Mathematical Foundation of Association Rules - Mining Associations by Solving Integral Linear Inequalities

Size: px
Start display at page:

Download "Mathematical Foundation of Association Rules - Mining Associations by Solving Integral Linear Inequalities"

Transcription

1 Mathematical Foundation of Association Rules - Mining Associations by Solving Integral Linear Inequalities Tsau Young ( T. Y. ) Lin Department of Computer Science San Jose State University San Jose, CA 95192, USA tylin@cs.sjsu.edu Abstract Association(rules)s (not in rule forms) as patterns in data are critically analyzed. We build the theory based only on what data says, and no on other implicit assumptions. Data mining is regarded as a deductive science. First, we observe that isomorphic relations have isomorphic associations. Somewhat a surprise, such a simple observation turns out to have far reaching consequences. It implies that associations are properties of an isomorphic class, not an individual relation. Similar conclusion can be made for the probability theory based on item counting, hence it cannot characterize the interesting-ness, since the latter one is a property of individual relation. As a byproduct of this analysis, we find that all generalized associations can be found by simply solving a set of integral linear inequalities - this is a very striking result. Finally, we observe that from the structure of relation lattice, we may conclude that random sampling may loose substantial information about patterns. Keywords: attribute, feature, data mining, granular computing 1. Introduction In a superficial view, data mining and knowledge discovery are transformations (extracting or discovering) of data into patterns or knowledge: Schematically 1. DM: Patterns Data, or 2. KD: Knowledge Data In this paper, we will focus on a very narrow, but very popular special topics, namely, the association(rule)s mining (Two standard measures called support and confidence are used for association rules; the one that only concerns with support is called associations). For this problem, the transformation is mathematical deductions. In other words, we treat data as the axiom and associations as interesting theorems to be derived from the data. 2 The Raw Data - Relations in Relational Databases What are the raw data in association rule mining? Obviously, they are the relational tables in relational databases. Unfortunately, such a naive statement often has many unexpected hidden side effects. In traditional database processing, a relational table always lives under a relational schema. A relational schema is a data structure in which each data carries its full semantics perceived by a human mind. For example, the attribute, COLOR, in a relational schema means exactly what human thinks. Therefore its possible values are yellow, blue, and etc. DBMS, then, process these data based on such (human perceived) semantics. To echo such an embedded human view, we will call such a relational table a table-in-mind. This is the traditional database view of a relational table, which is, however, not the correct view for data mining. In data mining the raw data is still the relational table, however, they are treated intrinsically different. In data mining, all algorithms process the relational table without consulting (1) relational schema nor (2) the human view of the data. In data mining, an attribute value is merely a symbol stored in the computer system. Changing the symbols will not affect the outcomes, more precisely, they will produce the same associations, but with different set of symbols. In data mining, a relational table is merely a stored table without any additional semantics. So we shall call it a table-in-system.

2 2.1 Tables-in-Systems We formalize the notion of tables-in-systems, which is a view in relational database, but from data mining prospect. Fact 1 An attribute is merely a name or symbol of a column during the processing of data mining; ; it has no human perceived semantics (during data mining). Fact 2 Fact 1 implies that an attribute values in a table-insystem is a merely a symbol; it has no human perceived semantics (during data mining). Next we will assume there is no redundancy in data, Assumption All attributes of a table-in system are nonisomorphic; To see why such an assumption does not loose the generality, please see [12]. For convenience, we will regard a table-in-system as a knowledge representation of some entities. The set of such entities will be denoted by, and called the universe. Let be a set of attributes, and their (active) attribute domains be, where active is a database term to emphasize the fact that is the set of actual values that have occurred in the representation. Each, often denoted by, is a Cantor set. A table-in-a-system is a map (= a single valued function) One can also regard an attribute as a map. So the relation,, is a join of attributes (single column knowledge representations); see [16, 18]. In traditional database theory, the image of the map, is the relational table (table-in-system). The independent variable plays no explicit role. However, in data mining, it is more convenient to have independent variables in the formulation. So in this paper, we will use the graph, which is called the information table in rough set community. Throughout the whole paper, by abuse of notation, may mean (1) the knowledge representation (2) the information table (3) the classical relation, the image of, which is a set of tuples (actually should be a bag). (4) Since and determines and vice versa, we may use and interchangeably. (5) We will simply refer any of them as the table(-insystem). 2.2 Target - High Frequency Patterns Association rule mining is originated from on the market basket data [1]. However, in many software systems, the data mining tools are added to general DBMS. So we will be interested in data mining on general relations. For definitive, we have the following translations: an item is an attribute value, a -itemset is a subtuple of length, a large -itemset is a high frequency -pattern. In other words, A subtuple of length is a high frequency q-patterns, or simply -pattern, if its occurrences are greater than or equal to a given threshold. Whne q is understood, we will drop the. 3 Interesting-ness of Associations 3.1 Isomorphic Relations and Patterns We take this section from [12] almost verbatim. Attributes and are isomorphic iff there is a one-to-one and onto map, such that. The map is called an isomorphism. Intuitively, two attributes (columns) are isomorphic iff one column turns into another one by properly renaming its attribute values. Let and be two information tables, where and. Then, and are said to be isomorphic if every is isomorphic to some, and vice versa. By our assumption (all attributes are distinct), and have the same degree (number of attributes), that is, ; See more general version in [12]. The following theorem should be obvious. Theorem Isomorphic relations have isomorphic patterns. The impacts of this simple theorem are rather far reaching. It essentially declares that patterns are syntactic in nature. They are patterns of the whole isomorphic class, even though many of isomorphic relations may have very different semantics; see next Section 3.2. Theorem The interesting-ness (of associations) defined by the item counting and its probability theory is a property of isomorphic class. 3.2 Illustration on Interesting-ness The two relations, Table 1, 2, are isomorphic, but their semantics are completely different, one table is about (hardware) parts, the other is about suppliers (sales persons). These two relations have isomorphic associations;

3 K ( Business Birth CITY) Amount (in m.) Day ( TWENTY MAR NY ( TEN MAR SJ ( TEN FEB NY ( TEN FEB LA ( TWENTY MAR SJ ( TWENTY MAR SJ ( TWENTY APR SJ ( THIRTY JAN LA ( THIRTY JAN LA Table 1. A Table K K ( Weight Part Material Name ( 20 SCREW STEEL ( 10 SCREW BRASS ( 10 NAIL STEEL ( 10 NAIL ALLOY ( 20 SCREW BRASS ( 20 SCREW BRASS ( 20 PIN BRASS ( 30 HAMMER ALLOY ( 30 HAMMER ALLOY Table 2. An Table K 1. Length one: TEN, TWENTY, MAR, SJ, LA in Table 1 and 10, 20, SCREW, BRASS, ALLOY in Table 2 2. Length two: (TWENTY, MAR), (MAR, SJ), (TWENTY, SJ) in Table 1, (20, SCREW), (SCREW, BRASS), (20, BRASS), Table 2 However, they have non-isomorphic interesting rules: We have assumed: Support 1 In Table 1, (TWENTY, SJ) is interesting rules; it means the business amount at San Jose is likely 20 millions. 1 However, it is isomorphic to (20, BRASS), which is not interesting at all, because 20 is referred to PIN, not BRASS. 2 In Table 2, (SCREW, BRASS) is interesting; it means the screw is most likely made from BRASS. 2 However, it is isomorphic to (MAR, SJ), which is not interesting, because MAR is referred to a supplier, not to a city. 4. Canonical Models of Isomorphic Classes Again, we take this section almost verbatim from [12]. In this section, we construct the canonical models for each isomorphic class. We have observed that (Section 2) each is a map, which naturally induces an equivalence relation. Two elements are equivalent if they are mapped to the same element. We denote this equivalence relation by. The set, which consists of all elementary granules (equivalence classes), is called the quotient set. The equivalence class of the given attribute(equivalence relation) is called the elementary granules. The intersection of elementary granules is called a granule; it is an equivalence class of the equivalence relation of intersection. The map is called the natural projection, where [v] is the granule containing. It should be clear (a standard mathematical fact) that is mapped on-to-one onto. We call the latter map naming map or interpretation; the element of could be considered as a meaningful name (to human) of the granule; to system it is merely a symbol. 4.1 Canonical Model and Granular Data Model A relation, as a map, can be factored through the natural projection and the naming map. Note is the product of and is often referred to as the interpretation. Table 3 illustrates how is factored. 1. The natural projection can be regarded as a knowledge representation of the universe into quotient sets. It is called the canonical model of. 2. The interpretation induces an isomorphism from to (both are appropriate Cartesian products). The interpretation assigns a tuple of granules to a tuple of elementary concepts (attribute values). Each can be regard as a meaningful name of, and an attribute value is a meaningful name of a granule(equivalence class). 3. is an attribute of, called a canonical attribute (an uninterpreted attribute). is called a canonical domain; a granule is a canonical attribute value [16]. is iso- Theorem Patterns of the canonical model morphic (via interpretation) to the patterns of. This is a corollary of Theorem To find all patterns of, we only need to find the patterns on (and vice versa).

4 Canonical Model Relation ( ) ( ) ( ) ( NY) ( ) ( SJ) ( ) NAME ( SJ) ( ) ( SJ) ( ) ( SJ) ( ) ( SJ) ( ) ( LA) ( ) ( LA) ( ) ( LA) Table 3. The canonical model at left-hand-side is mapped to at right- hand-side The canonical model is uniquely determined by its universe, and the family of equivalence relations. In other words, the pair determines and is determined by. From the prospect of first order logic, is a model of some rather simple kind of first order logic, where the only predicates are equivalence predicates (predicates that satisfy the reflexive, symmetric and transitive properties) [23]. 1. One can regard the canonical model as a table format of. 2. Granules of are called elementary granules. 3. A -tuple of corresponds to an intersection of elementary granules in ; the intersection is called -granule. 4. High frequency patterns of are q-granule whose cardinality is greater than the given threshold. 5. We have assumed all attribute are distinct, to see more general version, we refer to [8]. Definition The pair is called granular data model; it is a special case of granular structure [19]. Corollary The patterns of, and are isomorphic. 5 Universal Model - Capturing all Features 5.1 Derived Attributes (Features) An attribute is also called a feature, especially in AI; they have been used interchangeably. In the table-in-mind, an attribute is a representation of property, characteristic, and etc.; see e.g., [27, 28]. However, in a table-in-system, an attribute is merely a named equivalence relation on the universe. So the study of attributes (features) is reduced to that of equivalence relations. Let be the set of all equivalence relations (partitions) on. Proposition is a derived attribute of, iff is a coarsening of, where and. Proposition There is a map that respects the meet, but not the join, operations. Lee called the image,, the relation lattice and observe that [7] 1. The join in is different from that of. 2. So is a subset, but not a sublattice, of. Such an embedding is an unnatural one, but Lee focused his efforts on it. However, we will, instead, take a natural embedding Definition The smallest lattice generated by, by abuse of language, is called the (Lin s) relation lattice, denoted by L(Q). This definition will not cause confusing, since we will not use Lee s notion at all. The difference between and is that former contains all the join of distinct attributes. The pair relation lattice. is the granular data model of the (Lin s) 5.2 Lattice and Universal Model The smallest lattice, denoted by, that consists of all coarsening of is called the complete relation lattice. Main Theorem is the set of all derived attributes of the canonical model.

5 Definition The pair is the completion of and is called the universal model of. A relation can be uniquely factored into and, so can be regarded as a pair. If in addition there is a given concept hierarchy [4, 22], that is, an extension of the interpretation is defined on a subset of. This additional information is called background knowledge Data mining with this additional background knowledge is called data mining on derived attributes. Basically, it is data mining on an extended table; the extended table has granular data model. If covers the attributes that support the invisible patterns, We can mine the invisible patterns. Since is finite, in theory we can always find it. The bound is Bell number [3] of the cardinal number of the smallest partition in. 6. Associations and Generalized Associations We will illustrate the idea by examples. Two standard measures called support and confidence are used for mining associations. In this paper we will focus on support only, we call the sub-tuples associations, if they meet the support requirement; it is one form of high frequency patterns. The Corollary in Section 5.2 tell us that association can be expressed by granules. We will illustrate the idea using the canonical model in Table 3 (support The association can be expressed as granules: 1. Associations of length one: (a) TEN = (b) SJ = (c) LA = 2. Associations of length two: (a) (TEN, SJ) = TEN SJ= 3. No associations of length. Now let us examine the universal model in Table 4. The column in Table 4 is the smallest element in the complete relation lattice. So every element of is a coarsening of. In other words, every granule in is a union of some granules from the partition (by the expression a granule in we mean a granule belong to one of its partitions. In this example, the granules in are TWENTY NY, TEN SJ, TWENTY LA, THIRTY LA. Let be the cardinality of. The following expression represents the cardinality of granules in, which is a union of some granules from the partition. TWENTY NY + TEN SJ + TWENTY LA + THIRTY LA. By taking the actual value of the cardinalities of the granules, we have, We will express the solutions in vector form,. It is an integral convex set in 4- dimensional space: The boundary solutions are: 1 (0, 1, 0, 0); this solution means s cardinality by itself already meets the threshold ( ). 2 (0, 0, 1, 1); it means we need the union of two granules, TWENTY LA and THIRTY LA, to meet the threshold. In other words, we need a generalized concept that covers both the sub-tuple (TWENTY, LA)= TWENTY LA and (THIRTY, LA)= THIRTY LA. For this particular case, since LA = (TWENTY, LA) (THIRTY, LA), hence LA is the desirable generalized concept. 3 (1, 0, 0, 1); we need the union of two granules, TWENTY NY THIRTY LA, as a single generalized concept. Internal points are 4 (1, 1, 0, 0); we skip the interpretations. 5 (0, 1, 1, 0) 6 (0, 1, 0, 1) 7 (1, 1, 1, 0) 8 (1, 1, 0, 1) 9 (1, 1, 1, 1) 10 (1, 0, 1, 1) By expressing in granular form; Boundary patterns are: 1 TEN SJ = TEN = SJ 2 TWENTY LA THIRTY LA 3 TWENTY NY THIRTY LA Internal Patterns are: 4 TWENTY NY TEN SJ 5 TEN SJ TWENTY LA 6 TEN SJ THIRTY LA 7 TWENTY NY TEN SJ TWENTY LA

6 Universal Model; attribute vales are names of granules =TWENTY =NY = TWENTY NY = TEN = SJ =TEN SJ = TEN = SJ = TEN SJ = TEN =SJ =TEN SJ = TEN =SJ =TEN SJ = TEN =SJ =TEN SJ =TWENTY =LA =TWENTY LA =THIRTY =LA =THIRTY LA =THIRTY =LA = THIRTY LA Table 4. The Universal Model of, partially displayed; it should have 15 (= ) columns 8 TWENTY NY TEN SJ THIRTY LA 9 TWENTY NY TEN SJ TWENTY LA THIRTY LA 10 TWENTY NY TWENTY LA THIRTY LA To identify associations from generalized associations, we rewrite the expression in disjunction normal forms. If the re-written expression is a single clause, it is the (nongeneralized) associations. We have the following associations 1 TEN = SJ = TEN SJ 2 LA (=TWENTY LA THIRTY LA)) The experimental results will be reported soon. 7. Sampling Let be a sample (subset) of. Let be the relation lattice of the partitions on. Each partition on induces a partition on. We will use to denote the derived partitions on. So there is a natural map from to. We say V is admissible sample, if the map from to induces an isomorphism of lattices. For random sampling, the possibility of to satisfy this admissibility is not high. 8 Conclusions Data, patterns and transformations are three key ingredients for data mining. In this paper, we focus on the most simplicity case. Data is a set of bare data; it has absolutely no additional assumptions. Patterns are the most obvious ones; something happened repeatedly. The transformations are the most conservative and reliable one, namely, mathematical deductions. The results of this exploration are surprisingly rich: 1. Associations are the properties of the isomorphic class, in other words, isomorphic relations have isomorphic associations. 2. The probability theory based on item counting is a property of isomorphic class. Hence can not be used to characterize the interesting-ness, since the latter one is properties of individual relation 3. All possible attributes (features) can be enumerated 4. Generalized associations can be found by solving integral linear inequalities 5. A sample of the universe is called (complete) admissible sample if the (complete) relation lattice of is isomorphic to that of. Random sample may not be admissible. Some items in the above seem indicate that relations with some additional semantics need to be explored; some initial results have been reported, more work are needed [24, 16, 18, 21, 22, 11]. References [1] R. Agrawal, T. Imielinski, and A. Swami, Mining Association Rules Between Sets of Items in Large Databases, in Proceeding of ACM-SIGMOD international Conference on Management of Data, pp , Washington, DC, June, 1993 [2] G. Birkhoff and S. MacLane, A Survey of Modern Algebra, Macmillan, 1977 [3] Richard A. Brualdi, Introductory Combinatorics, Prentice Hall, 1992.

7 [4] Y.D. Cai, N. Cercone, and J. Han. Attribute-oriented induction in relational databases. In Knowledge Discovery in Databases, pages AAAI/MIT Press, Cambridge, MA, [5] C. J. Date, C. DATE, An Introduction to Database Systems, 7th ed., Addison- Wesley, [6] A. Barr and E.A. Feigenbaum, The handbook of Artificial Intelligence, William Kaufmann 1981 [7] T. T. Lee, Algebraic Theory of Relational Databases, The Bell System Technical Journal Vol 62, No 10, December, 1983, pp [8] T. Y. Lin, Database Mining on Derived Attributes, to appear in the Spring- Verlag Lecture Notes on AI, [9] T. Y. Lin, Issues in Data Mining, in:the Proceeding of 26th IEEE Internaational Conference on Computer Software and Applications, Oxford, UK, Aug 26-29, [10] T. Y. Lin Feature Completion, Communication of IICM (Institute of Information and Computing Machinery, Taiwan) Vol 5, No. 2, May 2002, pp (the proceeding for the workshop Toward the Foundation on Data Mining in PAKDD2002, May 6, [11] Ng, R., Lakshmanan, L.V.S., Han, J. and Pang, A. Exploratory mining and pruning optimizations of constrained associations rules, Proceedings of 1998 ACM- SIGMOD Conference on Management of Data, 13-24, [12] T. Y. Lin, Attribute (Feature) Completion The Theory of Attributes from Data Mining Prospect, in: Proceeding of IEEE international Conference on Data Mining, Maebashi, Japan, Dec 9-12, 2002 [13] T. Y. Lin The Lattice Structure of Database and Mining Multiple Level Rules. Presented in COMPSAC 2001, Chicago, Oct 8-12, 2001; the exact copy appear Feature Transformations and Structure of Attributes. In: Data Mining and Knowledge Discovery: Theory, Tools, and Technology IV, B. Dasarathy (ed), Proceeding of SPIE Vol 4730, Orlando,Fl, April 1-5, 2002 [14] T. Y. Lin and J. Tremba Attribute Transformations for Data Mining II: Applications to Economic and Stock Market Data, International Journal of Intelligent Systems, to appear [15] T. Y. Lin, Association Rules in Semantically Rich Relations: Granular Computing Approach JSAI International Workshop on Rough Set Theory and Granular Computing May 20-25, The Post Proceeding is in Lecture note in AI 2253, Springer-Verlag, 2001, pp [16] T. Y. Lin, Data Mining and Machine Oriented Modeling: A Granular Computing Approach, Journal of Applied Intelligence, Kluwer, Vol. 13, No 2, September/October,2000, pp [17] T. Y. Lin, Attribute Transformations on Numerical Databases, Lecture Notes in Artificial Intelligence 1805, Terano, Liu, Chen (eds), PAKDD2000, Kyoto, Japan, April 18-20, 2000, [18] T. Y. Lin, Data Mining: Granular Computing Approach. In: Methodologies for Knowledge Discovery and Data Mining, Lecture Notes in Artificial Intelligence 1574, Third Pacific-Asia Conference, Beijing, April 26-28, 1999, [19] T. Y. Lin, Granular Computing on Binary Relations I: Data Mining and Neighborhood Systems. In: Rough Sets In Knowledge Discovery, A. Skoworn and L. Polkowski (eds), Springer-Verlag, 1998, [20] T. Y. Lin Discovering Patterns in Numerical Sequences Using Rough set Theory, In: Proceeding of the Third World Multi-conferences on Systemics, Cybernatics, and Informatics, Vol 5, Computer Science and Engineering, Orlando, Florida, July 31-Aug 4, 1999 [21] T. Y. Lin, N. Zhong, J. Duong, S. Ohsuga, Frameworks for Mining Binary Relations in Data. In: Rough sets and Current Trends in Computing, Lecture Notes on Artificial Intelligence 1424, A. Skoworn and L. Polkowski (eds), Springer-Verlag, 1998, [22], T. Y. Lin and M. Hadjimichael, Non-Classificatory Generalization in Data Mining, in Proceedings of the 4th Workshop on Rough Sets, Fuzzy Sets, and Machine Discovery, November 6-8, Tokyo, Japan, 1996, [23] T.Y. Lin, Eric Louie, Modeling the Real World for Data Mining: Granular Computing Approach Joint 9th IFSA World Congress and 20th NAFIPS Conference, July 25-28, Vancouver, Canada, 2001 [24] E. Louie,T. Y. Lin, Semantics Oriented Association Rules, In: 2002 World Congress of Computational Intelligence, Honolulu, Hawaii, May 12-17, 2002, (paper # 5702) [25] E. Louie and T. Y. Lin, Finding Association Rules using Fast Bit Computation: Machine-Oriented Modeling, in: Foundations of Intelligent Systems, Z. Ras and S. Ohsuga (eds), Lecture Notes in Artificial Intelligence

8 1932, Springer-Verlag, 2000, pp (ISMIS00, Charlotte, NC, Oct 11-14, 2000) [26] Hiroshi Motoda and Huan Liu Feature Selection, Extraction and Construction, Communication of IICM (Institute of Information and Computing Machinery, Taiwan) Vol 5, No. 2, May 2002, pp (proceeding for the workshop Toward the Foundation on Data Mining in PAKDD2002, May 6, [27] H. Liu and H. Motoda, Feature Transformation and Subset Selection, IEEE Intelligent Systems, Vol. 13, No. 2, March/April, pp (1998) [28] H. Liu and H. Motoda (eds), Feature Extraction, Construction and Selection - A Data Mining Perspective, Kluwer Academic Publishers (1998). [29] Z. Pawlak, Rough sets. Theoretical Aspects of Reasoning about Data, Kluwer Academic Publishers, 1991 [30] Z. Pawlak, Rough sets. International Journal of Information and Computer Science 11, 1982, pp [31] R. Ng, L. V. S. Lakshmanan, J. Han and A. Pang, Exploratory Mining and Pruning Optimizations of Constrained Associations Rules, Proc. of 1998 ACM- SIGMOD Conf. on Management of Data, Seattle, Washington, June 1998, pp

Attribute (Feature) Completion The Theory of Attributes from Data Mining Prospect

Attribute (Feature) Completion The Theory of Attributes from Data Mining Prospect Attribute (Feature) Completion The Theory of Attributes from Data Mining Prospect Tsay Young ( T. Y. ) Lin Department of Computer Science San Jose State University San Jose, CA 95192, USA tylin@cs.sjsu.edu

More information

- The Theory of Attributes from Data Mining Prospect

- The Theory of Attributes from Data Mining Prospect Attribute (Feature) Completion - The Theory of Attributes from Data Mining Prospect Tsay Young ( T. Y. ) Lin Department of Computer Science San Jose State University San Jose, CA 95192, USA tylin@cs.sjsu.edu

More information

Modeling the Real World for Data Mining: Granular Computing Approach

Modeling the Real World for Data Mining: Granular Computing Approach Modeling the Real World for Data Mining: Granular Computing Approach T. Y. Lin Department of Mathematics and Computer Science San Jose State University San Jose California 95192-0103 and Berkeley Initiative

More information

Interpreting Association Rules in Granular Data Model via Decision Logic

Interpreting Association Rules in Granular Data Model via Decision Logic Interpreting Association Rules in Granular Data Model via Decision Logic Tsau. Young.("T. Y.") Lin Department of Computer Science San Jose State University San Jose, CA 95192-0462 tylin@cs.sjsu.edu Abstruct

More information

Association Rules with Additional Semantics Modeled by Binary Relations

Association Rules with Additional Semantics Modeled by Binary Relations Association Rules with Additional Semantics Modeled by Binary Relations T. Y. Lin 1 and Eric Louie 2 1 Department of Mathematics and Computer Science San Jose State University, San Jose, California 95192-0103

More information

Mining High Order Decision Rules

Mining High Order Decision Rules Mining High Order Decision Rules Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 e-mail: yyao@cs.uregina.ca Abstract. We introduce the notion of high

More information

Value Added Association Rules

Value Added Association Rules Value Added Association Rules T.Y. Lin San Jose State University drlin@sjsu.edu Glossary Association Rule Mining A Association Rule Mining is an exploratory learning task to discover some hidden, dependency

More information

On Generalizing Rough Set Theory

On Generalizing Rough Set Theory On Generalizing Rough Set Theory Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca Abstract. This paper summarizes various formulations

More information

A Generalized Decision Logic Language for Granular Computing

A Generalized Decision Logic Language for Granular Computing A Generalized Decision Logic Language for Granular Computing Y.Y. Yao Department of Computer Science, University of Regina, Regina Saskatchewan, Canada S4S 0A2, E-mail: yyao@cs.uregina.ca Churn-Jung Liau

More information

A Logic Language of Granular Computing

A Logic Language of Granular Computing A Logic Language of Granular Computing Yiyu Yao and Bing Zhou Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yyao, zhou200b}@cs.uregina.ca Abstract Granular

More information

Semantics Oriented Association Rules

Semantics Oriented Association Rules Semantics Oriented Association Rules Eric Louie BM Almaden Research Center 650 Harry Road, San Jose, CA 95 120 ewlouie@almaden.ibm.com Abstract - t is well known that relational theory carries very little

More information

Rough Sets, Neighborhood Systems, and Granular Computing

Rough Sets, Neighborhood Systems, and Granular Computing Rough Sets, Neighborhood Systems, and Granular Computing Y.Y. Yao Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca Abstract Granulation

More information

Efficient SQL-Querying Method for Data Mining in Large Data Bases

Efficient SQL-Querying Method for Data Mining in Large Data Bases Efficient SQL-Querying Method for Data Mining in Large Data Bases Nguyen Hung Son Institute of Mathematics Warsaw University Banacha 2, 02095, Warsaw, Poland Abstract Data mining can be understood as a

More information

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM EFFICIENT ATTRIBUTE REDUCTION ALGORITHM Zhongzhi Shi, Shaohui Liu, Zheng Zheng Institute Of Computing Technology,Chinese Academy of Sciences, Beijing, China Abstract: Key words: Efficiency of algorithms

More information

Formal Concept Analysis and Hierarchical Classes Analysis

Formal Concept Analysis and Hierarchical Classes Analysis Formal Concept Analysis and Hierarchical Classes Analysis Yaohua Chen, Yiyu Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: {chen115y, yyao}@cs.uregina.ca

More information

Qualitative Fuzzy Sets and Granularity

Qualitative Fuzzy Sets and Granularity Qualitative Fuzzy Sets and Granularity T. Y. Lin Department of Mathematics and Computer Science San Jose State University, San Jose, California 95192-0103 E-mail: tylin@cs.sjsu.edu and Shusaku Tsumoto

More information

Granular Computing based on Rough Sets, Quotient Space Theory, and Belief Functions

Granular Computing based on Rough Sets, Quotient Space Theory, and Belief Functions Granular Computing based on Rough Sets, Quotient Space Theory, and Belief Functions Yiyu (Y.Y.) Yao 1, Churn-Jung Liau 2, Ning Zhong 3 1 Department of Computer Science, University of Regina Regina, Saskatchewan,

More information

Rough Set Approaches to Rule Induction from Incomplete Data

Rough Set Approaches to Rule Induction from Incomplete Data Proceedings of the IPMU'2004, the 10th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy, July 4 9, 2004, vol. 2, 923 930 Rough

More information

Generalized Infinitive Rough Sets Based on Reflexive Relations

Generalized Infinitive Rough Sets Based on Reflexive Relations 2012 IEEE International Conference on Granular Computing Generalized Infinitive Rough Sets Based on Reflexive Relations Yu-Ru Syau Department of Information Management National Formosa University Huwei

More information

Information Granulation and Approximation in a Decision-theoretic Model of Rough Sets

Information Granulation and Approximation in a Decision-theoretic Model of Rough Sets Information Granulation and Approximation in a Decision-theoretic Model of Rough Sets Y.Y. Yao Department of Computer Science University of Regina Regina, Saskatchewan Canada S4S 0A2 E-mail: yyao@cs.uregina.ca

More information

On Reduct Construction Algorithms

On Reduct Construction Algorithms 1 On Reduct Construction Algorithms Yiyu Yao 1, Yan Zhao 1 and Jue Wang 2 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 {yyao, yanzhao}@cs.uregina.ca 2 Laboratory

More information

Available online at ScienceDirect. Procedia Computer Science 96 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 96 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 96 (2016 ) 179 186 20th International Conference on Knowledge Based and Intelligent Information and Engineering Systems,

More information

Data Analysis and Mining in Ordered Information Tables

Data Analysis and Mining in Ordered Information Tables Data Analysis and Mining in Ordered Information Tables Ying Sai, Y.Y. Yao Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca Ning Zhong

More information

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets

XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets XI International PhD Workshop OWD 2009, 17 20 October 2009 Fuzzy Sets as Metasets Bartłomiej Starosta, Polsko-Japońska WyŜsza Szkoła Technik Komputerowych (24.01.2008, prof. Witold Kosiński, Polsko-Japońska

More information

Granular Computing. Y. Y. Yao

Granular Computing. Y. Y. Yao Granular Computing Y. Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca, http://www.cs.uregina.ca/~yyao Abstract The basic ideas

More information

Novel Materialized View Selection in a Multidimensional Database

Novel Materialized View Selection in a Multidimensional Database Graphic Era University From the SelectedWorks of vijay singh Winter February 10, 2009 Novel Materialized View Selection in a Multidimensional Database vijay singh Available at: https://works.bepress.com/vijaysingh/5/

More information

REDUNDANCY OF MULTISET TOPOLOGICAL SPACES

REDUNDANCY OF MULTISET TOPOLOGICAL SPACES Iranian Journal of Fuzzy Systems Vol. 14, No. 4, (2017) pp. 163-168 163 REDUNDANCY OF MULTISET TOPOLOGICAL SPACES A. GHAREEB Abstract. In this paper, we show the redundancies of multiset topological spaces.

More information

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,

More information

Data with Missing Attribute Values: Generalization of Indiscernibility Relation and Rule Induction

Data with Missing Attribute Values: Generalization of Indiscernibility Relation and Rule Induction Data with Missing Attribute Values: Generalization of Indiscernibility Relation and Rule Induction Jerzy W. Grzymala-Busse 1,2 1 Department of Electrical Engineering and Computer Science, University of

More information

FUZZY SPECIFICATION IN SOFTWARE ENGINEERING

FUZZY SPECIFICATION IN SOFTWARE ENGINEERING 1 FUZZY SPECIFICATION IN SOFTWARE ENGINEERING V. LOPEZ Faculty of Informatics, Complutense University Madrid, Spain E-mail: ab vlopez@fdi.ucm.es www.fdi.ucm.es J. MONTERO Faculty of Mathematics, Complutense

More information

Hierarchical Online Mining for Associative Rules

Hierarchical Online Mining for Associative Rules Hierarchical Online Mining for Associative Rules Naresh Jotwani Dhirubhai Ambani Institute of Information & Communication Technology Gandhinagar 382009 INDIA naresh_jotwani@da-iict.org Abstract Mining

More information

A Model of Machine Learning Based on User Preference of Attributes

A Model of Machine Learning Based on User Preference of Attributes 1 A Model of Machine Learning Based on User Preference of Attributes Yiyu Yao 1, Yan Zhao 1, Jue Wang 2 and Suqing Han 2 1 Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada

More information

Characterization of Boolean Topological Logics

Characterization of Boolean Topological Logics Characterization of Boolean Topological Logics Short Form: Boolean Topological Logics Anthony R. Fressola Denison University Granville, OH 43023 University of Illinois Urbana-Champaign, IL USA 61801-61802

More information

FUDMA Journal of Sciences (FJS) Maiden Edition Vol. 1 No. 1, November, 2017, pp ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES

FUDMA Journal of Sciences (FJS) Maiden Edition Vol. 1 No. 1, November, 2017, pp ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES FUDMA Journal of Sciences (FJS) Maiden Edition Vol 1 No 1 November 2017 pp 28-34 ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES * A O Yusuf 1 A M Ibrahim 2 1 Department of Mathematical Sciences Information

More information

Knowledge Engineering in Search Engines

Knowledge Engineering in Search Engines San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2012 Knowledge Engineering in Search Engines Yun-Chieh Lin Follow this and additional works at:

More information

Vague Congruence Relation Induced by VLI Ideals of Lattice Implication Algebras

Vague Congruence Relation Induced by VLI Ideals of Lattice Implication Algebras American Journal of Mathematics and Statistics 2016, 6(3): 89-93 DOI: 10.5923/j.ajms.20160603.01 Vague Congruence Relation Induced by VLI Ideals of Lattice Implication Algebras T. Anitha 1,*, V. Amarendra

More information

The Fibonacci hypercube

The Fibonacci hypercube AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

More information

Mining High Average-Utility Itemsets

Mining High Average-Utility Itemsets Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Mining High Itemsets Tzung-Pei Hong Dept of Computer Science and Information Engineering

More information

Granular Computing: A Paradigm in Information Processing Saroj K. Meher Center for Soft Computing Research Indian Statistical Institute, Kolkata

Granular Computing: A Paradigm in Information Processing Saroj K. Meher Center for Soft Computing Research Indian Statistical Institute, Kolkata Granular Computing: A Paradigm in Information Processing Saroj K. Meher Center for Soft Computing Research Indian Statistical Institute, Kolkata Granular computing (GrC): Outline Introduction Definitions

More information

Rough Approximations under Level Fuzzy Sets

Rough Approximations under Level Fuzzy Sets Rough Approximations under Level Fuzzy Sets W.-N. Liu J.T. Yao Y.Y.Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [liuwe200, jtyao, yyao]@cs.uregina.ca

More information

A Granular Computing Approach. T.Y. Lin 1;2. Abstract. From the processing point of view, data mining is machine

A Granular Computing Approach. T.Y. Lin 1;2. Abstract. From the processing point of view, data mining is machine Data Mining and Machine Oriented Modeling: A Granular Computing Approach T.Y. Lin 1;2 1 Department of Mathematics and Computer Science San Jose State University, San Jose, California 95192 tylin@cs.sjsu.edu

More information

A Rough Set Approach to Data with Missing Attribute Values

A Rough Set Approach to Data with Missing Attribute Values A Rough Set Approach to Data with Missing Attribute Values Jerzy W. Grzymala-Busse Department of Electrical Engineering and Computer Science, University of Kansas, Lawrence, KS 66045, USA and Institute

More information

Semantics via Syntax. f (4) = if define f (x) =2 x + 55.

Semantics via Syntax. f (4) = if define f (x) =2 x + 55. 1 Semantics via Syntax The specification of a programming language starts with its syntax. As every programmer knows, the syntax of a language comes in the shape of a variant of a BNF (Backus-Naur Form)

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

Temporal Weighted Association Rule Mining for Classification

Temporal Weighted Association Rule Mining for Classification Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider

More information

An Improved Apriori Algorithm for Association Rules

An Improved Apriori Algorithm for Association Rules Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan

More information

An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches

An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches An Approach to Intensional Query Answering at Multiple Abstraction Levels Using Data Mining Approaches Suk-Chung Yoon E. K. Park Dept. of Computer Science Dept. of Software Architecture Widener University

More information

FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC. Angel Garrido

FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC. Angel Garrido Acta Universitatis Apulensis ISSN: 1582-5329 No. 22/2010 pp. 101-111 FUZZY BOOLEAN ALGEBRAS AND LUKASIEWICZ LOGIC Angel Garrido Abstract. In this paper, we analyze the more adequate tools to solve many

More information

On the Finiteness of the Recursive Chromatic Number

On the Finiteness of the Recursive Chromatic Number On the Finiteness of the Recursive Chromatic Number William I Gasarch Andrew C.Y. Lee Abstract A recursive graph is a graph whose vertex and edges sets are recursive. A highly recursive graph is a recursive

More information

CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer Science (Arkoudas and Musser) Sections p.

CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer Science (Arkoudas and Musser) Sections p. CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer Science (Arkoudas and Musser) Sections 10.1-10.3 p. 1/106 CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer

More information

Consistency and Set Intersection

Consistency and Set Intersection Consistency and Set Intersection Yuanlin Zhang and Roland H.C. Yap National University of Singapore 3 Science Drive 2, Singapore {zhangyl,ryap}@comp.nus.edu.sg Abstract We propose a new framework to study

More information

A Decision-Theoretic Rough Set Model

A Decision-Theoretic Rough Set Model A Decision-Theoretic Rough Set Model Yiyu Yao and Jingtao Yao Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2 {yyao,jtyao}@cs.uregina.ca Special Thanks to Professor

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

Closed Non-Derivable Itemsets

Closed Non-Derivable Itemsets Closed Non-Derivable Itemsets Juho Muhonen and Hannu Toivonen Helsinki Institute for Information Technology Basic Research Unit Department of Computer Science University of Helsinki Finland Abstract. Itemset

More information

KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW. Ana Azevedo and M.F. Santos

KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW. Ana Azevedo and M.F. Santos KDD, SEMMA AND CRISP-DM: A PARALLEL OVERVIEW Ana Azevedo and M.F. Santos ABSTRACT In the last years there has been a huge growth and consolidation of the Data Mining field. Some efforts are being done

More information

Applying Objective Interestingness Measures. in Data Mining Systems. Robert J. Hilderman and Howard J. Hamilton. Department of Computer Science

Applying Objective Interestingness Measures. in Data Mining Systems. Robert J. Hilderman and Howard J. Hamilton. Department of Computer Science Applying Objective Interestingness Measures in Data Mining Systems Robert J. Hilderman and Howard J. Hamilton Department of Computer Science University of Regina Regina, Saskatchewan, Canada SS 0A fhilder,hamiltong@cs.uregina.ca

More information

Relational Database: The Relational Data Model; Operations on Database Relations

Relational Database: The Relational Data Model; Operations on Database Relations Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview

More information

A Comparison of Global and Local Probabilistic Approximations in Mining Data with Many Missing Attribute Values

A Comparison of Global and Local Probabilistic Approximations in Mining Data with Many Missing Attribute Values A Comparison of Global and Local Probabilistic Approximations in Mining Data with Many Missing Attribute Values Patrick G. Clark Department of Electrical Eng. and Computer Sci. University of Kansas Lawrence,

More information

Discovering interesting rules from financial data

Discovering interesting rules from financial data Discovering interesting rules from financial data Przemysław Sołdacki Institute of Computer Science Warsaw University of Technology Ul. Andersa 13, 00-159 Warszawa Tel: +48 609129896 email: psoldack@ii.pw.edu.pl

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2002 Vol. 1, No. 2, July-August 2002 The Theory of Classification Part 2: The Scratch-Built

More information

Inference in Hierarchical Multidimensional Space

Inference in Hierarchical Multidimensional Space Proc. International Conference on Data Technologies and Applications (DATA 2012), Rome, Italy, 25-27 July 2012, 70-76 Related papers: http://conceptoriented.org/ Inference in Hierarchical Multidimensional

More information

CSC 501 Semantics of Programming Languages

CSC 501 Semantics of Programming Languages CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this

More information

An Apriori-like algorithm for Extracting Fuzzy Association Rules between Keyphrases in Text Documents

An Apriori-like algorithm for Extracting Fuzzy Association Rules between Keyphrases in Text Documents An Apriori-lie algorithm for Extracting Fuzzy Association Rules between Keyphrases in Text Documents Guy Danon Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva

More information

Granular Computing: Models and Applications

Granular Computing: Models and Applications Granular Computing: Models and Applications Jianchao Han, 1, Tsau Young Lin 2, 1 Department of Computer Science, California State University, Dominguez Hills, Carson, CA 90747 2 Department of Computer

More information

Sets with Partial Memberships A Rough Set View of Fuzzy Sets

Sets with Partial Memberships A Rough Set View of Fuzzy Sets Sets with Partial Memberships A Rough Set View of Fuzzy Sets T. Y. Lin Department of Mathematics and Computer Science San Jose State University, San Jose, California 9592-3 E-mail: tylin @ cs.sj st.l.edu

More information

6. Relational Algebra (Part II)

6. Relational Algebra (Part II) 6. Relational Algebra (Part II) 6.1. Introduction In the previous chapter, we introduced relational algebra as a fundamental model of relational database manipulation. In particular, we defined and discussed

More information

Mining Local Association Rules from Temporal Data Set

Mining Local Association Rules from Temporal Data Set Mining Local Association Rules from Temporal Data Set Fokrul Alom Mazarbhuiya 1, Muhammad Abulaish 2,, Anjana Kakoti Mahanta 3, and Tanvir Ahmad 4 1 College of Computer Science, King Khalid University,

More information

Enhancing Datalog with Epistemic Operators to Reason About Systems Knowledge in

Enhancing Datalog with Epistemic Operators to Reason About Systems Knowledge in Enhancing Datalog with Epistemic Operators to Enhancing ReasonDatalog About Knowledge with Epistemic in Distributed Operators to Reason About Systems Knowledge in Distributed (Extended abstract) Systems

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science ul. Piotrowo

More information

Approximation Theories: Granular Computing vs Rough Sets

Approximation Theories: Granular Computing vs Rough Sets Approximation Theories: Granular Computing vs Rough Sets Tsau Young ( T. Y. ) Lin Department of Computer Science, San Jose State University San Jose, CA 95192-0249 tylin@cs.sjsu.edu Abstract. The goal

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

UML-Based Conceptual Modeling of Pattern-Bases

UML-Based Conceptual Modeling of Pattern-Bases UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an

More information

OnDatabaseRelationshipsVersusMathematicalRelations

OnDatabaseRelationshipsVersusMathematicalRelations Global Journal of Computer Science and Technology: C Software & Data Engineering Volume 16 Issue 1 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

On The Theoretical Foundation for Data Flow Analysis in Workflow Management

On The Theoretical Foundation for Data Flow Analysis in Workflow Management Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 On The Theoretical Foundation for Data Flow Analysis in

More information

Yiyu Yao University of Regina, Regina, Saskatchewan, Canada

Yiyu Yao University of Regina, Regina, Saskatchewan, Canada ROUGH SET APPROXIMATIONS: A CONCEPT ANALYSIS POINT OF VIEW Yiyu Yao University of Regina, Regina, Saskatchewan, Canada Keywords: Concept analysis, data processing and analysis, description language, form

More information

Rough Connected Topologized. Approximation Spaces

Rough Connected Topologized. Approximation Spaces International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department

More information

A mining method for tracking changes in temporal association rules from an encoded database

A mining method for tracking changes in temporal association rules from an encoded database A mining method for tracking changes in temporal association rules from an encoded database Chelliah Balasubramanian *, Karuppaswamy Duraiswamy ** K.S.Rangasamy College of Technology, Tiruchengode, Tamil

More information

The Fuzzy Search for Association Rules with Interestingness Measure

The Fuzzy Search for Association Rules with Interestingness Measure The Fuzzy Search for Association Rules with Interestingness Measure Phaichayon Kongchai, Nittaya Kerdprasop, and Kittisak Kerdprasop Abstract Association rule are important to retailers as a source of

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Forced orientation of graphs

Forced orientation of graphs Forced orientation of graphs Babak Farzad Mohammad Mahdian Ebad S. Mahmoodian Amin Saberi Bardia Sadri Abstract The concept of forced orientation of graphs was introduced by G. Chartrand et al. in 1994.

More information

A Closest Fit Approach to Missing Attribute Values in Preterm Birth Data

A Closest Fit Approach to Missing Attribute Values in Preterm Birth Data A Closest Fit Approach to Missing Attribute Values in Preterm Birth Data Jerzy W. Grzymala-Busse 1, Witold J. Grzymala-Busse 2, and Linda K. Goodwin 3 1 Department of Electrical Engineering and Computer

More information

ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM

ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM ROUGH SETS THEORY AND UNCERTAINTY INTO INFORMATION SYSTEM Pavel Jirava Institute of System Engineering and Informatics Faculty of Economics and Administration, University of Pardubice Abstract: This article

More information

Using Association Rules for Better Treatment of Missing Values

Using Association Rules for Better Treatment of Missing Values Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University

More information

COMBINATION OF ROUGH AND FUZZY SETS

COMBINATION OF ROUGH AND FUZZY SETS 1 COMBINATION OF ROUGH AND FUZZY SETS BASED ON α-level SETS Y.Y. Yao Department of Computer Science, Lakehead University Thunder Bay, Ontario, Canada P7B 5E1 E-mail: yyao@flash.lakeheadu.ca 1 ABSTRACT

More information

Triangle Graphs and Simple Trapezoid Graphs

Triangle Graphs and Simple Trapezoid Graphs JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 467-473 (2002) Short Paper Triangle Graphs and Simple Trapezoid Graphs Department of Computer Science and Information Management Providence University

More information

LOGIC AND DISCRETE MATHEMATICS

LOGIC AND DISCRETE MATHEMATICS LOGIC AND DISCRETE MATHEMATICS A Computer Science Perspective WINFRIED KARL GRASSMANN Department of Computer Science University of Saskatchewan JEAN-PAUL TREMBLAY Department of Computer Science University

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Mining Quantitative Association Rules on Overlapped Intervals

Mining Quantitative Association Rules on Overlapped Intervals Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,

More information

Efficient homomorphism-free enumeration of conjunctive queries

Efficient homomorphism-free enumeration of conjunctive queries Efficient homomorphism-free enumeration of conjunctive queries Jan Ramon 1, Samrat Roy 1, and Jonny Daenen 2 1 K.U.Leuven, Belgium, Jan.Ramon@cs.kuleuven.be, Samrat.Roy@cs.kuleuven.be 2 University of Hasselt,

More information

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T. Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement

More information

Universal Cycles for Permutations

Universal Cycles for Permutations arxiv:0710.5611v1 [math.co] 30 Oct 2007 Universal Cycles for Permutations J Robert Johnson School of Mathematical Sciences Queen Mary, University of London Mile End Road, London E1 4NS, UK Email: r.johnson@qmul.ac.uk

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong.

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong. Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR, China fyclaw,jleeg@cse.cuhk.edu.hk

More information

Lecture 6: Faces, Facets

Lecture 6: Faces, Facets IE 511: Integer Programming, Spring 2019 31 Jan, 2019 Lecturer: Karthik Chandrasekaran Lecture 6: Faces, Facets Scribe: Setareh Taki Disclaimer: These notes have not been subjected to the usual scrutiny

More information

EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES

EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES D.Kerana Hanirex Research Scholar Bharath University Dr.M.A.Dorai Rangaswamy Professor,Dept of IT, Easwari Engg.College Abstract

More information

Extending partial projective planes

Extending partial projective planes Extending partial projective planes J. B. Nation In honor of my colleagues, Ralph Freese and Bill Lampe Abstract. This note discusses a computational method for constructing finite projective planes. Mathematics

More information

MA651 Topology. Lecture 4. Topological spaces 2

MA651 Topology. Lecture 4. Topological spaces 2 MA651 Topology. Lecture 4. Topological spaces 2 This text is based on the following books: Linear Algebra and Analysis by Marc Zamansky Topology by James Dugundgji Fundamental concepts of topology by Peter

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information