Mining Optimal Utility Incorporated Sequential Pattern from RFID Data Warehouse Using Genetic Algorithm

Today, identification of sequential patterns from a huge database sequence is a major problem in the field of KDD. In addition, if the entire set of sequential patterns existing in a large database is presented, the user may find it difficult to understand and employ the mined result. In order to overcome these issues, we propose an efficient data mining system to generate the most favorable sequential patterns. The proposed technique first generates datasets from the warehoused RFID data. Each mined pattern has distinct utility and the most favorable sequential patterns are generated from the mined sequential patterns by using Genetic Algorithm (GA). A fitness function is used in GA to find out the sequential pattern that provides maximum profit. The implementation result shows that the proposed mining system accurately extracts the important RFID tags and its combinations, nature of movement of the tags and the optimum sequential patterns.

[1]  S. Ramanarayana Reddy Selection of RTOS for an Efficient Design of Embedded Systems , 2006 .

[2]  Philip S. Yu,et al.  Data Mining: An Overview from a Database Perspective , 1996, IEEE Trans. Knowl. Data Eng..

[3]  Bin Li,et al.  Free parallel data mining , 1998, SIGMOD '98.

[4]  Hatim Aboalsamh,et al.  A novel Boolean algebraic framework for association and pattern mining , 2008 .

[5]  P. Radhakrishnan,et al.  Optimizing Inventory Using Genetic Algorithm for Efficient Supply Chain Management , 2009 .

[6]  Xiaohui Liu,et al.  Data mining from 1994 to 2004: an application-orientated review , 2005, Int. J. Bus. Intell. Data Min..

[7]  Dayang Rohaya Awang Rambli,et al.  Mining Sequential Patterns Using I-PrefixSpan , 2007 .

[8]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[9]  Shengxiang Yang,et al.  A Comparative Study of Adaptive Mutation Operators for Genetic Algorithms , 2009 .

[10]  Om Prakash Vyas,et al.  Overview of Itemset Utility Mining and its Applications , 2010 .

[11]  Kuen-Fang Jea,et al.  MINING HYBRID SEQUENTIAL PATTERNS BY HIERARCHICAL MINING TECHNIQUE , 2009 .

[12]  Zorana Bankovic,et al.  Evaluating Sequential Combination of Two Light-Weight Genetic Algorithm based Solutions to Intrusion Detection , 2009 .

[13]  Kamal K. Bharadwaj,et al.  Genetic Programming Approach to Hierarchical Production Rule Discovery , 2007 .

[14]  Ganesh Vaidyanathan,et al.  Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges , 2008, J. Theor. Appl. Electron. Commer. Res..

[15]  Jayanthi Ranjan,et al.  Data mining tools: a CRM perspective , 2008 .

[16]  M. Sedighizadeh,et al.  Using genetic alghoritm for distributed generation allocation to reduce losses and improve voltage profile , 2007, 2007 42nd International Universities Power Engineering Conference.

[17]  Yen-Liang Chen,et al.  Constraint-based sequential pattern mining: The consideration of recency and compactness , 2006, Decis. Support Syst..

[18]  David A. Bell,et al.  EDM: A General Framework for Data Mining Based on Evidence Theory , 1996, Data Knowl. Eng..

[19]  Klaus Hanke,et al.  Genetic Algorithms for Automatic Registration of Laser Scans with Imperfect and Subdivided Features (GAReg-ISF) , 2009 .

[20]  V. Sathiyamoorthi,et al.  Data Mining for Intelligent Enterprise Resource Planning System , 2009 .

[21]  Mike Sewell,et al.  The Rank-scaled Mutation Rate for Genetic Algorithms , 2007 .

[22]  Dimitrios I. Fotiadis,et al.  A two-stage methodology for sequence classification based on sequential pattern mining and optimization , 2008, Data Knowl. Eng..

[23]  David R. Firth,et al.  Communications of the Association for Information Systems , 2011 .

[24]  Michael J. Shaw,et al.  Knowledge management and data mining for marketing , 2001, Decis. Support Syst..

[25]  Munir Mandviwalla,et al.  Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..

[26]  Jian Pei,et al.  Constraint-based sequential pattern mining: the pattern-growth methods , 2007, Journal of Intelligent Information Systems.

[27]  Mourad Ykhlef,et al.  Mining Sequential Patterns Using Hybrid Evolutionary Algorithm , 2009 .

[28]  Pedro A. Diaz-Gomez,et al.  Improved Off-Line Intrusion Detection Using a Genetic Algorithm , 2005, ICEIS.

[29]  T Purusothaman,et al.  UTILITY SENTIENT FREQUENT ITEM SET MINING AND ASSOCIATION RULE MINING: A LITERATURE SURVEY AND COMPARATIVE STUDY , 2009 .

[30]  Jianying Hu,et al.  High-utility pattern mining: A method for discovery of high-utility item sets , 2007, Pattern Recognit..

[31]  Tomasz Imielinski,et al.  Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..

[32]  Jianyong Wang,et al.  Mining sequential patterns by pattern-growth: the PrefixSpan approach , 2004, IEEE Transactions on Knowledge and Data Engineering.

[33]  Ryohei Orihara,et al.  A Sequential Pattern Mining Method based on Sequential Interestingness , 2008 .

[34]  Philip S. Yu Editorial: State of the Transactions , 2004, IEEE Trans. Knowl. Data Eng..