54
CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Embed Size (px)

DESCRIPTION

CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets. Apriori Algorithm. Method: Let k=1 Generate frequent itemsets of length 1 Repeat until no new frequent itemsets are identified Generate length (k+1) candidate itemsets from length k frequent itemsets - PowerPoint PPT Presentation

Citation preview

Page 1: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

CPS 196.03: Information Management and Mining

Association Rules and Frequent Itemsets

Page 2: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Apriori Algorithm

Method:

– Let k=1– Generate frequent itemsets of length 1– Repeat until no new frequent itemsets are identified

Generate length (k+1) candidate itemsets from length k frequent itemsets

Prune candidate itemsets containing subsets of length k that are infrequent

Count the support of each candidate by scanning the DB Eliminate candidates that are infrequent, leaving only those

that are frequent

Page 3: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Generating Candidate ItemSets

Exhaustive enumeration F(k-1) x F(1) Using (lexicographic) ordering F(k-1) x F(k-1) Will hashing help?

Page 4: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Reducing Number of Comparisons Candidate counting:

– Scan the database of transactions to determine the support of each candidate itemset

– To reduce the number of comparisons, store the candidates in a hash structure Instead of matching each transaction against every candidate, match it against candidates contained in the hashed buckets

TID Items 1 Bread, Milk 2 Bread, Diaper, Beer, Eggs 3 Milk, Diaper, Beer, Coke 4 Bread, Milk, Diaper, Beer 5 Bread, Milk, Diaper, Coke

N

Transactions Hash Structure

k

Buckets

Page 5: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Suppose you have 15 candidate itemsets of length 3:

{1 4 5}, {1 2 4}, {4 5 7}, {1 2 5}, {4 5 8}, {1 5 9}, {1 3 6}, {2 3 4}, {5 6 7}, {3 4 5}, {3 5 6}, {3 5 7}, {6 8 9}, {3 6 7}, {3 6 8}

You need:

• Hash function

•Max leaf size: max number of itemsets stored in a leaf node (if number of candidate itemsets exceeds max leaf size, split the node)

Generate Hash Tree

1,4,72,5,8

3,6,9Hash function

Page 6: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Association Rule Discovery: Hash tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1,4,7

2,5,8

3,6,9

Hash Function Candidate Hash Tree

Hash on 1, 4 or 7

Page 7: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Association Rule Discovery: Hash tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1,4,7

2,5,8

3,6,9

Hash Function Candidate Hash Tree

Hash on 2, 5 or 8

Page 8: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Association Rule Discovery: Hash tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1,4,7

2,5,8

3,6,9

Hash Function Candidate Hash Tree

Hash on 3, 6 or 9

Page 9: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Subset Operation

1 2 3 5 6

Transaction, t

2 3 5 61 3 5 62

5 61 33 5 61 2 61 5 5 62 3 62 5

5 63

1 2 31 2 51 2 6

1 3 51 3 6 1 5 6 2 3 5

2 3 6 2 5 6 3 5 6

Subsets of 3 items

Level 1

Level 2

Level 3

63 5

Given a transaction t, what are the possible subsets of size 3?

Page 10: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Subset Operation Using Hash Tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1 2 3 5 6

1 + 2 3 5 6 3 5 62 +

5 63 +

1,4,7

2,5,8

3,6,9

Hash Functiontransaction

Page 11: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Subset Operation Using Hash Tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1,4,7

2,5,8

3,6,9

Hash Function1 2 3 5 6

3 5 61 2 +

5 61 3 +

61 5 +

3 5 62 +

5 63 +

1 + 2 3 5 6

transaction

Page 12: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Subset Operation Using Hash Tree

1 5 9

1 4 5 1 3 63 4 5 3 6 7

3 6 83 5 63 5 76 8 9

2 3 45 6 7

1 2 44 5 7

1 2 54 5 8

1,4,7

2,5,8

3,6,9

Hash Function1 2 3 5 6

3 5 61 2 +

5 61 3 +

61 5 +

3 5 62 +

5 63 +

1 + 2 3 5 6

transaction

Match transaction against 11 out of 15 candidates

Page 13: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Factors Affecting Performance Choice of minimum support threshold

– lowering support threshold results in more frequent itemsets– this may increase number of candidates and max length of

frequent itemsets Dimensionality (number of items) of the data set

– more space is needed to store support count of each item– if number of frequent items also increases, both computation and

I/O costs may also increase Size of database

– since Apriori makes multiple passes, run time of algorithm may increase with number of transactions

Average transaction width– number of subsets in a transaction increases with its width– this may increase max length of frequent itemsets and traversals

of hash tree

Page 14: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Compact Representation of Frequent Itemsets

Some itemsets are redundant because they have identical support as their supersets

Number of frequent itemsets

Need a compact representation

TID A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 C1 C2 C3 C4 C5 C6 C7 C8 C9 C101 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 02 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 03 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 04 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 05 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 06 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 07 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 08 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 09 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 010 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 011 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 112 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 113 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 114 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 115 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1

10

1

103

k k

Page 15: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Compression of Itemset Information

TID Items

1 ABC

2 ABCD

3 BCE

4 ACDE

5 DE

null

AB AC AD AE BC BD BE CD CE DE

A B C D E

ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE

ABCD ABCE ABDE ACDE BCDE

ABCDE

124 123 1234 245 345

12 124 24 4 123 2 3 24 34 45

12 2 24 4 4 2 3 4

2 4

Transaction Ids

Not supported by any transactions

Page 16: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Maximal Frequent Itemset

null

AB AC AD AE BC BD BE CD CE DE

A B C D E

ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE

ABCD ABCE ABDE ACDE BCDE

ABCDE

BorderInfrequent Itemsets

Maximal Itemsets

An itemset is maximal frequent if none of its immediate supersets is frequent

Page 17: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Closed Itemset

An itemset is closed if none of its immediate supersets has the same support as the itemset

TID Items1 {A,B}2 {B,C,D}3 {A,B,C,D}4 {A,B,D}5 {A,B,C,D}

Itemset Support{A} 4{B} 5{C} 3{D} 4

{A,B} 4{A,C} 2{A,D} 3{B,C} 3{B,D} 4{C,D} 3

Itemset Support{A,B,C} 2{A,B,D} 3{A,C,D} 2{B,C,D} 3

{A,B,C,D} 2

Page 18: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Maximal vs Closed Itemsets

TID Items

1 ABC

2 ABCD

3 BCE

4 ACDE

5 DE

null

AB AC AD AE BC BD BE CD CE DE

A B C D E

ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE

ABCD ABCE ABDE ACDE BCDE

ABCDE

124 123 1234 245 345

12 124 24 4 123 2 3 24 34 45

12 2 24 4 4 2 3 4

2 4

Transaction Ids

Not supported by any transactions

Page 19: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Maximal vs Closed Frequent Itemsets

null

AB AC AD AE BC BD BE CD CE DE

A B C D E

ABC ABD ABE ACD ACE ADE BCD BCE BDE CDE

ABCD ABCE ABDE ACDE BCDE

ABCDE

124 123 1234 245 345

12 124 24 4 123 2 3 24 34 45

12 2 24 4 4 2 3 4

2 4

Minimum support = 2

# Closed = 9

# Maximal = 4

Closed and maximal

Closed but not maximal

Page 20: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Maximal vs Closed Itemsets

FrequentItemsets

ClosedFrequentItemsets

MaximalFrequentItemsets

Page 21: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Why Do We Care About Closed Itemsets? Compact representation of frequent itemsets

– Helps if there are many frequent itemsets– There are efficient algorithms that can

efficiently find the closed itemsets (and only them)

HW Exercise: Come up with an algorithm to generate all info about frequent itemsets given info about closed frequent itemsets?

Closed itemsets help identify redundant association rules– E.g., if {b} and {b,c} have the same support: then

would you care about {b} -> {d} or {b,c} -> {d}?

Page 22: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Toivonen’s Algorithm --- (1)

Start as in the simple algorithm, but lower the threshold slightly for the sample.– Example: if the sample is 1% of the baskets, use

s/125 as the support threshold rather than s /100.– Goal is to avoid missing any itemset that is frequent in

the full set of baskets.

Page 23: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Toivonen’s Algorithm --- (2)

Add to the itemsets that are frequent in the sample the negative border of these itemsets.

An itemset is in the negative border if it is not deemed frequent in the sample, but all its immediate subsets are.

Page 24: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Example

ABCD is in the negative border if and only if it is not frequent, but all of ABC, BCD, ACD, and ABD are.

Page 25: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Toivonen’s Algorithm --- (3)

In a second pass, count all candidate frequent itemsets from the first pass, and also count the negative border.

If no itemset from the negative border turns out to be frequent, then the candidates found to be frequent in the whole data are exactly the frequent itemsets.

Page 26: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Toivonen’s Algorithm --- (4)

What if we find something in the negative border is actually frequent?

We must start over again! Try to choose the support threshold so the

probability of failure is low, while the number of itemsets checked on the second pass fits in main-memory.

Page 27: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Alternative Methods for Frequent Itemset Generation

Traversal of Itemset Lattice– General-to-specific vs Specific-to-general

Frequentitemsetborder null

{a1,a2,...,an}

(a) General-to-specific

null

{a1,a2,...,an}

Frequentitemsetborder

(b) Specific-to-general

..

......

Frequentitemsetborder

null

{a1,a2,...,an}

(c) Bidirectional

..

..

Page 28: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Alternative Methods for Frequent Itemset Generation

Traversal of Itemset Lattice– Equivalent Classes

null

AB AC AD BC BD CD

A B C D

ABC ABD ACD BCD

ABCD

null

AB AC ADBC BD CD

A B C D

ABC ABD ACD BCD

ABCD

(a) Prefix tree (b) Suffix tree

Page 29: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Alternative Methods for Frequent Itemset Generation

Traversal of Itemset Lattice– Breadth-first vs Depth-first

(a) Breadth first (b) Depth first

Page 30: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Alternative Methods for Frequent Itemset Generation

Representation of Database– horizontal vs vertical data layout

TID Items1 A,B,E2 B,C,D3 C,E4 A,C,D5 A,B,C,D6 A,E7 A,B8 A,B,C9 A,C,D10 B

HorizontalData Layout

A B C D E1 1 2 2 14 2 3 4 35 5 4 5 66 7 8 97 8 98 109

Vertical Data Layout

Page 31: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

ECLAT

For each item, store a list of transaction ids (tids)

TID Items1 A,B,E2 B,C,D3 C,E4 A,C,D5 A,B,C,D6 A,E7 A,B8 A,B,C9 A,C,D

10 B

HorizontalData Layout

A B C D E1 1 2 2 14 2 3 4 35 5 4 5 66 7 8 97 8 98 109

Vertical Data Layout

TID-list

Page 32: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

ECLAT Determine support of any k-itemset by intersecting tid-lists

of two of its (k-1) subsets.

3 traversal approaches: – top-down, bottom-up and hybrid

Advantage: very fast support counting Disadvantage: intermediate tid-lists may become too large

for memory

A1456789

B12578

10

AB1578

Page 33: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Bottleneck of Frequent-pattern Mining

Multiple database scans are costly Mining long patterns needs many passes of

scanning and generates lots of candidates– To find frequent itemset i1i2…i100

# of scans: 100# of Candidates: (100

1) + (1002) + … + (1

10

00

0) = 2100-1 = 1.27*1030 !

Bottleneck: candidate-generation-and-test Can we avoid candidate generation?

Page 34: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

FP-growth Algorithm

Use a compressed representation of the database using an FP-tree

Once an FP-tree has been constructed, it uses a recursive divide-and-conquer approach to mine the frequent itemsets

Page 35: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

FP-tree construction

TID Items1 {A,B}2 {B,C,D}3 {A,C,D,E}4 {A,D,E}5 {A,B,C}6 {A,B,C,D}7 {B,C}8 {A,B,C}9 {A,B,D}10 {B,C,E}

null

A:1

B:1

null

A:1

B:1

B:1

C:1

D:1

After reading TID=1:

After reading TID=2:

Page 36: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

FP-Tree Construction

null

A:7

B:5

B:3

C:3

D:1

C:1

D:1C:3

D:1

D:1

E:1 E:1

TID Items1 {A,B}2 {B,C,D}3 {A,C,D,E}4 {A,D,E}5 {A,B,C}6 {A,B,C,D}7 {B,C}8 {A,B,C}9 {A,B,D}10 {B,C,E}

Pointers are used to assist frequent itemset generation

D:1E:1

Transaction Database

Item PointerABCDE

Header table

Page 37: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Construct FP-tree from Transaction Database

{}

f:4 c:1

b:1

p:1

b:1c:3

a:3

b:1m:2

p:2 m:1

Header Table

Item frequency head f 4c 4a 3b 3m 3p 3

min_support = 3

TID Items bought (ordered) frequent items100 {f, a, c, d, g, i, m, p} {f, c, a, m, p}200 {a, b, c, f, l, m, o} {f, c, a, b, m}300 {b, f, h, j, o, w} {f, b}400 {b, c, k, s, p} {c, b, p}500 {a, f, c, e, l, p, m, n} {f, c, a, m, p}

1. Scan DB once, find frequent 1-itemset (single item pattern)

2. Sort frequent items in frequency descending order, f-list

3. Scan DB again, construct FP-tree F-list=f-c-a-b-m-p

Page 38: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Benefits of the FP-tree Structure

Completeness – Preserve complete information for frequent pattern mining– Never break a long pattern of any transaction

Compactness– Reduce irrelevant info—infrequent items are gone– Items in frequency descending order: the more frequently

occurring, the more likely to be shared– Never be larger than the original database (not count node-links

and the count field)

Page 39: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Partition Patterns and Databases

Frequent patterns can be partitioned into subsets according to f-list– F-list=f-c-a-b-m-p– Patterns containing p– Patterns having m but no p– …– Patterns having c but no a nor b, m, p– Pattern f

Completeness and non-redundancy

Page 40: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Find Patterns From P-conditional Database

Starting at the frequent item header table in the FP-tree Traverse the FP-tree by following the link of each frequent item p Accumulate all of transformed prefix paths of item p to form p’s

conditional pattern base

Conditional pattern basesitem cond. pattern basec f:3a fc:3b fca:1, f:1, c:1m fca:2, fcab:1p fcam:2, cb:1

{}

f:4 c:1

b:1

p:1

b:1c:3

a:3

b:1m:2

p:2 m:1

Header Table

Item frequency head f 4c 4a 3b 3m 3p 3

Page 41: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

From Conditional Pattern-bases to Conditional FP-trees

For each pattern-base– Accumulate the count for each item in the base– Construct the FP-tree for the frequent items of the pattern

base

m-conditional pattern base:fca:2, fcab:1

{}

f:3

c:3

a:3m-conditional FP-tree

All frequent patterns relate to mm, fm, cm, am, fcm, fam, cam, fcam

{}

f:4 c:1

b:1

p:1

b:1c:3

a:3

b:1m:2

p:2 m:1

Header TableItem frequency head f 4c 4a 3b 3m 3p 3

Page 42: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Recursion: Mining Each Conditional FP-tree

{}

f:3

c:3

a:3m-conditional FP-tree

Cond. pattern base of “am”: (fc:3)

{}

f:3

c:3am-conditional FP-tree

Cond. pattern base of “cm”: (f:3){}

f:3

cm-conditional FP-tree

Cond. pattern base of “cam”: (f:3){}

f:3

cam-conditional FP-tree

Page 43: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Mining Frequent Patterns With FP-trees

Idea: Frequent pattern growth– Recursively grow frequent patterns by pattern and

database partition Method

– For each frequent item, construct its conditional pattern-base, and then its conditional FP-tree

– Repeat the process on each newly created conditional FP-tree

– Until the resulting FP-tree is empty, or it contains only one path—single path will generate all the combinations of its sub-paths, each of which is a frequent pattern

Page 44: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Rule Generation

Given a frequent itemset L, find all non-empty subsets f L such that f L – f satisfies the minimum confidence requirement– If {A,B,C,D} is a frequent itemset, candidate rules:

ABC D, ABD C, ACD B, BCD A, A BCD, B ACD, C ABD, D ABCAB CD, AC BD, AD BC, BC AD, BD AC, CD AB,

If |L| = k, then there are 2k – 2 candidate association rules (ignoring L and L)

Page 45: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Rule Generation

How to efficiently generate rules from frequent itemsets?– In general, confidence does not have an anti-

monotone propertyc(ABC D) can be larger or smaller than c(AB D)

– But confidence of rules generated from the same itemset has an anti-monotone property

– e.g., L = {A,B,C,D}:

c(ABC D) c(AB CD) c(A BCD) Confidence is anti-monotone w.r.t. number of items on the RHS of the rule

Page 46: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Rule Generation for Apriori Algorithm

ABCD=>{ }

BCD=>A ACD=>B ABD=>C ABC=>D

BC=>ADBD=>ACCD=>AB AD=>BC AC=>BD AB=>CD

D=>ABC C=>ABD B=>ACD A=>BCD

Lattice of rulesABCD=>{ }

BCD=>A ACD=>B ABD=>C ABC=>D

BC=>ADBD=>ACCD=>AB AD=>BC AC=>BD AB=>CD

D=>ABC C=>ABD B=>ACD A=>BCD

Pruned Rules

Low Confidence Rule

Page 47: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Pattern Evaluation

Association rule algorithms tend to produce too many rules – many of them are uninteresting or redundant– Redundant if {A,B,C} {D} and {A,B} {D}

have same support & confidence

Interestingness measures can be used to prune/rank the derived patterns

In the original formulation of association rules, support & confidence are the only measures used

Page 48: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Application of Interestingness Measure

Feature

Prod

uctP

roduct

Prod

uctP

roduct

Prod

uctP

roduct

Prod

uctP

roduct

Prod

uctP

roduct

FeatureFeatureFeatureFeatureFeatureFeatureFeatureFeatureFeature

Selection

Preprocessing

Mining

Postprocessing

Data

SelectedData

PreprocessedData

Patterns

KnowledgeInterestingness Measures

Page 49: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Computing Interestingness Measure

Given a rule X Y, information needed to compute rule interestingness can be obtained from a contingency table

Y Y

X f11 f10 f1+

X f01 f00 fo+

f+1 f+0 |T|

Contingency table for X Yf11: support of X and Yf10: support of X and Yf01: support of X and Yf00: support of X and Y

Used to define various measures support, confidence, lift, Gini, J-measure, etc.

Page 50: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Drawback of Confidence

Coffee CoffeeTea 15 5 20Tea 75 5 80

90 10 100

Association Rule: Tea Coffee

Confidence= P(Coffee|Tea) = 0.75but P(Coffee) = 0.9 Although confidence is high, rule is misleading P(Coffee|Tea) = 0.9375

Page 51: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Statistical Independence

Population of 1000 students– 600 students know how to swim (S)– 700 students know how to bike (B)– 420 students know how to swim and bike (S,B)

– P(SB) = 420/1000 = 0.42– P(S) P(B) = 0.6 0.7 = 0.42

– P(SB) = P(S) P(B) => Statistical independence– P(SB) > P(S) P(B) => Positively correlated– P(SB) < P(S) P(B) => Negatively correlated

Page 52: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Statistical-based Measures

Measures that take into account statistical dependence

)](1)[()](1)[()()(),(

)()(),()()(

),()(

)|(

YPYPXPXPYPXPYXPtcoefficien

YPXPYXPPSYPXP

YXPInterest

YPXYPLift

Page 53: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Example: Lift/Interest

Coffee CoffeeTea 15 5 20Tea 75 5 80

90 10 100

Association Rule: Tea Coffee

Confidence= P(Coffee|Tea) = 0.75but P(Coffee) = 0.9 Lift = 0.75/0.9= 0.8333 (< 1, therefore is negatively associated)

Page 54: CPS 196.03: Information Management and Mining Association Rules and Frequent Itemsets

Drawback of Lift & Interest

Y YX 10 0 10X 0 90 90

10 90 100

Y YX 90 0 90X 0 10 10

90 10 100

10)1.0)(1.0(

1.0 Lift 11.1)9.0)(9.0(

9.0 Lift

Statistical independence:

If P(X,Y)=P(X)P(Y) => Lift = 1