracking of ships using a stereo vision system Scientific Reseach and Essays Vol. 8(7), pp. 288-303, 18 Febuay, 2013 Available online at http://www.academicjounals.og/sre DOI: 10.5897/SRE12.318 ISSN 1992-2248 2013 Academic Jounals Full Length Reseach

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

DEVELOPMENT OF A PROCEDURE FOR VERTICAL STRUCTURE ANALYSIS AND 3D-SINGLE TREE EXTRACTION WITHIN FORESTS BASED ON LIDAR POINT CLOUD

DEVELOPMENT OF A PROCEDURE FOR VERTICAL STRUCTURE ANALYSIS AND 3D-SINGLE TREE EXTRACTION WITHIN FORESTS BASED ON LIDAR POINT CLOUD IAPRS Volume XXXVI, Pat 3 / W52, 27 DEVELOPMENT OF A PROCEDURE FOR VERTICAL STRUCTURE ANALYSIS AND 3D-SINGLE TREE EXTRACTION WITHIN FORESTS BASED ON LIDAR POINT CLOUD Yunsheng Wang a,*, Holge Weinacke

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

Effective Missing Data Prediction for Collaborative Filtering

Effective Missing Data Prediction for Collaborative Filtering Effective Missing Data Pediction fo Collaboative Filteing Hao Ma, Iwin King and Michael R. Lyu Dept. of Compute Science and Engineeing The Chinese Univesity of Hong Kong Shatin, N.T., Hong Kong { hma,

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional

More information

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder 20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation

More information

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary

Haptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)

More information

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Poceedings of the ASME 215 Dynamic Systems and Contol Confeence DSCC215 Octobe 28-3, 215, Columbus, Ohio, USA DSCC215-999 PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Jaeyeon Lee

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

XML Data Integration By Graph Restructuring

XML Data Integration By Graph Restructuring XML Integation y Gaph Restuctuing Lucas Zamboulis and lexanda Poulovassilis School of Compute Science and Infomation Systems ikbeck College, Univesity of London, {lucas,ap}@dcs.bbk.ac.uk bstact This technical

More information

COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE

COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE COLOR EDGE DETECTION IN RGB USING JOINTLY EUCLIDEAN DISTANCE AND VECTOR ANGLE Slawo Wesolkowski Systems Design Engineeing Univesity of Wateloo Wateloo (Ont.), Canada, NL 3G s.wesolkowski@ieee.og Ed Jenigan

More information

Effective Data Co-Reduction for Multimedia Similarity Search

Effective Data Co-Reduction for Multimedia Similarity Search Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

BUPT at TREC 2006: Spam Track

BUPT at TREC 2006: Spam Track BUPT at TREC 2006: Spam Tac Zhen Yang, Wei Xu, Bo Chen, Weian Xu, and Jun Guo PRIS Lab, School of Infomation Engineeing, Beijing Univesity of Posts and Telecommunications, 100876, Beijing, China yangzhen@pis.edu.cn

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information