Applying Data Mining to Wireless Networks

Size: px
Start display at page:

Download "Applying Data Mining to Wireless Networks"

Transcription

1 Applying Data Mining to Wireless Networks CHENG-MING HUANG 1, TZUNG-PEI HONG 2 and SHI-JINN HORNG 3,4 1 Department of Electrical Engineering National Taiwan University of Science and Technology, Taipei, 106, TAIWAN 2 Department of Computer Science and Information Engineering National University of Kaohsiung, Kaohsiung, 811, TAIWAN 3 Department of Computer Science and Information Engineering National Taiwan University of Science and Technology, Taipei, 106, TAIWAN 4 Department of Electronic Engineering National United University, Miao-li, 360, TAIWAN Abstract: - Wireless networks and mobile applications have grown very rapidly and have made a significant impact on computer systems. Especially, the usage of mobile phones and PDA is increased very rapidly. Added functions and values with these devices are thus greatly developed. If some regularity can be known from the user mobility behavior, then these functions and values can be further expanded and used intelligently. This paper thus attempts to mine appropriate mobility patterns for being used by mobile-system managers in future strategy planning. The location areas in which mobile users visit can be found from the log data stored in the home-location-register module. The preprocessing task for preparing appropriate data from HLR is then done. The mobility sequences from mobile users are formed. The algorithm then calculates the count of each term in all mobility sequences. The mining process based on counts is then performed to find mobility patterns. Key-Words: - data mining, mobility pattern, location area, home location register. 1 Introduction Wireless networks and mobile applications have recently become very popular and have made a significant impact on our daily life [3]. Especially, the usage of mobile phones and PDA is increased very rapidly. Added functions and values with these devices are thus greatly developed. In a wireless system of mobile phones, a module called home location register (HLR) keeps related user mobility data. When a mobile user moves from a location area to its next one, his/her corresponding data in HLR are updated. HLR can thus help the system successfully and efficiently find users current locations and distribute desired messages to them. The log data stored in HLR can also be used for analyzing users mobility behavior. The regular patterns found from the mobility data may provide some appropriate suggestions to mobile-system managers. The added functions and values with the system may also be further expanded. Data-mining has become a process of considerable interest in recent years as the amounts of data in many databases have grown tremendously large. It has been developed to turn data into useful task-oriented knowledge. It is used to identify effective, coherent, potentially useful, and previously unknown patterns in large databases [4]. Some data-mining approaches for mobile systems were proposed in the past [9, 10]. In this paper, we emphasize on the automatic discovery of user mobility patterns in wireless networks. The preprocessing task for preparing appropriate data from HLR is first done. The preprocessing task for preparing appropriate data from HLR is then done. The mobility sequences from mobile users are formed. The algorithm then calculates the count of each term in all mobility sequences. The mining process based on counts is then performed to find mobility patterns. The concept of the algorithm is similar to that in the AprioriAll algorithm [1] for finding sequential patterns, but much simpler since a user can visit only one location each time. The remaining parts of this paper are organized as follows. The architecture of wireless networks for mobile users is reviewed in Section 2. Some related mining approaches are introduced in Section 3. An algorithm for mining mobility patterns from log data in HLR of a wireless network is proposed in Section 4. An example to illustrate the proposed algorithm is given in Section 5. Experimental results are described in Section 6. Conclusions and future work are stated in Section 7.

2 2 Review of wireless networks for mobile users The architecture of a typical wireless communication system for mobile users is shown in Figure 1 [2, 11]. Location Area VLR BSC MSC BSC MSC HLR VLR Figure 1: A typical wireless communication system All the communication space of a wireless system is divided into many units called cells. Each cell has a base station, in charge of broadcasting the contents to mobile users located within the cell. Several neighboring cells are grouped into a location area, which are managed by a base-station controller (BSC) and a mobile switch service center (MSC). BSC is used to control all the base stations in a location area for performing their jobs; MSC maintains a visitor location register (VLR) which stores the location area identifier and some related information to the current visitors in the location area. All the visitors with their relevant VLR data are sent to the home location register (HLR). When calls come, HLR determines users current location areas according to the identification number of mobile users called, and invokes corresponding BSCs to broadcast messages from base stations to them. The action is called paging. Besides, when mobile users move from a location area to another one, they must register and update both the VLR data in MSC and the HLR data. This action is called location update. Many researches were thus proposed in the past for making a good trade-off between the costs of these two actions [5, 6, 7, 8, 11]. The location areas in which mobile users visit can be easily found from the mobility data stored in VLR and HLR. This paper thus attempts to mine appropriate mobility patterns from these data for being used by mobile-system managers in future strategy planning. 3 Review of Related Mining Approaches Agrawal and Srikant proposed a mining algorithm to discover sequential patterns from a set of transactions [1]. Five phases are included in their approach. In the first phase, the transactions are sorted first by customer ID as the major key and then by transaction time as the minor key. This phase thus converts the original transactions into customer sequences. In the second phase, the set of all large itemsets are found from the customer sequences by comparing their counts with a predefined support parameter. This phase is similar to the process of mining association rules. Note that when an itemset occurs more than one time in a customer sequence, it is counted once for this customer sequence. In the third phase, each large itemset is mapped to a contiguous integer and the original customer sequences are transformed into the mapped integer sequences. In the fourth phase, the set of transformed integer sequences are used to find large sequences among them. In the fifth phase, the maximally large sequences are then derived and output to users. 4 Mining Mobility Patterns In this paper, the log data stored in HLR in a wireless network are used to analyze the mobility patterns on that system. The four attributes mobile-id, date, time, and location-area are used in the mining process. The log data to be analyzed are sorted first in the order of mobile-id and then in the order of date and time. The mobility sequences from mobile users are then formed. The algorithm then calculates the count of each term on all mobility sequences. The mining process based on counts is then performed to find mobility patterns. The details of the proposed mobility-pattern mining algorithm are described as follows. The mobility-pattern mining algorithm: INPUT: A set of log data in HLR, a predefined minimum support value α. OUTPUT: A set of mobility patterns. STEP 1: Extract the log data with only the four attributes mobile-id, date, time, and location-area; denote the resulting log data as D. STEP 2: Transform the mobile-ids into contiguous integers (called encoded mobile ID) for convenience, according to their first turn-on time. Note that the same mobile-id with

3 two turn-off connections is given two integers. STEP 3: Sort the resulting log data first by encoded mobile ID and then by date and time. STEP 4: Form a mobility sequence D j for each mobile user c j by sequentially listing his/her n j location areas visited, where n j is the number of location areas visited by c j. STEP 5: Calculate the number (count j ) of each location area I j appearing in the mobility sequences for 1 j n; if there are more than one appearance of I j in a mobility sequence, count it only once. STEP 6: Set the support (support j ) of each I j as count j / n, where n is the number of mobility sequences. STEP 7: Check whether the support of each location area I j is larger than or equal to the predefined minimum support valueα. If I j satisfies the condition, put it in the set of large 1-itemsets (L 1 ). That is, L 1 = {I j support j α, 1 j n }. STEP 8: If L 1 is null, then exit the algorithm; otherwise, do the next step. STEP 9: Set r = 1, where r is used to represent the length of mobility patterns currently being processed. STEP 10: Generate the candidate set C r+1 from L r in a way similar to that in the aprioriall algorithm [1]. Restated, the algorithm first joins L r and L r, under the condition that r-1 items in the two itemsets are the same and with the same orders. Different permutations represent different candidates. The algorithm then keeps in C r+1 the sequences which have all their sub-sequences of length r existing in L r. STEP 11: Calculate the number (count s ) of each candidate (r+1)-sequence s in C r+1 appearing in the mobility sequences; if there are more than one appearance of s in a mobility sequence, count it only once. STEP 12: Set the support (support s ) of each s as count s / n. STEP 13: Check whether the support of candidate (r+1)-sequences s in C r+1 is larger than or equal to the predefined minimum support valueα. If s satisfies the condition, put it in the set of large (r+1)-sequences s in L r+1. That is, L r+1 = {s support s α, s C r+1 }. STEP 14: IF L r+1 is null, then do the next step; otherwise, set r = r + 1 and repeat STEPs 10 to 14. STEP 15: Output the maximally large q-sequences, q 2, to mobile-system managers as the mobility patterns. After STEP 15, the mobility patterns found out can serve as meta-knowledge concerning the given log data in HLR of a wireless network. 5 An Example In this section, a simple example is given to show how the proposed algorithm can be used to generate mobility patterns for mobile users' moving behavior according to the log data in HLR. Assume the location areas in a wireless network are shown in Figure 2. There are five location areas A, B, C, D and E in this example. A D Figure 2: The location areas used in this example Each transaction in the log data of HLR includes the four fields: mobile-id, date, time, and location-area, among others. Only the data in the above four fields are extracted for mining. Assume the extracted log data in HLR are shown in Table 1. Table 1: The extracted log data in HLR Mobile-id Date Time Location-area :56 E :38 B :52 D :08 D :30 A :54 B :25 D :46 C :02 D :46 B :06 C :07 Turn-off :17 Turn-off :31 Turn-off :47 E :46 D :45 B :53 B :56 C :19 C :38 Turn-off :53 D :33 Turn-off :13 C B C E

4 :14 E :16 B :33 Turn-off In this example, six mobile users logged in HLR. Only one location area is contained in each transaction. The values in the field mobile-id are then transformed into contiguous integers according to the order of each mobile user s first visiting time. The extracted log data in Table 1 are sorted first by encoded client ID and then by date and time. After that, all the location areas visited by each mobile user are listed as a mobility sequence. The resulting mobility sequences are shown in Table 2. Table 2: The mobility sequences formed from Table 1. Encoded Mobile-id Mobility Sequence 1 E, B, D, C 2 D, B, D 3 A, D 4 B, C, E, B, C 5 D, B,C 6 D, C, E, B The count of each location area is then checked against the predefined minimum support value α. Assume α is set at 3 (or 50%) in this example. The four location area B, C, D, and E are thus put in L 1. The candidate set C 2 is then generated from L 1. The large 2-sequences found in this example are (B, C), (D, B), (D, C), and (E, B). There are no large 3-sequences in this example. These four mobility patterns are then output as meta-knowledge concerning the given log data in HLR. 6 Experiments The section reports on experiments made to show the effects of the parameters on the proposed algorithm for mobility patterns. They were implemented in JAVA on a Pentium-IV 2.6GHz personal computer with 1 GB memory. There were 50 location areas. Data sets with different numbers of mobile users were run by the proposed algorithm. In each data set, the numbers of visited location area in mobility sequences were first randomly generated. Experiments were first performed to find the relationships between numbers of mobility patterns and minimum supports when the mobile user number was set at 800, the location areas was 50 and the average number of location areas visited by a mobile user was 12. The results for mobility patterns are shown in Figure 3 Number of mobility patterns Minimum support Figure 3. The relationship between numbers of mobility patterns and minimum support values It can be observed from Figure 3 that the number of mobility patterns decreased along with the increase of the minimum support value. It was consistent with the property of data mining. Note that the mobility patterns in Figure 3 do not include L 1. Also in the experimental environments, a reasonable minimum support value is 0.6, below which the number of mobility patterns increased sharply. The execution time with the minimum support value set at 0.5 along with different numbers of mobile users is shown in Figure 4. It can be observed from Figure 4 that the execution time increased along with the increase of mobile uesrs. The line is nearly linear. Time (Sec.) Mobile user numbers Figure 4. The relationship between execution times and mobile user numbers 7 Conclusions and Future Work In this paper, we have attempted to discover mobility patterns from the extracted log data in HLR. A mining process has then been performed to find mobility patterns. The concept of the mining process is similar to that in the AprioriAll algorithm for

5 finding sequential patterns, but is much simpler since a user can visit only one location each time. The mobility patterns may also be used by mobile-system managers in future strategy planning, such as for location size re-planning. For example, if a mobility pattern (A -> B) is mined, the location area B may be considered to be merged into the location A. Also, the message distribution strategy may also be decided based on these patterns. In the future, we will attempt to design other mining models for solving various mobile problems. References: [1] R. Agrawal, R. Srikant: Mining Sequential Patterns, The Eleventh International Conference on Data Engineering, 1995, pp [2] I. F. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu and W. Wang, "Mobility management in current and future communications networks", IEEE Network, Vol. 12, No. 4, 1998, pp [3] D. Barbara, Mobile computing and databases - a survey, IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, 1999, pp [4] M. S. Chen, J. Han and P. S. Yu, Data mining: an overview from a database perspective, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, No. 6, 1996, pp [5] R. V. J. Chintalapati, V. Kumar and A. Datta, "An adaptive location management algorithm for mobile computing", The 22th Annual IEEE Conference on Local Computer Networks, 1997, pp [6] I. Han and D. H. Cho,"Group location management for mobile subscribers on transportation systems in mobile communication networks", IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, 2004, pp [7] N. E. Kruijt, D. Sparreboom, F. C. Schoute and R. Prasad, "Location management strategies for cellular mobile networks", IEEE Electronics & Communication Engineering Journal, Vol. 10, No.2, 1998, pp [8] W. Ma and Y. Fang, A new location management strategy based on user mobility pattern for wireless networks, The 27th Annual IEEE Conference on Local Computer Networks, [9] W. C. Peng and M. S. Chen, Developing data allocation schemes by incremental mining of user moving patterns in a mobile computing system, IEEE Transactions on Knowledge and Data Engineering, Vol. 15, No. 1, 2003, pp [10] Y. Saygin and O. Ulusoy, Exploiting data mining techniques for broadcasting data in mobile computing environments, IEEE Transactions on Knowledge and Data Engineering, Vol. 14, No. 6, 2002, pp [11] K.Wang, J. M. Liao and J. M Chen, Intelligent location tracking strategy in PCS, The IEE Proceedings on Communications, 2000, Vol. 147, No. 1, pp

UNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances

UNCORRECTED PROOF ARTICLE IN PRESS. 1 Expert Systems with Applications. 2 Mining knowledge from object-oriented instances 1 Expert Systems with Applications Expert Systems with Applications xxx (26) xxx xxx wwwelseviercom/locate/eswa 2 Mining knowledge from object-oriented instances 3 Cheng-Ming Huang a, Tzung-Pei Hong b,

More information

Mobility Management usually includes two parts: location management and handoff management.

Mobility Management usually includes two parts: location management and handoff management. Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable market for

More information

Appropriate Item Partition for Improving the Mining Performance

Appropriate Item Partition for Improving the Mining Performance Appropriate Item Partition for Improving the Mining Performance Tzung-Pei Hong 1,2, Jheng-Nan Huang 1, Kawuu W. Lin 3 and Wen-Yang Lin 1 1 Department of Computer Science and Information Engineering National

More information

AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011

AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR UTILITY MINING. Received April 2011; revised October 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 7(B), July 2012 pp. 5165 5178 AN EFFICIENT GRADUAL PRUNING TECHNIQUE FOR

More information

Mining High Average-Utility Itemsets

Mining High Average-Utility Itemsets Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Mining High Itemsets Tzung-Pei Hong Dept of Computer Science and Information Engineering

More information

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA

UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA UAPRIORI: AN ALGORITHM FOR FINDING SEQUENTIAL PATTERNS IN PROBABILISTIC DATA METANAT HOOSHSADAT, SAMANEH BAYAT, PARISA NAEIMI, MAHDIEH S. MIRIAN, OSMAR R. ZAÏANE Computing Science Department, University

More information

Maintenance of the Prelarge Trees for Record Deletion

Maintenance of the Prelarge Trees for Record Deletion 12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, 2007 105 Maintenance of the Prelarge Trees for Record Deletion Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Department of

More information

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept

Maintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for

More information

Web page recommendation using a stochastic process model

Web page recommendation using a stochastic process model Data Mining VII: Data, Text and Web Mining and their Business Applications 233 Web page recommendation using a stochastic process model B. J. Park 1, W. Choi 1 & S. H. Noh 2 1 Computer Science Department,

More information

Web Service Usage Mining: Mining For Executable Sequences

Web Service Usage Mining: Mining For Executable Sequences 7th WSEAS International Conference on APPLIED COMPUTER SCIENCE, Venice, Italy, November 21-23, 2007 266 Web Service Usage Mining: Mining For Executable Sequences MOHSEN JAFARI ASBAGH, HASSAN ABOLHASSANI

More information

Maintenance of fast updated frequent pattern trees for record deletion

Maintenance of fast updated frequent pattern trees for record deletion Maintenance of fast updated frequent pattern trees for record deletion Tzung-Pei Hong a,b,, Chun-Wei Lin c, Yu-Lung Wu d a Department of Computer Science and Information Engineering, National University

More information

An Efficient Tree-based Fuzzy Data Mining Approach

An Efficient Tree-based Fuzzy Data Mining Approach 150 International Journal of Fuzzy Systems, Vol. 12, No. 2, June 2010 An Efficient Tree-based Fuzzy Data Mining Approach Chun-Wei Lin, Tzung-Pei Hong, and Wen-Hsiang Lu Abstract 1 In the past, many algorithms

More information

Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment

Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Ching-Huang Yun and Ming-Syan Chen Department of Electrical Engineering National Taiwan

More information

Mining Associated Ranking Patterns from Wireless Sensor Networks

Mining Associated Ranking Patterns from Wireless Sensor Networks 1 Mining Associated Ranking Patterns from Wireless Sensor Networks Pu-Tai Yang Abstract Wireless Sensor Networks (WSNs) are complex networks consisting of many sensors which can detect and collect sensed

More information

A New Method for Mining High Average Utility Itemsets

A New Method for Mining High Average Utility Itemsets A New Method for Mining High Average Utility Itemsets Tien Lu 1, Bay Vo 2,3, Hien T. Nguyen 3, and Tzung-Pei Hong 4 1 University of Sciences, Ho Chi Minh, Vietnam 2 Divison of Data Science, Ton Duc Thang

More information

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam www.kuet.ac.bd Khulna University of Engineering & Technology (KUET) 2 Introduction Components of Wireless

More information

A Novel Method of Optimizing Website Structure

A Novel Method of Optimizing Website Structure A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School

More information

A Graph-Based Approach for Mining Closed Large Itemsets

A Graph-Based Approach for Mining Closed Large Itemsets A Graph-Based Approach for Mining Closed Large Itemsets Lee-Wen Huang Dept. of Computer Science and Engineering National Sun Yat-Sen University huanglw@gmail.com Ye-In Chang Dept. of Computer Science and

More information

A Methodology in Mobile Networks for Global Roaming

A Methodology in Mobile Networks for Global Roaming ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Discovering fuzzy time-interval sequential patterns in sequence databases

Discovering fuzzy time-interval sequential patterns in sequence databases Discovering fuzzy time-interval sequential patterns in sequence databases Yen-Liang Chen Department of Information Management National Central University ylchen@mgt.ncu.edu.tw Cheng-Kui Huang Department

More information

Knowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey

Knowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey Knowledge Discovery from Web Usage Data: Research and Development of Web Access Pattern Tree Based Sequential Pattern Mining Techniques: A Survey G. Shivaprasad, N. V. Subbareddy and U. Dinesh Acharya

More information

Association Rule Mining from XML Data

Association Rule Mining from XML Data 144 Conference on Data Mining DMIN'06 Association Rule Mining from XML Data Qin Ding and Gnanasekaran Sundarraj Computer Science Program The Pennsylvania State University at Harrisburg Middletown, PA 17057,

More information

Hierarchical Online Mining for Associative Rules

Hierarchical Online Mining for Associative Rules Hierarchical Online Mining for Associative Rules Naresh Jotwani Dhirubhai Ambani Institute of Information & Communication Technology Gandhinagar 382009 INDIA naresh_jotwani@da-iict.org Abstract Mining

More information

Parallel Mining of Maximal Frequent Itemsets in PC Clusters

Parallel Mining of Maximal Frequent Itemsets in PC Clusters Proceedings of the International MultiConference of Engineers and Computer Scientists 28 Vol I IMECS 28, 19-21 March, 28, Hong Kong Parallel Mining of Maximal Frequent Itemsets in PC Clusters Vong Chan

More information

Mining Temporal Association Rules in Network Traffic Data

Mining Temporal Association Rules in Network Traffic Data Mining Temporal Association Rules in Network Traffic Data Guojun Mao Abstract Mining association rules is one of the most important and popular task in data mining. Current researches focus on discovering

More information

Fast Algorithm for Mining Association Rules

Fast Algorithm for Mining Association Rules Fast Algorithm for Mining Association Rules M.H.Margahny and A.A.Mitwaly Dept. of Computer Science, Faculty of Computers and Information, Assuit University, Egypt, Email: marghny@acc.aun.edu.eg. Abstract

More information

Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining

Discovery of Frequent Itemset and Promising Frequent Itemset Using Incremental Association Rule Mining Over Stream Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.923

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE

DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE Saravanan.Suba Assistant Professor of Computer Science Kamarajar Government Art & Science College Surandai, TN, India-627859 Email:saravanansuba@rediffmail.com

More information

An Approach for Finding Frequent Item Set Done By Comparison Based Technique

An Approach for Finding Frequent Item Set Done By Comparison Based Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern

Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern Web Usage Mining for Comparing User Access Behaviour using Sequential Pattern Amit Dipchandji Kasliwal #, Dr. Girish S. Katkar * # Malegaon, Nashik, Maharashtra, India * Dept. of Computer Science, Arts,

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 Uppsala University Department of Information Technology Kjell Orsborn DATA MINING II - 1DL460 Assignment 2 - Implementation of algorithm for frequent itemset and association rule mining 1 Algorithms for

More information

Mining of Web Server Logs using Extended Apriori Algorithm

Mining of Web Server Logs using Extended Apriori Algorithm International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

An Efficient Clustering Method for k-anonymization

An Efficient Clustering Method for k-anonymization An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management

More information

Performance Analysis of Apriori Algorithm with Progressive Approach for Mining Data

Performance Analysis of Apriori Algorithm with Progressive Approach for Mining Data Performance Analysis of Apriori Algorithm with Progressive Approach for Mining Data Shilpa Department of Computer Science & Engineering Haryana College of Technology & Management, Kaithal, Haryana, India

More information

An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining

An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining P.Subhashini 1, Dr.G.Gunasekaran 2 Research Scholar, Dept. of Information Technology, St.Peter s University,

More information

PRAGMATIC REVISION ON DIVERSE MOBILITY MANAGING PATTERNS

PRAGMATIC REVISION ON DIVERSE MOBILITY MANAGING PATTERNS PRAGMATIC REVISION ON DIVERSE MOBILITY MANAGING PATTERNS Mohan 1 and Dr. S. Thabasu Kannan 2 1 Research Scholar, Associate Professor and Head, Department of Computer Science, Rajus College, Rajapalayam

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

Web Usage Data for Web Access Control (WUDWAC)

Web Usage Data for Web Access Control (WUDWAC) Web Usage Data for Web Access Control (WUDWAC) Dr. Selma Elsheikh* Abstract The development and the widespread use of the World Wide Web have made electronic data storage and data distribution possible

More information

A Quantified Approach for large Dataset Compression in Association Mining

A Quantified Approach for large Dataset Compression in Association Mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 3 (Nov. - Dec. 2013), PP 79-84 A Quantified Approach for large Dataset Compression in Association Mining

More information

FUFM-High Utility Itemsets in Transactional Database

FUFM-High Utility Itemsets in Transactional Database Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

Incrementally mining high utility patterns based on pre-large concept

Incrementally mining high utility patterns based on pre-large concept Appl Intell (2014) 40:343 357 DOI 10.1007/s10489-013-0467-z Incrementally mining high utility patterns based on pre-large concept Chun-Wei Lin Tzung-Pei Hong Guo-Cheng Lan Jia-Wei Wong Wen-Yang Lin Published

More information

Parallelizing Frequent Itemset Mining with FP-Trees

Parallelizing Frequent Itemset Mining with FP-Trees Parallelizing Frequent Itemset Mining with FP-Trees Peiyi Tang Markus P. Turkia Department of Computer Science Department of Computer Science University of Arkansas at Little Rock University of Arkansas

More information

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery

More information

UMCS. Annales UMCS Informatica AI 7 (2007) Data mining techniques for portal participants profiling. Danuta Zakrzewska *, Justyna Kapka

UMCS. Annales UMCS Informatica AI 7 (2007) Data mining techniques for portal participants profiling. Danuta Zakrzewska *, Justyna Kapka Annales Informatica AI 7 (2007) 153-161 Annales Informatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Data mining techniques for portal participants profiling Danuta Zakrzewska *, Justyna

More information

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH

DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)

More information

Generation of Potential High Utility Itemsets from Transactional Databases

Generation of Potential High Utility Itemsets from Transactional Databases Generation of Potential High Utility Itemsets from Transactional Databases Rajmohan.C Priya.G Niveditha.C Pragathi.R Asst.Prof/IT, Dept of IT Dept of IT Dept of IT SREC, Coimbatore,INDIA,SREC,Coimbatore,.INDIA

More information

Performance Analysis of Data Mining Algorithms

Performance Analysis of Data Mining Algorithms ! Performance Analysis of Data Mining Algorithms Poonam Punia Ph.D Research Scholar Deptt. of Computer Applications Singhania University, Jhunjunu (Raj.) poonamgill25@gmail.com Surender Jangra Deptt. of

More information

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management

Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Frequent Item Set using Apriori and Map Reduce algorithm: An Application in Inventory Management Kranti Patil 1, Jayashree Fegade 2, Diksha Chiramade 3, Srujan Patil 4, Pradnya A. Vikhar 5 1,2,3,4,5 KCES

More information

Diminishing Signaling Traffic for Authentication in Mobile Communication System

Diminishing Signaling Traffic for Authentication in Mobile Communication System Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,

More information

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views

Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Fast Discovery of Sequential Patterns Using Materialized Data Mining Views Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzewicz Poznan University of Technology Institute of Computing Science ul. Piotrowo

More information

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

Association Rules Mining using BOINC based Enterprise Desktop Grid

Association Rules Mining using BOINC based Enterprise Desktop Grid Association Rules Mining using BOINC based Enterprise Desktop Grid Evgeny Ivashko and Alexander Golovin Institute of Applied Mathematical Research, Karelian Research Centre of Russian Academy of Sciences,

More information

FREQUENT PATTERN MINING IN BIG DATA USING MAVEN PLUGIN. School of Computing, SASTRA University, Thanjavur , India

FREQUENT PATTERN MINING IN BIG DATA USING MAVEN PLUGIN. School of Computing, SASTRA University, Thanjavur , India Volume 115 No. 7 2017, 105-110 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu FREQUENT PATTERN MINING IN BIG DATA USING MAVEN PLUGIN Balaji.N 1,

More information

An Efficient Algorithm for finding high utility itemsets from online sell

An Efficient Algorithm for finding high utility itemsets from online sell An Efficient Algorithm for finding high utility itemsets from online sell Sarode Nutan S, Kothavle Suhas R 1 Department of Computer Engineering, ICOER, Maharashtra, India 2 Department of Computer Engineering,

More information

Combining Clustering with Moving Sequential Patterns Mining: A Novel and Efficient Technique

Combining Clustering with Moving Sequential Patterns Mining: A Novel and Efficient Technique Combining Clustering with Moving Sequential Patterns Mining: A Novel and Efficient Technique Shuai Ma, Shiwei Tang, Dongqing Yang, Tengjiao Wang, Jinqiang Han Department of Computer Science, Peking University,

More information

FM-WAP Mining: In Search of Frequent Mutating Web Access Patterns from Historical Web Usage Data

FM-WAP Mining: In Search of Frequent Mutating Web Access Patterns from Historical Web Usage Data FM-WAP Mining: In Search of Frequent Mutating Web Access Patterns from Historical Web Usage Data Qiankun Zhao Nanyang Technological University, Singapore and Sourav S. Bhowmick Nanyang Technological University,

More information

High Utility Web Access Patterns Mining from Distributed Databases

High Utility Web Access Patterns Mining from Distributed Databases High Utility Web Access Patterns Mining from Distributed Databases Md.Azam Hosssain 1, Md.Mamunur Rashid 1, Byeong-Soo Jeong 1, Ho-Jin Choi 2 1 Database Lab, Department of Computer Engineering, Kyung Hee

More information

Top-k Keyword Search Over Graphs Based On Backward Search

Top-k Keyword Search Over Graphs Based On Backward Search Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer

More information

A New Method for Mining High Average Utility Itemsets

A New Method for Mining High Average Utility Itemsets A New Method for Mining High Average Utility Itemsets Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong To cite this version: Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong. A New Method for Mining High Average

More information

Upper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2

Upper bound tighter Item caps for fast frequent itemsets mining for uncertain data Implemented using splay trees. Shashikiran V 1, Murali S 2 Volume 117 No. 7 2017, 39-46 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Upper bound tighter Item caps for fast frequent itemsets mining for uncertain

More information

A Study on Mining of Frequent Subsequences and Sequential Pattern Search- Searching Sequence Pattern by Subset Partition

A Study on Mining of Frequent Subsequences and Sequential Pattern Search- Searching Sequence Pattern by Subset Partition A Study on Mining of Frequent Subsequences and Sequential Pattern Search- Searching Sequence Pattern by Subset Partition S.Vigneswaran 1, M.Yashothai 2 1 Research Scholar (SRF), Anna University, Chennai.

More information

Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms

Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Combining Distributed Memory and Shared Memory Parallelization for Data Mining Algorithms Ruoming Jin Department of Computer and Information Sciences Ohio State University, Columbus OH 4321 jinr@cis.ohio-state.edu

More information

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction

An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction International Journal of Engineering Science Invention Volume 2 Issue 1 January. 2013 An Approach for Privacy Preserving in Association Rule Mining Using Data Restriction Janakiramaiah Bonam 1, Dr.RamaMohan

More information

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing

Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Spatial and Temporal Aware, Trajectory Mobility Profile Based Location Management for Mobile Computing Jianting Zhang Le Gruenwald The University of Oklahoma, School of Computer Science, Norman, OK, 73019

More information

Discovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree

Discovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree Discovery of Multi-level Association Rules from Primitive Level Frequent Patterns Tree Virendra Kumar Shrivastava 1, Parveen Kumar 2, K. R. Pardasani 3 1 Department of Computer Science & Engineering, Singhania

More information

Efficient Remining of Generalized Multi-supported Association Rules under Support Update

Efficient Remining of Generalized Multi-supported Association Rules under Support Update Efficient Remining of Generalized Multi-supported Association Rules under Support Update WEN-YANG LIN 1 and MING-CHENG TSENG 1 Dept. of Information Management, Institute of Information Engineering I-Shou

More information

Temporal Weighted Association Rule Mining for Classification

Temporal Weighted Association Rule Mining for Classification Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider

More information

To Enhance Projection Scalability of Item Transactions by Parallel and Partition Projection using Dynamic Data Set

To Enhance Projection Scalability of Item Transactions by Parallel and Partition Projection using Dynamic Data Set To Enhance Scalability of Item Transactions by Parallel and Partition using Dynamic Data Set Priyanka Soni, Research Scholar (CSE), MTRI, Bhopal, priyanka.soni379@gmail.com Dhirendra Kumar Jha, MTRI, Bhopal,

More information

An Approximate Approach for Mining Recently Frequent Itemsets from Data Streams *

An Approximate Approach for Mining Recently Frequent Itemsets from Data Streams * An Approximate Approach for Mining Recently Frequent Itemsets from Data Streams * Jia-Ling Koh and Shu-Ning Shin Department of Computer Science and Information Engineering National Taiwan Normal University

More information

An Algorithm for Mining Large Sequences in Databases

An Algorithm for Mining Large Sequences in Databases 149 An Algorithm for Mining Large Sequences in Databases Bharat Bhasker, Indian Institute of Management, Lucknow, India, bhasker@iiml.ac.in ABSTRACT Frequent sequence mining is a fundamental and essential

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

Efficient Algorithm for Frequent Itemset Generation in Big Data

Efficient Algorithm for Frequent Itemset Generation in Big Data Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru

More information

Efficient GSP Implementation based on XML Databases

Efficient GSP Implementation based on XML Databases 212 International Conference on Information and Knowledge Management (ICIKM 212) IPCSIT vol.45 (212) (212) IACSIT Press, Singapore Efficient GSP Implementation based on Databases Porjet Sansai and Juggapong

More information

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer

More information

SETM*-MaxK: An Efficient SET-Based Approach to Find the Largest Itemset

SETM*-MaxK: An Efficient SET-Based Approach to Find the Largest Itemset SETM*-MaxK: An Efficient SET-Based Approach to Find the Largest Itemset Ye-In Chang and Yu-Ming Hsieh Dept. of Computer Science and Engineering National Sun Yat-Sen University Kaohsiung, Taiwan, Republic

More information

Implementation of CHUD based on Association Matrix

Implementation of CHUD based on Association Matrix Implementation of CHUD based on Association Matrix Abhijit P. Ingale 1, Kailash Patidar 2, Megha Jain 3 1 apingale83@gmail.com, 2 kailashpatidar123@gmail.com, 3 06meghajain@gmail.com, Sri Satya Sai Institute

More information

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules

Support and Confidence Based Algorithms for Hiding Sensitive Association Rules Support and Confidence Based Algorithms for Hiding Sensitive Association Rules K.Srinivasa Rao Associate Professor, Department Of Computer Science and Engineering, Swarna Bharathi College of Engineering,

More information

An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification

An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification Jingjun Zhu Department of Computer Science and Technology,Tsinghua University sillypig0206@gmail.com

More information

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme Yue Zhang, Yunxia Pei To cite this version: Yue Zhang, Yunxia Pei. A Resource Discovery Algorithm in Mobile Grid Computing

More information

Advanced Eclat Algorithm for Frequent Itemsets Generation

Advanced Eclat Algorithm for Frequent Itemsets Generation International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 9 (2015) pp. 23263-23279 Research India Publications http://www.ripublication.com Advanced Eclat Algorithm for Frequent

More information

An Improved Apriori Algorithm for Association Rules

An Improved Apriori Algorithm for Association Rules Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan

More information

A New Distance Independent Localization Algorithm in Wireless Sensor Network

A New Distance Independent Localization Algorithm in Wireless Sensor Network A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key

More information

A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations

A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.1, January 2013 1 A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations Hiroyuki

More information

A Review on various Location Management and Update Mechanisms in Mobile Communication

A Review on various Location Management and Update Mechanisms in Mobile Communication International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 268-274 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Random Sampling over Data Streams for Sequential Pattern Mining

Random Sampling over Data Streams for Sequential Pattern Mining Random Sampling over Data Streams for Sequential Pattern Mining Chedy Raïssi LIRMM, EMA-LGI2P/Site EERIE 161 rue Ada 34392 Montpellier Cedex 5, France France raissi@lirmm.fr Pascal Poncelet EMA-LGI2P/Site

More information

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42 Pattern Mining Knowledge Discovery and Data Mining 1 Roman Kern KTI, TU Graz 2016-01-14 Roman Kern (KTI, TU Graz) Pattern Mining 2016-01-14 1 / 42 Outline 1 Introduction 2 Apriori Algorithm 3 FP-Growth

More information

Comparing the Performance of Frequent Itemsets Mining Algorithms

Comparing the Performance of Frequent Itemsets Mining Algorithms Comparing the Performance of Frequent Itemsets Mining Algorithms Kalash Dave 1, Mayur Rathod 2, Parth Sheth 3, Avani Sakhapara 4 UG Student, Dept. of I.T., K.J.Somaiya College of Engineering, Mumbai, India

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Improved Apriori Algorithm was Applied in the System of Elective Courses in Colleges and Universities

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

Performance Measurements of 360 Video Streaming to Head-Mounted Displays Over Live 4G Cellular Networks

Performance Measurements of 360 Video Streaming to Head-Mounted Displays Over Live 4G Cellular Networks Performance Measurements of 360 Video Streaming to Head-Mounted Displays Over Live 4G Cellular Networks Wen-Chih Lo, Ching-Ling Fan, Shou-Cheng Yen, and Cheng-Hsin Hsu Department of Computer Science National

More information

An Algorithm for Mining Frequent Itemsets from Library Big Data

An Algorithm for Mining Frequent Itemsets from Library Big Data JOURNAL OF SOFTWARE, VOL. 9, NO. 9, SEPTEMBER 2014 2361 An Algorithm for Mining Frequent Itemsets from Library Big Data Xingjian Li lixingjianny@163.com Library, Nanyang Institute of Technology, Nanyang,

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

Binary Sequences and Association Graphs for Fast Detection of Sequential Patterns

Binary Sequences and Association Graphs for Fast Detection of Sequential Patterns Binary Sequences and Association Graphs for Fast Detection of Sequential Patterns Selim Mimaroglu, Dan A. Simovici Bahcesehir University,Istanbul, Turkey, selim.mimaroglu@gmail.com University of Massachusetts

More information

AC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery

AC-Close: Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery : Efficiently Mining Approximate Closed Itemsets by Core Pattern Recovery Hong Cheng Philip S. Yu Jiawei Han University of Illinois at Urbana-Champaign IBM T. J. Watson Research Center {hcheng3, hanj}@cs.uiuc.edu,

More information

Utility Mining Algorithm for High Utility Item sets from Transactional Databases

Utility Mining Algorithm for High Utility Item sets from Transactional Databases IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 34-40 Utility Mining Algorithm for High Utility Item sets from Transactional

More information

Mining Maximum frequent item sets over data streams using Transaction Sliding Window Techniques

Mining Maximum frequent item sets over data streams using Transaction Sliding Window Techniques IJCSNS International Journal of Computer Science and Network Security, VOL.1 No.2, February 201 85 Mining Maximum frequent item sets over data streams using Transaction Sliding Window Techniques ANNURADHA

More information