Outline. Data Integration. Entity Matching/Identification. Duplicate Detection. More Resources. Duplicates Detection in Database Integration
|
|
- Juliana Booker
- 5 years ago
- Views:
Transcription
1 Outline Duplicates Detection in Database Integration Background HumMer Automatic Data Fusion System Duplicate Detection methods An efficient method using priority queue Approach based on Extended key Approach based on Classification methods More Resources Data Integration What is Data Integration? Background It is the problem of taking multiple independently developed databases and resolving the difference between them, to make them appear as one. Entity Matching/Identification What is Entity Matching/Identification? Given a pair of records drawn from semantically corresponding tables in multiple heterogeneous databases, the objective is to determine whether the records represent the same real-world entity. Duplicate Detection Schema level Identify the duplicate attributes Instance level Identify the duplicate records It is closed related to Duplicate Detection. 1
2 Introduction HumMer Automatic Data Fusion System It is a system trying to fuse heterogeneous, duplicate, and conflicting data. [1] It incorporates Schema Matching Duplicate (Records) Detection Conflict Resolution System Diagram Query Language Based on SQL For Example Conflict Resolution SQL function (min, max, sum, ) Others Schematic Heterogeneity Resolving Schema Matching Detect a few duplicates in two unaligned databases Convert tuples to strings Do string matching to find duplicates Derive attribute correspondences based on similar attribute values of duplicates Two duplicates are compared field-wise, resulting in a matrix containing similarity scores for each attribute combination Using threshold to get the final attribute correspondences 2
3 Schematic Heterogeneity Resolving Data Transformation For the two relations to be fused One schema is chosen to determine the name of attribute correspondences in fused table All tables receive an additional sourceid The full outer union of all tables is computed. Duplicate Records Detection Specify the relevant attributes Compare tuples pairwisely using a similarity measure Objects with similarity above a given threshold are considered as duplicates The closures of duplicates is computed, in which each is assigned one <sourceid> Duplicates Detection Methods Duplicate Detection Methods An efficient entity identification method using priority queue [2] Approach based on Extended key [3] Approach based on Classification methods [4] Introduction An Efficient Entity Identification Method Using Priority Queue Addressed Issue: Entity Identification with improved efficiency. Standard method Sort the table based on an application-specific key Comparing nearby records by a sliding window Cost expensive pairwise record comparison 3
4 Main Component How to improve efficiency? Each record is only compared with clusters of duplicates in Priority Queue. Priority Queue It contains clusters of duplicates. Each cluster contains some records as representatives. Every cluster has a priority. The newly updated cluster has the highest priority The queue has a fixed size The cluster with least priority will be replaced by the newly-added cluster. Main Component Strategy of Priority Queue When there is a new record, its membership with clusters in the queue is checked. The record only need to be compared with representatives of cluster If it belongs to none, create a new cluster for it, and put it in the queue. If the queue is full, the cluster with least priority will be moved out. If it belongs to one cluster, the cluster will be given highest priority. If the matching score of the record is below a certain threshold, set it as one representative. Other Component How to compare records? Convert record to a long string Use Edit Distance algorithm Example: edit(error,eror) = 1, edit(great,grate) = 2 How to store and query the duplicate clusters? Union-Find data structure Union: Combine or merge two sets into a single set. Find: Determine which set a particular element is in. Also useful for determining if two elements are in the same set. Workflow 1. Sort the records according to the given attributes 2. Scan through the database sequentially Check each record Compare it with the representatives of each cluster in priority queue. Update the priority queue 3. Scan through the database again Check each record (same as before) 4. End Introduction Approach based on Extended key Addressed Issue: How to determine the correspondence between records from multiple databases with different schemas? 4
5 Main Idea An Example What is Extended Key? A minimal set of attributes able to uniquely identify an instance New way to resolve the heterogeneity Use Extended Key Equivalence It is defined by ILFD (Instance level functional dependencies) tables Main Idea How to get ILFD tables? Such semantic information can be supplied By database administrators during Schema Integration Through some knowledge acquisition tools Approach based on Classification methods Introduction Addressed Issue: Entity Matching using machine learning method. Strategy How to use one pair of records as input of classifier? Convert it to a vector. Here is an example: Main Idea: Model the problem as a binary (match or non-match) classification problem. For each pair of records, the trained classifier will tell whether they are duplicates or not. A vector with length of 16 5
6 Strategy How to get training example? One way is to get suggestions from domain expert. Another way is to use partial common key, if available. More Resources Reading Resources Schema Matching Rahm, Erhard and Bernstein, Philip A. (2001) A survey of approaches to automatic schema matching. VLDB Journal Duplicate Record Detection A. K. Elmagarmid, P. G. Ipeirotis and V. S. Verykios. Duplicate record detection: A survey. TKDE 19(1): 1--16, 1007 Paper Lists [1] A. Bilke, J. Bleiholder, C. Bohm, K. Draba, F. Naumann, and M. Weis. Automatic data fusion with hummer. In Proc. of VLDB, Trondheim, Norway, 2005 [2] A.E. Monge and C.P. Elkan, An Efficient Domain-Independent Algorithm for Detecting Approximately Duplicate Database Records, Proc. ACM-SIGMOD Workshop Research Issues on Knowledge Discovery and Data Mining, 1997 [3] Ee-Peng Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson, Entity Identification in Database Integration, Proceedings of the Ninth International Conference on Data Engineering, p , April 19-23, 1993 [4] Huimin Zhao, Sudha Ram, Entity matching across heterogeneous data sources: An approach based on constrained cascade generalization. Data & Knowledge Engineering, Volume 66, 2008, Question & Answer Tack! 6
7 Table R and S as shown below: Table R Exercise 1. Use Extended Key to do Entity Identification[1] Name City ZIP PersonNr Eva Aadde INGARÖ Eva Aalto Norsborg Eva Abrahamsson INGARÖ Table S Name HomeAddress Telephone Eva Aadde Myskviksvägen Eva Abrahamsson Myrvägen Eva Abrahamsson Pilgatan Eva Abrahamsson Nyängsvägen 39A Suppose the extended key is {name, city, homeaddress} and the following ILFDs: (E. HomeAddress= Myskviksvägen 8 ) ->(E.City= INGARÖ ) (E. HomeAddress= Myrvägen 2 ) ->(E.City= INGARÖ ) (E. HomeAddress= Pilgatan 9 ) ->(E.City= STOCKHOLM ) (E. HomeAddress= Nyängsvägen 39A ) ->(E.City= TULLINGE ) Please construct the integrated table. Exercise 2. Use Priority Queue to do Duplicate Detection[2] [1] Lim, Jaideep Srivastava, Satya Prabhakar, James Richardson, Entity Identification in Database Integration, Proceedings of the Ninth International Conference on Data Engineering, p , April 19-23, 1993 Given conditions below, please use Priority Queue algorithm to find the Duplicate Clusters within. 1. Table R, which is already sorted according to application-specific key : Tuple T1 T2 T3 T4 T5 T6 T7 2. Similarities between tuples T1 T2 T3 T4 T5 T6 T7 T T T T T T T Method to count Matching Sorce: Given one cluster, the Matching Sorce of one tuple is : The average of the tuple s similarity with the cluster s all representitives. 4. The condition to declare a new cluster : matching score > The condition to declare a representitive: 0.5 < matching score < The size of Priority Queue: [2] A.E. Monge and C.P. Elkan, An Efficient Domain-Independent Algorithm for Detecting Approximately Duplicate Database Records, Proc. ACM-SIGMOD Workshop Research Issues on Knowledge Discovery and Data Mining,
Rule-Based Method for Entity Resolution Using Optimized Root Discovery (ORD)
American-Eurasian Journal of Scientific Research 12 (5): 255-259, 2017 ISSN 1818-6785 IDOSI Publications, 2017 DOI: 10.5829/idosi.aejsr.2017.255.259 Rule-Based Method for Entity Resolution Using Optimized
More information(Big Data Integration) : :
(Big Data Integration) : : 3 # $%&'! ()* +$,- 2/30 ()* + # $%&' = 3 : $ 2 : 17 ;' $ # < 2 6 ' $%&',# +'= > 0 - '? @0 A 1 3/30 3?. - B 6 @* @(C : E6 - > ()* (C :(C E6 1' +'= - ''3-6 F :* 2G '> H-! +'-?
More informationAn Ameliorated Methodology to Eliminate Redundancy in Databases Using SQL
An Ameliorated Methodology to Eliminate Redundancy in Databases Using SQL Praveena M V 1, Dr. Ajeet A. Chikkamannur 2 1 Department of CSE, Dr Ambedkar Institute of Technology, VTU, Karnataka, India 2 Department
More informationDIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY
DIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY Reham I. Abdel Monem 1, Ali H. El-Bastawissy 2 and Mohamed M. Elwakil 3 1 Information Systems Department, Faculty of computers and information,
More informationA Relational Operator Approach to Data Fusion
A Relational Operator Approach to Data Fusion Jens Bleiholder Humboldt-Universität zu Berlin Unter den Linden 6, 10099 Berlin, Germany bleiho@informatik.hu-berlin.de Abstract Integrated information systems
More informationDeep Web Content Mining
Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased
More informationData Cleansing. LIU Jingyuan, Vislab WANG Yilei, Theoretical group
Data Cleansing LIU Jingyuan, Vislab WANG Yilei, Theoretical group What is Data Cleansing Data cleansing (data cleaning) is the process of detecting and correcting (or removing) errors or inconsistencies
More informationMatching Algorithms within a Duplicate Detection System
Matching Algorithms within a Duplicate Detection System Alvaro E. Monge California State University Long Beach Computer Engineering and Computer Science Department, Long Beach, CA, 90840-8302 Abstract
More informationComparison of Online Record Linkage Techniques
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 Dec-2015 p-issn: 2395-0072 www.irjet.net Comparison of Online Record Linkage Techniques Ms. SRUTHI.
More informationCreating a Mediated Schema Based on Initial Correspondences
Creating a Mediated Schema Based on Initial Correspondences Rachel A. Pottinger University of Washington Seattle, WA, 98195 rap@cs.washington.edu Philip A. Bernstein Microsoft Research Redmond, WA 98052-6399
More informationTuple Merging in Probabilistic Databases
Tuple Merging in Probabilistic Databases Fabian Panse and Norbert Ritter Universität Hamburg, Vogt-Kölln Straße 33, 22527 Hamburg, Germany {panse,ritter}@informatik.uni-hamburg.de http://vsis-www.informatik.uni-hamburg.de/
More informationSimilarity Joins of Text with Incomplete Information Formats
Similarity Joins of Text with Incomplete Information Formats Shaoxu Song and Lei Chen Department of Computer Science Hong Kong University of Science and Technology {sshaoxu,leichen}@cs.ust.hk Abstract.
More informationAn Overview of various methodologies used in Data set Preparation for Data mining Analysis
An Overview of various methodologies used in Data set Preparation for Data mining Analysis Arun P Kuttappan 1, P Saranya 2 1 M. E Student, Dept. of Computer Science and Engineering, Gnanamani College of
More information[Gidhane* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AN EFFICIENT APPROACH FOR TEXT MINING USING SIDE INFORMATION Kiran V. Gaidhane*, Prof. L. H. Patil, Prof. C. U. Chouhan DOI: 10.5281/zenodo.58632
More informationSorted Neighborhood Methods Felix Naumann
Sorted Neighborhood Methods 2.7.2013 Felix Naumann Duplicate Detection 2 Number of comparisons: All pairs 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 1 2 3 4 5 6 7 8 9 10 11 400 comparisons 12
More informationAppropriate Item Partition for Improving the Mining Performance
Appropriate Item Partition for Improving the Mining Performance Tzung-Pei Hong 1,2, Jheng-Nan Huang 1, Kawuu W. Lin 3 and Wen-Yang Lin 1 1 Department of Computer Science and Information Engineering National
More informationEffective Keyword Search over (Semi)-Structured Big Data Mehdi Kargar
Effective Keyword Search over (Semi)-Structured Big Data Mehdi Kargar School of Computer Science Faculty of Science University of Windsor How Big is this Big Data? 40 Billion Instagram Photos 300 Hours
More informationGeneric Model Management
Generic Model Management A Database Infrastructure for Schema Manipulation Philip A. Bernstein Microsoft Corporation April 29, 2002 2002 Microsoft Corp. 1 The Problem ithere is 30 years of DB Research
More informationA Mapping Approach for Fully Virtual Data Integration System Processes
A Mapping Approach for Fully Virtual Data Integration System Processes Ali Z. El Qutaany 1 PhD Student, Faculty of Computers and Information, Cairo University Cairo, Egypt Osman M. Hegazi 2 Professor,
More informationRelational model continued. Understanding how to use the relational model. Summary of board example: with Copies as weak entity
COS 597A: Principles of Database and Information Systems Relational model continued Understanding how to use the relational model 1 with as weak entity folded into folded into branches: (br_, librarian,
More informationCluster-based Instance Consolidation For Subsequent Matching
Jennifer Sleeman and Tim Finin, Cluster-based Instance Consolidation For Subsequent Matching, First International Workshop on Knowledge Extraction and Consolidation from Social Media, November 2012, Boston.
More informationOperations on Heap Tree The major operations required to be performed on a heap tree are Insertion, Deletion, and Merging.
Priority Queue, Heap and Heap Sort In this time, we will study Priority queue, heap and heap sort. Heap is a data structure, which permits one to insert elements into a set and also to find the largest
More informationCluster quality 15. Running time 0.7. Distance between estimated and true means Running time [s]
Fast, single-pass K-means algorithms Fredrik Farnstrom Computer Science and Engineering Lund Institute of Technology, Sweden arnstrom@ucsd.edu James Lewis Computer Science and Engineering University of
More informationCMSC 461 Final Exam Study Guide
CMSC 461 Final Exam Study Guide Study Guide Key Symbol Significance * High likelihood it will be on the final + Expected to have deep knowledge of can convey knowledge by working through an example problem
More informationA Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning
A Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning Faculty of Computer Engineering and Information Technology Amirkabir University of Technology (Tehran Polytechnic), Tehran,
More informationLink Mining & Entity Resolution. Lise Getoor University of Maryland, College Park
Link Mining & Entity Resolution Lise Getoor University of Maryland, College Park Learning in Structured Domains Traditional machine learning and data mining approaches assume: A random sample of homogeneous
More informationData Mining. Data preprocessing. Hamid Beigy. Sharif University of Technology. Fall 1395
Data Mining Data preprocessing Hamid Beigy Sharif University of Technology Fall 1395 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1395 1 / 15 Table of contents 1 Introduction 2 Data preprocessing
More informationRelational Model, Relational Algebra, and SQL
Relational Model, Relational Algebra, and SQL August 29, 2007 1 Relational Model Data model. constraints. Set of conceptual tools for describing of data, data semantics, data relationships, and data integrity
More informationSummary of Last Chapter. Course Content. Chapter 3 Objectives. Chapter 3: Data Preprocessing. Dr. Osmar R. Zaïane. University of Alberta 4
Principles of Knowledge Discovery in Data Fall 2004 Chapter 3: Data Preprocessing Dr. Osmar R. Zaïane University of Alberta Summary of Last Chapter What is a data warehouse and what is it for? What is
More informationVisualization and text mining of patent and non-patent data
of patent and non-patent data Anton Heijs Information Solutions Delft, The Netherlands http://www.treparel.com/ ICIC conference, Nice, France, 2008 Outline Introduction Applications on patent and non-patent
More informationHorizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator
Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator R.Saravanan 1, J.Sivapriya 2, M.Shahidha 3 1 Assisstant Professor, Department of IT,SMVEC, Puducherry, India 2,3 UG student, Department
More informationA Learning Method for Entity Matching
A Learning Method for Entity Matching Jie Chen Cheqing Jin Rong Zhang Aoying Zhou Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, China 5500002@ecnu.cn,
More informationA Survey on Data Extraction and Data Duplication Detection
A Survey on Data Extraction and Data Duplication Detection Yashika A. Shah e-mail: yashah0694@gmail.com Snehal S. Zade e-mail: snehalzade12@gmail.com Smita M. Raut e-mail: swatiraut93@gmail.com Shraddha
More informationPart I: Data Mining Foundations
Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?
More informationOutline. Database Management and Tuning. Outline. Join Strategies Running Example. Index Tuning. Johann Gamper. Unit 6 April 12, 2012
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 6 April 12, 2012 1 Acknowledgements: The slides are provided by Nikolaus Augsten
More informationPreprocessing Short Lecture Notes cse352. Professor Anita Wasilewska
Preprocessing Short Lecture Notes cse352 Professor Anita Wasilewska Data Preprocessing Why preprocess the data? Data cleaning Data integration and transformation Data reduction Discretization and concept
More informationData Preprocessing. Slides by: Shree Jaswal
Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data
More informationWhat happens. 376a. Database Design. Execution strategy. Query conversion. Next. Two types of techniques
376a. Database Design Dept. of Computer Science Vassar College http://www.cs.vassar.edu/~cs376 Class 16 Query optimization What happens Database is given a query Query is scanned - scanner creates a list
More informationChapter 1, Introduction
CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from
More informationStream Processing Platforms Storm, Spark,.. Batch Processing Platforms MapReduce, SparkSQL, BigQuery, Hive, Cypher,...
Data Ingestion ETL, Distcp, Kafka, OpenRefine, Query & Exploration SQL, Search, Cypher, Stream Processing Platforms Storm, Spark,.. Batch Processing Platforms MapReduce, SparkSQL, BigQuery, Hive, Cypher,...
More informationIntroduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p.
Introduction p. 1 What is the World Wide Web? p. 1 A Brief History of the Web and the Internet p. 2 Web Data Mining p. 4 What is Data Mining? p. 6 What is Web Mining? p. 6 Summary of Chapters p. 8 How
More informationDatabases Lectures 1 and 2
Databases Lectures 1 and 2 Timothy G. Griffin Computer Laboratory University of Cambridge, UK Databases, Lent 2009 T. Griffin (cl.cam.ac.uk) Databases Lectures 1 and 2 DB 2009 1 / 36 Re-ordered Syllabus
More informationDatabase Management Systems Paper Solution
Database Management Systems Paper Solution Following questions have been asked in GATE CS exam. 1. Given the relations employee (name, salary, deptno) and department (deptno, deptname, address) Which of
More informationEnhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines
38 Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph and Vetriselvi Ramaraj Department of Information Technology,
More informationWeb Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India
Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the
More informationIntroduction to Query Processing and Query Optimization Techniques. Copyright 2011 Ramez Elmasri and Shamkant Navathe
Introduction to Query Processing and Query Optimization Techniques Outline Translating SQL Queries into Relational Algebra Algorithms for External Sorting Algorithms for SELECT and JOIN Operations Algorithms
More informationAn Efficient Approach for Color Pattern Matching Using Image Mining
An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,
More informationHorizontal Aggregation in SQL to Prepare Dataset for Generation of Decision Tree using C4.5 Algorithm in WEKA
Horizontal Aggregation in SQL to Prepare Dataset for Generation of Decision Tree using C4.5 Algorithm in WEKA Mayur N. Agrawal 1, Ankush M. Mahajan 2, C.D. Badgujar 3, Hemant P. Mande 4, Gireesh Dixit
More informationLearning mappings and queries
Learning mappings and queries Marie Jacob University Of Pennsylvania DEIS 2010 1 Schema mappings Denote relationships between schemas Relates source schema S and target schema T Defined in a query language
More informationIntelligent Methods in Virtual Databases
Intelligent Methods in Virtual Databases Amihai Motro, Philipp Anokhin and Jacob Berlin Department of Information and Software Engineering George Mason University, Fairfax, VA 22030, USA Abstract Considerable
More informationDatabase Heterogeneity
Database Heterogeneity Lecture 13 1 Outline Database Integration Wrappers Mediators Integration Conflicts 2 1 1. Database Integration Goal: providing a uniform access to multiple heterogeneous information
More informationRelational Query Languages. Preliminaries. Formal Relational Query Languages. Example Schema, with table contents. Relational Algebra
Note: Slides are posted on the class website, protected by a password written on the board Reading: see class home page www.cs.umb.edu/cs630. Relational Algebra CS430/630 Lecture 2 Relational Query Languages
More informationAdministriva. CS 133: Databases. General Themes. Goals for Today. Fall 2018 Lec 11 10/11 Query Evaluation Prof. Beth Trushkowsky
Administriva Lab 2 Final version due next Wednesday CS 133: Databases Fall 2018 Lec 11 10/11 Query Evaluation Prof. Beth Trushkowsky Problem sets PSet 5 due today No PSet out this week optional practice
More informationData preprocessing Functional Programming and Intelligent Algorithms
Data preprocessing Functional Programming and Intelligent Algorithms Que Tran Høgskolen i Ålesund 20th March 2017 1 Why data preprocessing? Real-world data tend to be dirty incomplete: lacking attribute
More informationData Mining. Data preprocessing. Hamid Beigy. Sharif University of Technology. Fall 1394
Data Mining Data preprocessing Hamid Beigy Sharif University of Technology Fall 1394 Hamid Beigy (Sharif University of Technology) Data Mining Fall 1394 1 / 15 Table of contents 1 Introduction 2 Data preprocessing
More informationA Review on Unsupervised Record Deduplication in Data Warehouse Environment
A Review on Unsupervised Record Deduplication in Data Warehouse Environment Keshav Unde, Dhiraj Wadhawa, Bhushan Badave, Aditya Shete, Vaishali Wangikar School of Computer Engineering, MIT Academy of Engineering,
More informationData Storage In Wireless Sensor Databases
http://www2.cs.ucy.ac.cy/~dzeina/ Data Storage In Wireless Sensor Databases Demetris Zeinalipour Department of Computer Science University of Cyprus* enext WG1 Workshop on Sensor and Ad-hoc Networks University
More informationComprehensive and Progressive Duplicate Entities Detection
Comprehensive and Progressive Duplicate Entities Detection Veerisetty Ravi Kumar Dept of CSE, Benaiah Institute of Technology and Science. Nagaraju Medida Assistant Professor, Benaiah Institute of Technology
More informationDatabase Applications (15-415)
Database Applications (15-415) DBMS Internals- Part VI Lecture 14, March 12, 2014 Mohammad Hammoud Today Last Session: DBMS Internals- Part V Hash-based indexes (Cont d) and External Sorting Today s Session:
More informationA CRITICAL EVALUATION OF SCHEMA INTEGRATION METHODOLOGIES AND TRENDS
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2002 Proceedings Americas Conference on Information Systems (AMCIS) December 2002 A CRITICAL EVALUATION OF SCHEMA INTEGRATION METHODOLOGIES
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationA GML SCHEMA MAPPING APPROACH TO OVERCOME SEMANTIC HETEROGENEITY IN GIS
A GML SCHEMA MAPPING APPROACH TO OVERCOME SEMANTIC HETEROGENEITY IN GIS Manoj Paul, S. K. Ghosh School of Information Technology, Indian Institute of Technology, Kharagpur 721302, India - (mpaul, skg)@sit.iitkgp.ernet.in
More informationEntity Resolution with Heavy Indexing
Entity Resolution with Heavy Indexing Csaba István Sidló Data Mining and Web Search Group, Informatics Laboratory Institute for Computer Science and Control, Hungarian Academy of Sciences sidlo@ilab.sztaki.hu
More informationData Mining. Part 2. Data Understanding and Preparation. 2.4 Data Transformation. Spring Instructor: Dr. Masoud Yaghini. Data Transformation
Data Mining Part 2. Data Understanding and Preparation 2.4 Spring 2010 Instructor: Dr. Masoud Yaghini Outline Introduction Normalization Attribute Construction Aggregation Attribute Subset Selection Discretization
More informationPatMan: A Visual Database System to Manipulate Path Patterns and Data in Hierarchical Catalogs
PatMan: A Visual Database System to Manipulate Path Patterns and Data in Hierarchical Catalogs Aggeliki Koukoutsaki, Theodore Dalamagas, Timos Sellis, Panagiotis Bouros Knowledge and Database Systems Lab
More informationLinkedMDB. The first linked data source dedicated to movies
Oktie Hassanzadeh Mariano Consens University of Toronto April 20th, 2009 Madrid, Spain Presentation at the Linked Data On the Web (LDOW) 2009 Workshop LinkedMDB 2 The first linked data source dedicated
More informationRelational Algebra. Note: Slides are posted on the class website, protected by a password written on the board
Note: Slides are posted on the class website, protected by a password written on the board Reading: see class home page www.cs.umb.edu/cs630. Relational Algebra CS430/630 Lecture 2 Slides based on Database
More informationInstance-based one-to-some Assignment of Similarity Measures to Attributes
Instance-based one-to-some Assignment of Similarity Measures to Attributes Tobias Vogel and Felix Naumann Hasso Plattner Institute, University of Potsdam, Germany {firstname.lastname}@hpi.uni-potsdam.de
More informationDATA POSITION AND PROFILING IN DOMAIN-INDEPENDENT WAREHOUSE CLEANING
DATA POSITION AND PROFILING IN DOMAIN-INDEPENDENT WAREHOUSE CLEANING C.I. Ezeife School of Computer Science, University of Windsor Windsor, Ontario, Canada N9B 3P4 cezeife@uwindsor.ca A. O. Udechukwu,
More informationAn Algorithm for Frequent Pattern Mining Based On Apriori
An Algorithm for Frequent Pattern Mining Based On Goswami D.N.*, Chaturvedi Anshu. ** Raghuvanshi C.S.*** *SOS In Computer Science Jiwaji University Gwalior ** Computer Application Department MITS Gwalior
More informationEnd-User Development of Mobile Mashups Maristella Matera, Matteo Picozzi, Cinzia Cappiello
End-User Development of Mobile Mashups Maristella Matera, Matteo Picozzi, Cinzia Cappiello Introduction and motivations spread of mobile devices huge number of services Mobile improved HW and SW technologies
More informationCSE 373 Autumn 2012: Midterm #2 (closed book, closed notes, NO calculators allowed)
Name: Sample Solution Email address: CSE 373 Autumn 0: Midterm # (closed book, closed notes, NO calculators allowed) Instructions: Read the directions for each question carefully before answering. We may
More information10. Record-Oriented DB Interface
10 Record-Oriented DB Interface Theo Härder wwwhaerderde Goals - Design principles for record-oriented and navigation on logical access paths - Development of a scan technique and a Main reference: Theo
More informationDATA MINING - 1DL105, 1DL111
1 DATA MINING - 1DL105, 1DL111 Fall 2007 An introductory class in data mining http://user.it.uu.se/~udbl/dut-ht2007/ alt. http://www.it.uu.se/edu/course/homepage/infoutv/ht07 Kjell Orsborn Uppsala Database
More informationData Access Paths for Frequent Itemsets Discovery
Data Access Paths for Frequent Itemsets Discovery Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science {marekw, mzakrz}@cs.put.poznan.pl Abstract. A number
More informationWeb Database Integration
In Proceedings of the Ph.D Workshop in conjunction with VLDB 06 (VLDB-PhD2006), Seoul, Korea, September 11, 2006 Web Database Integration Wei Liu School of Information Renmin University of China Beijing,
More information38050 Povo Trento (Italy), Via Sommarive 14 Fausto Giunchiglia, Pavel Shvaiko and Mikalai Yatskevich
UNIVERSITY OF TRENTO DEPARTMENT OF INFORMATION AND COMMUNICATION TECHNOLOGY 38050 Povo Trento (Italy), Via Sommarive 14 http://www.dit.unitn.it SEMANTIC MATCHING Fausto Giunchiglia, Pavel Shvaiko and Mikalai
More informationMedical Data Mining Based on Association Rules
Medical Data Mining Based on Association Rules Ruijuan Hu Dep of Foundation, PLA University of Foreign Languages, Luoyang 471003, China E-mail: huruijuan01@126.com Abstract Detailed elaborations are presented
More informationDatabase Applications (15-415)
Database Applications (15-415) DBMS Internals- Part VI Lecture 17, March 24, 2015 Mohammad Hammoud Today Last Two Sessions: DBMS Internals- Part V External Sorting How to Start a Company in Five (maybe
More informationComputational Cost of Querying for Related Entities in Different Ontologies
Computational Cost of Querying for Related Entities in Different Ontologies Chung Ming Cheung Yinuo Zhang Anand Panangadan Viktor K. Prasanna University of Southern California Los Angeles, CA 90089, USA
More informationCombining Fuzzy Information - Top-k Query Algorithms. Sanjay Kulhari
Combining Fuzzy Information - Top-k Query Algorithms Sanjay Kulhari Outline Definitions Objects, Attributes and Scores Querying Fuzzy Data Top-k query algorithms Naïve Algorithm Fagin s Algorithm (FA)
More informationIntegrated Usage of Heterogeneous Databases for Novice Users
International Journal of Networked and Distributed Computing, Vol. 3, No. 2 (April 2015), 109-118 Integrated Usage of Heterogeneous Databases for Novice Users Ayano Terakawa Dept. of Information Science,
More informationCSE 530A. B+ Trees. Washington University Fall 2013
CSE 530A B+ Trees Washington University Fall 2013 B Trees A B tree is an ordered (non-binary) tree where the internal nodes can have a varying number of child nodes (within some range) B Trees When a key
More informationBing Liu. Web Data Mining. Exploring Hyperlinks, Contents, and Usage Data. With 177 Figures. Springer
Bing Liu Web Data Mining Exploring Hyperlinks, Contents, and Usage Data With 177 Figures Springer Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web
More informationAdaptive Windows for Duplicate Detection
Adaptive Windows for Duplicate Detection Uwe Draisbach #1, Felix Naumann #2, Sascha Szott 3, Oliver Wonneberg +4 # Hasso-Plattner-Institute, Potsdam, Germany 1 uwe.draisbach@hpi.uni-potsdam.de 2 felix.naumann@hpi.uni-potsdam.de
More informationAlgorithms for Query Processing and Optimization. 0. Introduction to Query Processing (1)
Chapter 19 Algorithms for Query Processing and Optimization 0. Introduction to Query Processing (1) Query optimization: The process of choosing a suitable execution strategy for processing a query. Two
More informationClustering & Classification (chapter 15)
Clustering & Classification (chapter 5) Kai Goebel Bill Cheetham RPI/GE Global Research goebel@cs.rpi.edu cheetham@cs.rpi.edu Outline k-means Fuzzy c-means Mountain Clustering knn Fuzzy knn Hierarchical
More informationSemi-automatic Generation of Active Ontologies from Web Forms
Semi-automatic Generation of Active Ontologies from Web Forms Martin Blersch, Mathias Landhäußer, and Thomas Mayer (IPD) 1 KIT The Research University in the Helmholtz Association www.kit.edu "Create an
More informationBig Data Analytics CSCI 4030
High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams
More informationFunctional Dependencies and Single Valued Normalization (Up to BCNF)
Functional Dependencies and Single Valued Normalization (Up to BCNF) Harsh Srivastava 1, Jyotiraditya Tripathi 2, Dr. Preeti Tripathi 3 1 & 2 M.Tech. Student, Centre for Computer Sci. & Tech. Central University
More informationCSC 261/461 Database Systems Lecture 19
CSC 261/461 Database Systems Lecture 19 Fall 2017 Announcements CIRC: CIRC is down!!! MongoDB and Spark (mini) projects are at stake. L Project 1 Milestone 4 is out Due date: Last date of class We will
More informationUniversity of Massachusetts Amherst Department of Computer Science Prof. Yanlei Diao
University of Massachusetts Amherst Department of Computer Science Prof. Yanlei Diao CMPSCI 445 Midterm Practice Questions NAME: LOGIN: Write all of your answers directly on this paper. Be sure to clearly
More informationData Warehousing & Mining. Data integration. OLTP versus OLAP. CPS 116 Introduction to Database Systems
Data Warehousing & Mining CPS 116 Introduction to Database Systems Data integration 2 Data resides in many distributed, heterogeneous OLTP (On-Line Transaction Processing) sources Sales, inventory, customer,
More informationIMPROVING DATABASE QUALITY THROUGH ELIMINATING DUPLICATE RECORDS
Data Science Journal, Volume 5, 19 October 2006 127 IMPROVING DATABASE QUALITY THROUGH ELIMINATING DUPLICATE RECORDS Mingzhen Wei 1*, Andrew H. Sung 2, Martha E. Cather 3 1* University of Missouri-Rolla,
More informationDatabase System Concepts
Chapter 13: Query Processing s Departamento de Engenharia Informática Instituto Superior Técnico 1 st Semester 2008/2009 Slides (fortemente) baseados nos slides oficiais do livro c Silberschatz, Korth
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SURVEY ON BIG DATA USING DATA MINING AYUSHI V. RATHOD, PROF. S. S. ASOLE BNCOE,
More informationWeka ( )
Weka ( http://www.cs.waikato.ac.nz/ml/weka/ ) The phases in which classifier s design can be divided are reflected in WEKA s Explorer structure: Data pre-processing (filtering) and representation Supervised
More informationTERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES
TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES Mu. Annalakshmi Research Scholar, Department of Computer Science, Alagappa University, Karaikudi. annalakshmi_mu@yahoo.co.in Dr. A.
More informationDatabases 2 Lecture IV. Alessandro Artale
Free University of Bolzano Database 2. Lecture IV, 2003/2004 A.Artale (1) Databases 2 Lecture IV Alessandro Artale Faculty of Computer Science Free University of Bolzano Room: 221 artale@inf.unibz.it http://www.inf.unibz.it/
More information