IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

High Utility Item Sets Mining From Transactional Databases Shanta Kallur , Lingaraj Hadimani 1

2

Mtech student, KLESCET, Vishweshwaraiyya Technological University Belgaum, Karnataka, India [email protected]

Asst.Proffessor, KLESCET, Vishweshwaraiyya Technological University Belgaum, Karnataka, India [email protected]

Abstract Mining high utility item sets from transactional databases means to discovery of item sets with high utility like profits, costs. Although, frequency of occurrence may reflects statistical correlation between items, and it does not reflect semantic significance of the items because the user's interest may be related to other factors, such as cost and profit. Utility based item set mining approach is used to overcome this limitation .In this paper, we propose an algorithm, namely UP-Growth (Utility Pattern Growth) and for mining high utility item sets with a set of effective strategies for pruning candidate item sets. The information of high utility item sets is maintained in a tree-based data structure named UP-Tree (Utility Pattern Tree) such that candidate item sets can be generated efficiently with only two scans of database.

Keywords: PHUI –potential high utility item sets, Apriori-based algorithms, OEU–over estimated utility, DGU- Discarding global unpromising items, HTWUI-high transactional weighted utility item set. TUTransactional Utility

1. INTRODUCTION Data mining is the process of revealing nontrivial, previously unknown and potentially useful information from large databases. Mining high utility item sets from the databases refers to finding the item sets with high utilities. The basic meaning of utility is the interestedness/importance/profitability of items to the users. An item set is called a high utility item set if its utility is no less than a user specified threshold; otherwise, the item set is called a low utility item set. Here we proposed an algorithm, named utility pattern growth (UP Growth) and a compact tree structure, called utility pattern tree (UP-Tree), for discovering high utility item sets and maintaining important information related to utility patterns within databases are proposed. High-utility item sets can be generated from UP-Tree efficiently with only two scans of original databases.

2. LITERATURE SURVEY 2.1 Previous Research work 2.1.1 Frequent pattern mining using Apriori and FP-growth methods

Shanta Kallur, IJRIT

246

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

Extensive studies have been proposed for mining frequent patterns [1], [2]. Among the issues of frequent pattern mining, the most famous are association rule mining and sequential pattern mining .One of the well-known algorithms for mining association rules is Apriori [1], which is the pioneer for efficiently mining association rules from large databases. Pattern growth-based association rule mining algorithms such as FPGrowth were afterward proposed. It is widely recognized that FP-Growth achieves a better performance than Apriori-based algorithms since it finds frequent item sets without generating any candidate item set and scans database just twice. In the framework of frequent mining, the importance of items to users is not considered. Thus, the topic called weighted association rule mining was brought to attention 2.1.2 Incremental and Interactive Mining Research has been done to develop techniques for incremental and interactive mining in the area of traditional frequent pattern mining, and they have shown that incremental prefix-tree structures such as CanTree , CP-tree , FUFP-tree , etc., are quite possible and efficient using currently available memory in the gigabyte range. The efficient dynamic database updating algorithm (EDUA) is designed for mining databases when data deletion is performed frequently in any database subset. IncWTP and WssWTP algorithms are designed for incremental and interactive mining of Web traversal patterns. However, these solutions are not applicable for incremental and interactive high utility pattern mining. In the existing high utility pattern mining works, no one has proposed a solution for incremental mining, where many new transactions can be added, and existing transactions can be deleted/modified. Moreover, none of the data structures have the “build once mine many” property. Therefore, we propose new tree structures for incremental high utility pattern mining techniques containing the “build once mine many” property. Our algorithm maintains the downward closure property with a transaction-weighted utilization value of a pattern, and uses FP-growth mining operation to avoid level-wise candidate generation-and-test problem. 2.1.3 High Utility Pattern Mining The Item set Share approach considers multiple frequencies of an item in each transaction. Share is the percentage of a numerical total that is contributed by the items in an item set. The authors define the problem of finding share frequent item sets and compare the share and support measures to illustrate that the share measure approach can provide useful information about the numerical values that are associated with transaction items, which is not possible using only the support measure. This method cannot rely on the downward closure property. The authors developed heuristic methods to find item sets with share values above the minimum share threshold. Mining high utility item sets developed top-K objective-directed high utility closed patterns. The authors’ definitions are different from our work. They assume the same medical treatment for different patients (different transactions) will have different levels of effectiveness. They cannot maintain the downward closure property but they develop a pruning strategy to prune low-utility item sets based on a weaker antimonotony condition. The theoretical model and definitions of high utility pattern mining were given in [5]. This approach, called mining with expected utility (MEU), cannot maintain the downward closure property of Apriori and the authors of [5] used a heuristic to determine whether an item set should be considered as a candidate item set. Also, MEU usually overestimates, especially at the beginning stages, where the number of candidates approaches the number of all the combinations of items. This trait is impractical whenever the number of distinct items is large and the utility threshold is low. Later, the same authors proposed two new algorithms, UMining and UMiningH to calculate the high utility patterns. In UMining, a pruning strategy based on utility upper bound property is used. UMining H has been designed with another pruning strategy based on a heuristic method. However, some high utility item sets may be erroneously pruned by their heuristic method. Moreover, these methods do not satisfy the downward closure property of Apriori, and therefore, overestimate too many patterns. They also suffer from excessive candidate generations and poor test methodology. The Two-Phase [7], [8] algorithm was developed based on the definitions of [5] to find high utility item sets using the downward closure property of Apriori. The authors have defined the transaction-weighted utilization (TWU) and by that they proved it is possible to maintain the downward closure property. For the first database scan, the algorithm finds all the oneelement transaction-weighted utilization item sets, and based on that result, it generates the candidates for two element transaction-weighted utilization item sets. In the second database scan, it finds all the two-element transaction- weighted utilization item sets, and based on that result, it generates the candidates for three-element transaction weighted utilization item sets, and so on. At the last scan, the Two-Phase algorithm determines the actual high utility item sets from the high transaction-weighted utilization item sets. This algorithm suffers from the same problem of the level-wise candidate generation-and-test methodology. CTU-Mine proposed an algorithm that is more efficient than the Two Phase method only in dense databases when the minimum utility threshold is very low. Another algorithm presents an approximation to solve the high utility pattern mining Shanta Kallur, IJRIT 247

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

problem through specialized partition trees, called high-yield partition trees. The isolated items discarding strategy (IIDS) for discovering high utility item sets was proposed to reduce the number of candidates in every database scan. IIDS shows that item set share mining [9] problem can be directly converted to the utility mining problem by replacing the frequency value of each item in a transaction by its total profit, i.e., multiplying the frequency value by its unit profit. Applying IIDS, the authors developed efficient high utility item set mining algorithms called FUM and DCG+ and showed that their technique is better than all previous high utility pattern mining techniques.

3. PROPOSED METHOD In this section, we first introduce the proposed data structure, named UP-Tree, and then describe the proposed algorithm, called UP-Growth, in details. The framework of the proposed method consists of three parts: (1) construction of UP-Tree, (2) generation of potential high utility item sets from the UP-Tree by UP-Growth, and (3) identification of high utility item sets from the set of potential high utility item sets.

3.1 BACKGROUND In this section, we first give some definitions and define the problem of utility mining, and then introduce related work in utility mining. Problem Definition Given a finite set of items I = {i1, i2… im}. Each item ip (1 ≤ p ≤ m) has a unit profit p (ip). An item set X is a set of k distinct items {i1, i2… ik}, where ij belongs to I, 1≤ j ≤ k, and k is the length of X. An item set with length k is called k-item set. A transaction database D = {T1, T2… Tn} contains a set of transactions, and each transaction Td (1 ≤ d ≤ n) has an unique identifier d, called TID. Each item ip in the transaction Td is associated with a quantity q(ip, Td), that is, the purchased number of ip in Td. Definition 1. The utility of an item ip in the transaction Td is Denoted as u (ip, Td) and defined as p(ip) × q(ip, Td). For example, in Table 1, u({A}, T1) = 5 × 1 = 5. Definition 2. The utility of an item set X in Td is denoted as u(X, Td) and defined as ∑ u (ip, Td). For example ({AC}, T1) =u({A}, T1) + u({C}, T1) = 5 + 1=6. Definition 3. The utility of an item set X in D is denoted as u(X) and defined as ∑ u(X,Td ) .For example u({AD}) i.e u({AD})=u({AD}, T1) + u({AD}, T3) =7 + 17 =24.

3.2 The Proposed Data Structure: UP-Tree To facilitate the mining performance and avoid scanning original database repeatedly, we use a compact tree structure, called UP-Tree to maintain the information of transactions and high utility item sets. 3.2.1 The elements in UP-Tree In UP-Tree, each node N includes N.name, N.count, N.nu, N.parent, N.hlink and a set of child nodes. The details are introduced as follows. N.name is the item name of the node. N.count is the support count of the node [5]. N.nu is called node utility which is an estimate utility value of the node. N.parent records the parent node of the node. N.hlink is a node link which points to a node whose item name is the same as N.name. Header table is employed to facilitate the traversal of UP-Tree 3.2.2 Discarding global unpromising items during the construction of a global UP-Tree The construction of UP-Tree can be performed with two scans of the original database. In the first scan of database, the transaction utility of each transaction is computed. At the same time, TWU of each single item is also accumulated. After scanning database once, items and their TWUs are obtained.

Shanta Kallur, IJRIT

248

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

Definition 4. (Promising item and unpromising item) An item iP is called a promising item if TWU(iP)  min_util. Otherwise, the item is called an unpromising item. Example 1. Consider the transaction database in Table 1 and the profit table in Table 2. Suppose the minimum utility threshold min_util is 40. In the first scan of database, TUs of the transactions and the TWUs of the items are computed. They are shown in the last column of Table 1 and in Table 3, respectively. As shown in Table 3, {F} and {G} are unpromising items. Example 2. Consider the reorganized transactions in Table 4. The first reorganized transaction T1’ = {C, A, D} leads to create a branch in UP-Tree. The first node {C} is created under the root with {C}.count = 1 and {C}.nu = 8. The second node {A} is created under node {A} with {A}.count = 1 and {A}.nu = 8. The third node {C} is created as a child of node {A} with {C}.count =1 and {C}.nu = 8. When the next reorganized transaction T2’ = {C, E, A} is retrieved, the node utility of the node {C} is increased by 22 and {C}.count is increased by 1. Then, a new node {E} is created under {C} with {E}.count=1 and {E}.nu = 22. Similarly, a new node {A} is

created under the node {E} with {A}.count=1 and {A}.nu = 22. The reorganized transactions T3’, T4’ and T5’ are inserted in the same way. After inserting all reorganized transactions, the construction of a global UP-Tree with strategy DGU is complete. The global UP-Tree is shown in Figure1.

Strategy 1. Discarding global unpromising items (DGU). The unpromising items and their utilities are eliminated from the transaction utilities during the construction of a global UP-Tree. Strategy 2. Discarding global node utilities (DGN). For any node in a global UP-Tree, the utilities of its descendants are discarded from the utility of the node during the construction of a global UP-Tree.

Shanta Kallur, IJRIT

249

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

3.3 The Proposed Mining Method: UP-Growth In this section, we describe the details of UP-Growth for efficiently generating PHUIs from the global UP-Tree with two strategies, namely DLU (Discarding local unpromising items) and DLN (Decreasing local node utilities), we maintain a minimum item utility table, abbreviated as MIUT, to maintain the minimum item utility for all global promising items. Strategy 3. Discarding local unpromising items (DLU). The minimum item utilities of unpromising items are discarded from path utilities of the paths during the construction of a local UP-Tree. Example 3. Consider {D}’s conditional pattern base shown in Table 5. Table 6 shows the local items in {D}CPB and their path utilities. In Table 6, a local unpromising item {A} is identified. During the second scan of {D}-CPB, local unpromising item {A} is removed from the path {AC} and {BAEC}, respectively. The minimum item utilities of {A} in the above paths, that is, miu ({A}) × {AC}.count = 5×1 = 5 and miu ({A}) × {BAEC}.count = 5×1, are eliminated from the path utilities of {AC} and {BAEC}, respectively. After that, the reorganized paths and the reduced path utilities are shown in Table 5. Here, the path utilities of the paths in {D}CPB are shown to be further reduced after applying strategy DLU. Stratege4. Decreasing local node utilities (DLN). The minimum item utilities of descendant nodes for the node are decreased during the construction of a local UP-Tree. Example 4. Consider {D}’s conditional pattern base shown in Table 8, the reorganized transactions are shown in the second Column, and their path utilities which are reduced by strategies DGU, DGN and DLU are shown in the last column. When the first reorganized path {C} is inserted into the {D}-Tree, the first node {C} is created under the root R’ with {C}.count = 1 and {C}.nu = 3. When the second path {C, B, E} is inserted into the tree, {C}.count is increased by 1, and {C}.nu is increased by (20 – (miu({B}) × 1 + miu({E}) × 1))= 20 – (4+3) = 13. After that, {C}.nu is equal to 16. The second node {B} is crated under the node {C} with {B}.count = 1 and {B}.nu = (20 – miu({E}) × 1) = 20 – 3 = 17. The last node {E} is created under the node {B}

with {E}.count = 1 and {E}.nu = 20. After inserting all paths in {D}-CPB, {D}-Tree is constructed completely. Figure 3(b) shows a conditional UP-Tree for item {D} when the four strategies are applied. Comparing with {D}-Tree shown in Figure 3(a), the node utilities of the nodes in {D}Tree are further reduced by applying both strategies DLU and DLN.

The procedure of the UP-Growth is shown as follows: Subroutine: UP-Growth (Tx, Hy, X) Input: A UP-Tree Tx, a header table Hy for Tx and an item set X. Output: All PHUIs in Tx. Procedure UP-Growth (Tx, Hy, X) (1) For each entry ai in Hy do (2) Generate a PHUI Y = X U ai ; (3) The estimate utility of Y is set as ai’s utility value in Hx; (4) Construct Y’s conditional pattern base Y-CPB; (5) Put local promising items in Y-CPB into H y (6) Apply strategy DLU to reduce path utilities of the paths; (7) Apply strategy DLN and insert paths into Ty; (8) If Ty is not null then call UP-Growth(Ty, Hy, Y); (9) End for Shanta Kallur, IJRIT

250

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

3.4Advantages of proposed system are as follows: • • • •

The information of high utility item sets is maintained in a tree-based data structure named utility pattern tree (UP-Tree). High utility item sets can be generated efficiently with only two scans of database. It reduces the memory required for storing data in databases. It reduces time required to calculate frequent pattern with high utility.

4. SYSTEM ARCHITECTURE

Here, in this system architecture User has to select the list of item sets and make some transactions. After that all the transactions made by the users are going to be stored in My SQL database. Then mining system has to fetch the all item sets. It will use an UP-Growth algorithm for calculating high utility item sets. Once the high utility item sets are calculated then they are to be displayed to the user in appropriate manner.

5. DATA FLOW DIAGRAM

Here, in this above data flow diagram first user will make some transactions by selecting item sets from list. Then all the transactions are given to the TU generator process as inputs. TU generator process will calculate Transactional Utility of each transaction. Then Distinct item selection process will separate the each individual items in transactions. Each distinct item is given to TU calculator process; It calculates the transactional utility Shanta Kallur, IJRIT

251

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 246- 252

of each item sets and check with the threshold value. If the TU of an item is greater or equal to Threshold value then it will be considered as a high utility item.

6. CONCLUSION In this paper, we have proposed an efficient algorithm named UP-Growth for mining high utility item sets from transaction databases. A data structure named UP-Tree is proposed for maintaining the information of high utility item sets. Hence, the potential high utility item sets can be efficiently generated from the UP-Tree with only two scans of the database. Besides, we develop four strategies to decrease the estimated utility value and enhance the mining performance in utility mining.

ACKNOWLEDGEMENTS Our thanks to respected senior lecturers and experts who guided in this development of the template. The research is supported in our KLE college computer science department.

REFERENCES [1] R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB), pp. 487-499, 1994. [2] C.F. Ahmed, S.K. Tanbeer, B.-S. Jeong, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1708-1721, Dec. 2009. [3] M.-S. Chen, J.-S. Park, and P.S. Yu, “Efficient Data Mining for Path Traversal Patterns,” IEEE Trans. Knowledge and Data Eng., vol. 10, no. 2, pp. 209-221, Mar. 1998. [4] C.H. Cai, A.W.C. Fu, C.H. Cheng, and W.W. Kwong, “Mining Association Rules with Weighted Items,” Proc. Int’l Database Eng. and Applications Symp. (IDEAS ’98), 1998. [5] K. Sun and F. Bai, “Mining Weighted Association Rules without Preassigned Weights,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 4, pp. 489-495, Apr. 2008. [6] Tao, F., Murtagh, F., and Farid, M. Weighted Association Rule Mining using Weighted Support and Significance Framework. Proc. of International Conference on Knowledge Discovery and Data mining, 2003. [7] C. F. Ahmed, S. K. Tanbeer, B.-S. Jeong, and Y.-K. Lee. Efficient tree structures for high utility pattern mining in incremental databases. In IEEE Transactions on Knowledge and Data Engineering, Vol. 21, Issue 12, pp.2009. [8] U.Yun, “An Efficient Mining of Weighted Frequent Patterns with Length Decreasing Support Constraints,” Knowledge-Based Systems, vol. 21, no. 8, pp. 741-752, Dec. 2008. [9] Y. Liu, W. Liao, and A. Choudhary, “A Fast High Utility Item sets Mining Algorithm,” Proc. Utility-Based Data Mining Workshop, 2005. [10] B.-E. Shie, H.-F. Hsiao, V., S. Tseng, and P.S. Yu, “Mining High Utility Mobile Sequential Patterns in Mobile Commerce Environments,” Proc. 16th Int’l Conf. Database Systems for Advanced Applications (DASFAA ’11), vol. 6587/2011, pp. 224-238, 2011. [11] Silberschatz, A., Tuzhilin, A. What Makes Patterns Interesting in Knowledge Discovery Systems. IEEE Transactions on Knowledge and Data Engineering, 8(6), December 1996.

Shanta Kallur, IJRIT

252

High Utility Item Sets Mining From Transactional Databases - IJRIT

Large Data Bases (VLDB), pp. 487-499, 1994. ... Proc. of International Conference on Knowledge Discovery and Data mining, 2003. [7] C. F. Ahmed, S. K. ...

2MB Sizes 1 Downloads 204 Views

Recommend Documents

High Utility Item Sets Mining From Transactional Databases - IJRIT
Mining high utility item sets from transactional databases means to discovery of ..... Here, in this system architecture User has to select the list of item sets and ...

Improved Mining of Outliers in Distributed Large Data Sets ... - IJRIT
achieve a large time savings and it meets two basic requirements: the reduction of the ... of real data sets and in the prevalence of distributed data sources [11].

Improved Mining of Outliers in Distributed Large Data Sets ... - IJRIT
Abstract- In Data Mining, a distributed approach for detecting distance-based ... of all the data sets is widely adopted solution requires to a single storage and .... This implementation is portable on a large number of parallel architectures and it

X-FTL: transactional FTL for SQLite databases
Jun 27, 2013 - ‡School of Computer Science and Engineering. Seoul National University. Seoul, 151-744, Korea [email protected]. ABSTRACT. In the era of smartphones and mobile computing, many pop- ular applications such as Facebook, twitter, Gmail, a

Data Mining: Current and Future Applications - IJRIT
(KDD), often called data mining, aims at the discovery of useful information from ..... Advanced analysis of data for extracting useful knowledge is the next natural ...

Data Mining: Current and Future Applications - IJRIT
Artificial neural networks: Non-linear predictive models that learn through training ..... Semi-supervised learning and social network analysis are other methods ...

Data Mining: Current and Future Applications - IJRIT
Language. (SQL). Oracle, Sybase,. Informix, IBM,. Microsoft. Retrospective, dynamic data delivery at record level. Data Warehousing. &. Decision Support. (1990s). "What were unit sales in. New England last. March? Drill down to. Boston. On-line analy

Reading from SQL databases - GitHub
Description. odbcDriverConnect() Open a connection to an ODBC database. sqlQuery(). Submit a query to an ODBC database and return the results. sqlTables(). List Tables on an ODBC Connection. sqlFetch(). Read a table from an ODBC database into a data

Mining Frequent Highly-Correlated Item-Pairs at Very ...
results when mining very large data sets. 1. Introduction ... During this analysis we discovered that much of the ... compute frequent pairs from very large datasets. ..... Equipment And Software Platform Used .... architecture-conscious solution.

CONFERENCE: Creating Probabilistic Databases from ...
arbitrary time series, which can work in online as well as offline fashion. ... a lack of effective tools that are capable of creating such ... ICDE Conference 2011.

Mining Spatial Patterns in Mix-Quality Text Databases
i.e. the Web, can hide interesting information of realistic colocation ... method involves automatically summarization from free-text databases to n-gram models ...

A Robust Solution for Collaborative Data Mining - IJRIT
His research interests include networking and cloud computing. ... He is Microsoft Certified System Engineer & CISCO Certified Network Administrator, ...

A Robust Solution for Collaborative Data Mining - IJRIT
... is the approach in which multiple data providers share their data for data mining tasks .... He is Microsoft Certified System Engineer & CISCO Certified Network ...

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
An OLAP is market-oriented which is used for data analysis by knowledge ..... The data warehouse environment supports the entire decision. Database. Source.

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
used for transactions and query processing by clerks, clients. An OLAP is market-oriented which is used for data analysis by knowledge employees, including ...

Extracting Coactivated Features from Multiple Data Sets
s Background information on the extraction of related features from multiple data sets s Explanation of the statistical model underlying our method s Testing our ...

Designing of High-Performance Floating Point Processing ... - IJRIT
Abstract— This paper presents the design and evaluation of two new processing ... arithmetic processing units which allow modular system design in order to ...

Designing of High-Performance Floating Point Processing ... - IJRIT
Digital signal processing and multimedia applications require large amounts of data, real-time processing ability, and very high computational power. As a result ...

do arbitrage free prices come from utility maximization?
Bank account with no interest. Exist martingale measures. No constraints on strategy H. Agent. Maximal expected utility u(x,q) := sup. H. E[U(x + qf + ∫ T. 0.