An efficient method for mining non-redundant sequential rules using attributed prefix-trees

被引:28
|
作者
Thi-Thiet Pham [1 ]
Luo, Jiawei [2 ]
Tzung-Pei Hong [3 ,4 ]
Bay Vo [5 ]
机构
[1] Ind Univ Ho Chi Minh City, Fac Informat Technol, Ho Chi Minh City, Vietnam
[2] Hunan Univ, Sch Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[3] Natl Univ Kaohsiung, Dept Comp Sci & Informat Engn, Kaohsiung, Taiwan
[4] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
[5] Ton Duc Thang Univ, Fac Informat Technol, Ho Chi Minh City, Vietnam
关键词
Sequential pattern; Sequential generator pattern; Closed sequential pattern; Non-redundant sequential rule; Prefix-tree; ASSOCIATION RULES; LATTICE; PATTERN; ALGORITHM;
D O I
10.1016/j.engappai.2014.02.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mining sequential generator patterns and mining closed sequential patterns are important to sequence mining. They address difficulties in the mining of sequential patterns by reducing the number of sequential rules, and the results are often used to generate non-redundant sequential rules. This paper proposes an efficient method for mining non-redundant sequential rules from an attributed prefix-tree. The proposed method has two phases. In the first phase, it builds a prefix-tree that stores all the sequential patterns from a given sequence database. Then in the second phase, it mines non-redundant sequential rules from this prefix-tree. In the prefix-tree building process, each node on the prefix-tree has a field that indicates whether this node is a minimal sequential generator pattern, and another field that indicates whether this node is a closed sequential pattern. By traversing the prefix-tree, nonredundant sequential rules can be easily mined from a minimal sequential generator pattern X to a closed sequential pattern Y such that X is a prefix of Y. In addition, a good pruning mechanism is proposed to reduce the search space and the execution time in the mining process. Experimental results show that the proposed method is more efficient than existing methods in mining non-redundant sequential rules. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:88 / 99
页数:12
相关论文
共 41 条
  • [1] An Approach for Mining Non-Redundant Sequential Rules Efficiently
    Minh-Thai Tran
    Bay Vo
    Bac Le
    Tzung-Pei Hong
    [J]. PROCEEDINGS OF 2015 2ND NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT CONFERENCE ON INFORMATION AND COMPUTER SCIENCE NICS 2015, 2015, : 277 - 282
  • [2] Mining Non-Redundant Association Rules
    Mohammed J. Zaki
    [J]. Data Mining and Knowledge Discovery, 2004, 9 : 223 - 248
  • [3] Mining non-redundant association rules
    Zaki, MJ
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2004, 9 (03) : 223 - 248
  • [4] Mining Non-redundant Reclassification Rules
    Tsay, Li-Shiang
    Im, Seunghyun
    [J]. NEXT-GENERATION APPLIED INTELLIGENCE, PROCEEDINGS, 2009, 5579 : 806 - +
  • [5] Mining non-redundant sequential rules with dynamic bit vectors and pruning techniques
    Minh-Thai Tran
    Bac Le
    Bay Vo
    Hong, Tzung-Pei
    [J]. APPLIED INTELLIGENCE, 2016, 45 (02) : 333 - 342
  • [6] Mining non-redundant sequential rules with dynamic bit vectors and pruning techniques
    Minh-Thai Tran
    Bac Le
    Bay Vo
    Tzung-Pei Hong
    [J]. Applied Intelligence, 2016, 45 : 333 - 342
  • [7] Towards Efficient Mining of Non-Redundant Recurrent Rules from a Sequence Database
    Yoon, SeungYong
    Seki, Hiroshisa
    [J]. 2017 IEEE 10TH INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (IWCIA), 2017, : 141 - 146
  • [8] Efficient Algorithm for Mining Non-Redundant High-Utility Association Rules
    Thang Mai
    Nguyen, Loan T. T.
    Bay Vo
    Yun, Unil
    Hong, Tzung-Pei
    [J]. SENSORS, 2020, 20 (04)
  • [9] Non-redundant sequential rules-Theory and algorithm
    Lo, David
    Khoo, Siau-Cheng
    Wong, Limsoon
    [J]. INFORMATION SYSTEMS, 2009, 34 (4-5) : 438 - 453
  • [10] Optimized algorithm for Mining Valid and non-Redundant Rules
    Liu, Naili
    Ma, Lei
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 851 - 854