Mining Frequent Trajectory Using FP-tree in GPS Data

Size: px
Start display at page:

Download "Mining Frequent Trajectory Using FP-tree in GPS Data"

Transcription

1 Journal of Computational Information Systems 9: 16 (2013) Available at Mining Frequent Trajectory Using FP-tree in GPS Data Junhuai LI 1,, Jinqin WANG 1, Hailing LIU 2, Lei YU 1, Jing ZHANG 1 1 School of Computer Science & Engineering, Xi an University of Technology, Xi an , China 2 College of Electronic Information Engineering, Chongqing University of Science and Technology, Chongqing , China Abstract Pervasiveness of location-acquisition technologies makes it convenient to collect the movement data of moving objects, and the spatial-temporal information contained implicitly in the historical trajectories unveils important knowledge about movement behaviors. This paper presents a novel frequent trajectory mining method using FP-Tree Most existing approaches transform trajectories into sequences of popular region-ids using a statically predefined grid of cells with the same size, and then merge popular cells into larger popular regions. However, due to the size of these popular regions have not been limited, the movements of objects in the region may be lost. And predefined grid may be lack of adaptability. This study defines a Boundary Function to limit the maximum size of the popular regions and selects the size of the grid dynamically by defining a distance threshold d. Then, an improved FP-Tree algorithm is proposed to mine frequent trajectories. The experimental results show our method is efficient. Keywords: Trajectory; Frequent Trajectory Mining; FP-tree; GPS Data 1 Introduction The fast developments in tracking technologies and rapid improvement in location-based services have made it convenient to collect a large amount of time-stamped location data of moving objects. Moving objects consist of customers using embedded GPS mobile phones or PDAs, and vehicles with navigational equipment. Movement information of objects can be collected in the form of time-stamped location data. For example, GPS-equipped portable devices can record their latitude-longitude position during fixed time interval, and transmit them to a collecting server. The spatial-temporal information contained in the historical trajectories of moving objects can succinctly provide useful information. By analyzing the historical travel data of tourists over a long time, we can find the places of interest (mean the places tourists visit most) or the most Project supported by the National Nature Science Foundation of China (No ), the Science and Research Plan Project of Shaanxi Province (No. 2011NXC01-12), Science and Research Plan Project of Shaanxi Province Department of Education (No. 2010JC15) Corresponding author. address: lijunhuai@xaut.edu.cn (Junhuai LI) / Copyright 2013 Binary Information Press DOI: /jcisP0732 August 15, 2013

2 6556 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) popular routes, so some recommendations can be gave. Frequent movements of some vehicles during a period of time can help drivers select the best route. It is important and meaningful in future urban planning or urban computing. As a result, mining frequent trajectory has attracted increasing attention recently. In this paper, we present a FP-tree-based method for mining frequent trajectories in GPS data. In general, due to the noise and the limitation of location-acquisition equipment, the location information (e.g., coordinate values in 2D) of a fixed place cannot be exactly the same. Therefore although two GPS sequences represent the same route, the values of them will rarely be exactly the same. To solve this problem, we firstly define a distance threshold d and divide the trajectories area into cells with the same size of dd. According to the density of these cells, by defining a minimum support s min, the popular cells can be extracted. Then, we merge these popular cells into larger popular regions by defining a Boundary Function. Finally, the original trajectories can be transformed into sequences of popular region-ids. The other problem is detecting frequent trajectories, most studies adopt sequential pattern mining paradigm. But as we know, pattern discovery techniques in transactional database are not readily applicable for finding trajectory patterns. Without candidate generation, FP-tree proposed in [1] has great efficiency in mining sequential patterns. In this paper, we consider the continuity of trajectory mining, and have made some improvements to make it ready for trajectory mining. In general, frequent trajectory mining in this paper contains three phases: (1) create an index structure for each frequent spatial region; (2) traverse these segments to construct a FP-tree; (3) extract frequent trajectories. The remainder of the paper is organized as follows: Section 2 discusses the related work. Section 3 describes trajectory preprocessing. Section 4 describes the proposed algorithm in detail. Section 5 illustrates the results and performance of our method. Section 6 presents conclusion. 2 Related Works Recently, many researches have been made on trajectory analysis, and lots of achievements have been drawn. Giannotti et al. introduced the concepts of Region-of-Interest (RoI) in [2]. To efficiently compute popular points, they discretize the trajectory space through a regular grid with cells of small size. The density of cells is computed by taking each single trajectory and incrementing the density of all the cells that contain any of its points. Then, detecting popular cells, and merging them into RoIs. And they detect trajectory patterns using TAS (Temporally Annotated Sequences). J.Y.Kang et al. first approximated original trajectories into simplified line segments and transformed them into sequences of spatio-temporal regions by incorporating temporal constraints, finally proposed a prefix-projection approach to extract frequent spatiotemporal patterns [3]. A framework had been put forward in [4] to analyze, manages, and query frequent periodic patterns in spatio-temporal data. A density-based algorithm had been adopted to find the pattern regions. Then, they proposed two methods to find longer patterns: a bottomup, level-wise technique and a faster top-down approach. Anthony J.T et al. presented a GBM (graph-based mining) algorithm for mining the frequent trajectory patterns [5]. First, they scan the database once to generate a mapping graph and trajectory information lists (TI-lists), and then traverses the mapping graph in a depth-first search manner to mine all frequent trajectory patterns. But they have not related to the preprocessing of trajectories. Savage NS et al. selected K most frequent edges and combined them to create a list of the most frequent paths [6]. Akasapu A et al. use Apriori-TFP, and the T-tree finally contains all frequent sets with their complete

3 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) support-counts [7]. 3 Trajectory Preprocessing A trajectory of a moving object is a temporally ordered sequence of triples T =< (x 0, y 0, t 0 ), (x 1, y 1, t 1 ),, (x n, y n, t n ) >, where t i (i = 0 n) is a time stamp, ( 0 i n )t i t (i+1) and (x i, y i ) are coordinates in two-dimensional. Due to the noise and the limitation of location-acquisition equipment, even though two GPS sequences represent the same route, it is highly unlikely that they have the identical location values. In addition, matching the items of a sequence in standard sequential pattern mining requires simple equality tests between symbols. Therefore, in order to use the approaches based on sequential pattern mining, the coordinate values of a trajectory should be discretized prior to mining process. To discretize trajectory data, we take the method similar to it in [2]. Firstly, we discretize the trajectory space through a dynamically grid with cells of small size. Each cell has the same size with fixed width and height. Then, we map each of the GPS points that belong to a trajectory into the cells. As a result, a trajectory can be converted to a sequence of cell id. The densities of the cells with GPS point located in are incremented. It should be noted that a trajectory touching a point multiple times should be counted only once. After matching all the trajectories, we know the density of each cell. If it is larger than a threshold defined by user, we call it popularcell. Generally, the cell size is very small. Therefore, the number of popular cells can be extremely large. To solve this problem, in [2] they merge cells into larger regions. For each region they consider the average density of its cells, the final results may contain very large regions, as shown in F igure1a. Therefore, the movements in the region may be lost. In order to make up for the deficiency, we introduce a BoundaryF unction, which is defined in the following way: B(m, n) x max x min m, y max y min n (1) The BoundaryF unction is used to limit the maximum size of popular region. Then, the definition of popular region set can be redefined as following: Definition 1 (Popular region set) Given a trajectory database and a distance threshold d, the trajectory space can be divided into a grid ζ of n m cells, each cell with its density ζ(i, j)(1 i n, 1 j m), a minimum support S min. A popular region set for ζ is a collection R of sets of cells from ζ, such that: (i) each r R forms a rectangular region; (ii) sets in R are pairwise disjoint; (iii) all popular cells in ζ are contained in some set r R; (iv) all r R have avg ( i, j) r)ζ(i, j) S min ; (v) assuming that r R has size h k, all its rectangular supersets r r of size (h + 1) k or h (k + 1) violate (iv) or r and r contain exactly the same number of popular cells; (vi) Given BoundaryF unctionb(m, n), h m, k n. It should be noted that a grid ζ of n m cells is not statically pre-defined. F igure1b shows the results with BoundaryF unction. We can see that the large regions are divided into several small ones.

4 6558 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) (a) the results with method in [2] (b) the results with Boundary Function Fig. 1: Extracted RoIs After finding all the RoIs, each with an id. The original trajectory sequences can be transformed into a list of RoI id sequence segments. The rules are as follows: (1) Segment a trajectory from the point that are not covered by any RoI, and delete the point. (2) Delete the repeat trajectory segments of each trajectory. Definition 2 (Frequent Trajectories mining(ftm)) Given a database of input trajectories D, a distance threshold d, a minimum support S min, Boundary Function B(m, n). FTM problem consists of finding all frequent trajectories T such that: Support(T ) >= S min, where Support(T ) is the support value of T in D. 4 FP-Tree-Based Frequent Trajectory Mining FP-Tree proposed in [8] has great efficiency in mining sequential patterns. But as we know, pattern discovery techniques in transactional database are not readily applicable for finding trajectory patterns. In this paper, we consider the continuity of trajectory mining, and have made some improvement. In this section, we discuss the proposed FTTBM (FP-Tree-based mining) algorithm for mining frequent trajectories. FTTBM comprises three phases: (1) create an index structure for each frequent spatial region; (2) traverse these segments to construct a FP-Tree; (3) extract frequent trajectories. 4.1 FP-tree construction In FTTBM method, each node of FP-tree contains six fields: the parent domain points to the parent node, the data contained in the node, support of the node, the objectid that latest generates the node, all the objectids that generating the node, and the refe domain points to the next node which contains the same data. In addition, in order to facilitate the traversal of the tree, we create a project head table Htable, which consists of two domains: itemname and itemhead. Each ROI, via an itemhead, to its first occurrence in the tree. Let us give an example to illustrate the construction of FP-Tree. Suppose Table 1 is the trajectory database after clustering the minimum support threshold is 3. Let us consider the database shown in Table 1, we can get all ROIs :< (1 : 3), (2 : 3), (3 : 3), (4 : 3), (5 : 3) >, where the domain before : is the data and the domain after it is the support value. Through data preprocessing mentioned in

5 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Table 1: The trajectories consist of popular region-ids Object id Trajectory 1 1,2,3,4,5,6,7,8,1,3,5,3,2 2 2,4,5,7,6,1,2,3,4 3 1,2,3,4,5,8,2,3 Section 3, we can get the results in Table 2. Next, we create an Htable for all ROIs (i.e., < (1), (2), (3), (4), (5) >), as shown in table 3. Then a root node will be created, initialized to null. The scan of the first trajectory segment leads to the construction of the first branch of the tree: < (1 : 1), (2 : 1), (3 : 1), (4 : 1), (5 : 1) > of object 1. For the second segment, although it shares a common prefix < 1 > with the existing path < 1, 2, 3, 4, 5 >, the support of node < 1 > is not increased by 1 for it belongs to object 1. For the next segment < 2, 4, 5 >, since it shares no common prefix with the existing tree, a new branch is created. For the segment < 1, 2, 3, 4 >, since it shares a common prefix < 1, 2, 3, 4 > with the segment < 1, 2, 3, 4, 5 > of objects, the support of each node along the prefix is increased by 1. For the last segment < 1, 2, 3, 4, 5 >, since it is identical to the first segment, the support of each node along the segment is increased by 1. Table 2: The trajectories after preprocessing Object id Trajectory segments 1 (1,2,3,4,5)(1,3,5,3,2) 2 (2,4,5)(1,2,3,4) 3 (1,2,3,4,5) Table 3: Htable Itemname Itemhead The algorithm for constructing FP-Tree is as follows: Algorithm: Construct T-ree Input: The trajectory segments after preprocessing and a minimum support threshold Output: T treet (1) Create an Htable for all ROIs; (2) Create a root node, and initialize it to Null; (3) Scan the trajectory segments [p P ] of each object, where p is the first element of the segment and P is the remaining part; (4) Callinsert tree([p P ], T, ids), its implementation is: if T-tree T has a child node N, making N.data = p, and the current object id is not included in ids, then the support value of node N increases 1 and ids = ids+id.t ostring(). Otherwise, create a new node N, N.data = p, N.parent

6 6560 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) points to its previous node in the segment. N.ref e points to the next node that has the same data, N.ids = thecurrentobjectid. If P! = N ull, then recursively callinsert tree([p P ], T, ids). And the construction process is illustrated in Figure 2. (a) Construction of the segment (1,3,5,3,2) of object 1 (c) Construction of the segment (1,3,5,3,2) of object 1 (b) Construction of the segment (1,2,3,4,5) of object 1 (d) Construction of the segment (e) Construction of the segment (1,2,3,4,5) of object 1 (1,3,5,3,2) of object 1 Fig. 2: FP-Tree construction 4.2 Frequent trajectory mining For each itemname in Htable, scan the tree to find the set of trajectory sequences that ending of it. Since the support of each sequence is known after the construction of tree, considering the consecutive subsequence of each trajectory sequence, calculating its support in the set. And the most important information is that the support value of the last symbol represents the support of the whole sequence. Let us consider the example above again, set Smin = 3 and frequent trajectory set FT to null, after obtaining the tree in Figure 5. Suppose itemname is 5, we traverse the tree to find the set < (1, 2, 3, 4, 5), (2, 4, 5) >. For the first segment (1, 2, 3, 4, 5), we consider sequence (4, 5). Its support is 2 and the object 1 and 3 contain it, but the segment (2, 4, 5) of object 2 also contains it, so its final support value is 3. Adding (4, 5) to set FT. For the second subsequence (3, 4, 5), its support value is 2 according to the support of symbol 5 in the ending of the segment. For the subsequences (2, 3, 4, 5), (1, 2, 3, 4, 5), their support are 2. For the next subsequence (4, 5) of (2, 4, 5), the scan of FT shows that the frequent trajectory (4, 5) has already existed. Therefore, considering the next subsequence (2, 4, 5), its support is 1. An algorithm FTM of extracting frequent trajectories is as follows: Algorithm: FTM()

7 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Input: T-tree, Minimum support Output: the set of frequent trajectories FT (1) FT=;//the set of frequent trajectories (2) For each item name in Htable, scan T-tree to find the set of all the sequences that ending of item name. Marked as SeriesList (Item name). (3) For each element in SeriesList (item name), getting the consecutive subsequences of it, which ending of item name. Scan SeriesList (item name) to calculate its support. (4) The rule to calculate the support is: if a sequence s1 is a consecutive subsequence of another sequence s 2 in SeriesList (item name), then call function Dis(s 1, s 2 ). If it returns n, then the support of s1 increases n. (5) If the support of s1 is larger than the given minimum support, and it is not contained in a subset of FT, then FT union s 1. Dis(s 1, s 2 ) (1) get the ids of the first element in s 1 and s 2 respectively. (2) For all the elements in s 1, calculating the different element in s 2 from s 1, and return the number. 5 Experiments In this section we summarize the results of a set of experiments obtained from real data. The real data used in these experiments describe the trajectories of 2 school buses collecting (and delivering) students around Athens metropolitan area in Greece for 108 distinct days, and the data of one day of each bus forms a trajectory, as shown in Figure 3a. It should be declared that, in order to make the results more intuitive, we only take the compacted data. It should be noted that a grid ζ of n m cells is not statically pre-defined. The value of n and m are relying on the space size of trajectory database and distance threshold d. This property makes it adaptive. In order to verify the efficiency of our approach, we set the parameters as follows: distance threshold d = 100, minimum support s min = 10, Boundary Function B(5, 5). The frequent trajectories extracted are shown in Figure 3b and 3c using the two different trajectory preprocessing method mentioned in section 3. The movements of objects inside a large popular region can be extracted by using Boundary Function. (a) Trajectory of a bus (b) Frequent trajectories extracted by method in [2] (c) Frequent trajectories extracted by our method Fig. 3: The original trajectory database and frequent trajectories

8 6562 J. Li et al. /Journal of Computational Information Systems 9: 16 (2013) Conclusion In this paper, we have discussed the issue that mining frequent trajectories. We introduce a distance threshold d to dynamically divide the trajectory space into a grid of cells with the same size of d d. Due to the size of popular regions have not been limited, the movements of objects in the region may be lost, and we define a Boundary Function to limit the maximum size of the popular regions. As a result, the original trajectories can be transformed into sequences of popular region-ids. Then, we propose an improving FP-Tree algorithm to mine frequent trajectories. Acknowledgement This work was supported by the grant from the Natural Science Foundation of China (No ), the Science & Research Plan Project of Shaanxi Province (No. 2011NXC01-12) and Science & Research Plan Project of Shaanxi Province Department of Education (No.2010JC15). The authors are grateful for the anonymous reviewers who made constructive comments. References [1] Han, J., J. Pei and Y. Yin. Mining frequent patterns without candidate generations[c]. ACM SIGMOD Record, 29: [2] Giannotti, F., M. Nanni, F. Pinelli and D. Pedreschi. Trajectory pattern mining[c]. Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 12-15, ACM, New York, USA, [3] Kang, J.Y. and H.S. Yong. Mining trajectory patterns by incorporating temporal properties[c]. Proceedings of the 1st International Conference on Emerging Database, August 27-28, 2009, Busan, Korea, pp [4] Mamoulis, N., H. Cao, G. Kollios, M. Hadjieleftheriou, U.Y. Tao and D. W. Cheung. Mining, indexing and querying historical spatiotemporal data[c]. Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 22-25, 2004, ACM, New York, USA., pp [5] Lee, A.J.T., Y.A. Chen and W.C. Ip. Mining frequent trajectory patterns in spatial-temporal databases[j]. Jounal Information Science, 179: [6] Savage, N.S., S. Nishimura, N.E. Chavez and X. Yan,. Frequent trajectory mining on GPS data[c]. In: Proceedings of the 3rd International Workshop on Location and the Web, Tokyo, Japan, November 29, 2010, ACM, pp [7] Akasapu, A., L.K. Sharma and G. Ramarkrishan. Efficient trajectory pattern mining for both sparse and dense dataset[j]. International Journal Computer Application, 9: [8] Han, J., G. Dong and Y. Yin. Efficient mining of partial periodic patterns in time series database[c]. Proceedings of the 1999 International Conference on Data Engineering, March 23-26, Sydney, Australia, pp

Fosca Giannotti et al,.

Fosca Giannotti et al,. Trajectory Pattern Mining Fosca Giannotti et al,. - Presented by Shuo Miao Conference on Knowledge discovery and data mining, 2007 OUTLINE 1. Motivation 2. T-Patterns: definition 3. T-Patterns: the approach(es)

More information

TRAJECTORY PATTERN MINING

TRAJECTORY PATTERN MINING TRAJECTORY PATTERN MINING Fosca Giannotti, Micro Nanni, Dino Pedreschi, Martha Axiak Marco Muscat Introduction 2 Nowadays data on the spatial and temporal location is objects is available. Gps, GSM towers,

More information

Where Next? Data Mining Techniques and Challenges for Trajectory Prediction. Slides credit: Layla Pournajaf

Where Next? Data Mining Techniques and Challenges for Trajectory Prediction. Slides credit: Layla Pournajaf Where Next? Data Mining Techniques and Challenges for Trajectory Prediction Slides credit: Layla Pournajaf o Navigational services. o Traffic management. o Location-based advertising. Source: A. Monreale,

More information

Detect tracking behavior among trajectory data

Detect tracking behavior among trajectory data Detect tracking behavior among trajectory data Jianqiu Xu, Jiangang Zhou Nanjing University of Aeronautics and Astronautics, China, jianqiu@nuaa.edu.cn, jiangangzhou@nuaa.edu.cn Abstract. Due to the continuing

More information

Data Mining Part 3. Associations Rules

Data Mining Part 3. Associations Rules Data Mining Part 3. Associations Rules 3.2 Efficient Frequent Itemset Mining Methods Fall 2009 Instructor: Dr. Masoud Yaghini Outline Apriori Algorithm Generating Association Rules from Frequent Itemsets

More information

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management

More information

Web page recommendation using a stochastic process model

Web page recommendation using a stochastic process model Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,

More information

Mining Quantitative Association Rules on Overlapped Intervals

Mining Quantitative Association Rules on Overlapped Intervals Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,

More information

Implementation and Experiments of Frequent GPS Trajectory Pattern Mining Algorithms

Implementation and Experiments of Frequent GPS Trajectory Pattern Mining Algorithms DEIM Forum 213 A5-3 Implementation and Experiments of Frequent GPS Trajectory Pattern Abstract Mining Algorithms Xiaoliang GENG, Hiroki ARIMURA, and Takeaki UNO Graduate School of Information Science and

More information

Mining of Web Server Logs using Extended Apriori Algorithm

Mining of Web Server Logs using Extended Apriori Algorithm International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Available online at ScienceDirect. Procedia Computer Science 45 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 45 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 45 (2015 ) 101 110 International Conference on Advanced Computing Technologies and Applications (ICACTA- 2015) An optimized

More information

This paper proposes: Mining Frequent Patterns without Candidate Generation

This paper proposes: Mining Frequent Patterns without Candidate Generation Mining Frequent Patterns without Candidate Generation a paper by Jiawei Han, Jian Pei and Yiwen Yin School of Computing Science Simon Fraser University Presented by Maria Cutumisu Department of Computing

More information

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in

More information

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents

Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving Multi-documents Send Orders for Reprints to reprints@benthamscience.ae 676 The Open Automation and Control Systems Journal, 2014, 6, 676-683 Open Access The Three-dimensional Coding Based on the Cone for XML Under Weaving

More information

Data Structure for Association Rule Mining: T-Trees and P-Trees

Data Structure for Association Rule Mining: T-Trees and P-Trees IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 6, JUNE 2004 1 Data Structure for Association Rule Mining: T-Trees and P-Trees Frans Coenen, Paul Leng, and Shakil Ahmed Abstract Two new

More information

A System for Discovering Regions of Interest from Trajectory Data

A System for Discovering Regions of Interest from Trajectory Data A System for Discovering Regions of Interest from Trajectory Data Muhammad Reaz Uddin, Chinya Ravishankar, and Vassilis J. Tsotras University of California, Riverside, CA, USA {uddinm,ravi,tsotras}@cs.ucr.edu

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Clustering Spatio-Temporal Patterns using Levelwise Search

Clustering Spatio-Temporal Patterns using Levelwise Search Clustering Spatio-Temporal Patterns using Levelwise Search Abhishek Sharma, Raj Bhatnagar University of Cincinnati Cincinnati, OH, 45221 sharmaak,rbhatnag@ececs.uc.edu Figure 1: Spatial Grids at Successive

More information

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the

More information

xiii Preface INTRODUCTION

xiii Preface INTRODUCTION xiii Preface INTRODUCTION With rapid progress of mobile device technology, a huge amount of moving objects data can be geathed easily. This data can be collected from cell phones, GPS embedded in cars

More information

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract

More information

Frequent Pattern Mining with Uncertain Data

Frequent Pattern Mining with Uncertain Data Charu C. Aggarwal 1, Yan Li 2, Jianyong Wang 2, Jing Wang 3 1. IBM T J Watson Research Center 2. Tsinghua University 3. New York University Frequent Pattern Mining with Uncertain Data ACM KDD Conference,

More information

Mining Rare Periodic-Frequent Patterns Using Multiple Minimum Supports

Mining Rare Periodic-Frequent Patterns Using Multiple Minimum Supports Mining Rare Periodic-Frequent Patterns Using Multiple Minimum Supports R. Uday Kiran P. Krishna Reddy Center for Data Engineering International Institute of Information Technology-Hyderabad Hyderabad,

More information

OLAP for Trajectories

OLAP for Trajectories OLAP for Trajectories Oliver Baltzer 1, Frank Dehne 2, Susanne Hambrusch 3, and Andrew Rau-Chaplin 1 1 Dalhousie University, Halifax, Canada obaltzer@cs.dal.ca, arc@cs.dal.ca http://www.cs.dal.ca/~arc

More information

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments Send Orders for Reprints to reprints@benthamscience.ae 368 The Open Automation and Control Systems Journal, 2014, 6, 368-373 Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing

More information

Constructing Popular Routes from Uncertain Trajectories

Constructing Popular Routes from Uncertain Trajectories Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei, Yu Zheng, Wen-Chih Peng presented by Slawek Goryczka Scenarios A trajectory is a sequence of data points recording location information

More information

Trajectory Pattern Mining

Trajectory Pattern Mining Trajectory Pattern Mining Fosca Giannotti 1 Mirco Nanni 1 Dino Pedreschi 2 Fabio Pinelli 1 Pisa KDD Laboratory 1 ISTI - CNR, Area della Ricerca di Pisa, Via Giuseppe Moruzzi, 1-56124 Pisa, Italy 2 Computer

More information

PartSpan: Parallel Sequence Mining of Trajectory Patterns

PartSpan: Parallel Sequence Mining of Trajectory Patterns Fifth International Conference on Fuzzy Systems and Knowledge Discovery PartSpan: Parallel Sequence Mining of Trajectory Patterns Shaojie Qiao,, Changjie Tang, Shucheng Dai, Mingfang Zhu Jing Peng, Hongjun

More information

Research and Improvement of Apriori Algorithm Based on Hadoop

Research and Improvement of Apriori Algorithm Based on Hadoop Research and Improvement of Apriori Algorithm Based on Hadoop Gao Pengfei a, Wang Jianguo b and Liu Pengcheng c School of Computer Science and Engineering Xi'an Technological University Xi'an, 710021,

More information

Improved Frequent Pattern Mining Algorithm with Indexing

Improved Frequent Pattern Mining Algorithm with Indexing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.

More information

A Survey on Moving Towards Frequent Pattern Growth for Infrequent Weighted Itemset Mining

A Survey on Moving Towards Frequent Pattern Growth for Infrequent Weighted Itemset Mining A Survey on Moving Towards Frequent Pattern Growth for Infrequent Weighted Itemset Mining Miss. Rituja M. Zagade Computer Engineering Department,JSPM,NTC RSSOER,Savitribai Phule Pune University Pune,India

More information

Hotspot District Trajectory Prediction *

Hotspot District Trajectory Prediction * Hotspot District Trajectory Prediction * Hongjun Li 1,2, Changjie Tang 1, Shaojie Qiao 3, Yue Wang 1, Ning Yang 1, and Chuan Li 1 1 Institute of Database and Knowledge Engineering, School of Computer Science,

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

Predicting the Next Location Change and Time of Change for Mobile Phone Users

Predicting the Next Location Change and Time of Change for Mobile Phone Users Predicting the Next Location Change and Time of Change for Mobile Phone Users Mert Ozer, Ilkcan Keles, İsmail Hakki Salih Ergut Toroslu, Pinar Karagoz Avealabs, Avea Technology Center Computer Engineering

More information

Route Pattern Mining From Personal Trajectory Data *

Route Pattern Mining From Personal Trajectory Data * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 147-164 (2015) Route Pattern Mining From Personal Trajectory Data * MINGQI LV 1, YINGLONG LI 1, ZHENMING YUAN 2 AND QIHUI WANG 2 1 College of Computer

More information

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM

INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM INFREQUENT WEIGHTED ITEM SET MINING USING NODE SET BASED ALGORITHM G.Amlu #1 S.Chandralekha #2 and PraveenKumar *1 # B.Tech, Information Technology, Anand Institute of Higher Technology, Chennai, India

More information

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: [35] [Rana, 3(12): December, 2014] ISSN:

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: [35] [Rana, 3(12): December, 2014] ISSN: IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Brief Survey on Frequent Patterns Mining of Uncertain Data Purvi Y. Rana*, Prof. Pragna Makwana, Prof. Kishori Shekokar *Student,

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

Parallelizing Frequent Itemset Mining with FP-Trees

Parallelizing Frequent Itemset Mining with FP-Trees Parallelizing Frequent Itemset Mining with FP-Trees Peiyi Tang Markus P. Turkia Department of Computer Science Department of Computer Science University of Arkansas at Little Rock University of Arkansas

More information

Improving Suffix Tree Clustering Algorithm for Web Documents

Improving Suffix Tree Clustering Algorithm for Web Documents International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Improving Suffix Tree Clustering Algorithm for Web Documents Yan Zhuang Computer Center East China Normal

More information

Periodic Pattern Mining Based on GPS Trajectories

Periodic Pattern Mining Based on GPS Trajectories Periodic Pattern Mining Based on GPS Trajectories iaopeng Chen 1,a, Dianxi Shi 2,b, Banghui Zhao 3,c and Fan Liu 4,d 1,2,3,4 National Laboratory for Parallel and Distributed Processing, School of Computer,

More information

Association Rule Mining

Association Rule Mining Huiping Cao, FPGrowth, Slide 1/22 Association Rule Mining FPGrowth Huiping Cao Huiping Cao, FPGrowth, Slide 2/22 Issues with Apriori-like approaches Candidate set generation is costly, especially when

More information

Mining Temporal Association Rules in Network Traffic Data

Mining Temporal Association Rules in Network Traffic Data Mining Temporal Association Rules in Network Traffic Data Guojun Mao Abstract Mining association rules is one of the most important and popular task in data mining. Current researches focus on discovering

More information

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION

AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION AN IMPROVED TAIPEI BUS ESTIMATION-TIME-OF-ARRIVAL (ETA) MODEL BASED ON INTEGRATED ANALYSIS ON HISTORICAL AND REAL-TIME BUS POSITION Xue-Min Lu 1,3, Sendo Wang 2 1 Master Student, 2 Associate Professor

More information

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)

More information

APPLYING BIT-VECTOR PROJECTION APPROACH FOR EFFICIENT MINING OF N-MOST INTERESTING FREQUENT ITEMSETS

APPLYING BIT-VECTOR PROJECTION APPROACH FOR EFFICIENT MINING OF N-MOST INTERESTING FREQUENT ITEMSETS APPLYIG BIT-VECTOR PROJECTIO APPROACH FOR EFFICIET MIIG OF -MOST ITERESTIG FREQUET ITEMSETS Zahoor Jan, Shariq Bashir, A. Rauf Baig FAST-ational University of Computer and Emerging Sciences, Islamabad

More information

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42 Pattern Mining Knowledge Discovery and Data Mining 1 Roman Kern KTI, TU Graz 2016-01-14 Roman Kern (KTI, TU Graz) Pattern Mining 2016-01-14 1 / 42 Outline 1 Introduction 2 Apriori Algorithm 3 FP-Growth

More information

AC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery

AC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery : Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery Hong Cheng Philip S. Yu Jiawei Han University of Illinois at Urbana-Champaign IBM T. J. Watson Research Center {hcheng3, hanj}@cs.uiuc.edu,

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Top-k Keyword Search Over Graphs Based On Backward Search

Top-k Keyword Search Over Graphs Based On Backward Search Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer

More information

Efficient Algorithm for Frequent Itemset Generation in Big Data

Efficient Algorithm for Frequent Itemset Generation in Big Data Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru

More information

Performance Analysis of Data Mining Algorithms

Performance Analysis of Data Mining Algorithms ! Performance Analysis of Data Mining Algorithms Poonam Punia Ph.D Research Scholar Deptt. of Computer Applications Singhania University, Jhunjunu (Raj.) poonamgill25@gmail.com Surender Jangra Deptt. of

More information

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques

Proxy Server Systems Improvement Using Frequent Itemset Pattern-Based Techniques Proceedings of the 2nd International Conference on Intelligent Systems and Image Processing 2014 Proxy Systems Improvement Using Frequent Itemset Pattern-Based Techniques Saranyoo Butkote *, Jiratta Phuboon-op,

More information

A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations

A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.1, January 2013 1 A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations Hiroyuki

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Welcome to DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH 116 Fall 2017 First Grading for Reading Assignment Weka v 6 weeks v https://weka.waikato.ac.nz/dataminingwithweka/preview

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

City, University of London Institutional Repository

City, University of London Institutional Repository City Research Online City, University of London Institutional Repository Citation: Andrienko, N., Andrienko, G., Fuchs, G., Rinzivillo, S. & Betz, H-D. (2015). Real Time Detection and Tracking of Spatial

More information

Salah Alghyaline, Jun-Wei Hsieh, and Jim Z. C. Lai

Salah Alghyaline, Jun-Wei Hsieh, and Jim Z. C. Lai EFFICIENTLY MINING FREQUENT ITEMSETS IN TRANSACTIONAL DATABASES This article has been peer reviewed and accepted for publication in JMST but has not yet been copyediting, typesetting, pagination and proofreading

More information

Introduction to Trajectory Clustering. By YONGLI ZHANG

Introduction to Trajectory Clustering. By YONGLI ZHANG Introduction to Trajectory Clustering By YONGLI ZHANG Outline 1. Problem Definition 2. Clustering Methods for Trajectory data 3. Model-based Trajectory Clustering 4. Applications 5. Conclusions 1 Problem

More information

Item Set Extraction of Mining Association Rule

Item Set Extraction of Mining Association Rule Item Set Extraction of Mining Association Rule Shabana Yasmeen, Prof. P.Pradeep Kumar, A.Ranjith Kumar Department CSE, Vivekananda Institute of Technology and Science, Karimnagar, A.P, India Abstract:

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

Comparing the Performance of Frequent Itemsets Mining Algorithms

Comparing the Performance of Frequent Itemsets Mining Algorithms Comparing the Performance of Frequent Itemsets Mining Algorithms Kalash Dave 1, Mayur Rathod 2, Parth Sheth 3, Avani Sakhapara 4 UG Student, Dept. of I.T., K.J.Somaiya College of Engineering, Mumbai, India

More information

Generation of Potential High Utility Itemsets from Transactional Databases

Generation of Potential High Utility Itemsets from Transactional Databases Generation of Potential High Utility Itemsets from Transactional Databases Rajmohan.C Priya.G Niveditha.C Pragathi.R Asst.Prof/IT, Dept of IT Dept of IT Dept of IT SREC, Coimbatore,INDIA,SREC,Coimbatore,.INDIA

More information

PTclose: A novel algorithm for generation of closed frequent itemsets from dense and sparse datasets

PTclose: A novel algorithm for generation of closed frequent itemsets from dense and sparse datasets : A novel algorithm for generation of closed frequent itemsets from dense and sparse datasets J. Tahmores Nezhad ℵ, M.H.Sadreddini Abstract In recent years, various algorithms for mining closed frequent

More information

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases

SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases Jinlong Wang, Congfu Xu, Hongwei Dan, and Yunhe Pan Institute of Artificial Intelligence, Zhejiang University Hangzhou, 310027,

More information

Maintenance of the Prelarge Trees for Record Deletion

Maintenance of the Prelarge Trees for Record Deletion 12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, 2007 105 Maintenance of the Prelarge Trees for Record Deletion Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Department of

More information

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud R. H. Jadhav 1 P.E.S college of Engineering, Aurangabad, Maharashtra, India 1 rjadhav377@gmail.com ABSTRACT: Many

More information

Trajectory analysis. Ivan Kukanov

Trajectory analysis. Ivan Kukanov Trajectory analysis Ivan Kukanov Joensuu, 2014 Semantic Trajectory Mining for Location Prediction Josh Jia-Ching Ying Tz-Chiao Weng Vincent S. Tseng Taiwan Wang-Chien Lee Wang-Chien Lee USA Copyright 2011

More information

CLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets

CLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets CLOSET+:Searching for the Best Strategies for Mining Frequent Closed Itemsets Jianyong Wang, Jiawei Han, Jian Pei Presentation by: Nasimeh Asgarian Department of Computing Science University of Alberta

More information

Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials *

Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials * Discovering the Association Rules in OLAP Data Cube with Daily Downloads of Folklore Materials * Galina Bogdanova, Tsvetanka Georgieva Abstract: Association rules mining is one kind of data mining techniques

More information

Concurrent Processing of Frequent Itemset Queries Using FP-Growth Algorithm

Concurrent Processing of Frequent Itemset Queries Using FP-Growth Algorithm Concurrent Processing of Frequent Itemset Queries Using FP-Growth Algorithm Marek Wojciechowski, Krzysztof Galecki, Krzysztof Gawronek Poznan University of Technology Institute of Computing Science ul.

More information

A Novel Method of Optimizing Website Structure

A Novel Method of Optimizing Website Structure A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School

More information

WIP: mining Weighted Interesting Patterns with a strong weight and/or support affinity

WIP: mining Weighted Interesting Patterns with a strong weight and/or support affinity WIP: mining Weighted Interesting Patterns with a strong weight and/or support affinity Unil Yun and John J. Leggett Department of Computer Science Texas A&M University College Station, Texas 7783, USA

More information

Mobility Data Management and Exploration: Theory and Practice

Mobility Data Management and Exploration: Theory and Practice Mobility Data Management and Exploration: Theory and Practice Chapter 4 -Mobility data management at the physical level Nikos Pelekis & Yannis Theodoridis InfoLab, University of Piraeus, Greece infolab.cs.unipi.gr

More information

Parallel Mining of Maximal Frequent Itemsets in PC Clusters

Parallel Mining of Maximal Frequent Itemsets in PC Clusters Proceedings of the International MultiConference of Engineers and Computer Scientists 28 Vol I IMECS 28, 19-21 March, 28, Hong Kong Parallel Mining of Maximal Frequent Itemsets in PC Clusters Vong Chan

More information

Mining Frequent Patterns without Candidate Generation

Mining Frequent Patterns without Candidate Generation Mining Frequent Patterns without Candidate Generation Outline of the Presentation Outline Frequent Pattern Mining: Problem statement and an example Review of Apriori like Approaches FP Growth: Overview

More information

Querying Spatiotemporal Data Based on XML Twig Pattern

Querying Spatiotemporal Data Based on XML Twig Pattern Querying Spatiotemporal Data Based on XML Twig Pattern Luyi Bai Yin Li Jiemin Liu* College of Information Science and Engineering Northeastern University Shenyang 110819 China * Corresponding author Tel:

More information

Medical Data Mining Based on Association Rules

Medical Data Mining Based on Association Rules Medical Data Mining Based on Association Rules Ruijuan Hu Dep of Foundation, PLA University of Foreign Languages, Luoyang 471003, China E-mail: huruijuan01@126.com Abstract Detailed elaborations are presented

More information

Upper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2

Upper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2 Volume 117 No. 7 2017, 39-46 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Upper bound tighter Item caps for fast frequent itemsets mining for uncertain

More information

Appropriate Item Partition for Improving the Mining Performance

Appropriate Item Partition for Improving the Mining Performance Appropriate Item Partition for Improving the Mining Performance Tzung-Pei Hong 1,2, Jheng-Nan Huang 1, Kawuu W. Lin 3 and Wen-Yang Lin 1 1 Department of Computer Science and Information Engineering National

More information

An Efficient XML Index Structure with Bottom-Up Query Processing

An Efficient XML Index Structure with Bottom-Up Query Processing An Efficient XML Index Structure with Bottom-Up Query Processing Dong Min Seo, Jae Soo Yoo, and Ki Hyung Cho Department of Computer and Communication Engineering, Chungbuk National University, 48 Gaesin-dong,

More information

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang

More information

Similarity-based Analysis for Trajectory Data

Similarity-based Analysis for Trajectory Data Similarity-based Analysis for Trajectory Data Kevin Zheng 25/04/2014 DASFAA 2014 Tutorial 1 Outline Background What is trajectory Where do they come from Why are they useful Characteristics Trajectory

More information

Maintenance of fast updated frequent pattern trees for record deletion

Maintenance of fast updated frequent pattern trees for record deletion Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University

More information

Mining Frequent Itemsets Along with Rare Itemsets Based on Categorical Multiple Minimum Support

Mining Frequent Itemsets Along with Rare Itemsets Based on Categorical Multiple Minimum Support IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 6, Ver. IV (Nov.-Dec. 2016), PP 109-114 www.iosrjournals.org Mining Frequent Itemsets Along with Rare

More information

Memory issues in frequent itemset mining

Memory issues in frequent itemset mining Memory issues in frequent itemset mining Bart Goethals HIIT Basic Research Unit Department of Computer Science P.O. Box 26, Teollisuuskatu 2 FIN-00014 University of Helsinki, Finland bart.goethals@cs.helsinki.fi

More information

3 The standard grid. N ode(0.0001,0.0004) Longitude

3 The standard grid. N ode(0.0001,0.0004) Longitude International Conference on Information Science and Computer Applications (ISCA 2013 Research on Map Matching Algorithm Based on Nine-rectangle Grid Li Cai1,a, Bingyu Zhu2,b 1 2 School of Software, Yunnan

More information

A New Encoding Scheme of Supporting Data Update Efficiently

A New Encoding Scheme of Supporting Data Update Efficiently Send Orders for Reprints to reprints@benthamscience.ae 1472 The Open Cybernetics & Systemics Journal, 2015, 9, 1472-1477 Open Access A New Encoding Scheme of Supporting Data Update Efficiently Houliang

More information

Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules

Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Manju Department of Computer Engg. CDL Govt. Polytechnic Education Society Nathusari Chopta, Sirsa Abstract The discovery

More information

Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation

Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation MATEC Web of Conferences 55, 03001 () DOI: 10.1051/ matecconf/5503001 Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation Luo Hanwu 1, Li Mengke 1,

More information

SeqIndex: Indexing Sequences by Sequential Pattern Analysis

SeqIndex: Indexing Sequences by Sequential Pattern Analysis SeqIndex: Indexing Sequences by Sequential Pattern Analysis Hong Cheng Xifeng Yan Jiawei Han Department of Computer Science University of Illinois at Urbana-Champaign {hcheng3, xyan, hanj}@cs.uiuc.edu

More information

Trajectory Pattern Mining. Figures and charts are from some materials downloaded from the internet.

Trajectory Pattern Mining. Figures and charts are from some materials downloaded from the internet. Trajectory Pattern Mining Figures and charts are from some materials downloaded from the internet. Outline Spatio-temporal data types Mining trajectory patterns Spatio-temporal data types Spatial extension

More information

High Utility Web Access Patterns Mining from Distributed Databases

High Utility Web Access Patterns Mining from Distributed Databases High Utility Web Access Patterns Mining from Distributed Databases Md.Azam Hosssain 1, Md.Mamunur Rashid 1, Byeong-Soo Jeong 1, Ho-Jin Choi 2 1 Database Lab, Department of Computer Engineering, Kyung Hee

More information

Association Pattern Mining. Lijun Zhang

Association Pattern Mining. Lijun Zhang Association Pattern Mining Lijun Zhang zlj@nju.edu.cn http://cs.nju.edu.cn/zlj Outline Introduction The Frequent Pattern Mining Model Association Rule Generation Framework Frequent Itemset Mining Algorithms

More information

Zonal Co-location Pattern Discovery with Dynamic Parameters

Zonal Co-location Pattern Discovery with Dynamic Parameters Seventh IEEE International Conference on Data Mining Zonal Co-location Pattern Discovery with Dynamic Parameters Mete Celik James M. Kang Shashi Shekhar Department of Computer Science, University of Minnesota,

More information

Max-Count Aggregation Estimation for Moving Points

Max-Count Aggregation Estimation for Moving Points Max-Count Aggregation Estimation for Moving Points Yi Chen Peter Revesz Dept. of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA Abstract Many interesting problems

More information

Mobility Data Mining. Mobility data Analysis Foundations

Mobility Data Mining. Mobility data Analysis Foundations Mobility Data Mining Mobility data Analysis Foundations MDA, 2015 Trajectory Clustering T-clustering Trajectories are grouped based on similarity Several possible notions of similarity Start/End points

More information

Deakin Research Online

Deakin Research Online Deakin Research Online This is the published version: Saha, Budhaditya, Lazarescu, Mihai and Venkatesh, Svetha 27, Infrequent item mining in multiple data streams, in Data Mining Workshops, 27. ICDM Workshops

More information