ITCS 6162 Project Action Rules Implementation

Slides:



Advertisements
Similar presentations
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
Advertisements

CSCI3170 Introduction to Database Systems
Question Paper Generator Software
Exploring Office Grauer and Barber 1 Committed to Shaping the Next Generation of IT Experts. Chapter 1 – Introduction to Excel: What is a Spreadsheet?
1 Creating and Tweaking Data HRP223 – 2010 October 24, 2011 Copyright © Leland Stanford Junior University. All rights reserved. Warning: This.
Lecture 21 Rule discovery strategies LERS & ERID.
Action Rules Discovery without pre-existing classification rules B y Zbigniew W. Ras 1,2 and Agnieszka Dardzinska 1,3 1)University of North Carolina, Charlotte,
Basic Data Mining Techniques Chapter Decision Trees.
Basic Data Mining Techniques
Action Rules Discovery Systems: DEAR1, DEAR2, ARED, ….. by Zbigniew W. Raś.
Association Action Rules b y Zbigniew W. Ras 1,5 Agnieszka Dardzinska 2 Li-Shiang Tsay 3 Hanna Wasyluk 4 1)University of North Carolina, Charlotte, NC,
Fibre Channel Video Controller Project Description Kapshitz Tsachy Grinkrug Michael.
Management Reporter Ian Richardson CGA Cale Tanguay CGA.
Copyright © 2001 by Wiley. All rights reserved. Chapter 1: Introduction to Programming and Visual Basic Computer Operations What is Programming? OOED Programming.
Add a File with X, Y coordinates to MapWindow
Microsoft Office Word 2013 Expert Microsoft Office Word 2013 Expert Courseware # 3251 Lesson 4: Working with Forms.
Welcome to SAS…Session..!. What is SAS..! A Complete programming language with report formatting with statistical and mathematical capabilities.
Basic Data Mining Techniques
Rapid Miner Session CIS 600 Analytical Data Mining,EECS, SU Three steps for use  Assign the dataset file first  Select functionality  Execute.
Advanced File Processing
MarcEdit Basics and Beyond By Mary Aycock Head, Catalog Department Missouri University of Science and Technology MOBIUS 2012 Conference.
Exploring Excel 2003 Revised - Grauer and Barber 1 Committed to Shaping the Next Generation of IT Experts. Chapter 1 – Introduction to Excel: What is a.
XP New Perspectives on Microsoft Access 2002 Tutorial 51 Microsoft Access 2002 Tutorial 5 – Enhancing a Table’s Design, and Creating Advanced Queries and.
SqlReports Dean Dahlvang PSUG-MO March About Dean Dean Dahlvang Director of Administrative Technology for the Proctor.
First Screen : First window form will always remain open, for the user to select menu options. 1.
Software Engineering 2003 Jyrki Nummenmaa 1 CASE Tools CASE = Computer-Aided Software Engineering A set of tools to (optimally) assist in each.
COMP 410 & Sky.NET May 2 nd, What is COMP 410? Forming an independent company The customer The planning Learning teamwork.
Association Rule Mining on Multi-Media Data Auto Annotation on Images Bhavika Patel Hau San Si Tou Juveria Kanodia Muhammad Ahmad.
Guide To UNIX Using Linux Fourth Edition
Programming Project (Last updated: August 31 st /2010) Updates: - All details of project given - Deadline: Part I: September 29 TH 2010 (in class) Part.
Mastering Char to ASCII AND DOING MORE RELATED STRING MANIPULATION Why VB.Net ?  The Language resembles Pseudocode - good for teaching and learning fundamentals.
CS Tutorial 4 Frid. Oct 16 th, 2009 Prototype Tutorial.
Advanced File Processing. 2 Objectives Use the pipe operator to redirect the output of one command to another command Use the grep command to search for.
Execute Workflow. Home page To execute a workflow navigate to My Workflows Page.
Chapter Five Advanced File Processing Guide To UNIX Using Linux Fourth Edition Chapter 5 Unix (34 slides)1 CTEC 110.
Temporal Analysis using Sci2 Ted Polley and Dr. Katy Börner Cyberinfrastructure for Network Science Center Information Visualization Laboratory School.
0 eCPIC User Training: Dependency Mapper These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
As Class Convenes l Find your team’s table and have a seat l Pick up Team’s Modeling Folder l Remove Chapter 1 Assignment l Place your Chapter 2 Assignment.
Indexed and Relative File Processing
Computer Science Research and Development Department Computing Sciences Directorate, L B N L 1 Storage Management and Data Mining in High Energy Physics.
Algorithms  Problem: Write pseudocode for a program that keeps asking the user to input integers until the user enters zero, and then determines and outputs.
Chapter Five Advanced File Processing. 2 Lesson A Selecting, Manipulating, and Formatting Information.
Blackboard 8: Grade Center This workshop is for existing users of Blackboard interested in keeping track of student grades online. Blackboard replaced.
An Investigation of Commercial Data Mining Presented by Emily Davis Supervisor: John Ebden.
BOĞAZİÇİ UNIVERSITY DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS MATLAB AS A DATA MINING ENVIRONMENT.
Chapter One An Introduction to Programming and Visual Basic.
Introduction of Geoprocessing Lecture 9. Geoprocessing  Geoprocessing is any GIS operation used to manipulate data. A typical geoprocessing operation.
CSE/CIS 787 Analytical Data Mining, Dept. of EECS, SU Three steps for use  Assign the dataset file first  Assign the analysis type you want.
OOSSE Week 8 JSP models Format of lecture: Assignment context JSP models JSPs calling other JSPs i.e. breaking up work Parameter passing JSPs with Add.
A table is a set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows.
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| WISL |||||||||||| 1 Waterloo Information Systems.
© A B C D 78 A1A2A3A4 B1 B2 B3B4 C1C2 C3C4 D1D2D3D4 A5A6A7A8 B5B6B7B8 C5C6C7C8 D5D6D7D8 Questions: Ships Remaining: © 2012.
Apriori Algorithm and the World Wide Web Roger G. Doss CIS 734.
Dr. Chen, Data Mining  A/W & Dr. Chen, Data Mining Chapter 3 Basic Data Mining Techniques Jason C. H. Chen, Ph.D. Professor of MIS School of Business.
Programming with Microsoft Visual Basic 2012 Chapter 14: Access Databases and SQL.
ECE 544 Group Project : Routing KC Huang. Objective Application: message multicast. A message is sent from one sender to 1~3 recipients. Reach a protocol.
Jigsaw cards for LARGE classes Use these cards for classes with 24 or more students. Distribute letter cards evenly. If you have 32 students, pass out.
Emdeon Office Batch Management Services This document provides detailed information on Batch Import Services and other Batch features.
Prepare data for importing
Data File Import / Export
Azure Machine Learning & ML Studio
Guide To UNIX Using Linux Third Edition
Learning to Program in Python
Tutorial for LightSIDE
ECE 544 Group Project : Routing
Tutorial for WEKA Heejun Kim June 19, 2018.
Computer Science Projects Database Theory / Prototypes
Lab 2 HRP223 – 2010 October 18, 2010 Copyright © Leland Stanford Junior University. All rights reserved. Warning: This presentation is protected.
Introduction Time is something we waist as a society
Presentation transcript:

ITCS 6162 Project Action Rules Implementation Prepare 6 power point slides on the subject of Rule Extraction and Action Rules. Find a youtube.com video (or another video) on the subject of Rule Extraction (in Data Mining) and show the video. Implement Action Rules extraction algorithm - ARoGS (see slides 6-9) . Compute the support and confidence of the action rules . Source code , power points, and video link files are due on Moodle – on June 16 (Sunday) . Present your power points, video, and implementation demo to the class on June 18 . Each group member should speak for at least 1 minute, and should present a part of the project . Show your source code, and RUN the program in front of the class . Explain the way it was implemented , and explain the OUTPUT it produces. Explain what the rules mean – by using the attribute descriptions from the dataset . Entire presentation should not take longer than 15 minutes . Presenters will be asked 1 question from each of the remaining 5 groups .

ITCS 6162 Project Action Rules Implementation For input to the program , choose one dataset from : http://archive.ics.uci.edu/ml/datasets.html to download use http://mlearn.ics.uci.edu/MLSummary.html Input should be a 2 flat text files (as downloaded from the link) . 1st file .data - program should handle comma “ , “ delimited and tab “ “ delimited data formats . 2nd file .names - containing attribute names each on a new line . Test program with at least 3 different datasets from this link (should work with BOTH categorical and numerical attribute types (all attribute types)) At the presentation day , we will test your program with a random data sample from the link above . Program should not crash , hang (freeze) , or take more than 10 minutes to complete . Keep implementation SIMPLE . Program should NOT generate DUPLICATE rules . Add a module to the program to check for duplicates , and remove them , before producing the output . Interface: should allow to OPEN a dataset file (flat text file) | allow user to specify support and confidence tresholds | display all attribute names and allow user to specify stable and flexible attributes | allow user to specify DECISION attribute, display all values of decision attribute and allow user to specify desired class – for example: decision D change from d1 -> d2 | display all Action Rules produced . In addition, program should place output Action Rules extracted in a flat text file .

Decision System S (a, a1 → a1) (a, a2 → a2) (b, b1 → b1) (b, b2 → b2) ARED – Object Based Action Rule Discovery (a, a1 → a1) (a, a2 → a2) (b, b1 → b1) (b, b2 → b2) ……….. (d, d1 → d1) (d, d2 → d2) (a, a2) * (b, b1) Y = {x2, x4} (d, d1) Z = {x1,x2,x3,x4,x5,x7} Decision System S atomic action terms X a b c d x1 a1 b1 c1 d1 x2 a2 c2 x3 b2 x4 x5 b3 x6 d2 x7 x8 d3 r=[(a, a2 → a2)*(b, b1 → b1)] → (d, d1 → d1) (w, w)  (Y, Y ) → (w,w)  (Z, Z) action rule Support: Confidence: sup(r) = 2 conf(r) = 2/2 = 1

Decision System S (a, a1 → a1) (a, a1 → a2) (b, b1 → b2) (b, b2 → b2) ……….. (d, d1 → d1) (d, d2 → d2) atomic action terms Decision System S X a b c d x1 a1 b1 c1 d1 x2 a2 c2 x3 b2 x4 x5 b3 x6 d2 x7 x8 d3 r=[(a, a2 → a1)*(b, b1 → b1)] → (d, d1 → d2) (Y1, Y 2) (Z1, Z2) rule sup(r) = 2 conf(r) = 1/2 Y1 = {x2, x4} Z1 = {x1,x2,x3,x4,x5,x7} Y2 = {x1, x6} Z2 = { x6}

Decision System S (a, a1 → a1) (a, a1 → a2) (b, b1 → b2) (b, b2 → b2) ……….. (d, d1 → d1) (d, d2 → d2) atomic terms Decision System S X a b c d x1 a1 b1 c1 d1 x2 a2 c2 x3 b2 x4 x5 b3 x6 d2 x7 x8 d3 r=[(a, a2 → a1)*(b, b1 → b1)] → (d, d1 → d2) (Y1, Y 2) (Z1, Z2) rule sup(r) = 1 conf(r) = 1/2 Y1 = {x2, x4} Z1 = {x1,x2,x3,x4,x5,x7} Y2 = {x1, x6} Z2 = { x6}

ARoGS - Action Rules Discovery Decision table S = (U, AFl  ASt  {d}). Assumption: {a1,a2,...,ap}  ASt, {b1,b2,...,bq}  AFl, ai,1 Dom(ai), bi,1 Dom(bi). Rule: r = [a1,1  a2,1  ...  ap,1 ]  [b1,1  b2,1  ...  bq,1]  d1 stable part flexible part Action rule schema r[d2  d1] associated with r and re-classification task (d, d2  d1): [a1,1  a2,1  ...  ap,1]  [(b1,  b1,1 ) (b2,  b2,1) ...  (bq,  bq,1)]  (d, d2  d1)

ARoGS - Action Rules Discovery X a b c e f g d x1 a1 b1 c1 e1 f2 g1 d1 x2 a2 c2 e2 g2 d3 x3 a3 g3 d2 x4 x5 b2 e3 x6 f3 x7 b3 x8 Decision System S a, b, c – stable e, f, g - flexible Goal: reclassify objects in S from class d2 to d1.

Step 1: extract all rules , which imply  d1 (have d1 on the right side) by using LERS algorithm . For each rule r : { Step 2. generate r[d2  d1] (action rule schema) by: r1 = [b1  c1  f2  g1]  d1 r1[d2  d1] = [b1  c1  (f,  f2)  (g,  g1)]  (d, d2  d1) b1  c1 – stable f2  g1 – flexible (f,  f2) means change f from anything to f2 Step 3. compute set of objects supporting the schema r[d2  d1] U[r1,d2] = Sup(r1[d2  d1]) = {x3, x6, x8} Step 4. take the header (stable attributes i.e. b1  c1 ) from r[d2  d1] and combine with all remaining attribute values . Mark the subsets of U[r1,d2] [b1  c1  a1] = {x1}  U[r1,d2] [b1  c1  a2] = {x6, x8}  U[r1,d2] marked [b1  c1  a3] = {x3}  U[r1,d2] marked [b1  c1  f3] = {x6}  U[r1,d2] marked [b1  c1  g3] = {x3,x8}  U[r1,d2] marked

Step 5 From marked generate action rules by using r1[d2  d1] Action Rules: [b1  c1  a2  (f,  f2)  (g,  g1)]  (d, d2  d1), [b1  c1  a3  (f,  f2)  (g,  g1)]  (d, d2  d1), [b1  c1  (f, f3  f2)  (g,  g1)]  (d, d2  d1), [b1  c1  (f,  f2)  (g, g3  g1)]  (d, d2  d1) }