Parallel Mining for High Utility Itemsets Mining by Efficient Data Structure

In this paper, we have introduced the RTWU structure and two algorithms – EAHUI-Miner sequential algorithm and PEAHUI-Miner parallel algorithm. Experimental results have showed that the number of candidate sets that EAHUI-Miner generates is less than that of FHM. Moreover, the two proposed algorithms are also faster than two state-of-the-art algorithms (FHM and EFIM), with datasets containing thousands of items and huge numbers of transactions (large databases), but there are fewer items in each transaction. In the future, we plan to test and implement the algorithms using Hadoop framework.

pdf7 trang | Chia sẻ: huongthu9 | Lượt xem: 519 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Parallel Mining for High Utility Itemsets Mining by Efficient Data Structure, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Research and Development on Information and Communication Technology Parallel Mining for High Utility Itemsets Mining by Efficient Data Structure Nguyen Manh Hung1 and Dau Hai Phong2 1 Military Technical Academy, Hanoi, Vietnam 2 Thang Long University, Hanoi, Vietnam E-mail: manhhungk12@mta.edu.vn, phong4u@gmail.com Correspondence: Dau Hai Phong Communication: received 5 July 2017, revised 8 August 2017, accepted 16 August 2017 Abstract: Mining high utility itemsets in transaction database is an important task in data mining and widely applied in many areas. Recently, many algorithms have been proposed, but most algorithms for identifying high utility itemsets need to generate candidate sets by overestimating their utility and then calculating their exact utility value. Therefore, the number of candidate itemsets is much larger than the actual number of high utility itemsets. In this paper, we introduce the Retail Transaction-Weighted Utility (RTWU) structure and propose two algorithms: EAHUI- Miner algorithm and PEAHUI-Miner parallel algorithm. They have been experimented and compared to the two most efficient algorithms: EFIM and FHM. Results show that our algorithm is better with sparse datasets. Keywords: High utility mining, EAHUI-miner, PEAHUI-miner, utility-list, RTWU. I. INTRODUCTION Today, searching for hidden knowledge in huge volume datasets grows rapidly and becomes a very interesting problem. High utility mining, which aims to find a benefit value of an itemset greater than a given threshold, is a difficult problem. Unlike frequent itemset mining, in the mining of high utility itemsets, it is allowed to evaluate the importance of each item in the dataset. One of the challenges in mining high utility itemsets is that they do not have the closure property [1], which ensures that if X is not a high utility itemset then all itemsets containing X are also not high utility itemsets. This leads to increasing the number of candidates and search space. Some high utility mining algorithms proposed a two- phase mining approach, such as Udepth [2], PB [3], HP [4], UP-Growth [5] and UP-Hist [6]. However, algorithms using this approach generate a large number of candidates and require multiple scans of the database. Recently, to avoid the generation of a large number of candidates, algorithms such as HUI-Miner [7], EFIM [8] and FHM [9] attempted to directly search for high utility itemsets in only one phase. In 2012, Liu et al. proposed the HUI-Miner algorithm [7] that uses a utility-list structure to store utility information of each itemset and information for reducing search space. Different from previous algorithms, HUI-Miner does not generate candidate high utility itemsets. After constructing the initial utility-lists from a mined database, HUI-Miner can mine high utility itemsets from these utility-lists. In 2015, Zida and Fournier-Viger proposed the EFIM algorithm [8] that relies on two upper-bounds named sub- tree utility and local utility to more effectively prune the search space. It also introduced a novel array-based utility counting technique named Fast Utility Counting to calculate these upper-bounds in linear time and space. Moreover, to reduce the cost of database scans, EFIM proposes efficient database projection and transaction merging techniques. An extensive experimental study on various datasets showed that EFIM is in general two to three orders of magnitude and memory requirement is up to eight times less than the state-of-art algorithms, such as d2HUP, HUI-Miner, HUP- Miner, FHM, and UP-Growth+. The FHM algorithm [9] restricted the high join cost of the HUI-Miner algorithm [7] based on the closure property of the Transaction-Weighted Utility (TWU). It does not join itemsets containing the pair (x, y) having TWU(x, y) smaller than a given minimum utility threshold. However, as reviewed in [4], the complexity of TWU is more than necessary. In this paper, we propose the Retail Transaction-Weighted Utility (RTWU) structure, the EAHUI-Miner sequential algorithm, and the PEAHUI-Miner parallel algorithm for mining high utility itemsets by efficiently pruning candidate itemsets using the RTWU structure. The paper is organized as follows. First, Section II reviews related works. Then, Sections III and IV respec- 27 Research and Development on Information and Communication Technology TABLE I DATABASE TRANSACTION tid Transactions 1 b:1, c:2, d:1, g:1 2 a:4, b:1, c:3, d:1, e:1 3 a:4, c:2, d:1 4 c:2, e:1, f :1 5 a:5, b:2, d:1, e:2 6 a:3, b:4, c:1, f :2 7 d:1, g:5 TABLE II UTILITY TABLE Item a b c d e f g Utility 1 2 1 5 4 3 1 tively present the EAHUI-Miner and PEAHUI-Miner algo- rithms. Section V gives experimental evaluation. Finally, Section VI concludes the paper. II. RELATED WORKS Let I = {i1, i2, i3, . . . , in} be a set of items and D be a database composed of a utility table and a transaction table. Each item in I has a utility value in the utility table. Each transaction Tj in the transaction table T has a unique transaction identifier (tid = j), and is a subset of I, in which each item is associated with a count value. An itemset is a subset of I and is called a k-itemset if it contains k items. To better explain the concept, we give a database trans- action represented as a table, as Table I, and utilities of the items, as shown in Table II. Definition 1 ([7]): The internal utility of item ik in transaction Tj , denoted as O(ik,Tj), is the count value associated with i in Tj in the transaction table of D. For examples, in Table I, O(a,T2) = 4 and O(d,T2) = 1. Definition 2 ([7]): The external utility of item ik , denoted as S(ik), is the utility value of ik in the utility table of D. For examples, in Table II, S(a) = 1 and S(d) = 5. Definition 3 ([7]): The utility of item ik in transaction Tj , denoted as U(ik,Tj), is the product of O(ik,Tj) and S(ik), that is, U(ik,Tj) = S(ik) ×O(ik,Tj). For examples, U(a,T2) = 1× 4 = 4 and U(d,T2) = 5× 1 = 5. Definition 4 ([7]): The utility of itemset X in transac- tion Tj , denoted as U(X,Tj), is the sum of the utilities of all the items in X in Tj in which X is contained, that is, U(X,Tj) = ∑ (ik ∈X)∧(X⊆Tj ) U(ik,Tj). For example, U({ad},T2) = 1 × 4 + 5 × 1 = 9. Definition 5 ([7]): The utility of itemset X , denoted as U(X), is the sum of the utilities of X in all the transactions Tj containing X in D, that is, U(X) = ∑ (Tj ∈D)∧(X⊆Tj ) U(X,Tj). For example, in Table I, U({ad}) = U({ad},T2) + U({ad},T3) + U({ad},T5) = (1 × 4 + 5 × 1) + (1 × 4 + 5 × 1) + (1 × 5 + 5 × 1) = 28. Definition 6 ([7]): The utility of transaction Tj , denoted as TU(Tj), is the sum of the utilities of all the items in Tj , that is, TU(Tj) = ∑ ik ∈X U(ik,Tj), and the total utility of D is the sum of the utilities of all the transactions in D. For example, TU(T3) = 1 × 4 + 1 × 2 + 5 × 1 = 11 and TU(T4) = 1 × 2 + 4 × 1 + 3 × 1 = 9. Definition 7 ([7]): The transaction-weighted utility of itemset X in D, denoted as TWU(X), is the sum of the utilities of all the transactions containing X in D, that is, TWU(X) = ∑ (X⊆Tj )∧(Tj ∈D) TU(Tj). For example, TWU({ad}) = TU(T2)+TU(T5) = 18+26 = 44. Definition 8 (High transaction-weighted utility itemset (HTWU) [10]): For a given itemset X , X is called a high transaction-weighted utility itemset if TWU(X) ≥ λmin, where λmin is a user-specified threshold. For example, if λmin = 12 and TWU({ad}) then {ad} is HTWU. Definition 9 ([7]): Given an itemset X and a transaction (or itemset) T with X ⊆ T , the set of all the items after X in T is denoted as T/X . For example, in Table I, T2/{abc}= {de} and T2/{cd}= {e}. Definition 10 ([7]): The remaining utility of itemset X in transaction T , denoted as ru(X,T), is the sum of the utilities of all the items in T/X in T , that is, ru(X,T) = ∑ i∈(T/X) U(i,T). For example, ru({abc},T2) = 5 × 1 + 4 × 1 = 9. Definition 11 ([7]): Each element in the utility-list of an itemset X contains three fields: tid, iutil, and rutil, where tid is the identifier of the transaction, Ttid , containing X , iutil is the utility of X in Ttid , i.e., U(X,Ttid), and rutil is the remaining utility of X in Ttid , i.e., ru(X,Ttid). Lemma 1 ([7]): Given the utility-list of an itemset X , if the sum of all the iutils and rutils in the utility-list is less 28 Vol. E–3, No. 14, Sep. 2017 {ab} {ac} {abc} tid iutil rutil tid iutil rutil tid iutil rutil 2 6 12 + 2 7 9 → 2 9 9 5 9 13 3 6 5 6 12 6 6 11 7 6 4 6 Utility = 21 Utility = 26 Utility = 17 Figure 1. Joint utility-list of itemsets {ab} and {ac }. than a given threshold λmin, any extension X ′ of X is not high-utility. For example, the joint utility-list of itemsets {ab} and {ac} from Table I and Table II is shown in Figure 1. Let us join utility-list of two itemsets based on the transaction identifier tid. For example, iutil({abc},T2) = iutil({ab},T2)+iutil({ac},T2)−iutil({a},T2) = 6+7−4 = 9. Similarly, iutil({abc},T6) = iutil({ab},T6) + iutil({ac}, T6) − iutil({a},T6) = 11 + 4 − 3 = 12. Then, calculate rutil({abc},T2) = rutil({c},T2) = 9 and rutil({abc},T6) = rutil({c},T6) = 6. Assuming that λmin = 30, we have the total utility of the itemset {abc} is 21, so the itemset {abc} is not a high utility one. But the sum of the iutil and rutil of the itemset {abc} is 21+ 15 = 36. Thus, the itemset {abc} should still be able to generate high utility itemsets. The FHM algorithm is based on the observation that although HUI-Miner performs a single phase and thus does not generate candidates as does the two-phase model, it explores the search space of itemsets by generating itemsets and a costly join operation has to be performed to evaluate the utility of each itemset. To reduce the number of joins that are performed, FHM proposes a pruning strategy named Estimated Utility Co-occurrence Pruning (EUCP) that can prune itemsets without having to perform joins. Specifically, FHM stores the TWU value of all pairs (a, b) and is based on the closure property of TWU, so all itemsets containing pairs (a, b) and having a TWU value smaller than λmin will not join the utility-list of itemsets. Furthermore, the FHM algorithm mines high itemsets in depth. Assume that items are arranged in the alphabet order, {aX} is an itemset with the prefix a, {bX} is an itemset with the prefix b. Thus, {bX} does not contain item a, but since computation of TWU({bX}) may still contain the utility of item a, the value of TWU({bX}) is the upper bound of U({bX}) and larger than necessary, so using TWU({bX}) to prune candidate itemsets is not effective. III. EAHUI-MINER ALGORITHM In this section we present the RTWU structure and EAHUI-Miner sequential algorithm for mining high utility TABLE III UTILITY-LIST OF {cd} tid iutil itemutil rutil 1 7 5 1 2 8 5 4 3 7 5 0 itemsets using the RTWU structure to effectively pruning candidate itemsets. Definition 12: Extended utility-list of an itemset P is a list of items in which each item consists of 4 fields: tid, iutil, itemutil and rutil, where tid is the identity of transaction containing P, i.e., Ttid , iutil is the utility of itemset P in transaction Ttid , i.e., U(P,Ttid), itemutil is utility of item x in Ttid , i.e., U(x,Ttid), and rutil is remaining utility of transaction Ttid except the utility of P, starting from the item after item x. For example, utility-list of {cd} is shown in Table III. Definition 13: The remaining transaction-weighted util- ity of an item (x, y) (x is before y in order) in a transaction T is the sum of the remaining utilities of all the items in T from item x, denoted as RTWU(x, y,T), that is, RTWU(x, y,T) = ∑ i∈[T/x′] rutil(i,T), where [T/x ′] is the transaction T that does not contain items before item x in T . For example, RTWU(c, d,T2) = 4. Definition 14: The remaining transaction-weighted util- ity of an item pair (x, y) in database D is the sum of the remaining transaction-weighted utilities of pair (x, y) in all transactions containing items x and y in D, denoted as RTWU(x, y), that is, RTWU(x, y) = ∑ (T ∈D)∧((x,y)⊆T ) RTWU(x, y,T). For example, RTWU(c, d) = 1 + 4 + 0 = 5. Definition 15: The RTWU structure is determined by a triplet (x; y; c) ∈ I × I × R, where I is the set of items in the database, x and y are two items of I (x is before y in order), and c is a real number such that c = RTWU(x, y). Definition 16: Sum of all the iutils in the extended utility-list of itemset Px, denoted as Px.sumiutils, i.e., Px.sumiutils = ∑ (Px∈T )∧(T ∈D) U(P,T). Definition 17: Sum of all the rutils in the extended utility-list of itemset Px, denoted as Px.sumrutils, i.e., Px.sumiutils = ∑ (Px∈T )∧(T ∈D) U(T \Px,T). 29 Research and Development on Information and Communication Technology (iutil = U_set; rutil = U_rem; itemutil = U_item). {ab} {ac} tid iutil itemutil rutil tid iutil itemutil rutil 2 4 2 12 2 4 3 9 5 5 4 13 3 4 2 5 6 3 8 7 6 3 1 6 Figure 2. Extended utility-lists of itemsets {ab} and {ac } Definition 18: Sum of all the itemutils in the extended utility-list of itemset Px, denoted as Px.sumitemutils, i.e., Px.sumitemutils = ∑ (Px∈T )∧(T ∈D) U(x,T). Lemma 2: Given two extended utility-lists of itemsets Px and Py of P. If min(Px.sumiutils, Py.sumiutils) + RTWU(x, y) is smaller than λmin then Pxy and expand of Pxy are not high transaction weight utility itemsets. Proof: For all pairs (x, y), we have U(Pxy) = UTIL(P) +UTIL(xy), where U(Pxy) is utility of itemset Pxy in D, UTIL(P) is utility of P in transactions containing Pxy, UTIL(xy) is utility of itemset {xy} in transactions containing Pxy. According to Definition 12 of an extended utility-list and join operation of two extended utility-lists of Px and Py, implemented as join operation of HUI-Miner [7] and FHM [9] algorithms, we have UTIL(P) ≤ min(Px.sumiutils, Py.sumiutils). According to Definition 13 for RTWU(x, y), we have UTIL(xy) ≤ RTWU(x, y). Thus, U(Pxy) = UTIL(P) +UTIL(xy) ≤ min(Px.sumiutils, Py.sumiutils) + RTWU(x, y).  For example, in Figure 2, extended utility-list of itemsets {ab} and {ac}with λmin = 30. According to the FHM algorithm, with the itemset P = {abc} having the utility-list shown in Figure 1, we have P.sumiutils + P.sumrutils = 21 + 15 = 36 and TWU({ab}) = TU(T2)+TU(T5)+TU(T6) = 18+ 22+ 18 = 58. Similarly, TWU({ac}) = 47 and TWU({bc}) = 46. Thus, the itemset P contains pairs (a, b), (a, c) and (b, c), the TWU of each is greater than 30, and since P.sumiutils+ P.sumrutils > 30, it continues to join the utility-list of the itemset P with utility-lists of other itemsets to find high utility itemsets. Above, P = {abc} has P.sumiutils + P.sumrutils = 36 > 30. Algorithm 1: Building extended utility-list Inputs: Px.ULs . extended utility-list of Px; Py.ULs . extended utility-list of Py; Output: Pxy.ULs . extended utility-list of Pxy; function CONSTRUCT(Px, Py) Pxy.ULs = Null; for each item Ex ∈ Px.ULs do if (∃ E y ∈ Py.ULs and Ex.Ttid = E y.Ttid) then Exy = 〈Ex.Ttid, Ex.iutils + Ex.itemutils, E y.itemutils, E y.rutils〉; Insert Exy into Pxy.ULs; end if end for Return Pxy.ULs; end function However, according to Lemma 2, we have min({ab}.sumiutils, {ac}.sumiutils) + RTWU(b, c) = min{(4 + 5 + 3), (4 + 4 + 3)} + (9 + 6) = 11 + 15 = 26 < 30. Thus, it does not join the utility-list of itemset {abc} with utility-lists of other itemsets. Based on Lemma 2, we propose to improve the FHM algorithm using the RTWU structure, which is presented in the next section. 1. Building the Extended Utility-List In the first database scan, the extended utility-list of 1- itemset of P is empty (i.e., P.iutil=0). Extended utility-lists containing k-itemsets (k ≥ 2) are built using Algorithm 1. 2. Mining High Utility Itemsets Algorithm 2 shows the pseudo-code of the EAHUI-Miner algorithm. For each utility-list X in ULs, if the sum of all the utilities of items in X exceeds λmin, then the extension associated with X is high utility and is returned by the algorithm. In EAHUI-Miner, we use the EUCS structure of the FHM algorithm [9] and the RTWU structure of Definition 14. IV. PEAHUI-MINER PARALLEL ALGORITHM In this section, we present the PEAHUI-Miner parallel algorithm derived from the EAHUI-Miner algorithm in Section III. This is a dynamic distribution parallel algo- rithm following a fine-grain and shared memory model to 30 Vol. E–3, No. 14, Sep. 2017 Algorithm 2: High Utility Itemset Mining Algorithm Inputs: ULs . high utility 1-itemset; λmin . minimum utility threshold; Output: HUIs . high utility itemsets. procedure EAHUI-MINER(ULs, λmin) for each utility-list of Px ∈ ULs do if (Px.sumiutils+Px.sumitemutils ≥ λmin) then return Px; end if if (Px.sumiutils + Px.sumitemutils +Px.sumrutils ≥ λmin) then exULs = Null; for each Py after Px ∈ ULs do if (EUCS(x, y) ≥ λmin) & min(Px.sumiutils, Py.sumiutils) +RTWU(x, y) ≥ λmin) then exULs = exULs+Construct(Px, Py); end if Call EAHUI-Miner(exULs, λmin); end for end if end for end procedure improve load balancing between processes. The flowchart of the algorithm is shown in Figure 3. The main parallel step is implemented by the parallel loop structure (#pragma omp parallel for) of the OpenMP library for utility-list of 1-itemsets. The fine-grain parallel is a method which divides each element in the ULs of 1- itemsets for each process. The number of processes is usually much smaller than the number of elements in the ULs. The parallel loop structure will divide the next element in ULs for each processor when it has finished processing the previous element. V. EXPERIMENTS 1. Environment and Data We performed experiments to evaluate the performance of the proposed EAHUI-Miner and PEAHUI-Miner algo- rithms. Experiments were carried out on a computer with a third generation 64-bit core i7 processor running Win- dows 7 and 8 GB of RAM. We compared the performance of EAHUI-Miner with the state-of-the-art algorithms, EFIM and FHM, which are downloaded from the homepage of Fournier-Viger [11]. Our two algorithms are coded by Java, and the OpenMP library is used for the parallel algo- rithm. Experiments were performed using a set of standard . . . Database Caculate utility-list 1-itemsets i = 0 j = m F T j < ULs.size() m1 If (P1 - avaiable) If ( j < m + 1) Mining item ULs(i + 1) Else Mining item ULs( j) If (P1 - avaiable) If ( j < m + 1) Mining item ULs(i + m) Else Mining item ULs( j) j = j + 1 Waiting all threads is completed Finish. Range R(Ptindex) Figure 3. Flowchart of the PEAHUI-Miner algorithm. TABLE IV DATASET CHARACTERISTICS Database AvgLen #Trans #Items T10I4D100K 10 100,000 1,000 T10I4D200K 10 200,000 1,000 Foodmart 4.4 4,141 1,559 Mushroom 23 8,124 119 TABLE V NUMBER OF CANDIDATE ON DIFFERENT DATASETS λmin FHM EAHUI-Miner T10I4D100K 2,500 153,016 125,647 T10I4D200K 2,500 925,994 891,585 Foodmart 1,000 259,876 258,921 Mushroom 100,000 1,588,018 1,587,927 datasets namely T10I4D100K, T10I4D200K, Foodmart and Mushroom. Table IV summarizes their characteristics. 31 Research and Development on Information and Communication Technology Minimum Utility Threshold 100000 150000 200000 R un ni ng ti m e (s) ×105 0 0.5 1 1.5 2 Mushroom EFIM FHM EAHUI-Miner Figure 4. Execution times on Mushroom dataset. Minimum Utility Threshold 1000 1500 2000 R un ni ng ti m e (s) 0 100 200 300 400 500 600 700 Foodmart EFIM FHM EAHUI-Miner Figure 5. Execution times on Foodmart dataset. 2. Candidates and High Utility Itemsets The experimental results of the EAHUI-Miner, PEAHUI- Miner, EFIM, and FHM algorithms are obtained with many minimum thresholds of utility and the same number of high utility itemsets. Table V shows the number of candidates that the two algorithms generated. The results show that number of candidates generated by FHM is larger than that generated by EAHUI-Miner. 3. Running Time Running times of the EFIM, FHM, and EAHUI-Miner algorithms are shown in Figures 4, 5, 6 and 7. The results show that EFIM is very fast on dense datasets with small size for the set I, EAHUI-Miner and FHM are faster than Minimum Utility Threshold 2500 3000 3500 R un ni ng ti m e (s) ×104 0 0.5 1 1.5 2 T10I4D100K EFIM FHM EAHUI-Miner Figure 6. Execution times on T10I4D100K dataset. Minimum Utility Threshold 2500 3000 3500 R un ni ng ti m e (s) ×104 1 1.5 2 2.5 3 3.5 4 T10I4D200K EFIM FHM EAHUI-Miner Figure 7. Execution times on T10I4D200K dataset. EFIM on sparse large datasets with large size for I but there are fewer items in each transaction. Figure 8 and 9 compare the running times of the EAHUI- Miner sequential algorithm and the PEAHUI-Miner parallel algorithm on the T10I4D100K and T10I4D200K datasets. VI. CONCLUSIONS In this paper, we have introduced the RTWU structure and two algorithms – EAHUI-Miner sequential algorithm and PEAHUI-Miner parallel algorithm. Experimental re- sults have showed that the number of candidate sets that EAHUI-Miner generates is less than that of FHM. More- over, the two proposed algorithms are also faster than two state-of-the-art algorithms (FHM and EFIM), with datasets containing thousands of items and huge numbers 32 Vol. E–3, No. 14, Sep. 2017 Minimum Utility Threshold 2500 3000 3500 R un ni ng ti m e (s) ×104 0 0.5 1 1.5 2 T10I4D100K EAHUI-Miner PEAHUI-Miner Figure 8. Execution times on T10I4D100K dataset. Minimum Utility Threshold 2500 3000 3500 R un ni ng ti m e (s) ×104 0.5 1 1.5 2 2.5 T10I4D200K EAHUI-Miner PEAHUI-Miner Figure 9. Execution times on T10I4D200K dataset. of transactions (large databases), but there are fewer items in each transaction. In the future, we plan to test and implement the algorithms using Hadoop framework. REFERENCES [1] R. Agrawal, “Fast algorithms for mining association rules in large databases,” in Proceedings of the 20th International Conference on Very Large Data Bases, 1994, pp. 478–499. [2] W. Song, Y. Liu, and J. Li, “Vertical mining for high utility itemsets,” in IEEE International Conference on Granular Computing (GrC). IEEE, 2012, pp. 429–434. [3] G.-C. Lan, T.-P. Hong, and V. S. Tseng, “An efficient projection-based indexing approach for mining high utility itemsets,” Knowledge and information systems, vol. 38, no. 1, pp. 85–107, 2014. [4] D. H. Phong and N. M. Hung, “Một mô hình hiệu quả khai phá tập mục lợi ích cao,” Research and Development on Information and Communication, pp. 26–36, Jun. 2015. [5] V. S. Tseng, C.-W. Wu, B.-E. Shie, and P. S. Yu, “Up-growth: an efficient algorithm for high utility itemset mining,” in Proceedings of the 16th ACM SIGKDD international con- ference on Knowledge discovery and data mining. ACM, 2010, pp. 253–262. [6] S. Dawar and V. Goyal, “Up-hist tree: An efficient data structure for mining high utility patterns from transac- tion databases,” in Proceedings of the 19th International Database Engineering & Applications Symposium. ACM, 2015, pp. 56–61. [7] M. Liu and J. Qu, “Mining high utility itemsets without candidate generation,” in Proceedings of the 21st ACM international conference on Information and knowledge man- agement. ACM, 2012, pp. 55–64. [8] S. Zida, P. Fournier-Viger, J. C.-W. Lin, C.-W. Wu, and V. S. Tseng, “Efim: a highly efficient algorithm for high-utility itemset mining,” in Mexican International Conference on Artificial Intelligence. Springer, 2015, pp. 530–546. [9] P. Fournier-Viger, C.-W. Wu, S. Zida, and V. S. Tseng, “Fhm: faster high-utility itemset mining using estimated utility co-occurrence pruning,” in International symposium on methodologies for intelligent systems. Springer, 2014, pp. 83–92. [10] Y. Liu, W. keng Liao, and A. Choudhary, “A two-phase algorithm for fast discovery of high utility itemsets,” in Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2005, pp. 689–695. [11] Philippe Fournier-Viger’s site. viger.com. Nguyen Manh Hung received the Ph.D. degree in Computer Science, Scientific Academy, Russian Federation in 2004. He is working in the Postgraduate Department - Military Technical Academy, Hanoi, Viet- nam. His current research interests include: modern data structures, data mining, clas- sification of the high-performance packet. Dau Hai Phong received the Master degree in Information Technology, Military Tech- nical Academy, Hanoi, Vietnam in 2008. He is working in Faculty of Mathemat- ics and Computer Science, Thang Long University. His current research interests include: Data mining, Parallel computing, Distributed Database. 33

Các file đính kèm theo tài liệu này:

  • pdfparallel_mining_for_high_utility_itemsets_mining_by_efficien.pdf