Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (2): 96-109    DOI: 10.1631/jzus.C0910717
    
Mining item-item and between-set correlated association rules
Bin Shen1, Min Yao*,2, Li-jun Xie3, Rong Zhu2, Yun-ting Tang1
1 Ningbo Institute of Technology, Zhejiang University, Ningbo 315100, China 2 School of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China 3 Center for Engineering & Scientific Computation, School of Aeronautics and Astronautics, Zhejiang University, Hangzhou 310027, China
Download:   PDF(246KB)
Export: BibTeX | EndNote (RIS)      

Abstract  To overcome the failure in eliminating suspicious patterns or association rules existing in traditional association rules mining, we propose a novel method to mine item-item and between-set correlated association rules. First, we present three measurements: the association, correlation, and item-set correlation measurements. In the association measurement, the all-confidence measure is used to filter suspicious cross-support patterns, while the all-item-confidence measure is applied in the correlation measurement to eliminate spurious association rules that contain negatively correlated items. Then, we define the item-set correlation measurement and show its corresponding properties. By using this measurement, spurious association rules in which the antecedent and consequent item-sets are negatively correlated can be eliminated. Finally, we propose item-item and between-set correlated association rules and two mining algorithms, I&ISCoMine_AP and I&ISCoMine_CT. Experimental results with synthetic and real retail datasets show that the proposed method is effective and valid.

Key wordsItem-item and between-set correlated association rules      All-confidence      All-item-confidence      Item-set correlation      Mining algorithms      Pruning effect     
Received: 19 November 2009      Published: 08 February 2011
CLC:  TP311  
Cite this article:

Bin Shen, Min Yao, Li-jun Xie, Rong Zhu, Yun-ting Tang. Mining item-item and between-set correlated association rules. Front. Inform. Technol. Electron. Eng., 2011, 12(2): 96-109.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910717     OR     http://www.zjujournals.com/xueshu/fitee/Y2011/V12/I2/96


Mining item-item and between-set correlated association rules

To overcome the failure in eliminating suspicious patterns or association rules existing in traditional association rules mining, we propose a novel method to mine item-item and between-set correlated association rules. First, we present three measurements: the association, correlation, and item-set correlation measurements. In the association measurement, the all-confidence measure is used to filter suspicious cross-support patterns, while the all-item-confidence measure is applied in the correlation measurement to eliminate spurious association rules that contain negatively correlated items. Then, we define the item-set correlation measurement and show its corresponding properties. By using this measurement, spurious association rules in which the antecedent and consequent item-sets are negatively correlated can be eliminated. Finally, we propose item-item and between-set correlated association rules and two mining algorithms, I&ISCoMine_AP and I&ISCoMine_CT. Experimental results with synthetic and real retail datasets show that the proposed method is effective and valid.

关键词: Item-item and between-set correlated association rules,  All-confidence,  All-item-confidence,  Item-set correlation,  Mining algorithms,  Pruning effect 
[1] Deng Chen, Yan-duo Zhang, Wei Wei, Shi-xun Wang, Ru-bing Huang, Xiao-lin Li, Bin-bin Qu, Sheng Jiang. Efficient vulnerability detection based on an optimized rule-checking static analysis technique[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.
[2] Long-xiang Wang, Xiao-she Dong, Xing-jun Zhang, Yin-feng Wang, Tao Ju, Guo-fu Feng. TextGen: a realistic text data content generation method for modern storage system benchmarks[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(10): 982-993.
[3] Shahab Pourtalebi, Imre Horváth. Information schema constructs for defining warehouse databases of genotypes and phenotypes of system manifestation features[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(9): 862-884.
[4] Saif Ur Rehman Khan, Sai Peck Lee, Mohammad Dabbagh, Muhammad Tahir, Muzafar Khan, Muhammad Arif. RePizer: a framework for prioritization of software requirements[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(8): 750-765.
[5] Mohammad Alshayeb, Nasser Khashan, Sajjad Mahmood. A framework for an integrated unified modeling language[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 143-159.
[6] Hui-zong Li, Xue-gang Hu, Yao-jin Lin, Wei He, Jian-han Pan. A social tag clustering method based on common co-occurrence group similarity[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(2): 122-134.
[7] Dipayan DEV,Ripon PATGIRI. Dr. Hadoop: an infinite scalable metadata management for Hadoop—How the baby elephant becomes immortal[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(1): 15-31.
[8] Ignacio Marin, Francisco Ortin, German Pedrosa, Javier Rodriguez. Generating native user interfaces for multiple devices by means of model transformation[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(12): 995-1017.
[9] Hong Yin, Shu-qiang Yang, Xiao-qian Zhu, Shao-dong Ma, Lu-min Zhang. Symbolic representation based on trend features for knowledge discovery in long time series[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(9): 744-758.
[10] Ping Xie, Jian-zhong Huang, Er-wei Dai, Qiang Cao, Chang-sheng Xie. An efficient data layout scheme for better I/O balancing in RAID-6 storage systems[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(5): 335-345.
[11] Xiao-xia Zhang, Qiang-hua Xiao, Bin Li, Sai Hu, Hui-jun Xiong, Bi-hai Zhao. Overlap maximum matching ratio (OMMR): a new measure to evaluate overlaps of essential modules[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(4): 293-300.
[12] Yu-xiang Li, Yin-liang Zhao, Bin Liu, Shuo Ji. Optimization of thread partitioning parameters in speculative multithreading based on artificial immune algorithm[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(3): 205-216.
[13] László Lengyel, Hassan Charaf. Test-driven verification/validation of model transformations[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(2): 85-97.
[14] Alireza Parvizi-Mosaed, Shahrouz Moaven, Jafar Habibi, Ghazaleh Beigi, Mahdieh Naser-Shariat. Towards a self-adaptive service-oriented methodology based on extended SOMA[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 43-69.
[15] Zi-ying Dai, Xiao-guang Mao, Li-qian Chen, Yan Lei. Automatic recovery from resource exhaustion exceptions by collecting leaked resources[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(8): 622-635.