Association rule mining using fuzzy logic and whale optimization algorithm

Association rule mining (ARM) is a well-known data mining scheme that is used to discover the commonly co-occurred itemsets from the transactional datasets. Two considerable steps of ARM are frequent item recognition and association rule generation. Minimum support and confidence measures are used in the generation of association rules. Many algorithms have been projected by the researchers to generate association rules. Fuzzy logic is incorporated to uncover the recurrent itemsets and interesting fuzzy association rules. In general, huge volume of datasets could be analyzed which in turn needs more number of database scans. In addition to this, all the transactions and items are not required for data analysis. Hence, the first step of this research work uses a dimensionality reduction technique which drastically reduces the size of the data set. This dimensionality reduction technique uses low variance and hash table methods. The proposed algorithm effectively identifies the significant transactions and items from the database. The issues of dimensionality reduction appear when the items in the databases are higher dimension than endure. The proposed algorithm reduces the irrelevant items and transactions from the transactional database. The proposed dimensionality reduction technique dimensionality reduction in transactions and items is compared with the extend frequent pattern (EFP) and intersection set theory EFP and dimensionality reduction using frequency count. Item reduction, transaction reduction, execution time and memory space are the performance factors. Second step proposes fuzzy and whale optimization for frequent item identification and association rule generation. The efficiency of the proposed algorithm is compared with particle swarm optimization genetic algorithm and fuzzy frequent itemset-Miner. Performance metrics used in this step are number of frequent items, association rules generated, execution time and memory required. Experimental results proved that the proposed techniques have produced the good results.

[1]  N. C. Chauhan,et al.  Interesting association rule mining with consistent and inconsistent rule detection from big sales data in distributed environment , 2017 .

[2]  M. Sulaiman Khan,et al.  A Framework for Mining Fuzzy Association Rules from Composite Items , 2008, PAKDD Workshops.

[3]  B. V. Ramana Reddy,et al.  Design and development of a novel MOSFET structure for reduction of reverse bias pn junction leakage current , 2018 .

[4]  S. Shakya,et al.  Intelligent and Adaptive Multi-Objective Optimization in WANET Using Bio Inspired Algorithms , 2020, Journal of Soft Computing Paradigm.

[5]  Akash Rajak,et al.  Association Rule Mining: Applications in Various Areas , 2009 .

[6]  A Combined Approach for Mining Fuzzy Frequent Itemset , 2014 .

[7]  Kai-Uwe Sattler,et al.  SQL Based Frequent Pattern Mining with FP-Growth , 2004, INAP/WLP.

[8]  Mazura Mat Din,et al.  A Survey on Privacy Preserving Data Mining Approaches and Techniques , 2019, ICSCA.

[9]  Qiang Cheng,et al.  Remaining Useful Life Prediction of Rolling Bearings Based on Recurrent Neural Network , 2019, Journal on Artificial Intelligence.

[10]  Yucel Saygin,et al.  Secret charing vs. encryption-based techniques for privacy preserving data mining , 2007 .

[11]  Fatemeh Darakeh,et al.  Applying an ANFIS-based Algorithm in Comparison with Mechanistic Modelling in a Biofilter Treating Hexane , 2018 .

[12]  Vijayakumar T Dr,et al.  COMPARATIVE STUDY OF CAPSULE NEURAL NETWORK IN VARIOUS APPLICATIONS , 2019, Journal of Artificial Intelligence and Capsule Networks.

[13]  B. Raveendra Babu,et al.  A Fuzzy Approach for Privacy Preserving in Data Mining , 2012 .

[14]  Xinjun Qi,et al.  An Overview of Privacy Preserving Data Mining , 2012 .

[15]  Sandeep Kumar Singh,et al.  A Review: Data Mining with Fuzzy Association Rule Mining , 2012 .

[16]  Jai Narayan Tripathi,et al.  Soft-Reconfiguration Management for Operating Systems with Multiprocessor Architecture , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[17]  I S. Sasikala,et al.  Privacy Preserving Data Mining Using Piecewise Vector Quantization (PVQ) , 2014 .

[18]  P. Raviraj,et al.  Optimisation of multi-body fishbot undulatory swimming speed based on SOLEIL and BhT simulators , 2018 .

[19]  Mohamed S. Abougabal,et al.  Efficient mining fuzzy association rules from ubiquitous data streams , 2015 .

[20]  Tzung-Pei Hong,et al.  A fast Algorithm for mining fuzzy frequent itemsets , 2015, J. Intell. Fuzzy Syst..

[21]  Kunjal Bharatkumar Mankad A Genetic fuzzy approach to measure multiple intelligence , 2013 .

[22]  Victor J. Rayward-Smith,et al.  Non-metric Multidimensional Scaling for Privacy-Preserving Data Clustering , 2011, IDEAL.

[23]  Aris Gkoulalas-Divanis,et al.  An overview of privacy preserving data mining , 2009, ACM Crossroads.

[24]  Amin Mohammed,et al.  Mutation based PSO Techniques for Optimal Location and Parameter Settings of STATCOM under Generator Contingency , 2019 .

[25]  Sandip Sen,et al.  Using real-valued genetic algorithms to evolve rule sets for classification , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[26]  Heikki Mannila,et al.  Fast Discovery of Association Rules , 1996, Advances in Knowledge Discovery and Data Mining.

[27]  Ling Wang,et al.  Fuzzy Inference Algorithm based on Quantitative Association Rules , 2015, Complex Adaptive Systems.

[28]  Iwin Thanakumar Joseph S Dr,et al.  SURVEY OF DATA MINING ALGORITHM’S FOR INTELLIGENT COMPUTING SYSTEM , 2019, Journal of Trends in Computer Science and Smart Technology.