Applying Data Mining to Wireless Networks
|
|
- Brian Gilbert
- 5 years ago
- Views:
Transcription
1 Applying Data Mining to Wireless Networks CHENG-MING HUANG 1, TZUNG-PEI HONG 2 and SHI-JINN HORNG 3,4 1 Department of Electrical Engineering National Taiwan University of Science and Technology, Taipei, 106, TAIWAN 2 Department of Computer Science and Information Engineering National University of Kaohsiung, Kaohsiung, 811, TAIWAN 3 Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taipei, 106, TAIWAN 4 Department of Electronic Engineering National United University, Miao-li, 360, TAIWAN Abstract: - Wireless networks and mobile applications have grown very rapidly and have made a significant impact on computer systems. Especially, the usage of mobile phones and PDA is increased very rapidly. Added functions and values with these devices are thus greatly developed. If some regularity can be known from the user mobility behavior, then these functions and values can be further expanded and used intelligently. This paper thus attempts to mine appropriate mobility patterns for being used by mobile-system managers in future strategy planning. The location areas in which mobile users visit can be found from the log data stored in the home-location-register module. The preprocessing task for preparing appropriate data from HLR is then done. The mobility sequences from mobile users are formed. The algorithm then calculates the count of each term in all mobility sequences. The mining process based on counts is then performed to find mobility patterns. Key-Words: - data mining, mobility pattern, location area, home location register. 1 Introduction Wireless networks and mobile applications have recently become very popular and have made a significant impact on our daily life [3]. Especially, the usage of mobile phones and PDA is increased very rapidly. Added functions and values with these devices are thus greatly developed. In a wireless system of mobile phones, a module called home location register (HLR) keeps related user mobility data. When a mobile user moves from a location area to its next one, his/her corresponding data in HLR are updated. HLR can thus help the system successfully and efficiently find users current locations and distribute desired messages to them. The log data stored in HLR can also be used for analyzing users mobility behavior. The regular patterns found from the mobility data may provide some appropriate suggestions to mobile-system managers. The added functions and values with the system may also be further expanded. Data-mining has become a process of considerable interest in recent years as the amounts of data in many databases have grown tremendously large. It has been developed to turn data into useful task-oriented knowledge. It is used to identify effective, coherent, potentially useful, and previously unknown patterns in large databases [4]. Some data-mining approaches for mobile systems were proposed in the past [9, 10]. In this paper, we emphasize on the automatic discovery of user mobility patterns in wireless networks. The preprocessing task for preparing appropriate data from HLR is first done. The preprocessing task for preparing appropriate data from HLR is then done. The mobility sequences from mobile users are formed. The algorithm then calculates the count of each term in all mobility sequences. The mining process based on counts is then performed to find mobility patterns. The concept of the algorithm is similar to that in the AprioriAll algorithm [1] for finding sequential patterns, but much simpler since a user can visit only one location each time. The remaining parts of this paper are organized as follows. The architecture of wireless networks for mobile users is reviewed in Section 2. Some related mining approaches are introduced in Section 3. An algorithm for mining mobility patterns from log data in HLR of a wireless network is proposed in Section 4. An example to illustrate the proposed algorithm is given in Section 5. Experimental results are described in Section 6. Conclusions and future work are stated in Section 7.
2 2 Review of wireless networks for mobile users The architecture of a typical wireless communication system for mobile users is shown in Figure 1 [2, 11]. Location Area VLR BSC MSC BSC MSC HLR VLR Figure 1: A typical wireless communication system All the communication space of a wireless system is divided into many units called cells. Each cell has a base station, in charge of broadcasting the contents to mobile users located within the cell. Several neighboring cells are grouped into a location area, which are managed by a base-station controller (BSC) and a mobile switch service center (MSC). BSC is used to control all the base stations in a location area for performing their jobs; MSC maintains a visitor location register (VLR) which stores the location area identifier and some related information to the current visitors in the location area. All the visitors with their relevant VLR data are sent to the home location register (HLR). When calls come, HLR determines users current location areas according to the identification number of mobile users called, and invokes corresponding BSCs to broadcast messages from base stations to them. The action is called paging. Besides, when mobile users move from a location area to another one, they must register and update both the VLR data in MSC and the HLR data. This action is called location update. Many researches were thus proposed in the past for making a good trade-off between the costs of these two actions [5, 6, 7, 8, 11]. The location areas in which mobile users visit can be easily found from the mobility data stored in VLR and HLR. This paper thus attempts to mine appropriate mobility patterns from these data for being used by mobile-system managers in future strategy planning. 3 Review of Related Mining Approaches Agrawal and Srikant proposed a mining algorithm to discover sequential patterns from a set of transactions [1]. Five phases are included in their approach. In the first phase, the transactions are sorted first by customer ID as the major key and then by transaction time as the minor key. This phase thus converts the original transactions into customer sequences. In the second phase, the set of all large itemsets are found from the customer sequences by comparing their counts with a predefined support parameter. This phase is similar to the process of mining association rules. Note that when an itemset occurs more than one time in a customer sequence, it is counted once for this customer sequence. In the third phase, each large itemset is mapped to a contiguous integer and the original customer sequences are transformed into the mapped integer sequences. In the fourth phase, the set of transformed integer sequences are used to find large sequences among them. In the fifth phase, the maximally large sequences are then derived and output to users. 4 Mining Mobility Patterns In this paper, the log data stored in HLR in a wireless network are used to analyze the mobility patterns on that system. The four attributes mobile-id, date, time, and location-area are used in the mining process. The log data to be analyzed are sorted first in the order of mobile-id and then in the order of date and time. The mobility sequences from mobile users are then formed. The algorithm then calculates the count of each term on all mobility sequences. The mining process based on counts is then performed to find mobility patterns. The details of the proposed mobility-pattern mining algorithm are described as follows. The mobility-pattern mining algorithm: INPUT: A set of log data in HLR, a predefined minimum support value α. OUTPUT: A set of mobility patterns. STEP 1: Extract the log data with only the four attributes mobile-id, date, time, and location-area; denote the resulting log data as D. STEP 2: Transform the mobile-ids into contiguous integers (called encoded mobile ID) for convenience, according to their first turn-on time. Note that the same mobile-id with
3 two turn-off connections is given two integers. STEP 3: Sort the resulting log data first by encoded mobile ID and then by date and time. STEP 4: Form a mobility sequence D j for each mobile user c j by sequentially listing his/her n j location areas visited, where n j is the number of location areas visited by c j. STEP 5: Calculate the number (count j ) of each location area I j appearing in the mobility sequences for 1 j n; if there are more than one appearance of I j in a mobility sequence, count it only once. STEP 6: Set the support (support j ) of each I j as count j / n, where n is the number of mobility sequences. STEP 7: Check whether the support of each location area I j is larger than or equal to the predefined minimum support valueα. If I j satisfies the condition, put it in the set of large 1-itemsets (L 1 ). That is, L 1 = {I j support j α, 1 j n }. STEP 8: If L 1 is null, then exit the algorithm; otherwise, do the next step. STEP 9: Set r = 1, where r is used to represent the length of mobility patterns currently being processed. STEP 10: Generate the candidate set C r+1 from L r in a way similar to that in the aprioriall algorithm [1]. Restated, the algorithm first joins L r and L r, under the condition that r-1 items in the two itemsets are the same and with the same orders. Different permutations represent different candidates. The algorithm then keeps in C r+1 the sequences which have all their sub-sequences of length r existing in L r. STEP 11: Calculate the number (count s ) of each candidate (r+1)-sequence s in C r+1 appearing in the mobility sequences; if there are more than one appearance of s in a mobility sequence, count it only once. STEP 12: Set the support (support s ) of each s as count s / n. STEP 13: Check whether the support of candidate (r+1)-sequences s in C r+1 is larger than or equal to the predefined minimum support valueα. If s satisfies the condition, put it in the set of large (r+1)-sequences s in L r+1. That is, L r+1 = {s support s α, s C r+1 }. STEP 14: IF L r+1 is null, then do the next step; otherwise, set r = r + 1 and repeat STEPs 10 to 14. STEP 15: Output the maximally large q-sequences, q 2, to mobile-system managers as the mobility patterns. After STEP 15, the mobility patterns found out can serve as meta-knowledge concerning the given log data in HLR of a wireless network. 5 An Example In this section, a simple example is given to show how the proposed algorithm can be used to generate mobility patterns for mobile users' moving behavior according to the log data in HLR. Assume the location areas in a wireless network are shown in Figure 2. There are five location areas A, B, C, D and E in this example. A D Figure 2: The location areas used in this example Each transaction in the log data of HLR includes the four fields: mobile-id, date, time, and location-area, among others. Only the data in the above four fields are extracted for mining. Assume the extracted log data in HLR are shown in Table 1. Table 1: The extracted log data in HLR Mobile-id Date Time Location-area :56 E :38 B :52 D :08 D :30 A :54 B :25 D :46 C :02 D :46 B :06 C :07 Turn-off :17 Turn-off :31 Turn-off :47 E :46 D :45 B :53 B :56 C :19 C :38 Turn-off :53 D :33 Turn-off :13 C B C E
4 :14 E :16 B :33 Turn-off In this example, six mobile users logged in HLR. Only one location area is contained in each transaction. The values in the field mobile-id are then transformed into contiguous integers according to the order of each mobile user s first visiting time. The extracted log data in Table 1 are sorted first by encoded client ID and then by date and time. After that, all the location areas visited by each mobile user are listed as a mobility sequence. The resulting mobility sequences are shown in Table 2. Table 2: The mobility sequences formed from Table 1. Encoded Mobile-id Mobility Sequence 1 E, B, D, C 2 D, B, D 3 A, D 4 B, C, E, B, C 5 D, B,C 6 D, C, E, B The count of each location area is then checked against the predefined minimum support value α. Assume α is set at 3 (or 50%) in this example. The four location area B, C, D, and E are thus put in L 1. The candidate set C 2 is then generated from L 1. The large 2-sequences found in this example are (B, C), (D, B), (D, C), and (E, B). There are no large 3-sequences in this example. These four mobility patterns are then output as meta-knowledge concerning the given log data in HLR. 6 Experiments The section reports on experiments made to show the effects of the parameters on the proposed algorithm for mobility patterns. They were implemented in JAVA on a Pentium-IV 2.6GHz personal computer with 1 GB memory. There were 50 location areas. Data sets with different numbers of mobile users were run by the proposed algorithm. In each data set, the numbers of visited location area in mobility sequences were first randomly generated. Experiments were first performed to find the relationships between numbers of mobility patterns and minimum supports when the mobile user number was set at 800, the location areas was 50 and the average number of location areas visited by a mobile user was 12. The results for mobility patterns are shown in Figure 3 Number of mobility patterns Minimum support Figure 3. The relationship between numbers of mobility patterns and minimum support values It can be observed from Figure 3 that the number of mobility patterns decreased along with the increase of the minimum support value. It was consistent with the property of data mining. Note that the mobility patterns in Figure 3 do not include L 1. Also in the experimental environments, a reasonable minimum support value is 0.6, below which the number of mobility patterns increased sharply. The execution time with the minimum support value set at 0.5 along with different numbers of mobile users is shown in Figure 4. It can be observed from Figure 4 that the execution time increased along with the increase of mobile uesrs. The line is nearly linear. Time (Sec.) Mobile user numbers Figure 4. The relationship between execution times and mobile user numbers 7 Conclusions and Future Work In this paper, we have attempted to discover mobility patterns from the extracted log data in HLR. A mining process has then been performed to find mobility patterns. The concept of the mining process is similar to that in the AprioriAll algorithm for
5 finding sequential patterns, but is much simpler since a user can visit only one location each time. The mobility patterns may also be used by mobile-system managers in future strategy planning, such as for location size re-planning. For example, if a mobility pattern (A -> B) is mined, the location area B may be considered to be merged into the location A. Also, the message distribution strategy may also be decided based on these patterns. In the future, we will attempt to design other mining models for solving various mobile problems. References: [1] R. Agrawal, R. Srikant: Mining Sequential Patterns, The Eleventh International Conference on Data Engineering, 1995, pp [2] I. F. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu and W. Wang, "Mobility management in current and future communications networks", IEEE Network, Vol. 12, No. 4, 1998, pp [3] D. Barbara, Mobile computing and databases - a survey, IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, 1999, pp [4] M. S. Chen, J. Han and P. S. Yu, Data mining: an overview from a database perspective, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No. 6, 1996, pp [5] R. V. J. Chintalapati, V. Kumar and A. Datta, "An adaptive location management algorithm for mobile computing", The 22th Annual IEEE Conference on Local Computer Networks, 1997, pp [6] I. Han and D. H. Cho,"Group location management for mobile subscribers on transportation systems in mobile communication networks", IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, 2004, pp [7] N. E. Kruijt, D. Sparreboom, F. C. Schoute and R. Prasad, "Location management strategies for cellular mobile networks", IEEE Electronics & Communication Engineering Journal, Vol. 10, No.2, 1998, pp [8] W. Ma and Y. Fang, A new location management strategy based on user mobility pattern for wireless networks, The 27th Annual IEEE Conference on Local Computer Networks, [9] W. C. Peng and M. S. Chen, Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system, IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 1, 2003, pp [10] Y. Saygin and O. Ulusoy, Exploiting data mining techniques for broadcasting data in mobile computing environments, IEEE Transactions on Knowledge and Data Engineering, Vol. 14, No. 6, 2002, pp [11] K.Wang, J. M. Liao and J. M Chen, Intelligent location tracking strategy in PCS, The IEE Proceedings on Communications, 2000, Vol. 147, No. 1, pp
UNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances
1 Expert Systems with Applications Expert Systems with Applications xxx (26) xxx xxx wwwelseviercom/locate/eswa 2 Mining knowledge from object-oriented instances 3 Cheng-Ming Huang a, Tzung-Pei Hong b,
More informationMobility Management usually includes two parts: location management and handoff management.
Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable market for
More informationAppropriate Item Partition for Improving the Mining Performance
Appropriate Item Partition for Improving the Mining Performance Tzung-Pei Hong 1,2, Jheng-Nan Huang 1, Kawuu W. Lin 3 and Wen-Yang Lin 1 1 Department of Computer Science and Information Engineering National
More informationAN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 7(B), July 2012 pp. 5165 5178 AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR
More informationMining High Average-Utility Itemsets
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Mining High Itemsets Tzung-Pei Hong Dept of Computer Science and Information Engineering
More informationUAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA
UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University
More informationMaintenance of the Prelarge Trees for Record Deletion
12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, 2007 105 Maintenance of the Prelarge Trees for Record Deletion Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Department of
More informationSEQUENTIAL PATTERN MINING FROM WEB LOG DATA
SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract
More informationMining Frequent Itemsets for data streams over Weighted Sliding Windows
Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology
More informationMaintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept
Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for
More informationWeb page recommendation using a stochastic process model
Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,
More informationWeb Service Usage Mining: Mining For Executable Sequences
7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI
More informationMaintenance of fast updated frequent pattern trees for record deletion
Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University
More informationAn Efficient Tree-based Fuzzy Data Mining Approach
150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms
More informationUsing Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment
Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Ching-Huang Yun and Ming-Syan Chen Department of Electrical Engineering National Taiwan
More informationMining Associated Ranking Patterns from Wireless Sensor Networks
1 Mining Associated Ranking Patterns from Wireless Sensor Networks Pu-Tai Yang Abstract Wireless Sensor Networks (WSNs) are complex networks consisting of many sensors which can detect and collect sensed
More informationA New Method for Mining High Average Utility Itemsets
A New Method for Mining High Average Utility Itemsets Tien Lu 1, Bay Vo 2,3, Hien T. Nguyen 3, and Tzung-Pei Hong 4 1 University of Sciences, Ho Chi Minh, Vietnam 2 Divison of Data Science, Ton Duc Thang
More informationAuthors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam
Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam www.kuet.ac.bd Khulna University of Engineering & Technology (KUET) 2 Introduction Components of Wireless
More informationA Novel Method of Optimizing Website Structure
A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School
More informationA Graph-Based Approach for Mining Closed Large Itemsets
A Graph-Based Approach for Mining Closed Large Itemsets Lee-Wen Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University huanglw@gmail.com Ye-In Chang Dept. of Computer Science and
More informationA Methodology in Mobile Networks for Global Roaming
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationDiscovering fuzzy time-interval sequential patterns in sequence databases
Discovering fuzzy time-interval sequential patterns in sequence databases Yen-Liang Chen Department of Information Management National Central University ylchen@mgt.ncu.edu.tw Cheng-Kui Huang Department
More informationKnowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey
Knowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey G. Shivaprasad, N. V. Subbareddy and U. Dinesh Acharya
More informationAssociation Rule Mining from XML Data
144 Conference on Data Mining DMIN'06 Association Rule Mining from XML Data Qin Ding and Gnanasekaran Sundarraj Computer Science Program The Pennsylvania State University at Harrisburg Middletown, PA 17057,
More informationHierarchical Online Mining for Associative Rules
Hierarchical Online Mining for Associative Rules Naresh Jotwani Dhirubhai Ambani Institute of Information & Communication Technology Gandhinagar 382009 INDIA naresh_jotwani@da-iict.org Abstract Mining
More informationParallel Mining of Maximal Frequent Itemsets in PC Clusters
Proceedings of the International MultiConference of Engineers and Computer Scientists 28 Vol I IMECS 28, 19-21 March, 28, Hong Kong Parallel Mining of Maximal Frequent Itemsets in PC Clusters Vong Chan
More informationMining Temporal Association Rules in Network Traffic Data
Mining Temporal Association Rules in Network Traffic Data Guojun Mao Abstract Mining association rules is one of the most important and popular task in data mining. Current researches focus on discovering
More informationFast Algorithm for Mining Association Rules
Fast Algorithm for Mining Association Rules M.H.Margahny and A.A.Mitwaly Dept. of Computer Science, Faculty of Computers and Information, Assuit University, Egypt, Email: marghny@acc.aun.edu.eg. Abstract
More informationDiscovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.923
More informationAvoidance of Bottleneck in PCS Network
Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept
More informationDMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE Saravanan.Suba Assistant Professor of Computer Science Kamarajar Government Art & Science College Surandai, TN, India-627859 Email:saravanansuba@rediffmail.com
More informationAn Approach for Finding Frequent Item Set Done By Comparison Based Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationWeb Usage Mining for Comparing User Access Behaviour using Sequential Pattern
Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern Amit Dipchandji Kasliwal #, Dr. Girish S. Katkar * # Malegaon, Nashik, Maharashtra, India * Dept. of Computer Science, Arts,
More informationDATA MINING II - 1DL460
Uppsala University Department of Information Technology Kjell Orsborn DATA MINING II - 1DL460 Assignment 2 - Implementation of algorithm for frequent itemset and association rule mining 1 Algorithms for
More informationMining of Web Server Logs using Extended Apriori Algorithm
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
More informationAn Efficient Clustering Method for k-anonymization
An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management
More informationPerformance Analysis of Apriori Algorithm with Progressive Approach for Mining Data
Performance Analysis of Apriori Algorithm with Progressive Approach for Mining Data Shilpa Department of Computer Science & Engineering Haryana College of Technology & Management, Kaithal, Haryana, India
More informationAn Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining
An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining P.Subhashini 1, Dr.G.Gunasekaran 2 Research Scholar, Dept. of Information Technology, St.Peter s University,
More informationPRAGMATIC REVISION ON DIVERSE MOBILITY MANAGING PATTERNS
PRAGMATIC REVISION ON DIVERSE MOBILITY MANAGING PATTERNS Mohan 1 and Dr. S. Thabasu Kannan 2 1 Research Scholar, Associate Professor and Head, Department of Computer Science, Rajus College, Rajapalayam
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationWeb Usage Data for Web Access Control (WUDWAC)
Web Usage Data for Web Access Control (WUDWAC) Dr. Selma Elsheikh* Abstract The development and the widespread use of the World Wide Web have made electronic data storage and data distribution possible
More informationA Quantified Approach for large Dataset Compression in Association Mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 3 (Nov. - Dec. 2013), PP 79-84 A Quantified Approach for large Dataset Compression in Association Mining
More informationFUFM-High Utility Itemsets in Transactional Database
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationIncrementally mining high utility patterns based on pre-large concept
Appl Intell (2014) 40:343 357 DOI 10.1007/s10489-013-0467-z Incrementally mining high utility patterns based on pre-large concept Chun-Wei Lin Tzung-Pei Hong Guo-Cheng Lan Jia-Wei Wong Wen-Yang Lin Published
More informationParallelizing Frequent Itemset Mining with FP-Trees
Parallelizing Frequent Itemset Mining with FP-Trees Peiyi Tang Markus P. Turkia Department of Computer Science Department of Computer Science University of Arkansas at Little Rock University of Arkansas
More informationA New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks
Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery
More informationUMCS. Annales UMCS Informatica AI 7 (2007) Data mining techniques for portal participants profiling. Danuta Zakrzewska *, Justyna Kapka
Annales Informatica AI 7 (2007) 153-161 Annales Informatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Data mining techniques for portal participants profiling Danuta Zakrzewska *, Justyna
More informationDISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH
International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)
More informationGeneration of Potential High Utility Itemsets from Transactional Databases
Generation of Potential High Utility Itemsets from Transactional Databases Rajmohan.C Priya.G Niveditha.C Pragathi.R Asst.Prof/IT, Dept of IT Dept of IT Dept of IT SREC, Coimbatore,INDIA,SREC,Coimbatore,.INDIA
More informationPerformance Analysis of Data Mining Algorithms
! Performance Analysis of Data Mining Algorithms Poonam Punia Ph.D Research Scholar Deptt. of Computer Applications Singhania University, Jhunjunu (Raj.) poonamgill25@gmail.com Surender Jangra Deptt. of
More informationFrequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management
Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES
More informationDiminishing Signaling Traffic for Authentication in Mobile Communication System
Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,
More informationFast Discovery of Sequential Patterns Using Materialized Data Mining Views
Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science ul. Piotrowo
More informationWeb Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India
Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of
More informationAssociation Rules Mining using BOINC based Enterprise Desktop Grid
Association Rules Mining using BOINC based Enterprise Desktop Grid Evgeny Ivashko and Alexander Golovin Institute of Applied Mathematical Research, Karelian Research Centre of Russian Academy of Sciences,
More informationFREQUENT PATTERN MINING IN BIG DATA USING MAVEN PLUGIN. School of Computing, SASTRA University, Thanjavur , India
Volume 115 No. 7 2017, 105-110 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu FREQUENT PATTERN MINING IN BIG DATA USING MAVEN PLUGIN Balaji.N 1,
More informationAn Efficient Algorithm for finding high utility itemsets from online sell
An Efficient Algorithm for finding high utility itemsets from online sell Sarode Nutan S, Kothavle Suhas R 1 Department of Computer Engineering, ICOER, Maharashtra, India 2 Department of Computer Engineering,
More informationCombining Clustering with Moving Sequential Patterns Mining: A Novel and Efficient Technique
Combining Clustering with Moving Sequential Patterns Mining: A Novel and Efficient Technique Shuai Ma, Shiwei Tang, Dongqing Yang, Tengjiao Wang, Jinqiang Han Department of Computer Science, Peking University,
More informationFM-WAP Mining: In Search of Frequent Mutating Web Access Patterns from Historical Web Usage Data
FM-WAP Mining: In Search of Frequent Mutating Web Access Patterns from Historical Web Usage Data Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University,
More informationHigh Utility Web Access Patterns Mining from Distributed Databases
High Utility Web Access Patterns Mining from Distributed Databases Md.Azam Hosssain 1, Md.Mamunur Rashid 1, Byeong-Soo Jeong 1, Ho-Jin Choi 2 1 Database Lab, Department of Computer Engineering, Kyung Hee
More informationTop-k Keyword Search Over Graphs Based On Backward Search
Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer
More informationA New Method for Mining High Average Utility Itemsets
A New Method for Mining High Average Utility Itemsets Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong To cite this version: Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong. A New Method for Mining High Average
More informationUpper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2
Volume 117 No. 7 2017, 39-46 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Upper bound tighter Item caps for fast frequent itemsets mining for uncertain
More informationA Study on Mining of Frequent Subsequences and Sequential Pattern Search- Searching Sequence Pattern by Subset Partition
A Study on Mining of Frequent Subsequences and Sequential Pattern Search- Searching Sequence Pattern by Subset Partition S.Vigneswaran 1, M.Yashothai 2 1 Research Scholar (SRF), Anna University, Chennai.
More informationCombining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms
Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming Jin Department of Computer and Information Sciences Ohio State University, Columbus OH 4321 jinr@cis.ohio-state.edu
More informationAn Approach for Privacy Preserving in Association Rule Mining Using Data Restriction
International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan
More informationSpatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing
Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019
More informationDiscovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree
Discovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree Virendra Kumar Shrivastava 1, Parveen Kumar 2, K. R. Pardasani 3 1 Department of Computer Science & Engineering, Singhania
More informationEfficient Remining of Generalized Multi-supported Association Rules under Support Update
Efficient Remining of Generalized Multi-supported Association Rules under Support Update WEN-YANG LIN 1 and MING-CHENG TSENG 1 Dept. of Information Management, Institute of Information Engineering I-Shou
More informationTemporal Weighted Association Rule Mining for Classification
Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider
More informationTo Enhance Projection Scalability of Item Transactions by Parallel and Partition Projection using Dynamic Data Set
To Enhance Scalability of Item Transactions by Parallel and Partition using Dynamic Data Set Priyanka Soni, Research Scholar (CSE), MTRI, Bhopal, priyanka.soni379@gmail.com Dhirendra Kumar Jha, MTRI, Bhopal,
More informationAn Approximate Approach for Mining Recently Frequent Itemsets from Data Streams *
An Approximate Approach for Mining Recently Frequent Itemsets from Data Streams * Jia-Ling Koh and Shu-Ning Shin Department of Computer Science and Information Engineering National Taiwan Normal University
More informationAn Algorithm for Mining Large Sequences in Databases
149 An Algorithm for Mining Large Sequences in Databases Bharat Bhasker, Indian Institute of Management, Lucknow, India, bhasker@iiml.ac.in ABSTRACT Frequent sequence mining is a fundamental and essential
More informationA Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,
More informationEfficient Algorithm for Frequent Itemset Generation in Big Data
Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru
More informationEfficient GSP Implementation based on XML Databases
212 International Conference on Information and Knowledge Management (ICIKM 212) IPCSIT vol.45 (212) (212) IACSIT Press, Singapore Efficient GSP Implementation based on Databases Porjet Sansai and Juggapong
More informationNode selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth
American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer
More informationSETM*-MaxK: An Efficient SET-Based Approach to Find the Largest Itemset
SETM*-MaxK: An Efficient SET-Based Approach to Find the Largest Itemset Ye-In Chang and Yu-Ming Hsieh Dept. of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan, Republic
More informationImplementation of CHUD based on Association Matrix
Implementation of CHUD based on Association Matrix Abhijit P. Ingale 1, Kailash Patidar 2, Megha Jain 3 1 apingale83@gmail.com, 2 kailashpatidar123@gmail.com, 3 06meghajain@gmail.com, Sri Satya Sai Institute
More informationSupport and Confidence Based Algorithms for Hiding Sensitive Association Rules
Support and Confidence Based Algorithms for Hiding Sensitive Association Rules K.Srinivasa Rao Associate Professor, Department Of Computer Science and Engineering, Swarna Bharathi College of Engineering,
More informationAn Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification
An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification Jingjun Zhu Department of Computer Science and Technology,Tsinghua University sillypig0206@gmail.com
More informationA Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme Yue Zhang, Yunxia Pei To cite this version: Yue Zhang, Yunxia Pei. A Resource Discovery Algorithm in Mobile Grid Computing
More informationAdvanced Eclat Algorithm for Frequent Itemsets Generation
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 9 (2015) pp. 23263-23279 Research India Publications http://www.ripublication.com Advanced Eclat Algorithm for Frequent
More informationAn Improved Apriori Algorithm for Association Rules
Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan
More informationA New Distance Independent Localization Algorithm in Wireless Sensor Network
A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key
More informationA Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.1, January 2013 1 A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations Hiroyuki
More informationA Review on various Location Management and Update Mechanisms in Mobile Communication
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 268-274 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
More informationRandom Sampling over Data Streams for Sequential Pattern Mining
Random Sampling over Data Streams for Sequential Pattern Mining Chedy Raïssi LIRMM, EMA-LGI2P/Site EERIE 161 rue Ada 34392 Montpellier Cedex 5, France France raissi@lirmm.fr Pascal Poncelet EMA-LGI2P/Site
More informationPattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42
Pattern Mining Knowledge Discovery and Data Mining 1 Roman Kern KTI, TU Graz 2016-01-14 Roman Kern (KTI, TU Graz) Pattern Mining 2016-01-14 1 / 42 Outline 1 Introduction 2 Apriori Algorithm 3 FP-Growth
More informationComparing the Performance of Frequent Itemsets Mining Algorithms
Comparing the Performance of Frequent Itemsets Mining Algorithms Kalash Dave 1, Mayur Rathod 2, Parth Sheth 3, Avani Sakhapara 4 UG Student, Dept. of I.T., K.J.Somaiya College of Engineering, Mumbai, India
More informationInternational Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Improved Apriori Algorithm was Applied in the System of Elective Courses in Colleges and Universities
More informationA Hierarchical Document Clustering Approach with Frequent Itemsets
A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of
More informationPerformance Measurements of 360 Video Streaming to Head-Mounted Displays Over Live 4G Cellular Networks
Performance Measurements of 360 Video Streaming to Head-Mounted Displays Over Live 4G Cellular Networks Wen-Chih Lo, Ching-Ling Fan, Shou-Cheng Yen, and Cheng-Hsin Hsu Department of Computer Science National
More informationAn Algorithm for Mining Frequent Itemsets from Library Big Data
JOURNAL OF SOFTWARE, VOL. 9, NO. 9, SEPTEMBER 2014 2361 An Algorithm for Mining Frequent Itemsets from Library Big Data Xingjian Li lixingjianny@163.com Library, Nanyang Institute of Technology, Nanyang,
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationBinary Sequences and Association Graphs for Fast Detection of Sequential Patterns
Binary Sequences and Association Graphs for Fast Detection of Sequential Patterns Selim Mimaroglu, Dan A. Simovici Bahcesehir University,Istanbul, Turkey, selim.mimaroglu@gmail.com University of Massachusetts
More informationAC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery
: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery Hong Cheng Philip S. Yu Jiawei Han University of Illinois at Urbana-Champaign IBM T. J. Watson Research Center {hcheng3, hanj}@cs.uiuc.edu,
More informationUtility Mining Algorithm for High Utility Item sets from Transactional Databases
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 34-40 Utility Mining Algorithm for High Utility Item sets from Transactional
More informationMining Maximum frequent item sets over data streams using Transaction Sliding Window Techniques
IJCSNS International Journal of Computer Science and Network Security, VOL.1 No.2, February 201 85 Mining Maximum frequent item sets over data streams using Transaction Sliding Window Techniques ANNURADHA
More information