340 likes | 524 Views
Mining Frequent Item Sets by Opportunistic Projection. Junqiang Liu 1,4 , Yunhe Pan 1 , Ke Wang 2 , Jiawei Han 3 1 Institute of Artificial Intelligence, Zhejiang University, China 2 School of Computing Science, Simon Fraser University, Canada 3 Department of Computer Science, UIUC, USA
E N D
Mining Frequent Item Sets by Opportunistic Projection Junqiang Liu1,4, Yunhe Pan1, Ke Wang2, Jiawei Han3 1 Institute of Artificial Intelligence, Zhejiang University, China 2 School of Computing Science, Simon Fraser University, Canada 3 Department of Computer Science, UIUC, USA 4 Dept. of CS, Hangzhou University of Commerce, China
Outline • How to discover frequent item sets • Previous works • Our approach: Mining Frequent Item Sets by Opportunistic Projection • Performance evaluations • Conclusions
What Are Frequent Items Sets • What is a frequent item set? • set of items, X, that occurs together frequently in a database, i.e., support(X) ≥ a given threshold • Example Given support threshold 3, frequent item sets are as follows: a:3, b:3, c:4, f :4, m:3, p:3, ac:3, af :3, am:3, cf :3, cm:3, cp:3, fm:3, acf :3, acm:3, afm:3, cfm:3, acfm:3
How To Discover Frequent Item Sets • Frequent item sets can be represented by a tree, which is not necessarily materailized. • Mining process: • a process of tree construction, accompanied by • a process of projecting transaction subsets
Frequent Item Set Tree - FIST • FIST is an ordered tree • each node: (item,weight) • the following are imposed • items ordered on a path (top-down) • items ordered at children (left to right) • Frequent item set • a path starting from the FIST root • its support is the ending node’s weight • PTS - projected transaction subset • Each FIST node has its own PTS, filtered or unfiltered • All transactions that support the frequent item set represented by the node
Factors relate toMining Efficiency and Scalability • The FIST construction strategy • breadth first v.s. depth first • The PTS representation • Memory-based representation: array-based, tree-based, vertical bitmap, horizontal bitstring, etc. • Disk-based representation • PTS projecting method and item counting method
Our Approach: Mining Frequent Item Sets by Opportunistic Projection • Philosophy: The algorithm must adapt the construction strategy of FIST, the representation of PTS, and the methods of item counting in and projection of PTSs to the features of PTSs. • Main points: • Mining sparse data by projecting array-based PTS • Intelligent projecting tree-based PTS for dense data • Heuristics for opportunistic projection
Mining sparse data by projecting array-based PTS • TVLA– threaded varied length array for sparse PTS • FIL– local frequent items list • LQ –linked queues • arrays Each local frequent item has a FIL entry that consists of an item, a count, & a pointer. Each transaction is stored in an array that is threaded to FIL by LQ according to the heading item in the imposing order.
How to project TVLA for PTS • Arrays (transactions) that support a node’s first child are threaded by the LQ attached to the first entry of FIL. (see previous figure) • TVLA for a child node’s PTS has its own FIL and LQ. • A child TVLA is unfiltered if it shares arrays with its parent, filtered otherwise.
How to project TVLA for PTS (cont.) Get next child’s PTS by shifting transactions threaded in the LQ currently explored (current child’s PTS)
Intelligent projecting tree-based PTS for dense data • Tree-based Representation of dense PTS, inspired by FP-Growth • Novel projectingmethods, totally differ from FP-Growth • Bottom up pseudo projection • Top down pseudo projection
Tree-based Representation of dense PTS • TTF - threaded transaction forest • IL - item list: each entry consists of an item, a count, and a pointer. • Forest: each node labeled by an item, associated with a weight. Each local item in PTS has an entry in the IL. Each transaction in the PTS is one path starting from a root in the forest. count is the number of transactions represented by the path. All nodes of the same item threaded by an IL entry. TTF is filtered if only local frequent items appear in TTF, otherwise unfiltered.
Opportunistic Projection: Observations and Heuristics • Observation 1: • Upper portion of a FIST can fit in memory. • Transactions’ Number that support length k item sets decreases sharply when k is greater than 2. • Heuristic 1: • Grow the upper portion of a FIST breadth first. • Grow the lower portion under level k depth first, whenever the reduced transaction set can be represented by a memory based structure, either TVLA or TTF.
Opportunistic Projection: Observations and Heuristics(2) • Observation 2: • TTF compresses well at lower levels or denser branches, where there are fewer local frequent items in PTSs and the relative support is larger. • TTF is space expensive relative to TVLA if its compression ratio is less than 6-t/n ( t: number of transactions, n: number of items in a PTS). • Heuristic 2: • Represent PTSs by TVLA at high levels on FIST, unless the estimated compression ratio of TTF is sufficiently high.
Opportunistic Projection: Observations and Heuristics(3) • Observation 3: • PTSs shrink very quickly at high levels or sparse branches on FIST where filtered PTSs are usually in form of TVLA. • PTSs at lower levels or dense branches shrink slowly where PTSs are represented by TTF. The creation of filtered TTF involves expensive pattern matching. • Heuristic 3: • Make a filtered copy for the child TVLA as long as there is free memory when projecting a parent TVLA. • Delimitate the pseudo child TTF first and then make a filtered copy if it shrinks substantially sharp when projecting a parent TTF.
Algorithm OpportuneProject • OpportuneProject(Database: D) • begin • create a null root for frequent item set tree T; • D’= BreadthFirst(T, D); • GuidedDepthFirst(root_of_T, D’); • end
Performance Evaluation:Scalability on T25I20D100k~15mN20kL5k
Conclusions • OpportuneProject • maximize efficiency and scalability for all data features by combining • depth first with breadth first search strategies • array-based and tree-based representation for projected transaction subsets • unfiltered, and filetered projections
Acknowledgement We would like to thank Blue Martini Software, Inc. for providing us the BMS datasets!
References • [1] R. Agarwal, C. Aggarwal, and V. V. V. Prasad. A tree projection algorithm for generation of frequent itemsets. In Journal of Parallel and Distributed Computing (Special Issue on High Performance Data Mining), 2000. • [2] R. Agarwal, C. Aggarwal, and V. V. V. Prasad. Depth first generation of long patterns, in Proceedings of SIGKDD Conference, 2000. • [3] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between sets of items in large databases. In SIGMOD’93, Washington, D.C., May 1993. • [4] R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB'94, pp. 487-499, Santiago, Chile, Sept. 1994. • [5] R.J.Bayardo. Efficiently mining long patterns from databases. In SIGMOD’98, pp. 85-93, Seattle, Washington, June 1998. • [6] D.Burdick, M.Calimlim, J.Gehrke. MAFIA: A maximal frequent itemset algorithm for transactional databases. In proceedings of the 17th Internation Conference on Data Engineering, Heidelberg, Germany, April 2001. • [7] Sergey Brin, Rajeev Motwani, Jeffrey D. Ullman, Shalom Tsur. Dynamic Itemset Counting and Implication Rules for Market Basket Analysis. In SIGMOD’97, 255-264. Tucson, AZ, May 1997.
References (2) • [8] J. Han and Y. Fu. Discovery of multiple-level association rules from large databases. In VLDB'95, Zuich, Switzerland, Sept. 1995. • [9] J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD’2000, Dallas, TX, May 2000. • [10] D-I. Lin and Z. M. Kedem. Pincer-search: A new algorithm for discovering the maximum frequent set. In 6th Intl. Conf. Extending Database Technology, March 1998. • [11] J.S.Park, M.S.Chen, and P.S.Yu. An effective hash based algorithm for mining association rules. In Proc. 1995 ACM-SIGMOD, 175-186, San Jose, CA, Feb. 1995. • [12] J. Pei, J. Han, H. Lu, S. Nishio, S. Tang, and D. Yang, H-Mine: Hyper-Structure Mining of Frequent Patterns in Large Databases, Proc. 2001 Int. Conf. on Data Mining (ICDM'01)}, San Jose, CA, Nov. 2001. • [13] Ashok Sarasere, Edward Omiecinsky, and Shamkant Navathe. An efficient algorithm for mining association rules in large databases. In 21st Int'l Conf. on Very Large Databases (VLDB), Zurich, Switzerland, Sept. 1995.
References (3) • [14] H.Toivonen. Sampling large databases for association rules. In Proc. 1996 Int. Conf. Very Large Data Bases (VLDB’96), 134-145, Bombay, India, Sept. 1996. • [15] Zijian Zheng, Ron Kohavi and Llew Mason. Real World Performance of Association Rule Algorithms. In Proc. 2001 Int. Conf. on Knowledge Discovery in Databases (KDD'01), San Francisco, California, Aug. 2001. • [16] http://fuzzy.cs.uni-magdeburg.de/~borgelt/src/apriori.exe • [17] http://www.almaden.ibm.com/cs/quest/syndata.html • [18] http://www.ics.uci.edu/~mlearn/MLRepository.html