Noise-free attribute-oriented induction

被引:0
作者
Hu, Hsiao-Wei [1 ,3 ]
Chen, Yen-Liang [2 ,4 ]
Hong, Jia-Yu [2 ,4 ]
机构
[1] Soo Chow Univ, Sch Big Data Management, Taipei, Taiwan
[2] Natl Cent Univ, Dept Informat Management, Chungli, Taiwan
[3] 70 Linshi Rd, Taipei 111, Taiwan
[4] 300 Jhongda Rd, Taoyuan 32001, Taiwan
关键词
Data mining; Attribute-Oriented Induction; Concept Hierarchy; Noise; KNOWLEDGE DISCOVERY;
D O I
10.1016/j.ins.2021.04.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-oriented induction (AOI) was originally developed to facilitate the mining of generalized knowledge in relational databases. Input data for the AOI method comprises a relational table and a concept tree for each attribute. The output is a small relation that contains a number of generalized tuples which summarize the general characteristics of the relational table. Ideally, the generalized tuples shown in the induction table represent the patterns of information that appear in the table. However, if the input data contains a large amount of noise, the generalized tuples may contain too little information to be useful. Existing research into AOI has yet to focus on the elimination of noise. To fill this gap, we developed two noise-free AOI algorithms that filter out noise to enhance the specificity of AOI results. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:333 / 349
页数:17
相关论文
共 39 条
[1]  
Al-Janabi S, 2018, J ENG APPL SCI, V13, P10182
[2]  
Al-Janabi S, 2018, INT J COMPUT APPL, V40, P1
[3]  
Al-Janabi S, 2019, INT J GRID UTIL COMP, V10, P512
[4]   A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation [J].
Al-Janabi, Samaher ;
Alkaim, Ayad F. .
SOFT COMPUTING, 2020, 24 (01) :555-569
[5]  
Al-Janabi S, 2014, 2014 INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK)
[6]   A Study of Cyber Security Awareness in Educational Environment in the Middle East [J].
Al-Janabi, Samaher ;
Al-Shourbaji, Ibrahim .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2016, 15 (01)
[7]   Intrusion detection alarms reduction using root cause analysis and clustering [J].
Al-Mamory, Safaa O. ;
Zhang, Hongli .
COMPUTER COMMUNICATIONS, 2009, 32 (02) :419-430
[8]  
Ali SH, 2012, 2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), P962, DOI 10.1109/SETIT.2012.6482043
[9]  
Angryk RA, 2006, STUD COMPUT INTELL, V9, P169
[10]  
[Anonymous], 2017, INT C SOFT COMP DAT