+ All Categories
Home > Documents > EECS 800 Research Seminar Mining Biological Data

EECS 800 Research Seminar Mining Biological Data

Date post: 22-Jan-2016
Category:
Upload: maxime
View: 35 times
Download: 0 times
Share this document with a friend
Description:
EECS 800 Research Seminar Mining Biological Data. Instructor: Luke Huan Fall, 2006. Outline for today. Maximal and Closed itemset mining Quantitative itemset mining Association and correlation Summary. Frequent Pattern Analysis. Finding inherent regularities in data - PowerPoint PPT Presentation
51
The UNIVERSITY of Kansas EECS 800 Research Seminar Mining Biological Data Instructor: Luke Huan Fall, 2006
Transcript
Page 1: EECS 800 Research Seminar Mining Biological Data

The UNIVERSITY of Kansas

EECS 800 Research SeminarMining Biological Data

Instructor: Luke Huan

Fall, 2006

Page 2: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide2

8/28/2006Frequent Patterns

Outline for today

Maximal and Closed itemset mining

Quantitative itemset mining

Association and correlation

Summary

Page 3: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide3

8/28/2006Frequent Patterns

Frequent Pattern AnalysisFrequent Pattern Analysis

Finding inherent regularities in data

What products were often purchased together?— Beer and diapers?!

What are the subsequent purchases after buying a PC?

What are the commonly occurring subsequences in a group of genes?

What are the shared substructures in a group of effective drugs?

Page 4: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide4

8/28/2006Frequent Patterns

What Is Frequent Pattern Analysis?

What Is Frequent Pattern Analysis?

Frequent pattern: a pattern (a set of items, subsequences,

substructures, etc.) that occurs frequently in a data set

Applications

Identify motifs in bio-molecules

DNA sequence analysis, protein structure analysis

Identify patterns in micro-arrays

Business applications:

Market basket analysis, cross-marketing, catalog design, sale

campaign analysis, etc.

Page 5: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide5

8/28/2006Frequent Patterns

DataData

An item is an element (a literal, a variable, a symbol, a descriptor, an attribute, a measurement, etc)

A transaction is a set of items

A data set is a set of transactions

A database is a data setTransaction-id Items bought

100 f, a, c, d, g, I, m, p

200 a, b, c, f, l,m, o

300 b, f, h, j, o

400 b, c, k, s, p

500 a, f, c, e, l, p, m, n

Page 6: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide6

8/28/2006Frequent Patterns

Association RulesAssociation Rules

Itemset X = {x1, …, xk}

Find all the rules X Y with minimum support and confidence

support, s, is the probability that a transaction contains X Y

confidence, c, is the conditional probability that a transaction having X also contains Y

Let supmin = 50%, confmin = 50%

Association rules:A C (60%, 100%)C A (60%, 75%)

Customerbuys diaper

Customerbuys both

Customerbuys beer

Transaction-id

Items bought

100 f, a, c, d, g, I, m, p

200 a, b, c, f, l,m, o

300 b, f, h, j, o

400 b, c, k, s, p

500 a, f, c, e, l, p, m, n

Page 7: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide7

8/28/2006Frequent Patterns

Apriori AlgorithmApriori Algorithm

A level-wise, candidate-generation-and-test approach (Agrawal & Srikant 1994)

TID Items

10 a, c, d

20 b, c, e

30 a, b, c, e

40 b, e

Min_sup=2

Itemset Sup

a 2

b 3

c 3

d 1

e 3

Data base D 1-candidates

Scan D

Itemset Sup

a 2

b 3

c 3

e 3

Freq 1-itemsetsItemset

ab

ac

ae

bc

be

ce

2-candidates

Itemset Sup

ab 1

ac 2

ae 1

bc 2

be 3

ce 2

Counting

Scan D

Itemset Sup

ac 2

bc 2

be 3

ce 2

Freq 2-itemsetsItemset

bce

3-candidates

Itemset Sup

bce 2

Freq 3-itemsetsScan D

Page 8: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide8

8/28/2006Frequent Patterns

DIC: Reduce Number of ScansDIC: Reduce Number of Scans

ABCD

ABC ABD ACD BCD

AB AC BC AD BD CD

A B C D

{}

Itemset lattice

Once both A and D are determined frequent, the counting of AD can beginOnce all length-2 subsets of BCD are determined frequent, the counting of BCD can begin

Transactions

1-itemsets2-itemsets

…Apriori

1-itemsets2-items

3-itemsDICS. Brin R. Motwani, J. Ullman, and S. Tsur, 1997.

Page 9: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide9

8/28/2006Frequent Patterns

Construct FP-tree from a Transaction Database

Construct FP-tree from a Transaction Database

{}

f:4 c:1

b:1

p:1

b:1c:3

a:3

b:1m:2

p:2 m:1

Header Table

Item frequency head f 4c 4a 3b 3m 3p 3

min_support = 3

TID Items bought (ordered) frequent items100 {f, a, c, d, g, i, m, p} {f, c, a, m, p}200 {a, b, c, f, l, m, o} {f, c, a, b, m}300 {b, f, h, j, o, w} {f, b}400 {b, c, k, s, p} {c, b, p}500 {a, f, c, e, l, p, m, n} {f, c, a, m, p}

1. Scan DB once, find frequent 1-itemset (single item pattern)

2. Sort frequent items in frequency descending order, f-list

3. Scan DB again, construct FP-tree F-list=f-c-a-b-m-p

Page 10: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide10

8/28/2006Frequent Patterns

Construct FP-tree from a Transaction Database

Construct FP-tree from a Transaction Database

{}

A:4 B:1

D:1

F:1

D:1B:3

C:3

E:2D:1

E:1 F:2

Header Table

Item frequency head f A 4c B 4a C 3b D 3m E 3p F 3

min_support = 3

TID Items bought (ordered) frequent items100 {f, a, c, d, g, i, m, p} {f, c, a, m, p}200 {a, b, c, f, l, m, o} {f, c, a, b, m}300 {b, f, h, j, o, w} {f, b}400 {b, c, k, s, p} {c, b, p}500 {a, f, c, e, l, p, m, n} {f, c, a, m, p}

1. Scan DB once, find frequent 1-itemset (single item pattern)

2. Sort frequent items in frequency descending order, f-list

3. Scan DB again, construct FP-tree F-list=f-c-a-b-m-p

Page 11: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide11

8/28/2006Frequent Patterns

An New Algebraic Frame: Set Enumeration Tree

An New Algebraic Frame: Set Enumeration Tree

Subsets of I can be enumerated systematicallyI={a, b, c, d}

a b c d

ab ac ad bc bd cd

abc abd acd bcd

abcd

Page 12: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide12

8/28/2006Frequent Patterns

Borders of Frequent ItemsetsBorders of Frequent Itemsets

ConnectedX and Y are frequent and X is an ancestor of Y implies that all patterns between X and Y are frequent

a b c d

ab ac ad bc bd cd

abc abd acd bcd

abcd

Page 13: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide13

8/28/2006Frequent Patterns

Projected DatabasesProjected Databases

To find a child Xy of X, only X-projected database is needed

The sub-database of transactions containing X

Item y is frequent in X-projected database

a b c d

ab ac ad bc bd cd

abc abd acd bcd

abcd

Page 14: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide14

8/28/2006Frequent Patterns

Bottleneck of Frequent-pattern Mining

Bottleneck of Frequent-pattern Mining

Multiple database scans are costly

Mining long patterns needs many passes of scanning and generates lots of candidates

To find frequent itemset i1i2…i100

# of scans: 100

# of Candidates: (1001) + (100

2) + … + (11

00

00) = 2100-1 = 1.27*1030

!

Bottleneck: candidate-generation-and-test

Can we avoid candidate generation?

Page 15: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide15

8/28/2006Frequent Patterns

Closed and Maximal PatternsClosed and Maximal Patterns

Solution: Mine closed patterns and max-patterns

An itemset X is closed if X is frequent and there exists no super-pattern Y X, with the same support as X (proposed by Pasquier, et al. @ ICDT’99)

Closed pattern is a lossless compression of freq. patterns

Reducing the # of patterns and rules

An itemset X is maximal if X is frequent and there exists no super-pattern Y X such that Y is frequent

Page 16: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide16

8/28/2006Frequent Patterns

Closed Patterns and Max-PatternsClosed Patterns and Max-Patterns

Exercise. DB = {<a1, …, a100>, < a1, …, a50>}

Min_sup = 1.

What is the set of closed itemset?

<a1, …, a100>: 1

< a1, …, a50>: 2

What is the set of max-pattern?

<a1, …, a100>: 1

What is the set of all patterns?!!

Page 17: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide17

8/28/2006Frequent Patterns

1st scan: find frequent items

A, B, C, D, E

2nd scan: find support for

AB, AC, AD, AE, ABCDE

BC, BD, BE, BCDE

CD, CE, CDE, DE,

Since BCDE is a max-pattern, no need to check BCD, BDE, CDE in

later scan

R. Bayardo. Efficiently mining long patterns from databases. In

SIGMOD’98

MaxMiner: Mining Max-patternsMaxMiner: Mining Max-patterns

Potential max-

patterns

Tid Items

10 A,B,C,D,E

20 B,C,D,E,

30 A,C,D,F

Min_sup=2

Page 18: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide18

8/28/2006Frequent Patterns

CHARM: Mining by Exploring Vertical Data Format

CHARM: Mining by Exploring Vertical Data Format

Vertical format: t(AB) = {T11, T25, …}

tid-list: list of trans.-ids containing an itemset

Deriving closed patterns based on vertical intersectionst(X) = t(Y): X and Y always happen together

t(X) t(Y): transaction having X always has Y

Using diffset to accelerate miningOnly keep track of differences of tids

t(X) = {T1, T2, T3}, t(XY) = {T1, T3}

Diffset (XY, X) = {T2}

Eclat/MaxEclat (Zaki et al. @KDD’97), VIPER(P. Shenoy et al.@SIGMOD’00), CHARM (Zaki & Hsiao@SDM’02)

Page 19: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide19

8/28/2006Frequent Patterns

Example of Vertical Data FormatExample of Vertical Data Format

Page 20: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide20

8/28/2006Frequent Patterns

Frequent, Closed and Maximal Itemsets

Frequent, Closed and Maximal Itemsets

Page 21: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide21

8/28/2006Frequent Patterns

Data FormatsData Formats

Page 22: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide22

8/28/2006Frequent Patterns

Mining ExampleMining Example

{} {A,C,D,T,W}

A {C,D,T,W} C {D,T,W} D {T,W}T {W} W

AC {D,T,W}

ACD {T,W}

ACDT {W}

ACDTW

AD {TW} AT {W} AW CD {T,W}

CDT {W}

CDTW

ACT {W} ACW

ACDW ACTW

ADT ADW ATW

ADTW

CT {W} CW DT ,W}

DTW

DW TW

CDW CTW

Page 23: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide23

8/28/2006Frequent Patterns

Tidset Intersections (example)Tidset Intersections (example)

1

2

3

4

5

6

1

3

4

5

A C2

4

5

6

D1

3

5

6

T W1

2

3

4

5

1

3

4

5

4

5

1

3

5

1

3

4

5

AC AD AT AW

2

4

5

6

1

3

5

6

1

2

3

4

5

5

6

2

4

5

1

3

5

CD CT CW DT DW TW

1

3

5

1

3

4

5

1

3

5

1

3

5

2

4

5

1

3

5

ACT ACW ATW CDW CTW

ACTW

Page 24: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide24

8/28/2006Frequent Patterns

Mining Frequent Closed Patterns: CLOSETMining Frequent Closed Patterns: CLOSET

Flist: list of all frequent items in support ascending order

Flist: d-a-f-e-c

Divide search space

Patterns having d

Patterns having d but no a, etc.

Find frequent closed pattern recursively

Every transaction having d also has cfa cfad is a frequent closed

pattern

J. Pei, J. Han & R. Mao. CLOSET: An Efficient Algorithm

for Mining Frequent Closed Itemsets", DMKD'00.

Min_sup=2

Page 25: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide25

8/28/2006Frequent Patterns

CLOSET+: Mining Closed Itemsets by Pattern-Growth

CLOSET+: Mining Closed Itemsets by Pattern-Growth

Itemset merging: if Y appears in every occurrence of X, then Y is

merged with X

Sub-itemset pruning: if Y כ X, and sup(X) = sup(Y), X and all of X’s

descendants in the set enumeration tree can be pruned

Hybrid tree projection

Bottom-up physical tree-projection

Top-down pseudo tree-projection

Item skipping: if a local frequent item has the same support in

several header tables at different levels, one can prune it from the

header table at higher levels

Efficient subset checking

Page 26: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide27

8/28/2006Frequent Patterns

Mining Quantitative AssociationsMining Quantitative Associations

Techniques can be categorized by how numerical attributes, such as age or salary are treated

1. Static discretization based on predefined concept hierarchies (data cube methods)

2. Dynamic discretization based on data distribution (quantitative rules, e.g., Agrawal & Srikant@SIGMOD96)

3. Clustering: Distance-based association (e.g., Yang & Miller@SIGMOD97)

one dimensional clustering then association

4. Deviation: (such as Aumann and Lindell@KDD99)Sex = female => Wage: mean=$7/hr (overall mean = $9)

Page 27: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide28

8/28/2006Frequent Patterns

Static Discretization of Quantitative Attributes

Static Discretization of Quantitative Attributes

Discretized prior to mining using concept hierarchy.

Numeric values are replaced by ranges.

In relational database, finding all frequent k-predicate sets will

require k or k+1 table scans.

Data cube is well suited for mining.

The cells of an n-dimensional

cuboid correspond to the

predicate sets.

Mining from data cubes

can be much faster.

(income)(age)

()

(buys)

(age, income) (age,buys) (income,buys)

(age,income,buys)

Page 28: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide29

8/28/2006Frequent Patterns

Quantitative Association RulesQuantitative Association Rules

age(X,”34-35”) income(X,”30-50K”) buys(X,”high resolution TV”)

Proposed by Lent, Swami and Widom ICDE’97Numeric attributes are dynamically discretized

Such that the confidence or compactness of the rules mined is maximized

2-D quantitative association rules: Aquan1 Aquan2 Acat

Cluster adjacent association rules to form general rules using a 2D gridExample

Page 29: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide30

8/28/2006Frequent Patterns

Interestingness Measure: Correlations (Lift)

Interestingness Measure: Correlations (Lift)

play basketball eat cereal [40%, 66.7%] is misleading

The overall % of students eating cereal is 75% > 66.7%.

play basketball not eat cereal [20%, 33.3%] is more accurate, although with

lower support and confidence

Measure of dependent/correlated events: lift

89.05000/3750*5000/3000

5000/2000),( CBlift

)()(

)(

BPAP

BAPlift

33.15000/1250*5000/3000

5000/1000),( CBlift

Basketball Not basketball Sum (row)

Cereal 2000 1750 3750

Not cereal 1000 250 1250

Sum(col.) 3000 2000 5000

Page 30: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide31

8/28/2006Frequent Patterns

Are lift and 2 Good Measures of Correlation?

Are lift and 2 Good Measures of Correlation?

“Buy walnuts buy milk [1%, 80%]” is misleading

if 85% of customers buy milk

Support and confidence are not good to represent correlations

So many interestingness measures? (Tan, Kumar, Sritastava @KDD’02)

)()(

)(

BPAP

BAPlift

)sup(_max_

)sup(_

Xitem

Xconfall

|)(|

)sup(

Xuniverse

Xcoh

Milk No Milk Sum (row)

Coffee m, c ~m, c c

No Coffee m, ~c ~m, ~c ~c

Sum(col.) m ~m

DB m, c ~m, c m~c ~m~c lift all-conf coh 2

A1 1000 100 100 10,000 9.26 0.91 0.83 9055

A2 100 1000 1000 100,000 8.44 0.09 0.05 670

A3 1000 100 10000 100,000 9.18 0.09 0.09 8172

A4 1000 1000 1000 1000 1 0.5 0.33 0

Page 31: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide32

8/28/2006Frequent Patterns

Which Measures Should Be Used?Which Measures Should Be Used?

lift and 2 are not good measures for correlations in large transactional DBsall-conf or coherence could be good measures (Omiecinski@TKDE’03)

Both all-conf and coherence have the downward closure property Efficient algorithms can be derived for mining (Lee et al. @ICDM’03sub)

Page 32: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide33

8/28/2006Frequent Patterns

Mining Other Interesting PatternsMining Other Interesting Patterns

Flexible support constraints (Wang et al. @ VLDB’02)Some items (e.g., diamond) may occur rarely but are valuable

Customized supmin specification and application

Top-K closed frequent patterns (Han, et al. @ ICDM’02)Hard to specify supmin, but top-k with lengthmin is more desirable

Dynamically raise supmin in FP-tree construction and mining, and select most

promising path to mine

Page 33: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide34

8/28/2006Frequent Patterns

Mining Multiple-Level Association Rules

Mining Multiple-Level Association Rules

Items often form hierarchiesFlexible support settings

Items at the lower level are expected to have lower support

Exploration of shared multi-level mining (Agrawal & Srikant@VLB’95, Han & Fu@VLDB’95)

uniform support

Milk[support = 10%]

2% Milk [support = 6%]

Skim Milk [support = 4%]

Level 1min_sup = 5%

Level 2min_sup = 5%

Level 1min_sup = 5%

Level 2min_sup = 3%

reduced support

Page 34: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide35

8/28/2006Frequent Patterns

Multi-level Association: Redundancy Filtering

Multi-level Association: Redundancy Filtering

Some rules may be redundant due to “ancestor”

relationships between items.

Example

milk wheat bread [support = 8%, confidence = 70%]

2% milk wheat bread [support = 2%, confidence = 72%]

We say the first rule is an ancestor of the second rule.

A rule is redundant if its support is close to the “expected”

value, based on the rule’s ancestor.

Page 35: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide36

8/28/2006Frequent Patterns

Mining Multi-Dimensional AssociationMining Multi-Dimensional Association

Single-dimensional rules:buys(X, “milk”) buys(X, “bread”)

Multi-dimensional rules: 2 dimensions or predicatesInter-dimension assoc. rules (no repeated predicates)

age(X,”19-25”) occupation(X,“student”) buys(X, “coke”)

hybrid-dimension assoc. rules (repeated predicates)

age(X,”19-25”) buys(X, “popcorn”) buys(X, “coke”)

Categorical Attributes: finite number of possible values, no ordering among values—data cube approach

Quantitative Attributes: numeric, implicit ordering among values—discretization, clustering, and gradient approaches

Page 36: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide37

8/28/2006Frequent Patterns

Constraint-based (Query-Directed) MiningConstraint-based (Query-Directed) Mining

Finding all the patterns in a database autonomously? — unrealistic!

The patterns could be too many but not focused!

Data mining should be an interactive process User directs what to be mined using a data mining query language (or a graphical user interface)

Constraint-based miningUser flexibility: provides constraints on what to be mined

System optimization: explores such constraints for efficient mining—constraint-based mining

Page 37: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide38

8/28/2006Frequent Patterns

Constraints in Data Mining

Knowledge type constraint: classification, association, etc.

Data constraint — using SQL-like queries find product pairs sold together in stores in Chicago in Dec.’02

Dimension/level constraintin relevance to region, price, brand, customer category

Rule (or pattern) constraintsmall sales (price < $10) triggers big sales (sum > $200)

Interestingness constraintstrong rules: min_support 3%, min_confidence 60%

Page 38: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide39

8/28/2006Frequent Patterns

Constrained Mining vs. Constraint-Based Search

Constrained mining vs. constraint-based search/reasoningBoth are aimed at reducing search space

Finding all patterns satisfying constraints vs. finding some (or one) answer in constraint-based search in AI

Constraint-pushing vs. heuristic search

It is an interesting research problem on how to integrate them

Constrained mining vs. query processing in DBMSDatabase query processing requires to find all

Constrained pattern mining shares a similar philosophy as pushing selections deeply in query processing

Page 39: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide40

8/28/2006Frequent Patterns

Anti-Monotonicity in Constraint PushingAnti-Monotonicity in Constraint Pushing

Anti-monotonicityWhen an intemset S violates the constraint, so does any of its superset

sum(S.Price) v is anti-monotone

sum(S.Price) v is not anti-monotone

Example. C: range(S.profit) 15 is anti-monotone

Itemset ab violates C

So does every superset of ab

TDB (min_sup=2)TransactionTID

a, b, c, d, f10

b, c, d, f, g, h20

a, c, d, e, f30

c, e, f, g40

Item Profit

a 40

b 0

c -20

d 10

e -30

f 30

g 20

h -10

Page 40: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide41

8/28/2006Frequent Patterns

Monotonicity for Constraint Pushing

Monotonicity for Constraint Pushing

Monotonicity

When an intemset S satisfies the constraint, so does

any of its superset

sum(S.Price) v is monotone

min(S.Price) v is monotone

Example. C: range(S.profit) 15

Itemset ab satisfies C

So does every superset of ab

TDB (min_sup=2)

TransactionTID

a, b, c, d, f10

b, c, d, f, g, h20

a, c, d, e, f30

c, e, f, g40

Item Profit

a 40

b 0

c -20

d 10

e -30

f 30

g 20

h -10

Page 41: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide42

8/28/2006Frequent Patterns

SuccinctnessSuccinctness

Succinctness:

Given A1, the set of items satisfying a succinctness constraint C, then any

set S satisfying C is based on A1 , i.e., S contains a subset belonging to A1

Idea: Without looking at the transaction database, whether an itemset S

satisfies constraint C can be determined based on the selection of items

min(S.Price) v is succinct

sum(S.Price) v is not succinct

Optimization: If C is succinct, C is pre-counting pushable

Page 42: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide43

8/28/2006Frequent Patterns

The Apriori Algorithm — ExampleThe Apriori Algorithm — Example

TID Items100 1 3 4200 2 3 5300 1 2 3 5400 2 5

Database D itemset sup.{1} 2{2} 3{3} 3{4} 1{5} 3

itemset sup.{1} 2{2} 3{3} 3{5} 3

Scan D

C1L1

itemset{1 2}{1 3}{1 5}{2 3}{2 5}{3 5}

itemset sup{1 2} 1{1 3} 2{1 5} 1{2 3} 2{2 5} 3{3 5} 2

itemset sup{1 3} 2{2 3} 2{2 5} 3{3 5} 2

L2

C2 C2

Scan D

C3 L3itemset{2 3 5}

Scan D itemset sup{2 3 5} 2

Price

1

1

1

1

10

Page 43: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide44

8/28/2006Frequent Patterns

Naïve Algorithm: Apriori + Constraint

Naïve Algorithm: Apriori + Constraint

TID Items100 1 3 4200 2 3 5300 1 2 3 5400 2 5

Database D itemset sup.{1} 2{2} 3{3} 3{4} 1{5} 3

itemset sup.{1} 2{2} 3{3} 3{5} 3

Scan D

C1L1

itemset{1 2}{1 3}{1 5}{2 3}{2 5}{3 5}

itemset sup{1 2} 1{1 3} 2{1 5} 1{2 3} 2{2 5} 3{3 5} 2

itemset sup{1 3} 2{2 3} 2{2 5} 3{3 5} 2

L2

C2 C2

Scan D

C3 L3itemset{2 3 5}

Scan D itemset sup{2 3 5} 2

Constraint:

Sum{S.price} < 5

Price

1

1

1

1

10

Page 44: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide45

8/28/2006Frequent Patterns

The Constrained Apriori Algorithm: Push an Anti-monotone Constraint Deep

The Constrained Apriori Algorithm: Push an Anti-monotone Constraint Deep

TID Items100 1 3 4200 2 3 5300 1 2 3 5400 2 5

Database D itemset sup.{1} 2{2} 3{3} 3{4} 1{5} 3

itemset sup.{1} 2{2} 3{3} 3{5} 3

Scan D

C1L1

itemset{1 2}{1 3}{1 5}{2 3}{2 5}{3 5}

itemset sup{1 2} 1{1 3} 2{1 5} 1{2 3} 2{2 5} 3{3 5} 2

itemset sup{1 3} 2{2 3} 2{2 5} 3{3 5} 2

L2

C2 C2

Scan D

C3 L3itemset{2 3 5}

Scan D itemset sup{2 3 5} 2

Constraint:

Sum{S.price} < 5

Price

1

1

1

1

10

Page 45: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide46

8/28/2006Frequent Patterns

The Constrained Apriori Algorithm: Push a Succinct Constraint Deep

The Constrained Apriori Algorithm: Push a Succinct Constraint Deep

TID Items100 1 3 4200 2 3 5300 1 2 3 5400 2 5

Database D itemset sup.{1} 2{2} 3{3} 3{4} 1{5} 3

itemset sup.{1} 2{2} 3{3} 3{5} 3

Scan D

C1L1

itemset{1 2}{1 3}{1 5}{2 3}{2 5}{3 5}

itemset sup{1 2} 1{1 3} 2{1 5} 1{2 3} 2{2 5} 3{3 5} 2

itemset sup{1 3} 2{2 3} 2{2 5} 3{3 5} 2

L2

C2 C2

Scan D

C3 L3itemset{2 3 5}

Scan D itemset sup{2 3 5} 2

Constraint:

min{S.price } <= 1

not immediately to be used

Price

1

1

1

1

10

Page 46: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide47

8/28/2006Frequent Patterns

Converting “Tough” ConstraintsConverting “Tough” Constraints

Convert tough constraints into anti-monotone or monotone by properly ordering items

Examine C: avg(S.profit) 25Order items in value-descending order

<a, f, g, d, b, h, c, e>If an itemset afb violates C

So does afbh, afb*

It becomes anti-monotone!

TDB (min_sup=2)TransactionTID

a, b, c, d, f10

b, c, d, f, g, h20

a, c, d, e, f30

c, e, f, g40

Item Profit

a 40

b 0

c -20

d 10

e -30

f 30

g 20

h -10

Page 47: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide48

8/28/2006Frequent Patterns

Strongly Convertible ConstraintsStrongly Convertible Constraints

avg(X) 25 is convertible anti-monotone w.r.t. item value descending order R: <a, f, g, d, b, h, c, e>

If an itemset af violates a constraint C, so does every itemset with af as prefix, such as afd

avg(X) 25 is convertible monotone w.r.t. item value ascending order R-1: <e, c, h, b, d, g, f, a>

If an itemset d satisfies a constraint C, so does itemsets df and dfa, which having d as a prefix

Thus, avg(X) 25 is strongly convertible

TDB (min_sup=2)TransactionTID

a, b, c, d, f10

b, c, d, f, g, h20

a, c, d, e, f30

c, e, f, g40

Item Profit

a 40

b 0

c -20

d 10

e -30

f 30

g 20

h -10

Page 48: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide49

8/28/2006Frequent Patterns

Can Apriori Handle Convertible Constraint?

Can Apriori Handle Convertible Constraint?

A convertible, not monotone nor anti-monotone nor succinct constraint cannot be pushed deep into the an Apriori mining algorithm

Within the level wise framework, no direct pruning based on the constraint can be made

Itemset df violates constraint C: avg(X)>=25

Since adf satisfies C, Apriori needs df to assemble adf, df cannot be pruned

But it can be pushed into frequent-pattern growth framework!

Page 49: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide50

8/28/2006Frequent Patterns

Frequent-Pattern Mining: Research Problems

Mining fault-tolerant frequentPatterns allows limited faults (insertion, deletion, mutation)

Mining truly interesting patternsSurprising, novel, concise, …

Theoretic foundation of patterns?For compress data?

For classification analysis?

Application explorationPattern discovery in molecule structures

Pattern discovery in bionetworks

Page 50: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide51

8/28/2006Frequent Patterns

SummarySummary

Closed and maximal pattern discovery

Quantitative association rules

Find pattern with constraints

Page 51: EECS 800 Research Seminar Mining Biological Data

Mining Biological DataKU EECS 800, Luke Huan, Fall’06 slide52

8/28/2006Frequent Patterns

Ref: Basic Concepts of Frequent Pattern Mining

Ref: Basic Concepts of Frequent Pattern Mining

(Association Rules) R. Agrawal, T. Imielinski, and A. Swami. Mining

association rules between sets of items in large databases. SIGMOD'93.

(Max-pattern) R. J. Bayardo. Efficiently mining long patterns from databases.

SIGMOD'98.

(Closed-pattern) N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal. Discovering

frequent closed itemsets for association rules. ICDT'99.

(Sequential pattern) R. Agrawal and R. Srikant. Mining sequential patterns.

ICDE'95


Recommended