Carmela Comito and Domenico Talia. University of Calabria & ICAR-CNR

Size: px
Start display at page:

Download "Carmela Comito and Domenico Talia. University of Calabria & ICAR-CNR"

Transcription

1 Carmela Comito and Domenico Talia University of Calabria & ICAR-CNR

2 Introduction & Motivation Energy-aware Experimental Performance mobile mining of data setting evaluation 2

3 Battery power is a vital resource for mobile computing Can either increase supply or reduce demand Increasing the supply of energy is difficult: Battery constrains size, weight of mobile device Battery technology improving slowly Processing requirements also increasing 3

4 Lots of effort aimed at reducing energy demand Hardware-based techniques Low-power Circuits, architectures, protocols Power management Right power at the right place at the right time Recent devices (CPU, disk,) support multiple power modes Dynamic voltage scaling Low-power network design (e.g., Bluetooth) But, lower-level efforts have not been enough! Can the higher levels of the system help?

5 Adapt resources based on system layers Adaptive Layers Application Operating System /Network Hardware Most approaches in research adapt a single layer Possible to adapt across multiple layers?

6 Applications can reduce energy, but usually at a cost! Dynamic balancing of quality and energy conservation Energy-aware adaptation: significantly reduces energy usage complements hardware power management often exhibits predictable effect Resource Monitors Applications The application periodically: measures energy supply predicts energy demand os Redirector 6

7 Defer decisions as much as possible: Applications statically expose possible tradeoffs OS dynamically advises which tradeoffs are best When demand exceeds supply: Applications adapt to conserve energy usage When supply significantly exceeds demand: Applications increase data fidelity Energy En erg y su pp ly Energy Demand Time 7

8 The main focus today is on energyaware algorithms, tasks, applications. The other side of the coin is data and costs of operating on it. Abstract energy-cost models for exchanging, accessing and transform data are primary elements for energy-aware data management at large scale. They are useful for sustainable data science. 8

9 Data is everywhere, ubiquitous Big, complex, real-time, unstructured Every life process today is data intensive. The information stored in digital data archives is enormous and its size is still growing very rapidly. 9

10 Some decades ago the main problem was the shortage of information, now the challenge is the very large volume of information to deal with and the associated complexity to process it and to extract significant and useful parts or summaries. 10

11 We evaluated the energy cost of analyzing data by using some well-known data mining techniques on mobile devices. Our interest was mainly on how the same technique consumes energy when dimension of data change. Tests with different Data set dimensions, Attribute number, Class number. 11

12 Data mining is the process of automating finding implicit, previously unknown, and potentially useful information from large volumes of data We focused on algorithms for Data clustering Association rule mining Decision tree induction 12

13 A variety of powerful mobile devices is available Smart phones, PDAs, laptops, netbooks, Wireless networks are always more end-user oriented Emergence of the ubiquitous computing paradigm Mobile users perform intelligent analysis and monitoring of data Applications Risk management Collaborative computing, 13

14 Transportation Smart cars and smart roads Onboard systems talk to the road : Map obstacles and delays Inform the road of its actions Emergency search-and-rescue operations Police Fire Ambulance Military usage Real-time feedback for the battlefield Movement of intelligence Mobile Healthcare Smart Home 14

15

16 16

17 Due to resource restrictions a mobile node can not execute a complete data mining process: execute only a step of the knowledge discovery process: preprocessing, data mining, visualization, etc adapt a given data mining algorithm to the capability of the node: light-weight version of the algorithm collaboratively execute a data mining algorithm with stationary and mobile nodes partially execute a data mining algorithm: if the resource measurements indicates that the device can not achieve the required accuracy according to the incoming data rate, it sends a data mining request to a data mining server (either stationary or mobile) to continue a current 17

18 Identify the energy consumption characteristics of some commonly used data mining algorithms running on-board a mobile device Experimentally quantified the performance of specific data mining algorithms Machine learning approach to predict energy consumption of mobile devices to perform data mining algorithms 18

19 Energy characterization of data mining algorithms running on-board mobile devices K-Means (data clustering) J48 (data classification) Apriori (association rules) Common performance parameters Number of instances (data set size) Number of attributes Algorithm-specific performance parameters K-Means: number of clusters J48: decision tree size, confidence support Apriori: Number of rules, minimum support and minimum confidence 19

20 Perform data mining algorithms over an Android smartphone Algorithm selection Data set selection Performance parameters setting Gather of statistics about the mobile device and the algorithm during its execution Battery level CPU occupancy Memory usage Execution time 20

21 Each algorithm has been executed 10 times the values reported in the experiments are the average values of CPU, energy and execution time consumed The results are obtained with two Android smartphones Sony Xperia P, a 1 GHz Dual Core ARM processor with 1 GB RAM Each test is executed with the following setting 100% battery level radio signals off (airplane mode) automatic shut-off display off 21

22 Data Sets Census ( Used with K-means Data set size: 14 Number of instances: Number of attributes: 11 Census_disc ( Used with Apriori Data set size: 19 Number of instances: Number of attributes: 11 Covertype ( Used with J48 Data set size: 14.5 Number of instances:

23

24 Method Algorithm Data Set Size RAM Memory (yte) Virtual Memory (yte) CPU (%) Battery Charge Depletion (mah) Energy Consumption (J) Time (sec) Association Rules CENSUS_DISC.arff Rule Induction Apriori 0,1 0,2 0,4 0,8 1,6 3,2 15,86 16,97 18,06 19,87 23,32 26,92 95,19 105,36 104,95 102,75 103,99 100,01 96,92 98,03 98,24 98,13 96,87 95, ,7 13,5 23, , ,82 310, , ,47 20,15 23,87 27, ,94 104,92 105,6 103, ,4 29,8 59,4 194, , , , , ,75 8,1 18,9 18,9 43, ,91 107, , , , Classification COVERTYPE.arff Trees J48 0,1 0,2 0,4 0,8 1,6 3,2 6,4 96,23 98,21 97,43 97, Clustering CENSUS.arff Instancebased/La zy Learning K-Means 0,1 0,2 0,4 0,8 1,6 3,2 6,4 16,73 17,95 19,72 23,08 26, ,56 102,05 102,16 101,86 95, ,03 97,65 97,02 97,97 97,

25 A way of grouping together data samples that are similar in some way - according to some criteria that you pick A form of unsupervised learning you generally don t have examples demonstrating how the data should be grouped together So, it s a method of data exploration a way of looking for patterns or structure in the data that are of interest

26 Choose a number of clusters k Initialize cluster centers µ1, µk Could pick k data points and set cluster centers to these points Or could randomly assign points to clusters and take means of clusters For each data point, compute the cluster center it is closest to (using some distance measure) and assign the data point to this cluster Re-compute cluster centers (mean of data points in cluster) Stop when there are no new re-assignments The computational complexity of K-means is O(nmk)

27 Number of instances and number of clusters 27

28 Number of attributes and number of instances 28

29 Find the set of all subsets of items that frequently occur in database records. In addition, ARM applications extract rules regarding how a given subset of items influence the presence of another Two key parameters Confidence (A B) = #tuples containing both A & B / #tuples containing A = P(B A) = P(A U B ) / P (A) Support (A B) = #tuples containing both A & B/ total number of tuples = P(A U B) What do they actually mean? Find all the rules A & B C with minimum confidence and support support, s, probability that a transaction contains {A, B, C} confidence, c, conditional probability that a 29

30 Apriori is arguably the most influential ARM algorithm Apriori has two phases of execution 1. Find the frequent itemsets: the sets of items that have minimum support A subset of a frequent itemset must also be a frequent itemset i.e., if {AB} is a frequent itemset, both {A} and {B} should be a frequent itemset Iteratively find frequent itemsets with cardinality from 1 to k (k-itemset) 1. Use the frequent itemsets to generate 30

31 If m is the number of instances and n the number of distinct attributes, the number of potentially frequent itemsets is O(2n) and the overall computational complexity of the algorithm is O(m2n). Performance parameters data set size (number of instances) number of attributes minimum support minimum confidence 31

32 Reducing the generation of frequent itemsets Number of instances and attributes 32

33 The objective of a classification algorithm is to use a training dataset to build a model such that the model can be used to assign unclassified observations into one of the defined classes. Decision trees are a common knowledge representation used for classification. In classification, the decision tree predicts, based on data from a specific instance, the membership class of an instance. Each node in the tree consists of a test, based on one of more attributes of the instance to be classified. The leaf nodes provide the class label. 33

34 Creates a decision tree based on a set of labeled input data. This decision tree can then be tested against unseen labeled test data to quantify how well it generalizes. Reduced-errror based pruning Post-pruning Confidence factor Online-pruning Number of instances per node

35 The computational complexity of C4.5 is O(mn2) where m is the number of instances and n the number of attributes Performance parameters Number of instances Number of attributes Confidence factor Minimum number of instances per node 35

36 Tree pruning Number of instances and number of attributes

37 Results obtained with different smart phones Sony Xperia P: 1 GHz Dual Core ARM processor and 1 GB RAM HTC Hero: 528 MHz Qualcomm processor and 288 RAM Samsung Galaxy ACE: 800 MHz Qualcomm processor and 512 RAM

38 Energy-aware adaptation is an important part of a comprehensive energy management strategy! The main goal is to converse energy without affecting usability A collaborative relationship between the operating system and applications can effectively reduce the energy usage of mobile computers. Data-intensive applications demands for energy cost models based on data characteristics. 38

39

CMPUT 391 Database Management Systems. Data Mining. Textbook: Chapter (without 17.10)

CMPUT 391 Database Management Systems. Data Mining. Textbook: Chapter (without 17.10) CMPUT 391 Database Management Systems Data Mining Textbook: Chapter 17.7-17.11 (without 17.10) University of Alberta 1 Overview Motivation KDD and Data Mining Association Rules Clustering Classification

More information

Smartphone Evolution and Revolution

Smartphone Evolution and Revolution Smartphone Evolution and Revolution 31 March 2014 By: Eylon Gersten eylon@marvell.com Is your Smartphone really smart? Short Survey what OS type of Smartphone the audience have? OS # % Android 7 54 ios

More information

A Cloud Framework for Big Data Analytics Workflows on Azure

A Cloud Framework for Big Data Analytics Workflows on Azure A Cloud Framework for Big Data Analytics Workflows on Azure Fabrizio MAROZZO a, Domenico TALIA a,b and Paolo TRUNFIO a a DIMES, University of Calabria, Rende (CS), Italy b ICAR-CNR, Rende (CS), Italy Abstract.

More information

EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD

EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD 06 January, 2019 EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD Document Filetype: PDF 165.6 KB 0 EPUB // SAMSUNG GALAXY 7500 ONLINE MANUAL DOWNLOAD Samsung GT-S7500 Galaxy Ace Plus complete Service

More information

Computing and Sustainability Systems/Architecture & Beyond. Carla Schlatter Ellis Duke University

Computing and Sustainability Systems/Architecture & Beyond. Carla Schlatter Ellis Duke University Computing and Sustainability Systems/Architecture & Beyond Carla Schlatter Ellis Duke University 1 Scope Do less harm -- the greening of computing Energy efficiency for computing Data Centers Costs of

More information

IMPLEMENTATION AND COMPARATIVE STUDY OF IMPROVED APRIORI ALGORITHM FOR ASSOCIATION PATTERN MINING

IMPLEMENTATION AND COMPARATIVE STUDY OF IMPROVED APRIORI ALGORITHM FOR ASSOCIATION PATTERN MINING IMPLEMENTATION AND COMPARATIVE STUDY OF IMPROVED APRIORI ALGORITHM FOR ASSOCIATION PATTERN MINING 1 SONALI SONKUSARE, 2 JAYESH SURANA 1,2 Information Technology, R.G.P.V., Bhopal Shri Vaishnav Institute

More information

Towards Energy-Aware Intrusion Detection Systems on Mobile Devices M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse

Towards Energy-Aware Intrusion Detection Systems on Mobile Devices M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse Towards Energy-Aware Intrusion Detection Systems on Mobile Devices M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse The 2013 International Conference on High Performance Computing & Simulation (HPCS

More information

Classification by Association

Classification by Association Classification by Association Cse352 Ar*ficial Intelligence Professor Anita Wasilewska Generating Classification Rules by Association When mining associa&on rules for use in classifica&on we are only interested

More information

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford *, H. Andrés Lagar-Cavilla #, Alexander Varshavsky #, Vinod Ganapathy *, and Liviu Iftode * * Rutgers University

More information

Event Detection through Differential Pattern Mining in Internet of Things

Event Detection through Differential Pattern Mining in Internet of Things Event Detection through Differential Pattern Mining in Internet of Things Authors: Md Zakirul Alam Bhuiyan and Jie Wu IEEE MASS 2016 The 13th IEEE International Conference on Mobile Ad hoc and Sensor Systems

More information

Supervised and Unsupervised Learning (II)

Supervised and Unsupervised Learning (II) Supervised and Unsupervised Learning (II) Yong Zheng Center for Web Intelligence DePaul University, Chicago IPD 346 - Data Science for Business Program DePaul University, Chicago, USA Intro: Supervised

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Association Rule Mining. Entscheidungsunterstützungssysteme

Association Rule Mining. Entscheidungsunterstützungssysteme Association Rule Mining Entscheidungsunterstützungssysteme Frequent Pattern Analysis Frequent pattern: a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set

More information

Making 5G NR a commercial reality

Making 5G NR a commercial reality Making 5G NR a commercial reality Ultra-high fidelity media anywhere Immersive entertainment Safer, more autonomous transportation Connectivity is the new Electricity Reliable access to remote healthcare

More information

Cse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University

Cse634 DATA MINING TEST REVIEW. Professor Anita Wasilewska Computer Science Department Stony Brook University Cse634 DATA MINING TEST REVIEW Professor Anita Wasilewska Computer Science Department Stony Brook University Preprocessing stage Preprocessing: includes all the operations that have to be performed before

More information

ANU MLSS 2010: Data Mining. Part 2: Association rule mining

ANU MLSS 2010: Data Mining. Part 2: Association rule mining ANU MLSS 2010: Data Mining Part 2: Association rule mining Lecture outline What is association mining? Market basket analysis and association rule examples Basic concepts and formalism Basic rule measurements

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

INTRODUCTION... 2 FEATURES OF DARWIN... 4 SPECIAL FEATURES OF DARWIN LATEST FEATURES OF DARWIN STRENGTHS & LIMITATIONS OF DARWIN...

INTRODUCTION... 2 FEATURES OF DARWIN... 4 SPECIAL FEATURES OF DARWIN LATEST FEATURES OF DARWIN STRENGTHS & LIMITATIONS OF DARWIN... INTRODUCTION... 2 WHAT IS DATA MINING?... 2 HOW TO ACHIEVE DATA MINING... 2 THE ROLE OF DARWIN... 3 FEATURES OF DARWIN... 4 USER FRIENDLY... 4 SCALABILITY... 6 VISUALIZATION... 8 FUNCTIONALITY... 10 Data

More information

Introducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values

Introducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values Introducing Partial Matching Approach in Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY

PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY PREDICTION OF POPULAR SMARTPHONE COMPANIES IN THE SOCIETY T.Ramya 1, A.Mithra 2, J.Sathiya 3, T.Abirami 4 1 Assistant Professor, 2,3,4 Nadar Saraswathi college of Arts and Science, Theni, Tamil Nadu (India)

More information

Using Association Rules for Better Treatment of Missing Values

Using Association Rules for Better Treatment of Missing Values Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University

More information

Get Started with the INCENTER Application

Get Started with the INCENTER Application Get Started with the INCENTER Application Log in to the TireCheck INCENTER application using user account details provided. The application requires an Internet connection. Your Android smart device must

More information

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges

CSE 535 Mobile Computing. An Overview of Mobile Computing: Part I Motivation and Challenges CSE 535 Mobile Computing An Overview of Mobile Computing: Part I Motivation and Challenges Georgios Varsamopoulos School of Computing and Informatics Arizona State University 2 Mobile Computing The need

More information

The Dangers and Complexities of SQLite Benchmarking. Dhathri Purohith, Jayashree Mohan and Vijay Chidambaram

The Dangers and Complexities of SQLite Benchmarking. Dhathri Purohith, Jayashree Mohan and Vijay Chidambaram The Dangers and Complexities of SQLite Benchmarking Dhathri Purohith, Jayashree Mohan and Vijay Chidambaram 2 3 Benchmarking SQLite is Non-trivial! Benchmarking complex systems in a repeatable fashion

More information

SMARTPHONE HARDWARE: ANATOMY OF A HANDSET. Mainak Chaudhuri Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver

SMARTPHONE HARDWARE: ANATOMY OF A HANDSET. Mainak Chaudhuri Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver SMARTPHONE HARDWARE: ANATOMY OF A HANDSET Mainak Chaudhuri Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver Outline of topics What is the hardware architecture of a How does communication

More information

A Graph-Based Approach for Mining Closed Large Itemsets

A Graph-Based Approach for Mining Closed Large Itemsets A Graph-Based Approach for Mining Closed Large Itemsets Lee-Wen Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University huanglw@gmail.com Ye-In Chang Dept. of Computer Science and

More information

Parallel Approach for Implementing Data Mining Algorithms

Parallel Approach for Implementing Data Mining Algorithms TITLE OF THE THESIS Parallel Approach for Implementing Data Mining Algorithms A RESEARCH PROPOSAL SUBMITTED TO THE SHRI RAMDEOBABA COLLEGE OF ENGINEERING AND MANAGEMENT, FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

More information

Stuck in Traffic (SiT) Attacks

Stuck in Traffic (SiT) Attacks Stuck in Traffic (SiT) Attacks Mina Guirguis Texas State University Joint work with George Atia Traffic 2 Intelligent Transportation Systems V2X communication enable drivers to make better decisions: Avoiding

More information

Adaptive Spatiotemporal Node Selection in Dynamic Networks

Adaptive Spatiotemporal Node Selection in Dynamic Networks Adaptive Spatiotemporal Node Selection in Dynamic Networks Pradip Hari, John B. P. McCabe, Jonathan Banafato, Marcus Henry, Ulrich Kremer, Dept. of Computer Science, Rutgers University Kevin Ko, Emmanouil

More information

CSE 634/590 Data mining Extra Credit: Classification by Association rules: Example Problem. Muhammad Asiful Islam, SBID:

CSE 634/590 Data mining Extra Credit: Classification by Association rules: Example Problem. Muhammad Asiful Islam, SBID: CSE 634/590 Data mining Extra Credit: Classification by Association rules: Example Problem Muhammad Asiful Islam, SBID: 106506983 Original Data Outlook Humidity Wind PlayTenis Sunny High Weak No Sunny

More information

PSON: A Parallelized SON Algorithm with MapReduce for Mining Frequent Sets

PSON: A Parallelized SON Algorithm with MapReduce for Mining Frequent Sets 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming PSON: A Parallelized SON Algorithm with MapReduce for Mining Frequent Sets Tao Xiao Chunfeng Yuan Yihua Huang Department

More information

Chapter 4 Data Mining A Short Introduction

Chapter 4 Data Mining A Short Introduction Chapter 4 Data Mining A Short Introduction Data Mining - 1 1 Today's Question 1. Data Mining Overview 2. Association Rule Mining 3. Clustering 4. Classification Data Mining - 2 2 1. Data Mining Overview

More information

Computer Architecture Dr. Charles Kim Howard University

Computer Architecture Dr. Charles Kim Howard University EECE416 Microcomputer Fundamentals & Design Computer Architecture Dr. Charles Kim Howard University 1 Computer Architecture Computer Architecture Art of selecting and interconnecting hardware components

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 17 RESEARCH ARTICLE OPEN ACCESS Classifying Brain Dataset Using Classification Based Association Rules

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

Chapter 28. Outline. Definitions of Data Mining. Data Mining Concepts

Chapter 28. Outline. Definitions of Data Mining. Data Mining Concepts Chapter 28 Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms

More information

Apriori Algorithm. 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke

Apriori Algorithm. 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke Apriori Algorithm For a given set of transactions, the main aim of Association Rule Mining is to find rules that will predict the occurrence of an item based on the occurrences of the other items in the

More information

Samsung Galaxy S8 $ $ 718

Samsung Galaxy S8 $ $ 718 Samsung Galaxy S8 5.8 curved OLED screen 12MP rear-facing camera 8MP Selfie camera Quick Wireless Charging Ask us about Bixby Vision virtual assistant $ 29.92 $ 718 :... BLU D750U Studio X 5 touchscreen

More information

On the importance of deep learning regularization techniques in knowledge discovery

On the importance of deep learning regularization techniques in knowledge discovery On the importance of deep learning regularization techniques in knowledge discovery Ljubinka Sandjakoska Atanas Hristov Ana Madevska Bogdanova Output Introduction Theory - Regularization techniques - Impact

More information

Architectural Musings

Architectural Musings Architectural Musings Rethinking Computer Systems Architecture & Evaluation Christopher Vick cvick@qti.qualcomm.com March 23, 2014 1 Introduction Vision Talk How should we analyze, reason about and evaluate

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu [Kumar et al. 99] 2/13/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu

More information

June 27, Real-Time Analytics through Convergence. of User-Defined Functions. Vinay Deolalikar. HP-Autonomy Research. Sunnyvale, CA.

June 27, Real-Time Analytics through Convergence. of User-Defined Functions. Vinay Deolalikar. HP-Autonomy Research. Sunnyvale, CA. June 27, 2013 Outline 1 2 3 are Measurements 4 Results Example 20 Newsgroups 5 Explosive growth in unstructured data Already comprises about 80% enterprise data Growing faster than structured data Enterprises

More information

The new maximum security smartphone No Camera - No GPS - No Recorder

The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone No Camera - No GPS - No Recorder The new maximum security smartphone DASS H-ONE Smartphone is your smart choice to be protected and connected the whole time. What is

More information

Distributed Pervasive Systems

Distributed Pervasive Systems Distributed Pervasive Systems CS677 Guest Lecture Tian Guo Lecture 26, page 1 Outline Distributed Pervasive Systems Popular Application domains Sensor nodes and networks Energy in Distributed Systems (Green

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

USB Voltage and Current Tester Kit

USB Voltage and Current Tester Kit USB Voltage and Current Tester Kit Product ID: USBAUBSCHM This diagnostic kit gives you everything you need to make sure your USB devices are getting the proper charge. It enables you to: troubleshoot

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

SMART Technologies. Introducing bluetooth low energy and ibeacon

SMART Technologies. Introducing bluetooth low energy and ibeacon SMART Technologies Introducing bluetooth low energy and ibeacon In real life you may call me Frederick Bousson Competence Leader Mobile @ Ordina Smartphone as life s remote control Focus on Software Development

More information

Data Mining Concepts

Data Mining Concepts Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms Sequential

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Classification. Instructor: Wei Ding

Classification. Instructor: Wei Ding Classification Decision Tree Instructor: Wei Ding Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1 Preliminaries Each data record is characterized by a tuple (x, y), where x is the attribute

More information

Lecture notes for April 6, 2005

Lecture notes for April 6, 2005 Lecture notes for April 6, 2005 Mining Association Rules The goal of association rule finding is to extract correlation relationships in the large datasets of items. Many businesses are interested in extracting

More information

Development of a mobile application for manual traffic counts

Development of a mobile application for manual traffic counts Development of a mobile application for manual traffic counts Mohammad Ghanim 1,* and Khalid Khawaja 2 1 Department of Civil and Architectural Engineering, Qatar University, Doha, Qatar 2 Office of Academic

More information

10.1" Quad Core 3G. 1.2 GHz " 1280x800 IPS 3G. Specification: Optional: GPS OTA TABLET L10C1

10.1 Quad Core 3G. 1.2 GHz  1280x800 IPS 3G. Specification: Optional: GPS OTA TABLET L10C1 10.1" Quad Core 3G TABLET L10C1 Specification: CPU: MT8389WK Quad core A7 1.2 GHz LCD Screen: 10.1 IPS 1280 x 800 Memory/Storage: 1GB DDR3/8G EMMC Camera: Dual camera (0.3M+2M) Connectivity: Wi-Fi 802.

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Data Mining by I. H. Witten and E. Frank 7 Engineering the input and output Attribute selection Scheme-independent, scheme-specific Attribute discretization Unsupervised, supervised, error-

More information

Jarek Szlichta

Jarek Szlichta Jarek Szlichta http://data.science.uoit.ca/ Approximate terminology, though there is some overlap: Data(base) operations Executing specific operations or queries over data Data mining Looking for patterns

More information

Exam Advanced Data Mining Date: Time:

Exam Advanced Data Mining Date: Time: Exam Advanced Data Mining Date: 11-11-2010 Time: 13.30-16.30 General Remarks 1. You are allowed to consult 1 A4 sheet with notes written on both sides. 2. Always show how you arrived at the result of your

More information

Autonomous Adaptive Sensing for Energy-Efficient IoT Applications. Frank Alexander Kraemer

Autonomous Adaptive Sensing for Energy-Efficient IoT Applications. Frank Alexander Kraemer Autonomous Adaptive Sensing for Energy-Efficient IoT Applications Frank Alexander Kraemer kraemer@ntnu.no Internet of Things Challenges: The scale in terms of the number of units. The constraints in terms

More information

Car Connectivity Consortium. MirrorLink and the Connected Car

Car Connectivity Consortium. MirrorLink and the Connected Car Car Connectivity Consortium MirrorLink and the Connected Car 1 Agenda Landscape for Smartphone Integration into Cars Car Connectivity Consortium MirrorLink Technology Certification Applications 2 Landscape

More information

Big Data Analytics CSCI 4030

Big Data Analytics CSCI 4030 High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

Data Structures. Notes for Lecture 14 Techniques of Data Mining By Samaher Hussein Ali Association Rules: Basic Concepts and Application

Data Structures. Notes for Lecture 14 Techniques of Data Mining By Samaher Hussein Ali Association Rules: Basic Concepts and Application Data Structures Notes for Lecture 14 Techniques of Data Mining By Samaher Hussein Ali 2009-2010 Association Rules: Basic Concepts and Application 1. Association rules: Given a set of transactions, find

More information

Track Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross

Track Join. Distributed Joins with Minimal Network Traffic. Orestis Polychroniou! Rajkumar Sen! Kenneth A. Ross Track Join Distributed Joins with Minimal Network Traffic Orestis Polychroniou Rajkumar Sen Kenneth A. Ross Local Joins Algorithms Hash Join Sort Merge Join Index Join Nested Loop Join Spilling to disk

More information

Event Coverage in Theme Parks Using Wireless Sensor Networks with Mobile Sinks

Event Coverage in Theme Parks Using Wireless Sensor Networks with Mobile Sinks Event Coverage in Theme Parks Using Wireless Sensor Networks with Mobile Sinks Gürkan Solmaz and Damla Turgut Department of Electrical Engineering and Computer Science University of Central Florida - Orlando,

More information

[Hatwar, 3(3): March, 2014] ISSN: Impact Factor: 1.852

[Hatwar, 3(3): March, 2014] ISSN: Impact Factor: 1.852 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A Review on Wireless Oscilloscope Powered by Android Bhagyashree D.Hatwar *1, Prof.A.C.Wan 2 *1,2 S.S.B.T, Bambhori, Jalgaon,

More information

u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc.

u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections, etc. November 11, 2013 Presented by: Merhawit Habte 1. Introduc,on u Emerging mobile applications that sense context are very important; e.g. for timely news and events, health tracking, social connections,

More information

SoftFlash: Programmable Storage in Future Data Centers Jae Do Researcher, Microsoft Research

SoftFlash: Programmable Storage in Future Data Centers Jae Do Researcher, Microsoft Research SoftFlash: Programmable Storage in Future Data Centers Jae Do Researcher, Microsoft Research 1 The world s most valuable resource Data is everywhere! May. 2017 Values from Data! Need infrastructures for

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/24/2014 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 High dim. data

More information

Clustering and Association using K-Mean over Well-Formed Protected Relational Data

Clustering and Association using K-Mean over Well-Formed Protected Relational Data Clustering and Association using K-Mean over Well-Formed Protected Relational Data Aparna Student M.Tech Computer Science and Engineering Department of Computer Science SRM University, Kattankulathur-603203

More information

Driving the case for 700 MHz. Presentation to the GSMA

Driving the case for 700 MHz. Presentation to the GSMA Driving the case for 700 MHz Presentation to the GSMA Shaun Collins, CEO shaun.collins@ccsinsight.com / +44 7836 699970 @shauncollins Martin Garner, SVP Internet martin.garner@ccsinsight.com / +44 7887

More information

Data warehouse and Data Mining

Data warehouse and Data Mining Data warehouse and Data Mining Lecture No. 14 Data Mining and its techniques Naeem A. Mahoto Email: naeemmahoto@gmail.com Department of Software Engineering Mehran Univeristy of Engineering and Technology

More information

CMPUT 695 Fall 2004 Assignment 2 Xelopes

CMPUT 695 Fall 2004 Assignment 2 Xelopes CMPUT 695 Fall 2004 Assignment 2 Xelopes Paul Nalos, Ben Chu November 5, 2004 1 Introduction We evaluated Xelopes, a data mining library produced by prudsys 1. Xelopes is available for Java, C++, and CORBA

More information

Qualcomm Technologies, Inc.

Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. Qualcomm, Snapdragon, Adreno and Uplinq are trademarks of Qualcomm Incorporated, registered in the United States and in other countries, used with permission. Qualcomm Snapdragon

More information

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique

Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique Research Paper Uncertain Data Classification Using Decision Tree Classification Tool With Probability Density Function Modeling Technique C. Sudarsana Reddy 1 S. Aquter Babu 2 Dr. V. Vasu 3 Department

More information

Panel: Enabling Consumer Visibility into Energy Usage

Panel: Enabling Consumer Visibility into Energy Usage Panel: Enabling Consumer Visibility into Energy Usage Matthew Laherty Cisco Systems Shahram Mehraban Intel Mike Ballard Microchip Moderator Clayton Pillion Microchip Wendy Furchak Verizon Wireless A New

More information

Correlative Analytic Methods in Large Scale Network Infrastructure Hariharan Krishnaswamy Senior Principal Engineer Dell EMC

Correlative Analytic Methods in Large Scale Network Infrastructure Hariharan Krishnaswamy Senior Principal Engineer Dell EMC Correlative Analytic Methods in Large Scale Network Infrastructure Hariharan Krishnaswamy Senior Principal Engineer Dell EMC 2018 Storage Developer Conference. Dell EMC. All Rights Reserved. 1 Data Center

More information

CSE4334/5334 DATA MINING

CSE4334/5334 DATA MINING CSE4334/5334 DATA MINING Lecture 4: Classification (1) CSE4334/5334 Data Mining, Fall 2014 Department of Computer Science and Engineering, University of Texas at Arlington Chengkai Li (Slides courtesy

More information

Chapter 3: Supervised Learning

Chapter 3: Supervised Learning Chapter 3: Supervised Learning Road Map Basic concepts Evaluation of classifiers Classification using association rules Naïve Bayesian classification Naïve Bayes for text classification Summary 2 An example

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

I/O Systems (4): Power Management. CSE 2431: Introduction to Operating Systems

I/O Systems (4): Power Management. CSE 2431: Introduction to Operating Systems I/O Systems (4): Power Management CSE 2431: Introduction to Operating Systems 1 Outline Overview Hardware Issues OS Issues Application Issues 2 Why Power Management? Desktop PCs Battery-powered Computers

More information

Structure of Association Rule Classifiers: a Review

Structure of Association Rule Classifiers: a Review Structure of Association Rule Classifiers: a Review Koen Vanhoof Benoît Depaire Transportation Research Institute (IMOB), University Hasselt 3590 Diepenbeek, Belgium koen.vanhoof@uhasselt.be benoit.depaire@uhasselt.be

More information

Introduction to Parallel Computing

Introduction to Parallel Computing Introduction to Parallel Computing Chieh-Sen (Jason) Huang Department of Applied Mathematics National Sun Yat-sen University Thank Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar for providing

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/25/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 3 In many data mining

More information

Cooperative Wireless Communications. Ashutosh Sabharwal

Cooperative Wireless Communications. Ashutosh Sabharwal Cooperative Wireless Communications Ashutosh Sabharwal Outline Growing presence of wireless Why do we need a new paradigm Cooperative communication basics Future directions In Numbers Global cellular phone

More information

Today. Lecture 17: Reality Mining. Last time

Today. Lecture 17: Reality Mining. Last time Today We will introduce the idea of a relational database, discuss its underlying data model and present a slightly simplified view of how to access its information Lecture 17: As with all new technologies

More information

CHAPTER 5 WEIGHTED SUPPORT ASSOCIATION RULE MINING USING CLOSED ITEMSET LATTICES IN PARALLEL

CHAPTER 5 WEIGHTED SUPPORT ASSOCIATION RULE MINING USING CLOSED ITEMSET LATTICES IN PARALLEL 68 CHAPTER 5 WEIGHTED SUPPORT ASSOCIATION RULE MINING USING CLOSED ITEMSET LATTICES IN PARALLEL 5.1 INTRODUCTION During recent years, one of the vibrant research topics is Association rule discovery. This

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Pharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah

Pharmacy college.. Assist.Prof. Dr. Abdullah A. Abdullah The kinds of memory:- 1. RAM(Random Access Memory):- The main memory in the computer, it s the location where data and programs are stored (temporally). RAM is volatile means that the data is only there

More information

INTRODUCTION TO DATA MINING. Daniel Rodríguez, University of Alcalá

INTRODUCTION TO DATA MINING. Daniel Rodríguez, University of Alcalá INTRODUCTION TO DATA MINING Daniel Rodríguez, University of Alcalá Outline Knowledge Discovery in Datasets Model Representation Types of models Supervised Unsupervised Evaluation (Acknowledgement: Jesús

More information

Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors

Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Advanced Imaging Applications on Smart-phones Convergence of General-purpose computing, Graphics acceleration, and Sensors Sriram Sethuraman Technologist & DMTS, Ittiam 1 Overview Imaging on Smart-phones

More information

Measuring the Capability of Smartphones for Executing Context Algorithms

Measuring the Capability of Smartphones for Executing Context Algorithms Maximilian Eibl, Martin Gaedke. (Hrsg.): INFORMATIK 2017, Lecture Lecture Notes in Notes Informatics in Informatics (LNI), Gesellschaft (LNI), Gesellschaft für Informatik, für Informatik, Bonn 2017 Bonn

More information

A Dell Technical White Paper Dell

A Dell Technical White Paper Dell Which UPS is Right for the Job? A Dell Technical White Paper Dell THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED

More information

Servosila Robotic Heads

Servosila Robotic Heads Servosila Robotic Heads www.servosila.com TABLE OF CONTENTS SERVOSILA ROBOTIC HEADS 2 SOFTWARE-DEFINED FUNCTIONS OF THE ROBOTIC HEADS 2 SPECIFICATIONS: ROBOTIC HEADS 4 DIMENSIONS OF ROBOTIC HEAD 5 DIMENSIONS

More information

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm

Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,

More information

Machine Learning Techniques for Data Mining

Machine Learning Techniques for Data Mining Machine Learning Techniques for Data Mining Eibe Frank University of Waikato New Zealand 10/25/2000 1 PART VII Moving on: Engineering the input and output 10/25/2000 2 Applying a learner is not all Already

More information

Bluetooth: What does it really do and will it be replaced?

Bluetooth: What does it really do and will it be replaced? Bluetooth: What does it really do and will it be replaced? By James Rogerson January 29, 2014Mobile phones A look at the ins and outs of Bluetooth and what its future hold Bluetooth is old and it might

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information