Mining Frequent Trajectory Using FP-tree in GPS Data
|
|
- Gertrude Pope
- 5 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 9: 16 (2013) Available at Mining Frequent Trajectory Using FP-tree in GPS Data Junhuai LI 1,, Jinqin WANG 1, Hailing LIU 2, Lei YU 1, Jing ZHANG 1 1 School of Computer Science & Engineering, Xi an University of Technology, Xi an , China 2 College of Electronic Information Engineering, Chongqing University of Science and Technology, Chongqing , China Abstract Pervasiveness of location-acquisition technologies makes it convenient to collect the movement data of moving objects, and the spatial-temporal information contained implicitly in the historical trajectories unveils important knowledge about movement behaviors. This paper presents a novel frequent trajectory mining method using FP-Tree Most existing approaches transform trajectories into sequences of popular region-ids using a statically predefined grid of cells with the same size, and then merge popular cells into larger popular regions. However, due to the size of these popular regions have not been limited, the movements of objects in the region may be lost. And predefined grid may be lack of adaptability. This study defines a Boundary Function to limit the maximum size of the popular regions and selects the size of the grid dynamically by defining a distance threshold d. Then, an improved FP-Tree algorithm is proposed to mine frequent trajectories. The experimental results show our method is efficient. Keywords: Trajectory; Frequent Trajectory Mining; FP-tree; GPS Data 1 Introduction The fast developments in tracking technologies and rapid improvement in location-based services have made it convenient to collect a large amount of time-stamped location data of moving objects. Moving objects consist of customers using embedded GPS mobile phones or PDAs, and vehicles with navigational equipment. Movement information of objects can be collected in the form of time-stamped location data. For example, GPS-equipped portable devices can record their latitude-longitude position during fixed time interval, and transmit them to a collecting server. The spatial-temporal information contained in the historical trajectories of moving objects can succinctly provide useful information. By analyzing the historical travel data of tourists over a long time, we can find the places of interest (mean the places tourists visit most) or the most Project supported by the National Nature Science Foundation of China (No ), the Science and Research Plan Project of Shaanxi Province (No. 2011NXC01-12), Science and Research Plan Project of Shaanxi Province Department of Education (No. 2010JC15) Corresponding author. address: lijunhuai@xaut.edu.cn (Junhuai LI) / Copyright 2013 Binary Information Press DOI: /jcisP0732 August 15, 2013
2 6556 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) popular routes, so some recommendations can be gave. Frequent movements of some vehicles during a period of time can help drivers select the best route. It is important and meaningful in future urban planning or urban computing. As a result, mining frequent trajectory has attracted increasing attention recently. In this paper, we present a FP-tree-based method for mining frequent trajectories in GPS data. In general, due to the noise and the limitation of location-acquisition equipment, the location information (e.g., coordinate values in 2D) of a fixed place cannot be exactly the same. Therefore although two GPS sequences represent the same route, the values of them will rarely be exactly the same. To solve this problem, we firstly define a distance threshold d and divide the trajectories area into cells with the same size of dd. According to the density of these cells, by defining a minimum support s min, the popular cells can be extracted. Then, we merge these popular cells into larger popular regions by defining a Boundary Function. Finally, the original trajectories can be transformed into sequences of popular region-ids. The other problem is detecting frequent trajectories, most studies adopt sequential pattern mining paradigm. But as we know, pattern discovery techniques in transactional database are not readily applicable for finding trajectory patterns. Without candidate generation, FP-tree proposed in [1] has great efficiency in mining sequential patterns. In this paper, we consider the continuity of trajectory mining, and have made some improvements to make it ready for trajectory mining. In general, frequent trajectory mining in this paper contains three phases: (1) create an index structure for each frequent spatial region; (2) traverse these segments to construct a FP-tree; (3) extract frequent trajectories. The remainder of the paper is organized as follows: Section 2 discusses the related work. Section 3 describes trajectory preprocessing. Section 4 describes the proposed algorithm in detail. Section 5 illustrates the results and performance of our method. Section 6 presents conclusion. 2 Related Works Recently, many researches have been made on trajectory analysis, and lots of achievements have been drawn. Giannotti et al. introduced the concepts of Region-of-Interest (RoI) in [2]. To efficiently compute popular points, they discretize the trajectory space through a regular grid with cells of small size. The density of cells is computed by taking each single trajectory and incrementing the density of all the cells that contain any of its points. Then, detecting popular cells, and merging them into RoIs. And they detect trajectory patterns using TAS (Temporally Annotated Sequences). J.Y.Kang et al. first approximated original trajectories into simplified line segments and transformed them into sequences of spatio-temporal regions by incorporating temporal constraints, finally proposed a prefix-projection approach to extract frequent spatiotemporal patterns [3]. A framework had been put forward in [4] to analyze, manages, and query frequent periodic patterns in spatio-temporal data. A density-based algorithm had been adopted to find the pattern regions. Then, they proposed two methods to find longer patterns: a bottomup, level-wise technique and a faster top-down approach. Anthony J.T et al. presented a GBM (graph-based mining) algorithm for mining the frequent trajectory patterns [5]. First, they scan the database once to generate a mapping graph and trajectory information lists (TI-lists), and then traverses the mapping graph in a depth-first search manner to mine all frequent trajectory patterns. But they have not related to the preprocessing of trajectories. Savage NS et al. selected K most frequent edges and combined them to create a list of the most frequent paths [6]. Akasapu A et al. use Apriori-TFP, and the T-tree finally contains all frequent sets with their complete
3 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) support-counts [7]. 3 Trajectory Preprocessing A trajectory of a moving object is a temporally ordered sequence of triples T =< (x 0, y 0, t 0 ), (x 1, y 1, t 1 ),, (x n, y n, t n ) >, where t i (i = 0 n) is a time stamp, ( 0 i n )t i t (i+1) and (x i, y i ) are coordinates in two-dimensional. Due to the noise and the limitation of location-acquisition equipment, even though two GPS sequences represent the same route, it is highly unlikely that they have the identical location values. In addition, matching the items of a sequence in standard sequential pattern mining requires simple equality tests between symbols. Therefore, in order to use the approaches based on sequential pattern mining, the coordinate values of a trajectory should be discretized prior to mining process. To discretize trajectory data, we take the method similar to it in [2]. Firstly, we discretize the trajectory space through a dynamically grid with cells of small size. Each cell has the same size with fixed width and height. Then, we map each of the GPS points that belong to a trajectory into the cells. As a result, a trajectory can be converted to a sequence of cell id. The densities of the cells with GPS point located in are incremented. It should be noted that a trajectory touching a point multiple times should be counted only once. After matching all the trajectories, we know the density of each cell. If it is larger than a threshold defined by user, we call it popularcell. Generally, the cell size is very small. Therefore, the number of popular cells can be extremely large. To solve this problem, in [2] they merge cells into larger regions. For each region they consider the average density of its cells, the final results may contain very large regions, as shown in F igure1a. Therefore, the movements in the region may be lost. In order to make up for the deficiency, we introduce a BoundaryF unction, which is defined in the following way: B(m, n) x max x min m, y max y min n (1) The BoundaryF unction is used to limit the maximum size of popular region. Then, the definition of popular region set can be redefined as following: Definition 1 (Popular region set) Given a trajectory database and a distance threshold d, the trajectory space can be divided into a grid ζ of n m cells, each cell with its density ζ(i, j)(1 i n, 1 j m), a minimum support S min. A popular region set for ζ is a collection R of sets of cells from ζ, such that: (i) each r R forms a rectangular region; (ii) sets in R are pairwise disjoint; (iii) all popular cells in ζ are contained in some set r R; (iv) all r R have avg ( i, j) r)ζ(i, j) S min ; (v) assuming that r R has size h k, all its rectangular supersets r r of size (h + 1) k or h (k + 1) violate (iv) or r and r contain exactly the same number of popular cells; (vi) Given BoundaryF unctionb(m, n), h m, k n. It should be noted that a grid ζ of n m cells is not statically pre-defined. F igure1b shows the results with BoundaryF unction. We can see that the large regions are divided into several small ones.
4 6558 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) (a) the results with method in [2] (b) the results with Boundary Function Fig. 1: Extracted RoIs After finding all the RoIs, each with an id. The original trajectory sequences can be transformed into a list of RoI id sequence segments. The rules are as follows: (1) Segment a trajectory from the point that are not covered by any RoI, and delete the point. (2) Delete the repeat trajectory segments of each trajectory. Definition 2 (Frequent Trajectories mining(ftm)) Given a database of input trajectories D, a distance threshold d, a minimum support S min, Boundary Function B(m, n). FTM problem consists of finding all frequent trajectories T such that: Support(T ) >= S min, where Support(T ) is the support value of T in D. 4 FP-Tree-Based Frequent Trajectory Mining FP-Tree proposed in [8] has great efficiency in mining sequential patterns. But as we know, pattern discovery techniques in transactional database are not readily applicable for finding trajectory patterns. In this paper, we consider the continuity of trajectory mining, and have made some improvement. In this section, we discuss the proposed FTTBM (FP-Tree-based mining) algorithm for mining frequent trajectories. FTTBM comprises three phases: (1) create an index structure for each frequent spatial region; (2) traverse these segments to construct a FP-Tree; (3) extract frequent trajectories. 4.1 FP-tree construction In FTTBM method, each node of FP-tree contains six fields: the parent domain points to the parent node, the data contained in the node, support of the node, the objectid that latest generates the node, all the objectids that generating the node, and the refe domain points to the next node which contains the same data. In addition, in order to facilitate the traversal of the tree, we create a project head table Htable, which consists of two domains: itemname and itemhead. Each ROI, via an itemhead, to its first occurrence in the tree. Let us give an example to illustrate the construction of FP-Tree. Suppose Table 1 is the trajectory database after clustering the minimum support threshold is 3. Let us consider the database shown in Table 1, we can get all ROIs :< (1 : 3), (2 : 3), (3 : 3), (4 : 3), (5 : 3) >, where the domain before : is the data and the domain after it is the support value. Through data preprocessing mentioned in
5 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Table 1: The trajectories consist of popular region-ids Object id Trajectory 1 1,2,3,4,5,6,7,8,1,3,5,3,2 2 2,4,5,7,6,1,2,3,4 3 1,2,3,4,5,8,2,3 Section 3, we can get the results in Table 2. Next, we create an Htable for all ROIs (i.e., < (1), (2), (3), (4), (5) >), as shown in table 3. Then a root node will be created, initialized to null. The scan of the first trajectory segment leads to the construction of the first branch of the tree: < (1 : 1), (2 : 1), (3 : 1), (4 : 1), (5 : 1) > of object 1. For the second segment, although it shares a common prefix < 1 > with the existing path < 1, 2, 3, 4, 5 >, the support of node < 1 > is not increased by 1 for it belongs to object 1. For the next segment < 2, 4, 5 >, since it shares no common prefix with the existing tree, a new branch is created. For the segment < 1, 2, 3, 4 >, since it shares a common prefix < 1, 2, 3, 4 > with the segment < 1, 2, 3, 4, 5 > of objects, the support of each node along the prefix is increased by 1. For the last segment < 1, 2, 3, 4, 5 >, since it is identical to the first segment, the support of each node along the segment is increased by 1. Table 2: The trajectories after preprocessing Object id Trajectory segments 1 (1,2,3,4,5)(1,3,5,3,2) 2 (2,4,5)(1,2,3,4) 3 (1,2,3,4,5) Table 3: Htable Itemname Itemhead The algorithm for constructing FP-Tree is as follows: Algorithm: Construct T-ree Input: The trajectory segments after preprocessing and a minimum support threshold Output: T treet (1) Create an Htable for all ROIs; (2) Create a root node, and initialize it to Null; (3) Scan the trajectory segments [p P ] of each object, where p is the first element of the segment and P is the remaining part; (4) Callinsert tree([p P ], T, ids), its implementation is: if T-tree T has a child node N, making N.data = p, and the current object id is not included in ids, then the support value of node N increases 1 and ids = ids+id.t ostring(). Otherwise, create a new node N, N.data = p, N.parent
6 6560 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) points to its previous node in the segment. N.ref e points to the next node that has the same data, N.ids = thecurrentobjectid. If P! = N ull, then recursively callinsert tree([p P ], T, ids). And the construction process is illustrated in Figure 2. (a) Construction of the segment (1,3,5,3,2) of object 1 (c) Construction of the segment (1,3,5,3,2) of object 1 (b) Construction of the segment (1,2,3,4,5) of object 1 (d) Construction of the segment (e) Construction of the segment (1,2,3,4,5) of object 1 (1,3,5,3,2) of object 1 Fig. 2: FP-Tree construction 4.2 Frequent trajectory mining For each itemname in Htable, scan the tree to find the set of trajectory sequences that ending of it. Since the support of each sequence is known after the construction of tree, considering the consecutive subsequence of each trajectory sequence, calculating its support in the set. And the most important information is that the support value of the last symbol represents the support of the whole sequence. Let us consider the example above again, set Smin = 3 and frequent trajectory set FT to null, after obtaining the tree in Figure 5. Suppose itemname is 5, we traverse the tree to find the set < (1, 2, 3, 4, 5), (2, 4, 5) >. For the first segment (1, 2, 3, 4, 5), we consider sequence (4, 5). Its support is 2 and the object 1 and 3 contain it, but the segment (2, 4, 5) of object 2 also contains it, so its final support value is 3. Adding (4, 5) to set FT. For the second subsequence (3, 4, 5), its support value is 2 according to the support of symbol 5 in the ending of the segment. For the subsequences (2, 3, 4, 5), (1, 2, 3, 4, 5), their support are 2. For the next subsequence (4, 5) of (2, 4, 5), the scan of FT shows that the frequent trajectory (4, 5) has already existed. Therefore, considering the next subsequence (2, 4, 5), its support is 1. An algorithm FTM of extracting frequent trajectories is as follows: Algorithm: FTM()
7 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Input: T-tree, Minimum support Output: the set of frequent trajectories FT (1) FT=;//the set of frequent trajectories (2) For each item name in Htable, scan T-tree to find the set of all the sequences that ending of item name. Marked as SeriesList (Item name). (3) For each element in SeriesList (item name), getting the consecutive subsequences of it, which ending of item name. Scan SeriesList (item name) to calculate its support. (4) The rule to calculate the support is: if a sequence s1 is a consecutive subsequence of another sequence s 2 in SeriesList (item name), then call function Dis(s 1, s 2 ). If it returns n, then the support of s1 increases n. (5) If the support of s1 is larger than the given minimum support, and it is not contained in a subset of FT, then FT union s 1. Dis(s 1, s 2 ) (1) get the ids of the first element in s 1 and s 2 respectively. (2) For all the elements in s 1, calculating the different element in s 2 from s 1, and return the number. 5 Experiments In this section we summarize the results of a set of experiments obtained from real data. The real data used in these experiments describe the trajectories of 2 school buses collecting (and delivering) students around Athens metropolitan area in Greece for 108 distinct days, and the data of one day of each bus forms a trajectory, as shown in Figure 3a. It should be declared that, in order to make the results more intuitive, we only take the compacted data. It should be noted that a grid ζ of n m cells is not statically pre-defined. The value of n and m are relying on the space size of trajectory database and distance threshold d. This property makes it adaptive. In order to verify the efficiency of our approach, we set the parameters as follows: distance threshold d = 100, minimum support s min = 10, Boundary Function B(5, 5). The frequent trajectories extracted are shown in Figure 3b and 3c using the two different trajectory preprocessing method mentioned in section 3. The movements of objects inside a large popular region can be extracted by using Boundary Function. (a) Trajectory of a bus (b) Frequent trajectories extracted by method in [2] (c) Frequent trajectories extracted by our method Fig. 3: The original trajectory database and frequent trajectories
8 6562 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Conclusion In this paper, we have discussed the issue that mining frequent trajectories. We introduce a distance threshold d to dynamically divide the trajectory space into a grid of cells with the same size of d d. Due to the size of popular regions have not been limited, the movements of objects in the region may be lost, and we define a Boundary Function to limit the maximum size of the popular regions. As a result, the original trajectories can be transformed into sequences of popular region-ids. Then, we propose an improving FP-Tree algorithm to mine frequent trajectories. Acknowledgement This work was supported by the grant from the Natural Science Foundation of China (No ), the Science & Research Plan Project of Shaanxi Province (No. 2011NXC01-12) and Science & Research Plan Project of Shaanxi Province Department of Education (No.2010JC15). The authors are grateful for the anonymous reviewers who made constructive comments. References [1] Han, J., J. Pei and Y. Yin. Mining frequent patterns without candidate generations[c]. ACM SIGMOD Record, 29: [2] Giannotti, F., M. Nanni, F. Pinelli and D. Pedreschi. Trajectory pattern mining[c]. Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 12-15, ACM, New York, USA, [3] Kang, J.Y. and H.S. Yong. Mining trajectory patterns by incorporating temporal properties[c]. Proceedings of the 1st International Conference on Emerging Database, August 27-28, 2009, Busan, Korea, pp [4] Mamoulis, N., H. Cao, G. Kollios, M. Hadjieleftheriou, U.Y. Tao and D. W. Cheung. Mining, indexing and querying historical spatiotemporal data[c]. Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 22-25, 2004, ACM, New York, USA., pp [5] Lee, A.J.T., Y.A. Chen and W.C. Ip. Mining frequent trajectory patterns in spatial-temporal databases[j]. Jounal Information Science, 179: [6] Savage, N.S., S. Nishimura, N.E. Chavez and X. Yan,. Frequent trajectory mining on GPS data[c]. In: Proceedings of the 3rd International Workshop on Location and the Web, Tokyo, Japan, November 29, 2010, ACM, pp [7] Akasapu, A., L.K. Sharma and G. Ramarkrishan. Efficient trajectory pattern mining for both sparse and dense dataset[j]. International Journal Computer Application, 9: [8] Han, J., G. Dong and Y. Yin. Efficient mining of partial periodic patterns in time series database[c]. Proceedings of the 1999 International Conference on Data Engineering, March 23-26, Sydney, Australia, pp
Fosca Giannotti et al,.
Trajectory Pattern Mining Fosca Giannotti et al,. - Presented by Shuo Miao Conference on Knowledge discovery and data mining, 2007 OUTLINE 1. Motivation 2. T-Patterns: definition 3. T-Patterns: the approach(es)
More informationTRAJECTORY PATTERN MINING
TRAJECTORY PATTERN MINING Fosca Giannotti, Micro Nanni, Dino Pedreschi, Martha Axiak Marco Muscat Introduction 2 Nowadays data on the spatial and temporal location is objects is available. Gps, GSM towers,
More informationWhere Next? Data Mining Techniques and Challenges for Trajectory Prediction. Slides credit: Layla Pournajaf
Where Next? Data Mining Techniques and Challenges for Trajectory Prediction Slides credit: Layla Pournajaf o Navigational services. o Traffic management. o Location-based advertising. Source: A. Monreale,
More informationDetect tracking behavior among trajectory data
Detect tracking behavior among trajectory data Jianqiu Xu, Jiangang Zhou Nanjing University of Aeronautics and Astronautics, China, jianqiu@nuaa.edu.cn, jiangangzhou@nuaa.edu.cn Abstract. Due to the continuing
More informationData Mining Part 3. Associations Rules
Data Mining Part 3. Associations Rules 3.2 Efficient Frequent Itemset Mining Methods Fall 2009 Instructor: Dr. Masoud Yaghini Outline Apriori Algorithm Generating Association Rules from Frequent Itemsets
More informationAn Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database
Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management
More informationWeb page recommendation using a stochastic process model
Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,
More informationMining Quantitative Association Rules on Overlapped Intervals
Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,
More informationImplementation and Experiments of Frequent GPS Trajectory Pattern Mining Algorithms
DEIM Forum 213 A5-3 Implementation and Experiments of Frequent GPS Trajectory Pattern Abstract Mining Algorithms Xiaoliang GENG, Hiroki ARIMURA, and Takeaki UNO Graduate School of Information Science and
More informationMining of Web Server Logs using Extended Apriori Algorithm
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationAvailable online at ScienceDirect. Procedia Computer Science 45 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 45 (2015 ) 101 110 International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015) An optimized
More informationThis paper proposes: Mining Frequent Patterns without Candidate Generation
Mining Frequent Patterns without Candidate Generation a paper by Jiawei Han, Jian Pei and Yiwen Yin School of Computing Science Simon Fraser University Presented by Maria Cutumisu Department of Computing
More informationPrivacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in
More informationOpen Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents
Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving
More informationData Structure for Association Rule Mining: T-Trees and P-Trees
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 6, JUNE 2004 1 Data Structure for Association Rule Mining: T-Trees and P-Trees Frans Coenen, Paul Leng, and Shakil Ahmed Abstract Two new
More informationA System for Discovering Regions of Interest from Trajectory Data
A System for Discovering Regions of Interest from Trajectory Data Muhammad Reaz Uddin, Chinya Ravishankar, and Vassilis J. Tsotras University of California, Riverside, CA, USA {uddinm,ravi,tsotras}@cs.ucr.edu
More informationAN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE
AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3
More informationClustering Spatio-Temporal Patterns using Levelwise Search
Clustering Spatio-Temporal Patterns using Levelwise Search Abhishek Sharma, Raj Bhatnagar University of Cincinnati Cincinnati, OH, 45221 sharmaak,rbhatnag@ececs.uc.edu Figure 1: Spatial Grids at Successive
More informationWeb Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India
Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the
More informationxiii Preface INTRODUCTION
xiii Preface INTRODUCTION With rapid progress of mobile device technology, a huge amount of moving objects data can be geathed easily. This data can be collected from cell phones, GPS embedded in cars
More informationSEQUENTIAL PATTERN MINING FROM WEB LOG DATA
SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract
More informationFrequent Pattern Mining with Uncertain Data
Charu C. Aggarwal 1, Yan Li 2, Jianyong Wang 2, Jing Wang 3 1. IBM T J Watson Research Center 2. Tsinghua University 3. New York University Frequent Pattern Mining with Uncertain Data ACM KDD Conference,
More informationMining Rare Periodic-Frequent Patterns Using Multiple Minimum Supports
Mining Rare Periodic-Frequent Patterns Using Multiple Minimum Supports R. Uday Kiran P. Krishna Reddy Center for Data Engineering International Institute of Information Technology-Hyderabad Hyderabad,
More informationOLAP for Trajectories
OLAP for Trajectories Oliver Baltzer 1, Frank Dehne 2, Susanne Hambrusch 3, and Andrew Rau-Chaplin 1 1 Dalhousie University, Halifax, Canada obaltzer@cs.dal.ca, arc@cs.dal.ca http://www.cs.dal.ca/~arc
More informationOpen Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments
Send Orders for Reprints to reprints@benthamscience.ae 368 The Open Automation and Control Systems Journal, 2014, 6, 368-373 Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing
More informationConstructing Popular Routes from Uncertain Trajectories
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei, Yu Zheng, Wen-Chih Peng presented by Slawek Goryczka Scenarios A trajectory is a sequence of data points recording location information
More informationTrajectory Pattern Mining
Trajectory Pattern Mining Fosca Giannotti 1 Mirco Nanni 1 Dino Pedreschi 2 Fabio Pinelli 1 Pisa KDD Laboratory 1 ISTI - CNR, Area della Ricerca di Pisa, Via Giuseppe Moruzzi, 1-56124 Pisa, Italy 2 Computer
More informationPartSpan: Parallel Sequence Mining of Trajectory Patterns
Fifth International Conference on Fuzzy Systems and Knowledge Discovery PartSpan: Parallel Sequence Mining of Trajectory Patterns Shaojie Qiao,, Changjie Tang, Shucheng Dai, Mingfang Zhu Jing Peng, Hongjun
More informationResearch and Improvement of Apriori Algorithm Based on Hadoop
Research and Improvement of Apriori Algorithm Based on Hadoop Gao Pengfei a, Wang Jianguo b and Liu Pengcheng c School of Computer Science and Engineering Xi'an Technological University Xi'an, 710021,
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationA Survey on Moving Towards Frequent Pattern Growth for Infrequent Weighted Itemset Mining
A Survey on Moving Towards Frequent Pattern Growth for Infrequent Weighted Itemset Mining Miss. Rituja M. Zagade Computer Engineering Department,JSPM,NTC RSSOER,Savitribai Phule Pune University Pune,India
More informationHotspot District Trajectory Prediction *
Hotspot District Trajectory Prediction * Hongjun Li 1,2, Changjie Tang 1, Shaojie Qiao 3, Yue Wang 1, Ning Yang 1, and Chuan Li 1 1 Institute of Database and Knowledge Engineering, School of Computer Science,
More informationMining Frequent Itemsets for data streams over Weighted Sliding Windows
Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology
More informationPredicting the Next Location Change and Time of Change for Mobile Phone Users
Predicting the Next Location Change and Time of Change for Mobile Phone Users Mert Ozer, Ilkcan Keles, İsmail Hakki Salih Ergut Toroslu, Pinar Karagoz Avealabs, Avea Technology Center Computer Engineering
More informationRoute Pattern Mining From Personal Trajectory Data *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 147-164 (2015) Route Pattern Mining From Personal Trajectory Data * MINGQI LV 1, YINGLONG LI 1, ZHENMING YUAN 2 AND QIHUI WANG 2 1 College of Computer
More informationINFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM
INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India
More informationIJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: [35] [Rana, 3(12): December, 2014] ISSN:
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Brief Survey on Frequent Patterns Mining of Uncertain Data Purvi Y. Rana*, Prof. Pragna Makwana, Prof. Kishori Shekokar *Student,
More informationA Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data
A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,
More informationParallelizing Frequent Itemset Mining with FP-Trees
Parallelizing Frequent Itemset Mining with FP-Trees Peiyi Tang Markus P. Turkia Department of Computer Science Department of Computer Science University of Arkansas at Little Rock University of Arkansas
More informationImproving Suffix Tree Clustering Algorithm for Web Documents
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Improving Suffix Tree Clustering Algorithm for Web Documents Yan Zhuang Computer Center East China Normal
More informationPeriodic Pattern Mining Based on GPS Trajectories
Periodic Pattern Mining Based on GPS Trajectories iaopeng Chen 1,a, Dianxi Shi 2,b, Banghui Zhao 3,c and Fan Liu 4,d 1,2,3,4 National Laboratory for Parallel and Distributed Processing, School of Computer,
More informationAssociation Rule Mining
Huiping Cao, FPGrowth, Slide 1/22 Association Rule Mining FPGrowth Huiping Cao Huiping Cao, FPGrowth, Slide 2/22 Issues with Apriori-like approaches Candidate set generation is costly, especially when
More informationMining Temporal Association Rules in Network Traffic Data
Mining Temporal Association Rules in Network Traffic Data Guojun Mao Abstract Mining association rules is one of the most important and popular task in data mining. Current researches focus on discovering
More informationAN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION
AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION Xue-Min Lu 1,3, Sendo Wang 2 1 Master Student, 2 Associate Professor
More informationDISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH
International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)
More informationAPPLYING BIT-VECTOR PROJECTION APPROACH FOR EFFICIENT MINING OF N-MOST INTERESTING FREQUENT ITEMSETS
APPLYIG BIT-VECTOR PROJECTIO APPROACH FOR EFFICIET MIIG OF -MOST ITERESTIG FREQUET ITEMSETS Zahoor Jan, Shariq Bashir, A. Rauf Baig FAST-ational University of Computer and Emerging Sciences, Islamabad
More informationPattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42
Pattern Mining Knowledge Discovery and Data Mining 1 Roman Kern KTI, TU Graz 2016-01-14 Roman Kern (KTI, TU Graz) Pattern Mining 2016-01-14 1 / 42 Outline 1 Introduction 2 Apriori Algorithm 3 FP-Growth
More informationAC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery
: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery Hong Cheng Philip S. Yu Jiawei Han University of Illinois at Urbana-Champaign IBM T. J. Watson Research Center {hcheng3, hanj}@cs.uiuc.edu,
More informationYunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction
More informationTop-k Keyword Search Over Graphs Based On Backward Search
Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer
More informationEfficient Algorithm for Frequent Itemset Generation in Big Data
Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru
More informationPerformance Analysis of Data Mining Algorithms
! Performance Analysis of Data Mining Algorithms Poonam Punia Ph.D Research Scholar Deptt. of Computer Applications Singhania University, Jhunjunu (Raj.) poonamgill25@gmail.com Surender Jangra Deptt. of
More informationProxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques
Proceedings of the 2nd International Conference on Intelligent Systems and Image Processing 2014 Proxy Systems Improvement Using Frequent Itemset Pattern-Based Techniques Saranyoo Butkote *, Jiratta Phuboon-op,
More informationA Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.1, January 2013 1 A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations Hiroyuki
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationDS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li
Welcome to DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH 116 Fall 2017 First Grading for Reading Assignment Weka v 6 weeks v https://weka.waikato.ac.nz/dataminingwithweka/preview
More informationUAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA
UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationCity, University of London Institutional Repository
City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial
More informationSalah Alghyaline, Jun-Wei Hsieh, and Jim Z. C. Lai
EFFICIENTLY MINING FREQUENT ITEMSETS IN TRANSACTIONAL DATABASES This article has been peer reviewed and accepted for publication in JMST but has not yet been copyediting, typesetting, pagination and proofreading
More informationIntroduction to Trajectory Clustering. By YONGLI ZHANG
Introduction to Trajectory Clustering By YONGLI ZHANG Outline 1. Problem Definition 2. Clustering Methods for Trajectory data 3. Model-based Trajectory Clustering 4. Applications 5. Conclusions 1 Problem
More informationItem Set Extraction of Mining Association Rule
Item Set Extraction of Mining Association Rule Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar Department CSE, Vivekananda Institute of Technology and Science, Karimnagar, A.P, India Abstract:
More informationA Hierarchical Document Clustering Approach with Frequent Itemsets
A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of
More informationComparing the Performance of Frequent Itemsets Mining Algorithms
Comparing the Performance of Frequent Itemsets Mining Algorithms Kalash Dave 1, Mayur Rathod 2, Parth Sheth 3, Avani Sakhapara 4 UG Student, Dept. of I.T., K.J.Somaiya College of Engineering, Mumbai, India
More informationGeneration of Potential High Utility Itemsets from Transactional Databases
Generation of Potential High Utility Itemsets from Transactional Databases Rajmohan.C Priya.G Niveditha.C Pragathi.R Asst.Prof/IT, Dept of IT Dept of IT Dept of IT SREC, Coimbatore,INDIA,SREC,Coimbatore,.INDIA
More informationPTclose: A novel algorithm for generation of closed frequent itemsets from dense and sparse datasets
: A novel algorithm for generation of closed frequent itemsets from dense and sparse datasets J. Tahmores Nezhad ℵ, M.H.Sadreddini Abstract In recent years, various algorithms for mining closed frequent
More informationSA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,
More informationMaintenance of the Prelarge Trees for Record Deletion
12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, 2007 105 Maintenance of the Prelarge Trees for Record Deletion Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Department of
More informationDistributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud
Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many
More informationTrajectory analysis. Ivan Kukanov
Trajectory analysis Ivan Kukanov Joensuu, 2014 Semantic Trajectory Mining for Location Prediction Josh Jia-Ching Ying Tz-Chiao Weng Vincent S. Tseng Taiwan Wang-Chien Lee Wang-Chien Lee USA Copyright 2011
More informationCLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets
CLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets Jianyong Wang, Jiawei Han, Jian Pei Presentation by: Nasimeh Asgarian Department of Computing Science University of Alberta
More informationDiscovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials *
Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials * Galina Bogdanova, Tsvetanka Georgieva Abstract: Association rules mining is one kind of data mining techniques
More informationConcurrent Processing of Frequent Itemset Queries Using FP-Growth Algorithm
Concurrent Processing of Frequent Itemset Queries Using FP-Growth Algorithm Marek Wojciechowski, Krzysztof Galecki, Krzysztof Gawronek Poznan University of Technology Institute of Computing Science ul.
More informationA Novel Method of Optimizing Website Structure
A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School
More informationWIP: mining Weighted Interesting Patterns with a strong weight and/or support affinity
WIP: mining Weighted Interesting Patterns with a strong weight and/or support affinity Unil Yun and John J. Leggett Department of Computer Science Texas A&M University College Station, Texas 7783, USA
More informationMobility Data Management and Exploration: Theory and Practice
Mobility Data Management and Exploration: Theory and Practice Chapter 4 -Mobility data management at the physical level Nikos Pelekis & Yannis Theodoridis InfoLab, University of Piraeus, Greece infolab.cs.unipi.gr
More informationParallel Mining of Maximal Frequent Itemsets in PC Clusters
Proceedings of the International MultiConference of Engineers and Computer Scientists 28 Vol I IMECS 28, 19-21 March, 28, Hong Kong Parallel Mining of Maximal Frequent Itemsets in PC Clusters Vong Chan
More informationMining Frequent Patterns without Candidate Generation
Mining Frequent Patterns without Candidate Generation Outline of the Presentation Outline Frequent Pattern Mining: Problem statement and an example Review of Apriori like Approaches FP Growth: Overview
More informationQuerying Spatiotemporal Data Based on XML Twig Pattern
Querying Spatiotemporal Data Based on XML Twig Pattern Luyi Bai Yin Li Jiemin Liu* College of Information Science and Engineering Northeastern University Shenyang 110819 China * Corresponding author Tel:
More informationMedical Data Mining Based on Association Rules
Medical Data Mining Based on Association Rules Ruijuan Hu Dep of Foundation, PLA University of Foreign Languages, Luoyang 471003, China E-mail: huruijuan01@126.com Abstract Detailed elaborations are presented
More informationUpper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2
Volume 117 No. 7 2017, 39-46 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Upper bound tighter Item caps for fast frequent itemsets mining for uncertain
More informationAppropriate Item Partition for Improving the Mining Performance
Appropriate Item Partition for Improving the Mining Performance Tzung-Pei Hong 1,2, Jheng-Nan Huang 1, Kawuu W. Lin 3 and Wen-Yang Lin 1 1 Department of Computer Science and Information Engineering National
More informationAn Efficient XML Index Structure with Bottom-Up Query Processing
An Efficient XML Index Structure with Bottom-Up Query Processing Dong Min Seo, Jae Soo Yoo, and Ki Hyung Cho Department of Computer and Communication Engineering, Chungbuk National University, 48 Gaesin-dong,
More informationFast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1
Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang
More informationSimilarity-based Analysis for Trajectory Data
Similarity-based Analysis for Trajectory Data Kevin Zheng 25/04/2014 DASFAA 2014 Tutorial 1 Outline Background What is trajectory Where do they come from Why are they useful Characteristics Trajectory
More informationMaintenance of fast updated frequent pattern trees for record deletion
Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University
More informationMining Frequent Itemsets Along with Rare Itemsets Based on Categorical Multiple Minimum Support
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 6, Ver. IV (Nov.-Dec. 2016), PP 109-114 www.iosrjournals.org Mining Frequent Itemsets Along with Rare
More informationMemory issues in frequent itemset mining
Memory issues in frequent itemset mining Bart Goethals HIIT Basic Research Unit Department of Computer Science P.O. Box 26, Teollisuuskatu 2 FIN-00014 University of Helsinki, Finland bart.goethals@cs.helsinki.fi
More information3 The standard grid. N ode(0.0001,0.0004) Longitude
International Conference on Information Science and Computer Applications (ISCA 2013 Research on Map Matching Algorithm Based on Nine-rectangle Grid Li Cai1,a, Bingyu Zhu2,b 1 2 School of Software, Yunnan
More informationA New Encoding Scheme of Supporting Data Update Efficiently
Send Orders for Reprints to reprints@benthamscience.ae 1472 The Open Cybernetics & Systemics Journal, 2015, 9, 1472-1477 Open Access A New Encoding Scheme of Supporting Data Update Efficiently Houliang
More informationGraph Based Approach for Finding Frequent Itemsets to Discover Association Rules
Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Manju Department of Computer Engg. CDL Govt. Polytechnic Education Society Nathusari Chopta, Sirsa Abstract The discovery
More informationLightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation
MATEC Web of Conferences 55, 03001 () DOI: 10.1051/ matecconf/5503001 Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation Luo Hanwu 1, Li Mengke 1,
More informationSeqIndex: Indexing Sequences by Sequential Pattern Analysis
SeqIndex: Indexing Sequences by Sequential Pattern Analysis Hong Cheng Xifeng Yan Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign {hcheng3, xyan, hanj}@cs.uiuc.edu
More informationTrajectory Pattern Mining. Figures and charts are from some materials downloaded from the internet.
Trajectory Pattern Mining Figures and charts are from some materials downloaded from the internet. Outline Spatio-temporal data types Mining trajectory patterns Spatio-temporal data types Spatial extension
More informationHigh Utility Web Access Patterns Mining from Distributed Databases
High Utility Web Access Patterns Mining from Distributed Databases Md.Azam Hosssain 1, Md.Mamunur Rashid 1, Byeong-Soo Jeong 1, Ho-Jin Choi 2 1 Database Lab, Department of Computer Engineering, Kyung Hee
More informationAssociation Pattern Mining. Lijun Zhang
Association Pattern Mining Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction The Frequent Pattern Mining Model Association Rule Generation Framework Frequent Itemset Mining Algorithms
More informationZonal Co-location Pattern Discovery with Dynamic Parameters
Seventh IEEE International Conference on Data Mining Zonal Co-location Pattern Discovery with Dynamic Parameters Mete Celik James M. Kang Shashi Shekhar Department of Computer Science, University of Minnesota,
More informationMax-Count Aggregation Estimation for Moving Points
Max-Count Aggregation Estimation for Moving Points Yi Chen Peter Revesz Dept. of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA Abstract Many interesting problems
More informationMobility Data Mining. Mobility data Analysis Foundations
Mobility Data Mining Mobility data Analysis Foundations MDA, 2015 Trajectory Clustering T-clustering Trajectories are grouped based on similarity Several possible notions of similarity Start/End points
More informationDeakin Research Online
Deakin Research Online This is the published version: Saha, Budhaditya, Lazarescu, Mihai and Venkatesh, Svetha 27, Infrequent item mining in multiple data streams, in Data Mining Workshops, 27. ICDM Workshops
More information