簡易檢索 / 詳目顯示

研究生: 黃正明
Cheng-Ming Huang
論文名稱: 物件導向資料探勘及其應用
Object-Oriented Data Mining and Its Applications
指導教授: 洪西進
Shi-Jinn Horng
洪宗貝
Tzung-Pei Hong
口試委員: 張瑞雄
R.S. Chang
楊昌彪
C.B. Yang
王有禮
Y.L. Wang
陳健輝
G.H. Chen
李祖添
T.T. Lee
王家祥
J.S. Wang
楊竹星
C.S. Yang
學位類別: 博士
Doctor
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2006
畢業學年度: 94
語文別: 英文
論文頁數: 160
中文關鍵詞: 資料探勘行動探勘模糊理論物件導向網站探勘
外文關鍵詞: object-oriented, web mining, data mining, mobility mining, fuzzy sets
相關次數: 點閱:265下載:2
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

資料探勘是從現有的數據庫中選出合乎需要的知識、或者值得瞭解的樣式之過程。 近年來,物件概念在多種應用方面深受歡迎且廣被使用,尤其適用於複雜的資料描述。 這篇論文針對如何從二元的物件導向交易資料、及網站伺服器的記錄中找出相關知識提出兩種新演算法, 也同時利用數值化物件導向的交易資料、及上述網站伺服器的記錄中提出兩種模糊資料探勘演算法。
在應用上,這篇論文嘗試在無線網路中發現模糊個人行動樣式以幫助系統提供個人化服務。其將每個行動用戶在各地方區域的到達時間及所停留的時間當成重要的屬性來表示所得結果,由於到達時間及停留期間為數值型態,所以利用模糊概念來處理它們以形成語意項目。此外,本論文亦提出一個基於AprioriAll演算法的模糊探勘演算法,但是有許多針對行動網路的特殊考量和AprioriAll演算法不盡相同,這些差異造成在設計演算法時需有更細緻的考量。


Data mining is a process of extracting desirable knowledge or interesting patterns from existing databases for specific purposes. Recently, the object concept has been very popular and used in a variety of applications, especially for complex data description. This thesis thus proposes two novel data-mining algorithms for extracting interesting knowledge from transactions stored as object data and logs of object-oriented web server. We also proposed two novel fuzzy data-mining algorithms for extracting interesting knowledge from quantitative transactions which are stored as object data and log of quantitative object-oriented web server.
In applications, this thesis attempts to discover fuzzy personal mobility patterns for assisting systems in providing personalized service in a wireless network. The arrival time and the duration time of each location area visited by a mobile user are used as important attributes in representing the results. Since both the arrival time and the duration time are numeric, fuzzy concepts are used to process them and to form linguistic terms. A fuzzy mining algorithm has then been proposed, which is based on AprioriAll algorithm, though different in several ways aspects. The difference arises more delicate considerations in the design of the proposed algorithm.

摘 要 II ABSTRACT III List of Figures VII List of Tables X CHAPTER 1 Introduction 1 1.1 MOTIVATION 1 1.2 CONTRIBUTIONS 4 1.3 READER'S GUIDE 4 CHAPTER 2 Review of Related Concepts 5 2.1 OBJECT-ORIENTED TRANSACTIONS 5 2.2 ASSOCIATION RULES 6 2.3 SEQUENTIAL PATTERNS 7 2.4 WEB MINING 8 2.5 FUZZY SET CONCEPTS 9 2.6 FUZZY MINING 12 2.7 WIRELESS NETWORKS FOR MOBILE USERS 12 CHAPTER 3 Mining Inter- and Intra- Object-Oriented Association Rules 14 3.1 NOTATIONS 14 3.2 THE PROPOSED ALGORITHM 15 3.3 AN EXAMPLE 17 CHAPTER 4 Mining Fuzzy Inter- and Intra- Object-Oriented Association Rules 28 4.1 NOTATIONS 28 4.2 THE PROPOSED ALGORITHM 29 4.3 AN EXAMPLE 33 CHAPTER 5 Object-Oriented Web Usage Mining 43 5.1 NOTATIONS 43 5.2 THE PROPOSED ALGORITHM 44 5.3 AN EXAMPLE 47 CHAPTER 6 Linguistic Object-Oriented Web Mining 57 6.1 NOTATION 57 6.2 THE PROPOSED ALGORITHM 58 6.3 AN EXAMPLE 63 CHAPTER 7 Mobility Knowledge Discovery in Wireless Networks 80 7.1 NOTATIONS 81 7.2 THE PROPOSED ALGORITHM 81 7.3 AN EXAMPLE 84 CHAPTER 8 Linguistic Mobility Patterns Mining 92 8.1 NOTATIONS 93 8.2 THE PROPOSED ALGORITHM 94 8.3 AN EXAMPLE 98 CHAPTER 9 Experimental Results 111 9.1 EXPERIMENTAL RESULTS FOR OBJECT-ORIENTED DATA MINING 111 9.2 EXPERIMENTAL RESULTS FOR FUZZY OBJECT-ORIENTED DATA MINING 116 9.3 EXPERIMENTAL RESULTS FOR OBJECT-ORIENTED WEB MINING 123 9.4 EXPERIMENTAL RESULTS FOR LINGUISTIC OBJECT-ORIENTED WEB MINING 128 9.5 EXPERIMENTAL RESULTS FOR MOBILITY MINING 134 9.6 EXPERIMENTAL RESULTS FOR LINGUISTIC MOBILITY MINING 137 CHAPTER 10 Conclusions and Future Works 141 References 144

[1] R. Agrawal, T. Imielinksi and A. Swami, “Mining association rules between sets of items in large database,“ The 1993 ACM SIGMOD Conference, Washington DC, USA, 1993.
[2] R. Agrawal, T. Imielinksi and A. Swami, “Database mining: a performance perspective,” IEEE Transactions on Knowledge and Data Engineering, Vol. 5, No. 6, 1993, pp. 914-925.
[3] R. Agrawal, R. Srikant: “Mining sequential patterns”, The Eleventh International Conference on Data Engineering, 1995, pp. 3-14.
[4] R. Agrawal and R. Srikant, “Fast algorithm for mining association rules,” The International Conference on Very Large Databases, 1994, pp. 487-499.
[5] I. F. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu and W. Wang, "Mobility management in current and future communications networks", IEEE Network, Vol. 12, No. 4, 1998, pp. 39-49.
[6]D. Barbara, “Mobile computing and databases - a survey,” IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 1, 1999, pp. 108-117.
[7] C. H. Cai, W. C. Fu, C. H. Cheng and W. W. Kwong, “Mining association rules with weighted items,” The International Database Engineering and Applications Symposium, 1998, pp. 68-77.
[8] M. S. Chen, J. S. Park and P. S. Yu, “Efficient data mining for path traversal patterns” IEEE Transactions on Knowledge and Data Engineering, Vol. 10, 1998, pp. 209-221.

[9] L. Chen and K. Sycara, “Webmate: a personal agent for browsing and searching,” The ACM Second International Conference on Autonomous Agents, 1998, pp. 132-139.
[10]. R. V. J. Chintalapati, V. Kumar and A. Datta, "An adaptive location management algorithm for mobile computing", The 22th Annual IEEE Conference on Local Computer Networks, 1997, pp. 133-140.
[11] C. Clair, C. Liu and N. Pissinou, “Attribute weighting: a method of applying domain knowledge in the decision tree process,” The Seventh International Conference on Information and Knowledge Management, 1998, pp. 259-266.
[12] P. Clark and T. Niblett, “The CN2 induction algorithm,” Machine Learning, Vol. 3, 1989, pp. 261-283.
[13] E. Cohen, B. Krishnamurthy and J. Rexford, ”Efficient algorithms for predicting requests to web servers,” The Eighteenth IEEE Annual Joint Conference on Computer and Communications Societies, Vol. 1, 1999, pp. 284 –293.
[14] R. Cooley, B. Mobasher and J. Srivastava, “Grouping web page references into transactions for mining world wide web browsing patterns,” Knowledge and Data Engineering Exchange Workshop, 1997, pp. 2–9.
[15] R. Cooley, B. Mobasher and J. Srivastava, “Web mining: information and pattern discovery on the world wide web,” The Ninth IEEE International Conference on Tools with Artificial Intelligence, 1997, pp. 558 -567.
[16] A. Famili, W. M. Shen, R. Weber and E. Simoudis, "Data preprocessing and intelligent data analysis," Intelligent Data Analysis, Vol. 1, No. 1, 1997.
[17] W. J. Frawley, G. Piatetsky-Shapiro and C. J. Matheus, “Knowledge discovery in databases: an overview,” The AAAI Workshop on Knowledge Discovery in Databases, 1991, pp. 1-27.
[18] I. Graham and P. L. Jones, Expert Systems – Knowledge, Uncertainty and Decision, Chapman and Computing, Boston, 1988, pp.117-158.
[19]. I. Han and D. H. Cho,"Group location management for mobile subscribers on transportation systems in mobile communication networks", IEEE Transactions on Vehicular Technology, Vol. 53, No. 1, 2004, pp. 181-191.
[20] T. P. Hong and J. B. Chen, "Processing individual fuzzy attributes for fuzzy rule induction," Fuzzy Sets and Systems, Vol. 112, No. 1, 2000, pp. 127-140.
[21] Kimura, T.D., “Object-oriented dataflow,” The 11th IEEE International Symposium on Visual Languages, 1995, pp. 180 – 186.
[22] N. E. Kruijt, D. Sparreboom, F. C. Schoute and R. Prasad, "Location management strategies for cellular mobile networks", IEEE Electronics & Communication Engineering Journal, Vol. 10, No.2, 1998, pp. 64-72.
[23] W. Ma and Y. Fang, “A new location management strategy based on user mobility pattern for wireless networks”, The 27th Annual IEEE Conference on Local Computer Networks, 2002.
[24] E. H. Mamdani, “Applications of fuzzy algorithms for control of simple dynamic plants, “ IEEE Proceedings, 1974, pp. 1585-1588.
[25] H. Mannila, “Methods and problems in data mining,” The International Conference on Database Theory, 1997.
[26] R. Srikant and R. Agrawal, “Mining quantitative association rules in large relational tables,” The 1996 ACM SIGMOD International Conference on Management of Data, Montreal, Canada, June 1996, pp. 1-12.
[27] R. Srikant, Q. Vu and R. Agrawal, “Mining association rules with item constraints,” The Third International Conference on Knowledge Discovery in Databases and Data Mining, Newport Beach, California, August 1997, pp.67-73.
[28] K.Wang, J. M. Liao and J. M Chen, “Intelligent location tracking strategy in PCS”, The IEE Proceedings on Communications, 2000, Vol. 147, No. 1, pp. 63-68.
[29] WON KIM, “Object-oriented databases : definition and research directions,” IEEE Transactions on Knowledge and Data Engineering, Vol. 2, No. 3, 1990, pp. 327-341.
[30] S. Yue, E. Tsang, D. Yeung and D. Shi, “Mining fuzzy association rules with weighted items,” The IEEE International Conference on Systems, Man and Cybernetics, 2000, pp. 1906-1911.
[31] L. A. Zadeh, “Fuzzy logic,” IEEE Computer, 1988, pp. 83-93.
[32] L. A. Zadeh, “Fuzzy sets,” Information and Control, Vol. 8, No. 3, 1965, pp. 338-353.

無法下載圖示 全文公開日期 2011/07/06 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE