Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (2): 96-109    DOI: 10.1631/jzus.C0910717
    
Mining item-item and between-set correlated association rules
Bin Shen1, Min Yao*,2, Li-jun Xie3, Rong Zhu2, Yun-ting Tang1
1 Ningbo Institute of Technology, Zhejiang University, Ningbo 315100, China 2 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 3 Center for Engineering & Scientific Computation, School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310027, China
Mining item-item and between-set correlated association rules
Bin Shen1, Min Yao*,2, Li-jun Xie3, Rong Zhu2, Yun-ting Tang1
1 Ningbo Institute of Technology, Zhejiang University, Ningbo 315100, China 2 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 3 Center for Engineering & Scientific Computation, School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310027, China
 全文: PDF(246 KB)  
摘要: To overcome the failure in eliminating suspicious patterns or association rules existing in traditional association rules mining, we propose a novel method to mine item-item and between-set correlated association rules. First, we present three measurements: the association, correlation, and item-set correlation measurements. In the association measurement, the all-confidence measure is used to filter suspicious cross-support patterns, while the all-item-confidence measure is applied in the correlation measurement to eliminate spurious association rules that contain negatively correlated items. Then, we define the item-set correlation measurement and show its corresponding properties. By using this measurement, spurious association rules in which the antecedent and consequent item-sets are negatively correlated can be eliminated. Finally, we propose item-item and between-set correlated association rules and two mining algorithms, I&ISCoMine_AP and I&ISCoMine_CT. Experimental results with synthetic and real retail datasets show that the proposed method is effective and valid.
关键词: Item-item and between-set correlated association rulesAll-confidenceAll-item-confidenceItem-set correlationMining algorithmsPruning effect    
Abstract: To overcome the failure in eliminating suspicious patterns or association rules existing in traditional association rules mining, we propose a novel method to mine item-item and between-set correlated association rules. First, we present three measurements: the association, correlation, and item-set correlation measurements. In the association measurement, the all-confidence measure is used to filter suspicious cross-support patterns, while the all-item-confidence measure is applied in the correlation measurement to eliminate spurious association rules that contain negatively correlated items. Then, we define the item-set correlation measurement and show its corresponding properties. By using this measurement, spurious association rules in which the antecedent and consequent item-sets are negatively correlated can be eliminated. Finally, we propose item-item and between-set correlated association rules and two mining algorithms, I&ISCoMine_AP and I&ISCoMine_CT. Experimental results with synthetic and real retail datasets show that the proposed method is effective and valid.
Key words: Item-item and between-set correlated association rules    All-confidence    All-item-confidence    Item-set correlation    Mining algorithms    Pruning effect
收稿日期: 2009-11-19 出版日期: 2011-02-08
CLC:  TP311  
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Bin Shen
Min Yao
Li-jun Xie
Rong Zhu
Yun-ting Tang

引用本文:

Bin Shen, Min Yao, Li-jun Xie, Rong Zhu, Yun-ting Tang. Mining item-item and between-set correlated association rules. Front. Inform. Technol. Electron. Eng., 2011, 12(2): 96-109.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910717        http://www.zjujournals.com/xueshu/fitee/CN/Y2011/V12/I2/96

[1] Deng Chen, Yan-duo Zhang, Wei Wei, Shi-xun Wang, Ru-bing Huang, Xiao-lin Li, Bin-bin Qu, Sheng Jiang. 基于改进规则检查静态分析技术的高效脆弱性检测方法[J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18(3): 332-345.
[2] Long-xiang Wang, Xiao-she Dong, Xing-jun Zhang, Yin-feng Wang, Tao Ju, Guo-fu Feng. TextGen:用于新型存储系统基准测试的真实文本数据集生成方法[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(10): 982-993.
[3] Shahab Pourtalebi, Imre Horváth. 用于定义系统表现特征的基因型与表型仓库数据库的信息图式构造方法[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(9): 862-884.
[4] Saif Ur Rehman Khan, Sai Peck Lee, Mohammad Dabbagh, Muhammad Tahir, Muzafar Khan, Muhammad Arif. RePizer:一种软件需求排序架构[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(8): 750-765.
[5] Mohammad Alshayeb, Nasser Khashan, Sajjad Mahmood. 一种集成的统一建模语言框架[J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17(2): 143-159.
[6] Hui-zong Li, Xue-gang Hu, Yao-jin Lin, Wei He, Jian-han Pan. 基于共同共现群体相似度的社会化标签聚类方法[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 122-134.
[7] . Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(1): 15-31.
[8] Ignacio Marin, Francisco Ortin, German Pedrosa, Javier Rodriguez. 使用模型变换为多种终端生成原生用户界面[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(12): 995-1017.
[9] Hong Yin, Shu-qiang Yang, Xiao-qian Zhu, Shao-dong Ma, Lu-min Zhang. 基于趋势特征的时间序列符号化方法[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(9): 744-758.
[10] Ping Xie, Jian-zhong Huang, Er-wei Dai, Qiang Cao, Chang-sheng Xie. 一种负载平衡的RAID-6存储方案[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(5): 335-345.
[11] Xiao-xia Zhang, Qiang-hua Xiao, Bin Li, Sai Hu, Hui-jun Xiong, Bi-hai Zhao. OMMR:一种关键模块重叠部分评价指标[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 293-300.
[12] Yu-xiang Li, Yin-liang Zhao, Bin Liu, Shuo Ji. 基于人工免疫算法的推测多线程线程划分参数的优化[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(3): 205-216.
[13] László Lengyel, Hassan Charaf. 测试驱动的模式转换检验/认证[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(2): 85-97.
[14] Alireza Parvizi-Mosaed, Shahrouz Moaven, Jafar Habibi, Ghazaleh Beigi, Mahdieh Naser-Shariat. 基于扩展型服务导向建模与应用(SOMA)的一种自适应服务导向方法[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 43-69.
[15] Zi-ying Dai, Xiao-guang Mao, Li-qian Chen, Yan Lei. Automatic recovery from resource exhaustion exceptions by collecting leaked resources[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(8): 622-635.