DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald Md. Shiblee SadikRahul Shukla Hanqing Yang.

Slides:



Advertisements
Similar presentations
Huffman Codes and Asssociation Rules (II) Prof. Sin-Min Lee Department of Computer Science.
Advertisements

Mining Frequent Patterns II: Mining Sequential & Navigational Patterns Bamshad Mobasher DePaul University Bamshad Mobasher DePaul University.
Using Parallel Genetic Algorithm in a Predictive Job Scheduling
Frequent Closed Pattern Search By Row and Feature Enumeration
Constructing Popular Routes from Uncertain Trajectories Ling-Yin Wei 1, Yu Zheng 2, Wen-Chih Peng 1 1 National Chiao Tung University, Taiwan 2 Microsoft.
Data Mining Association Analysis: Basic Concepts and Algorithms
Data Mining Techniques So Far: Cluster analysis K-means Classification Decision Trees J48 (C4.5) Rule-based classification JRIP (RIPPER) Logistic Regression.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Data Mining Association Analysis: Basic Concepts and Algorithms
1 Mining Frequent Patterns Without Candidate Generation Apriori-like algorithm suffers from long patterns or quite low minimum support thresholds. Two.
Data Mining Association Analysis: Basic Concepts and Algorithms
Is Sampling Useful in Data Mining? A Case in the Maintenance of Discovered Association Rules S.D. Lee, D. W. Cheung, B. Kao Department of Computer Science.
Computing Trust in Social Networks
Basic Data Mining Techniques
Data Mining with Decision Trees Lutz Hamel Dept. of Computer Science and Statistics University of Rhode Island.
1 Adaptive Kalman Filter Based Freeway Travel time Estimation Lianyu Chu CCIT, University of California Berkeley Jun-Seok Oh Western Michigan University.
1 A DATA MINING APPROACH FOR LOCATION PREDICTION IN MOBILE ENVIRONMENTS* by Gökhan Yavaş Feb 22, 2005 *: To appear in Data and Knowledge Engineering, Elsevier.
Recommender systems Ram Akella November 26 th 2008.
Total Quality Management BUS 3 – 142 Statistics for Variables Week of Mar 14, 2011.
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
Energy-efficient Self-adapting Online Linear Forecasting for Wireless Sensor Network Applications Jai-Jin Lim and Kang G. Shin Real-Time Computing Laboratory,
1 Chapter 4: Variability. 2 Variability The goal for variability is to obtain a measure of how spread out the scores are in a distribution. A measure.
A Node-Centric Load Balancing Algorithm for Wireless Sensor Networks Hui Dai, Richar Han Department of Computer Science University of Colorado at Boulder.
Mining Association Rules of Simple Conjunctive Queries Bart Goethals Wim Le Page Heikki Mannila SIAM /8/261.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Noiseless Coding. Introduction Noiseless Coding Compression without distortion Basic Concept Symbols with lower probabilities are represented by the binary.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Mirco Nanni, Roberto Trasarti, Giulio Rossetti, Dino Pedreschi Efficient distributed computation of human mobility aggregates through user mobility profiles.
Data Mining CS157B Fall 04 Professor Lee By Yanhua Xue.
Data Mining Association Analysis: Basic Concepts and Algorithms Lecture Notes for Chapter 6 Introduction to Data Mining By Tan, Steinbach, Kumar Lecture.
Modul 7: Association Analysis. 2 Association Rule Mining  Given a set of transactions, find rules that will predict the occurrence of an item based on.
Efficient Data Mining for Calling Path Patterns in GSM Networks Information Systems, accepted 5 December 2002 SPEAKER: YAO-TE WANG ( 王耀德 )
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
A Process Control Screen for Multiple Stream Processes An Operator Friendly Approach Richard E. Clark Process & Product Analysis.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
Detecting Group Differences: Mining Contrast Sets Author: Stephen D. Bay Advisor: Dr. Hsu Graduate: Yan-Cheng Lin.
1 Inverted Matrix: Efficient Discovery of Frequent Items in Large Datasets in the Context of Interactive Mining -SIGKDD’03 Mohammad El-Hajj, Osmar R. Zaïane.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Replicating Memory Behavior for Performance Skeletons Aditya Toomula PC-Doctor Inc. Reno, NV Jaspal Subhlok University of Houston Houston, TX By.
August 30, 2004STDBM 2004 at Toronto Extracting Mobility Statistics from Indexed Spatio-Temporal Datasets Yoshiharu Ishikawa Yuichi Tsukamoto Hiroyuki.
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
SNU OOPSLA Lab. 1 Great Ideas of CS with Java Part 1 WWW & Computer programming in the language Java Ch 1: The World Wide Web Ch 2: Watch out: Here comes.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Intelligent DataBase System Lab, NCKU, Taiwan Josh Jia-Ching Ying 1, Wang-Chien Lee 2, Tz-Chiao Weng 1 and Vincent S. Tseng 1 1 Department of Computer.
Hierarchical Clustering Produces a set of nested clusters organized as a hierarchical tree Can be visualized as a dendrogram – A tree like diagram that.
Chapter 8 Physical Database Design. Outline Overview of Physical Database Design Inputs of Physical Database Design File Structures Query Optimization.
Jin Yan Embedded and Pervasive Computing Center
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University.
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
DECISION TREES Asher Moody, CS 157B. Overview  Definition  Motivation  Algorithms  ID3  Example  Entropy  Information Gain  Applications  Conclusion.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
CHARACTERIZING CLOUD COMPUTING HARDWARE RELIABILITY Authors: Kashi Venkatesh Vishwanath ; Nachiappan Nagappan Presented By: Vibhuti Dhiman.
Indexing and Mining Free Trees Yun Chi, Yirong Yang, Richard R. Muntz Department of Computer Science University of California, Los Angeles, CA {
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
黃福銘 (Angus F.M. Huang) ANTS Lab, IIS, Academia Sinica Exploring Spatial-Temporal Trajectory Model for Location.
Ning Jin, Wei Wang ICDE 2011 LTS: Discriminative Subgraph Mining by Learning from Search History.
Mining High-Speed Data Streams Presented by: William Kniffin Pedro Domingos Geoff Hulten Sixth ACM SIGKDD International Conference
Data Transformation: Normalization
Data Mining Association Analysis: Basic Concepts and Algorithms
Frequent Pattern Mining
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Pyramid Sketch: a Sketch Framework
Association Rule Mining
Presentation transcript:

DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald Md. Shiblee SadikRahul Shukla Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklahoma, USA

Outline 2  Research objective  Current approaches  The proposed approach: DEMS  Performance Evaluation  Conclusions and future work

Mobile Sensor Networks 3  A typical mobile sensor network:  Sensor nodes are provided with motion capabilities  Sensor nodes can relocate themselves  Sensor nodes may move continuously/randomly  Sensor nodes may move periodically to make up for lost/missing sensors  Sensor nodes send data to a base station.

Missing Sensor Data 4  Missing sensor data = sensor readings that fail to reach the base station or are corrupted when reaching the base station  Reasons for missing sensor data:  Power shortage (sensor nodes are battery-powered)  Mal-functioning of sensor nodes (hardware failure)  Networking issues  Connection failures  Data package collision  etc.

Research Objective 5 Goal: Develop an effective algorithm to estimate missing sensors’ readings in a mobile sensor network application.

Research Issues  Issues common with static sensor networks:  Infiniteness, fast arrival rate, concept drifts  Additional issues: due to mobility of mobile sensors  Spatial relations:  The spatial relation between two sensors’ readings is distorted by the mobility of mobile sensors  Temporal relations:  The history data of a mobile sensor that are generated at different locations may not necessarily possess the temporal relationships with the data in the current round of sensor readings  Frequent power failure  Power outage is more common in mobile sensor network compared to static sensor network because mobility requires excessive power. 6

Current Approaches 7 Ignore missing data Ask the sensor again Add redundant sensors Estimate missing data Available approaches Use average of other sensors Use auto-regression model Use some other statistics based model (e.g., Kalman filter) Use data mining-based model Fig 1. A taxonomy of techniques for handling missing data Statistics based techniques

The Proposed Approach: DEMS 8  DEMS: Data Estimation for Mobile Sensors  Based on two important concepts:  Virtual Static Sensor (VSS)  A fictitious static sensor which mimics a real static sensor  helps reconstruct the spatial and temporal relations among the sensors’ readings  Association Rule Mining  A popular method of discovering relationships among different items  helps explore the relationships among sensors’ readings.

DEMS Components  DEMS has three major components:  Mapping Real Mobile Sensor (RMS) to Virtual Static Sensor (VSS)  Divides the entire area of coverage into small hexagons  A hexagon: the coverage area of a VSS with VSS being at the center of the hexagon  Converts RMS readings into VSS readings  Association rule mining  Constructs a novel data structure called MASTER-tree to capture the association rules among VSSs  Updates MASTER-trees to capture the most recent association rules among VSSs  Data estimation  Uses the most recent association rules to estimate a missing VSS reading  Uses the estimated value of the missing VSS reading as the value of the missing RMS reading. 9

DEMS: Mapping RSS to VSS  What is VSS?  A VSS is a fictitious static sensor  A VSS reading is based on one or more RMSs’ readings  A VSS has a unique identifier and has a unique area of coverage  Why do we need VSS?  Each VSS has a fixed location; hence the spatial relations among VSSs readings can be obtained  Each VSS reading is generated from a fixed location; hence history readings might have strong temporal relations with the current reading. 10

DEMS: Mapping RSS to VSS (Cont.)  How to construct a VSS?  We divide the entire monitoring area into small hexagons  A virtual static sensor is the center of a hexagon  Each hexagon is a coverage area of a virtual static sensor. 11 Fig 2. Monitoring area, hexagons and virtual static sensor a b

DEMS: Mapping RMS to VSS 12 Goal: map RMSs’ readings to VSSs’ readings so that spatial and temporal relations among the sensor readings can be restored.  Two types of mapping:  Mapping of a non-missing RMS to VSS  Mapping of a missing RMS to VSS

Fig 3. RMSs and VSSs DEMS: Mapping of a non-missing RMS to VSS  If a VSS contains one RMS within its coverage area, the RMS’s reading is used as the VSS reading  If a VSS contains more than one RMSs, the average of the RMSs’ readings is used as the VSS reading  If a VSS contains no RMS, the VSS is called inactive. 13

DEMS: Mapping of a missing RMS to VSS  Why mapping of a missing RMS is difficult?  RMS location is the key to RMS to VSS mapping  If a RMS is missing, it is very likely that its data and location would be missing together  Hence mapping of a missing RMS to VSS requires intelligence  The solution  A missing RMS is mapped to a VSS using a trajectory mining approach for location prediction [Morzy, 2007]. 14

DEMS: Mapping of a missing RMS to VSS (cont.)  What is a trajectory?  A trajectory is the sequence of hexagons that a mobile sensor traverses  If a mobile sensor is not missing, it reports its location and the location is contained by one hexagon  Hence the sequence of hexagons is called a trajectory. 15 Fig 4. Trajectory of a RMS (V 14,V 9,V 11,V 4,V 3,V 10 ) is the trajectory of M 1

DEMS: Mapping of a missing RMS to VSS (cont.)  Each RMS has a trajectory  DEMS periodically stores the trajectories (collected from all RMSs) into a frequency pattern tree  Frequency pattern tree  It has a root labeled null  Each node consists of an ID (hexagon ID) and count (number of times it appears in the trajectories) 16 Example: 5 trajectories 1. (V 14, V 9, V 11, V 4, V 2, V 8, V 1 ) 2. (V 14, V 9, V 11, V 4, V 3, V 10, V 1 ) 3. (V 14, V 9, V 5, V 4, V 3, V 10, V 8 ) 4. (V 14, V 9, V 11, V 4, V 3, V 10, V 1, V 8 ) 5. (V 2, V 3, V 6, V 10, V 8, V 1 ) Fig 5. A frequency pattern tree

DEMS: Mapping of a missing RMS to VSS (cont.)  If a RMS is missing, it is mapped to a VSS from the frequency pattern tree and its own trajectory  Consider the last known trajectory of M 1 : (V 14,V 9,V 11,V 4 ) 17 Fig 7. Frequency pattern tree Fig 6. Trajectory of a missing RMS V 3: Predicted next hexagon in trajectory of M 1

DEMS: Mapping RMS to VSS (cont.) 18 Procedure mapReal2Virtual(RealSensorData listRSData, VirtualSensorData listVSData) 1for each real sensor rs 2 if(rs is not missing) 3 location ← listRSData(rs).Location 4 vs ← findVirtualSensor(location) 5 listVSData(vs).addReading(listRSData(rs).Reading) 6 else 7 location ← predictLocation(rs) 8 vs ← findVirtualSensor(location) 9 listVSData(vs).status←missing 10end loop 11for each virtual static sensor vs 12 if(listVSData(vs) has data) 13 listVSData(vs).status←active 14listVSData(vs).reading←average(listVSData(vs).Readings) 15 else 16 if(listVSData(vs).status is not missing) 17 listVSData(vs).status ←inactive 18end loop end procedure Fig 8. Mapping algorithm

DEMS Components  DEMS has three major components:  Real Mobile Sensor (RMS) to Virtual Static Sensor (VSS)  Divides the entire area of coverage into small hexagons,  Each hexagon is the coverage area of a virtual static sensor where the virtual static sensor is assumed to be sitting in the middle of the hexagon,  Converts RMS readings into VSS readings.  Association rule mining  Constructs a novel data structure called MASTER-tree to capture the association rules among VSSs  Updates MASTER-trees to capture the most recent association rules among VSSs.  Data estimation  Uses the most recent association rules to estimate a missing VSS reading,  Uses the missing VSS reading as missing RMS reading. 19

DEMS: Association Rule Mining Goal: mine and represent the potential association rules among the VSS readings.  We propose a novel data structure (called MASTER-tree) to mine and represent the association rules among VSS readings  MASTER-tree basics:  A MASTER-tree is capable of mining any kind of association rules among any number of VSSs  A MASTER-tree represents potential association rules among the VSS readings  A path in MASTER-tree represents a potential association rule. 20 Fig 8. A MASTER-tree

DEMS: Association Rule Mining (cont.)  The potential number of association rules among VSSs grows exponentially with the number of VSSs  To restrict the number of association rules, DEMS clusters the VSSs into small groups and constructs one MASTER- tree for each group  DEMS uses Agglomerative clustering:  Agglomerative clustering starts with every VSS as an individual cluster  At each step it merges two closest clusters based on their pair- wise distances into one if the total number of VSSs in the new cluster does not exceed a user-defined maximum number of VSSs in one cluster. 21

DEMS: Association Rule Mining (cont.) Fig 9. A MASTER-tree without the grid stricture V2V2 Ø V1V1 V3V3 V1V1 V3V3 V3V3 V1V1 V3V3 V2V2 V1V1 V2V2 V2V2 Details

DEMS: The MASTER-tree Projection Module (cont.) 23 Fig 10. MASTER-tree with grid structure Ø Summary Stats V2V2 Summary Stats … Summary Stats Summary Stats V1V1 Summary Stats … Summary Stats Summary Stats V3V3 Summary Stats … Summary Stats Summary Stats V1V1 Summary Stats … Summary Stats Summary Stats V3V3 Summary Stats … Summary Stats Summary Stats V3V3 Summary Stats … Summary Stats Summary Stats V1V1 Summary Stats … Summary Stats Summary Stats V1V1 Summary Stats … Summary Stats Summary Stats V3V3 Summary Stats … Summary Stats Summary Stats V3V3 Summary Stats … Summary Stats Summary Stats V1V1 Summary Stats … Summary Stats

V 2 [11, 20], V 3 [11, 20] → V 1 [1, 20] Support : 60% Confidence: 66% DEMS: Association Rule Mining (cont.) 24 Fig 11. MASTER-tree with count 5 2 V2V2 3 … 2 V1V1 2 … 12 V3V3 2 … 1 V1V1 2 … 1 V3V3 3 … 1 V3V3 1 … 1 V1V1 1 … 1 2 V1V1 … 2 V3V3 … V3V3 2 … 1 V1V1 1 … V 2 [1, 10], V 1 [1, 10] → V 3 [11, 20] Support : 40% Confidence: 100% (2, 31, 485, 7657, )

DEMS: Association Rule Mining (cont.) 25  Let  The minimum support 50%  The minimum confidence 50%  A typical association rule becomes  V 2 [11, 20], V 3 [11, 20] → V 1 [1, 20]  The rule meaning: if the VSS reading of V 2 is within 10 to 20 and the VSS reading for V 3 is within 10 to 20, the VSS reading for V 1 is most likely within 0 to 20.  There exists a path from the root node to V 1 [1, 20] via V 2 [11, 20] and V 3 [11, 20] in the Master-tree.

DEMS Components  DEMS composed of three major components  Real Mobile Sensor (RMS) to Virtual Static Sensor (VSS)  Divides the entire area of coverage into small hexagons,  Each hexagon is the coverage area of a virtual static sensor where the virtual static sensor is assumed to be sitting in the middle of the hexagon,  Converts RMS readings into VSS readings.  Association rule mining  Construct a novel data structure called MASTER-tree to capture the association rules among VSSs,  Update MASTER-trees to capture most recent association rules among VSSs.  Data estimation  Uses the most recent association rules to estimate a missing VSS reading  Uses the estimated value of the missing VSS reading as the estimated value of the missing RMS reading. 26

DEMS: Data Estimation Goal: estimate the missing VSS reading.  The data estimation modules estimates the missing VSS  The estimated reading for the missing VSS is used as the estimated reading for the missing RMS. 27

DEMS: Data Estimation (cont.) 28 Fig 12. Flowchart of the data estimation module (A step by step example)A step by step example

Performance Evaluation 29  Simulation Model  We simulate the missing data for our datasets  A sensor is missing randomly (approximately 5-10%) for a consecutive random number ( ) of rounds  Data and location both are missing for a missing sensor  We use DEMS, TinyDB, SPIRIT and Average method to estimate missing readings  TinyDB  An average based technique which estimates the missing data by taking the average of the readings from other sensor readings in the current round.  SPIRIT  An auto-regression based technique which estimates the missing data based on the readings in the previous rounds  Average  The average of other sensor readings is used as the estimated reading  We compare the techniques based on mean absolute error (MAE)  MAE = Σ|estimation error|/number of estimations.

Performance Evaluation (cont.) 30  Datasets  DAPPLE Project Dataset: A real life dataset  The carbon monoxide (CO) readings in the range [0, 6] were collected over a period of two weeks around Marylebone Road in London  The mobile sensors monitoring the atmospheric CO level are attached to PDAs which store these readings  We chose Thursday, 20th May 2004, when three sensors were simultaneously recording for about 32 minutes, resulting in 600 rounds (after disregarding the missing rounds) of CO readings  Factory Floor Temperature Dataset: A synthetic dataset  A simulation of a mobile sensor network for monitoring factory floor temperatures  Machines are placed on a floor  Some machines are turned on for a number of rounds; the temperatures on these machines reach a high constant temperature and heat disperse on the floor.  100 mobile sensors were roaming around in random directions to monitor the factory floor and report the temperature readings in the range [0, 100C] from different locations.  The mobile sensor readings were sampled once per hour; the total rounds of readings are 5000 from 100 mobile sensors.

Performance Evaluation (cont.) 31 Fig 13. Impacts of number of rounds on MAE for DAPPLE project dataset ApproachAverage MAE DEMS0 Average TinyDB SPIRIT Table 1. Average MAE for DAPPLE project dataset

Performance Evaluation (cont.) 32 Fig 14. Impacts of number of rounds on MAE for factory floor dataset ApproachAverage MAE DEMS Average TinyDB SPIRIT Table 2. Average MAE for factory floor dataset

Conclusions and Future Work 33  We proposed DEMS:  A novel data estimation technique for mobile sensor networks based on data mining and virtual static sensor concepts  Estimates missing sensor data with high accuracy  Future work: Extend DEMS to include  Multiple base stations  De-synchronized mobile sensor networks  Cluster sensor networks.

Thanks 34  Questions?

MASTER-tree Construction Ø Fig. Merged tree for figure a and b S2S2 S1S1 S3S3 S1S1 S3S3 S3S3 S3S3 S2S2 S1S1 S2S2 S2S2 Fig (a). A Pattern tree for S 3 S2S2 Ø S1S1 S3S3 S1S1 S3S3 S3S3 S3S3 Fig. (c) A Pattern tree for S 1 S2S2 Ø S3S3 S1S1 S3S3 S1S1 S1S1 S1S1 Fig (b). A Pattern tree for S 1 S3S3 Ø S1S1 S2S2 S1S1 S2S2 S2S2 S2S2 Ø Fig. Merged tree for figure a, b and c S2S2 S1S1 S3S3 S1S1 S3S3 S3S3 S1S1 S3S3 S2S2 S1S1 S2S2 S2S2 Back

MASTER-tree projection and data estimation: An example Simulation

Assume…  Three Node (A, B, C)  One dimension of Data (Temperature)  Upper bound 30 lower bound 0, cell size = 10  dis(A,B) = 4, dis(A,C) = 3 and dis(B,C) = 5  MCSS = 10  minSup = 25%  minConf = 75% C AB

Pattern trees Ø ABC BCC C Ø ACB CBB B Ø CBA BAA A Ø AB BC CB AC C BA A C A B Final MASTER tree without GS Pattern tree for C Pattern tree for B Pattern tree for A

Data Sequence A B C ?

A B C BC A A A BC BC Ø A B C ?

A B C BC A A A BC BC Ø A B C ? BC CB ACB A A

A B C BC A A A BC BC Ø A B C ? BC CB ACB A A

A B C BC A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A

A B C BC A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A C A

A B C BC A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A C A

A B 221 BC A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A C A MCSS = 10 Rule: Ø → C = [0, 29] Supp = 100% Conf = 100%

A B 221 BC A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A C A MCSS = 10 Rule: Ø → C = [0, 19] Supp = 80% Conf = 80%

23 B 221 B2 A A A BC BC Ø A B C ? BC CB ACB A A CB ACB A A C A MCSS = 10 Rule: Ø → C = [0, 29] Supp = 80% Conf = 80% Rule: A → C = [0, 9] Supp = 40% Conf = 100% Back to presentation