Cockroach Swarm Optimization Algorithm for High Utility Association Rule Mining

2021 ◽  
Vol 12 (3) ◽  
pp. 58-77
Author(s):  
Sivamathi Abarajithan ◽  
S. Vijayarani Mohan

Association rule mining is an important and widely used data mining technique. It is used to retrieve highly related objects in a database based on the occurrence. Recently, utility-based association rules were proposed to consider significant factors of the object. The main objective of this research work is to retrieve high utility association rules from a database using cockroach swarm optimization algorithm. So far, in the literature, no optimization algorithm was proposed in utility-based association rule mining. In this research work, CSOUAR (cockroach swarm optimization for high utility association rule mining) algorithm was proposed to generate utility association rules. CSOUAR algorithm is based on three behaviours of cockroach: chase-swarming, dispersing, and ruthless. To analyse the performance of CSOUAR, an improved particle swarm optimization (PSO-UAR), animal migration optimization (AMO-UAR), bees swarm optimisation (BSO-UAR), and penguins search optimisation (peSO-UAR) are also proposed in this work.

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Zhicong Kou ◽  
Lifeng Xi

An effective data mining method to automatically extract association rules between manufacturing capabilities and product features from the available historical data is essential for an efficient and cost-effective product development and production. This paper proposes a new binary particle swarm optimization- (BPSO-) based association rule mining (BPSO-ARM) method for discovering the hidden relationships between machine capabilities and product features. In particular, BPSO-ARM does not need to predefine thresholds of minimum support and confidence, which improves its applicability in real-world industrial cases. Moreover, a novel overlapping measure indication is further proposed to eliminate those lower quality rules to further improve the applicability of BPSO-ARM. The effectiveness of BPSO-ARM is demonstrated on a benchmark case and an industrial case about the automotive part manufacturing. The performance comparison indicates that BPSO-ARM outperforms other regular methods (e.g., Apriori) for ARM. The experimental results indicate that BPSO-ARM is capable of discovering important association rules between machine capabilities and product features. This will help support planners and engineers for the new product design and manufacturing.


Author(s):  
Suma B. ◽  
Shobha G.

<div>Association rule mining is a well-known data mining technique used for extracting hidden correlations between data items in large databases. In the majority of the situations, data mining results contain sensitive information about individuals and publishing such data will violate individual secrecy. The challenge of association rule mining is to preserve the confidentiality of sensitive rules when releasing the database to external parties. The association rule hiding technique conceals the knowledge extracted by the sensitive association rules by modifying the database. In this paper, we introduce a border-based algorithm for hiding sensitive association rules. The main purpose of this approach is to conceal the sensitive rule set while maintaining the utility of the database and association rule mining results at the highest level. The performance of the algorithm in terms of the side effects is demonstrated using experiments conducted on two real datasets. The results show that the information loss is minimized without sacrificing the accuracy. </div>


2011 ◽  
Vol 3 (2) ◽  
pp. 41-61 ◽  
Author(s):  
Nasser S. Abouzakhar ◽  
Huankai Chen ◽  
Bruce Christianson

The integration of fuzzy logic with data mining methods such as association rules has achieved interesting results in various digital forensics applications. As a data mining technique, the association rule mining (ARM) algorithm uses ranges to convert any quantitative features into categorical ones. Such features lead to the sudden boundary problem, which can be smoothed by incorporating fuzzy logic so as to develop interesting patterns for intrusion detection. This paper introduces a Fuzzy ARM-based intrusion detection model that is tested on the CAIDA 2007 backscatter network traffic dataset. Moreover, the authors present an improved algorithm named Matrix Fuzzy ARM algorithm for mining fuzzy association rules. The experiments and results that are presented in this paper demonstrate the effectiveness of integrating fuzzy logic with association rule mining in intrusion detection. The performance of the developed detection model is improved by using this integrated approach and improved algorithm.


Author(s):  
Manisha Gupta

Determination of the threshold values of support and confidence, affect the quality of association rule mining up to a great extent. Focus of my study is to apply weighted PSO for evaluating threshold values for support and confidence. The particle swarm optimization algorithm first searches for the optimum fitness value of each particle and then finds corresponding support and confidence as minimal threshold values after the data are transformed into binary values. The proposed method is verified by applying the Food Mart 2000 database of Microsoft SQL Server 2000. I am expecting that the particle swarm optimization algorithm will suggest suitable threshold values and obtain quality rules as per the previous works [1].


2016 ◽  
Vol 3 (1) ◽  
pp. 45-57 ◽  
Author(s):  
Reshu Agarwal ◽  
Mandeep Mittal ◽  
Sarla Pareek

Temporal association rule mining is a data mining technique in which relationships between items which satisfy certain timing constraints can be discovered. This paper presents the concept of temporal association rules in order to solve the problem of classification of inventories by including time expressions into association rules. Firstly, loss profit of frequent items is calculated by using temporal association rule mining algorithm. Then, the frequent items in particular time-periods are ranked according to descending order of loss profits. The manager can easily recognize most profitable items with the help of ranking found in the paper. An example is illustrated to validate the results.


2020 ◽  
Vol 54 (3) ◽  
pp. 365-382
Author(s):  
Praveen Kumar Gopagoni ◽  
Mohan Rao S K

PurposeAssociation rule mining generates the patterns and correlations from the database, which requires large scanning time, and the cost of computation associated with the generation of the rules is quite high. On the other hand, the candidate rules generated using the traditional association rules mining face a huge challenge in terms of time and space, and the process is lengthy. In order to tackle the issues of the existing methods and to render the privacy rules, the paper proposes the grid-based privacy association rule mining.Design/methodology/approachThe primary intention of the research is to design and develop a distributed elephant herding optimization (EHO) for grid-based privacy association rule mining from the database. The proposed method of rule generation is processed as two steps: in the first step, the rules are generated using apriori algorithm, which is the effective association rule mining algorithm. In general, the extraction of the association rules from the input database is based on confidence and support that is replaced with new terms, such as probability-based confidence and holo-entropy. Thus, in the proposed model, the extraction of the association rules is based on probability-based confidence and holo-entropy. In the second step, the generated rules are given to the grid-based privacy rule mining, which produces privacy-dependent rules based on a novel optimization algorithm and grid-based fitness. The novel optimization algorithm is developed by integrating the distributed concept in EHO algorithm.FindingsThe experimentation of the method using the databases taken from the Frequent Itemset Mining Dataset Repository to prove the effectiveness of the distributed grid-based privacy association rule mining includes the retail, chess, T10I4D100K and T40I10D100K databases. The proposed method outperformed the existing methods through offering a higher degree of privacy and utility, and moreover, it is noted that the distributed nature of the association rule mining facilitates the parallel processing and generates the privacy rules without much computational burden. The rate of hiding capacity, the rate of information preservation and rate of the false rules generated for the proposed method are found to be 0.4468, 0.4488 and 0.0654, respectively, which is better compared with the existing rule mining methods.Originality/valueData mining is performed in a distributed manner through the grids that subdivide the input data, and the rules are framed using the apriori-based association mining, which is the modification of the standard apriori with the holo-entropy and probability-based confidence replacing the support and confidence in the standard apriori algorithm. The mined rules do not assure the privacy, and hence, the grid-based privacy rules are employed that utilize the adaptive elephant herding optimization (AEHO) for generating the privacy rules. The AEHO inherits the adaptive nature in the standard EHO, which renders the global optimal solution.


Sign in / Sign up

Export Citation Format

Share Document