SlideShare a Scribd company logo
Sriskandarajah Suhothayan Kasun Gajasinghe Isuru Loku Narangoda Subash Chaturanga
Outline Introduction Basic principles Solution patterns
Introduction Graphs can be seen in everywhere. In computer science, graph is viewed as an abstract data structure which represents relationships among data.
Graph based data mining Graph based data mining is finding out useful and understandable patterns from graph representation of data. The main subject area of graph based data mining is identifying the frequently occurring subgraph patterns.
Approaches In the recent past a significant work has been done in this subject area to develop algorithms to mine graph data efficiently.  In this paper we are discussing about such several well known algorithms under following categories. Mathematical Graph Theory Based Approaches Greedy Search Based Approaches Inductive Logic Programming Approach Inductive Database Based Approaches
Applications BioInformatics mine biochemical structures  finding out biological conserved sub networks Chemical compound analysis Web browsing pattern analysis intrusion network analysis mining communication networks
Basic Principles Subgraph categories general subgraphs induced subgraphs connected subgraphs Subgraph Isomorphism Problem This finds whether there exists a one-to-one mapping from a set of vertices to another set.
Basic Principles Graph Invariants Quantities to characterize the topological  structure of a graph number vertices,  degree of each vertex number of edges connected to the vertex
Solution Approaches direct Categorization Completeness complete search heuristic search Subgraph isomorphism matching problem Indirect (solves the subgraph  similarity problem)
Solution Approaches Greedy search Inductive logic programming (ILP) Inductive database Complete level-wise search Support Vector Machine (SVM)
Greedy search The conventional solution Categorized into  Depth-First search (DFS) and Breadth-First Search (BFS) Beam search  The disadvantage: as the search proceeds it prunes the branches which do not fit to the maximum branch number limit
Inductive logic programming (ILP) Induction? combination of the 'abduction' (guessing) to select some hypotheses and the 'justification' to seek those hypotheses to justify the observed facts.
Inductive logic programming (ILP) positive examples  + negative examples   =>  hypothesis + background knowledge background knowledge  to control the search process (prune some search paths) introduce predetermined subgraph patterns  ILP can be in any of four categories
Inductive database Subgraphs and relations among subgraphs are  pre-generated sad stored in an inductive database Advantage: fast operation as the basic patterns Disadvantage: large amount of computation and memory utilization
Complete level-wise search It's Complete and Direct Here data are not sets of items Rather graphs having the combinations of a vertex set V(G) and an edge set E(G) which include topological information. Extended approach of Apriori algorithm is used
Support Vector Machine (SVM) Used for classification and regression analysis A non-probabilistic binary linear classifier SVN is a heuristic search and an indirect method in terms of subgraph isomorphism problem.
Categorization Mathematical Graph Theory Based Approaches  Greedy Search Based Approaches Inductive Logic Programming Approach Inductive Database Based Approaches Kernel Function Based Approaches
Greedy Search Based Approaches Use heuristics to evaluate the solution. Two major works SUBDUE GBI
Graph Based Induction (GBI) Has two methods  one  for chunking and the other for extracting patters. Can arrive at local minimum solutions; using pair wise chunking at each step by the opportunistic beam search. Ability to reconstruct the original graph as and when needed The advantage of GBI is that it can handle both directed and undirected labelled graph even with closed paths which includes closed edges. Use empirical graph size definition, limitation in continuously compressing the graph, graph never becomes a single vertex. Extract substructures and construct a classifier.
SUBDUE A graph-based relational learning system Compress the graphs based on Minimum Description Length (MDL) principle Not face high computational complexity (uses computationally constrained beam search) Miss some optimum sub graphs fewer number of highly interesting patterns; than generating a large number of patterns from which interesting patterns need to be identified. Runtime much larger than gSpan and FSG: non-linear with the dataset size (because of the implementation of graph isomorphism problem)
Mathematical Approaches  Apriori-based methods AGM FSG Pattern Growth methods gSpan
Apriori-based Approach  AGM Used to mine “frequent induced subgraphs” Works with both directed and undirected graphs Importantly, this algorithm is not limited to the connected graphs. It also supports isolated graphs.
AGM Breadth first search.  Create new candidates for level k+1 by joining two graphs at level k. AGM generates new graphs by adding a new node: And then proceeds as per Apriori...
FSG FSG works better on graph data sets with more edge and vertex labels This is an optimized algorithm of AGM with added techniques for efficiency. FSG increases the efficiency of the candidate generation of frequent subgraphs by introducing the Transaction ID (TID) method. efficient candidate subgraph generation algorithms.
FSG FSG is a apriori-based and therefore uses level-wise algorithm  Faces two challenges: candidate generation: the generation of size subgraph candidates is more complicated and costly pruning false positives: subgraph isomorphism test is an NP-complete problem
gSpan Uses Depth-First-Search (DFS) can be used to find frequent sub graphs one by one from small to large ones.  Advantages No candidate generation and false test Better saving of space by DFS. Pattern growth mathod
GRAPH DATASET FREQUENT PATTERNS (MIN SUPPORT IS 2) (A) (B) (C) (1) (2)
Another three approaches to mine graph based data. Inductive Logic Programming approach Inductive database approach Kernel function based approach
ILP approach. ILP systems constructs predictive model for a given data set  by searching large  space of candidate hypothesis.  WARMR – proposed in 1998. Combination of Apriori-like level wise search and IPL method.  But have a high computational complexity. FARMER – proposed in 2011. Runs two orders of magnitude than WARMER.
Inductive DB approach. Databases which are capable of handling patterns within data.  Quite different from from typical data bases. Uses interactive querying process to mine data in these data bases. MolFea is an effort related to this area. Has a better computational efficiency which mines linear fragments in chemical compounds..  Also this performs a complete search of the paths in graph data.
Kernel Function based approach This “kernel” function basically defines similarity between two graphs The paper consists of two efforts done based on this approach, which  classifies the graphs  in to binary classes by SVM (Support Vector -  Machine).
Ad

More Related Content

What's hot (20)

Lgm saarbrucken
Lgm saarbruckenLgm saarbrucken
Lgm saarbrucken
Yasuo Tabei
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
International Journal of Engineering Inventions www.ijeijournal.com
 
A Graph-based Model for Multimodal Information Retrieval
A Graph-based Model for Multimodal Information RetrievalA Graph-based Model for Multimodal Information Retrieval
A Graph-based Model for Multimodal Information Retrieval
serwah_S_gh
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discovery
aftab alam
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)
Ha Phuong
 
A Graph Summarization: A Survey | Summarizing and understanding large graphs
A Graph Summarization: A Survey | Summarizing and understanding large graphsA Graph Summarization: A Survey | Summarizing and understanding large graphs
A Graph Summarization: A Survey | Summarizing and understanding large graphs
aftab alam
 
Collaborative Similarity Measure for Intra-Graph Clustering
Collaborative Similarity Measure for Intra-Graph ClusteringCollaborative Similarity Measure for Intra-Graph Clustering
Collaborative Similarity Measure for Intra-Graph Clustering
Waqas Nawaz
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
lauratoni4
 
Learning Graph Representation for Data-Efficiency RL
Learning Graph Representation for Data-Efficiency RLLearning Graph Representation for Data-Efficiency RL
Learning Graph Representation for Data-Efficiency RL
lauratoni4
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
lauratoni4
 
[Seminar] 200508 hyunwook lee
[Seminar] 200508 hyunwook lee[Seminar] 200508 hyunwook lee
[Seminar] 200508 hyunwook lee
ivaderivader
 
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
ijiert bestjournal
 
Distributed graph summarization
Distributed graph summarizationDistributed graph summarization
Distributed graph summarization
aftab alam
 
Objects Clustering of Movie Using Graph Mining Technique
Objects Clustering of Movie Using Graph Mining TechniqueObjects Clustering of Movie Using Graph Mining Technique
Objects Clustering of Movie Using Graph Mining Technique
International Journal of Engineering Inventions www.ijeijournal.com
 
The Most Important Algorithms
The Most Important AlgorithmsThe Most Important Algorithms
The Most Important Algorithms
wensheng wei
 
Programming in python
Programming in pythonProgramming in python
Programming in python
Ivan Rojas
 
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
Daksh Raj Chopra
 
presentation
presentationpresentation
presentation
jie ren
 
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin RSelf-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
shanelynn
 
Good Old Fashioned Artificial Intelligence
Good Old Fashioned Artificial IntelligenceGood Old Fashioned Artificial Intelligence
Good Old Fashioned Artificial Intelligence
Robert Short
 
A Graph-based Model for Multimodal Information Retrieval
A Graph-based Model for Multimodal Information RetrievalA Graph-based Model for Multimodal Information Retrieval
A Graph-based Model for Multimodal Information Retrieval
serwah_S_gh
 
Locally densest subgraph discovery
Locally densest subgraph discoveryLocally densest subgraph discovery
Locally densest subgraph discovery
aftab alam
 
Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)Tutorial of topological data analysis part 3(Mapper algorithm)
Tutorial of topological data analysis part 3(Mapper algorithm)
Ha Phuong
 
A Graph Summarization: A Survey | Summarizing and understanding large graphs
A Graph Summarization: A Survey | Summarizing and understanding large graphsA Graph Summarization: A Survey | Summarizing and understanding large graphs
A Graph Summarization: A Survey | Summarizing and understanding large graphs
aftab alam
 
Collaborative Similarity Measure for Intra-Graph Clustering
Collaborative Similarity Measure for Intra-Graph ClusteringCollaborative Similarity Measure for Intra-Graph Clustering
Collaborative Similarity Measure for Intra-Graph Clustering
Waqas Nawaz
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
lauratoni4
 
Learning Graph Representation for Data-Efficiency RL
Learning Graph Representation for Data-Efficiency RLLearning Graph Representation for Data-Efficiency RL
Learning Graph Representation for Data-Efficiency RL
lauratoni4
 
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
Graph Signal Processing for Machine Learning A Review and New Perspectives - ...
lauratoni4
 
[Seminar] 200508 hyunwook lee
[Seminar] 200508 hyunwook lee[Seminar] 200508 hyunwook lee
[Seminar] 200508 hyunwook lee
ivaderivader
 
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
AN IMPLEMENTATION OF ADAPTIVE PROPAGATION-BASED COLOR SAMPLING FOR IMAGE MATT...
ijiert bestjournal
 
Distributed graph summarization
Distributed graph summarizationDistributed graph summarization
Distributed graph summarization
aftab alam
 
The Most Important Algorithms
The Most Important AlgorithmsThe Most Important Algorithms
The Most Important Algorithms
wensheng wei
 
Programming in python
Programming in pythonProgramming in python
Programming in python
Ivan Rojas
 
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
MATLAB IMPLEMENTATION OF SELF-ORGANIZING MAPS FOR CLUSTERING OF REMOTE SENSIN...
Daksh Raj Chopra
 
presentation
presentationpresentation
presentation
jie ren
 
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin RSelf-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
Self-Organising Maps for Customer Segmentation using R - Shane Lynn - Dublin R
shanelynn
 
Good Old Fashioned Artificial Intelligence
Good Old Fashioned Artificial IntelligenceGood Old Fashioned Artificial Intelligence
Good Old Fashioned Artificial Intelligence
Robert Short
 

Viewers also liked (20)

Graph Theory
Graph TheoryGraph Theory
Graph Theory
Shivam Singh
 
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Seattle DAML meetup
 
New opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph databaseNew opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph database
Cédric Fauvet
 
Frequent Itemset Mining(FIM) on BigData
Frequent Itemset Mining(FIM) on BigDataFrequent Itemset Mining(FIM) on BigData
Frequent Itemset Mining(FIM) on BigData
Raju Gupta
 
Temporal Pattern Mining
Temporal Pattern MiningTemporal Pattern Mining
Temporal Pattern Mining
Prakhar Dhama
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Salah Amean
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theory
Tech_MX
 
120808
120808120808
120808
Chongjie Li
 
Mining Frequent Closed Graphs on Evolving Data Streams
Mining Frequent Closed Graphs on Evolving Data StreamsMining Frequent Closed Graphs on Evolving Data Streams
Mining Frequent Closed Graphs on Evolving Data Streams
Albert Bifet
 
Financial planning in the brain scanner slidecast
Financial planning in the brain scanner slidecastFinancial planning in the brain scanner slidecast
Financial planning in the brain scanner slidecast
Russell James
 
Neuronvisio Intro
Neuronvisio IntroNeuronvisio Intro
Neuronvisio Intro
Michele Mattioni
 
Presentation Internship Brain Connectivity Graph 2014 (ENG)
Presentation Internship Brain Connectivity Graph 2014 (ENG)Presentation Internship Brain Connectivity Graph 2014 (ENG)
Presentation Internship Brain Connectivity Graph 2014 (ENG)
Romain Chion
 
Efficient frequent pattern mining in distributed system
Efficient frequent pattern mining in distributed systemEfficient frequent pattern mining in distributed system
Efficient frequent pattern mining in distributed system
Saurav Kumar
 
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
ijsrd.com
 
Graph Theory
Graph TheoryGraph Theory
Graph Theory
Ehsan Hamzei
 
burton_discrete_graph theory
burton_discrete_graph theoryburton_discrete_graph theory
burton_discrete_graph theory
guest63f42b
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining Techniques
Editor IJMTER
 
Frequent itemset mining using pattern growth method
Frequent itemset mining using pattern growth methodFrequent itemset mining using pattern growth method
Frequent itemset mining using pattern growth method
Shani729
 
How to read academic research (beginner's guide)
How to read academic research (beginner's guide)How to read academic research (beginner's guide)
How to read academic research (beginner's guide)
Russell James
 
Talking Planned Giving: Words that Work
Talking Planned Giving: Words that Work Talking Planned Giving: Words that Work
Talking Planned Giving: Words that Work
Russell James
 
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Seattle DAML meetup
 
New opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph databaseNew opportunities for connected data : Neo4j the graph database
New opportunities for connected data : Neo4j the graph database
Cédric Fauvet
 
Frequent Itemset Mining(FIM) on BigData
Frequent Itemset Mining(FIM) on BigDataFrequent Itemset Mining(FIM) on BigData
Frequent Itemset Mining(FIM) on BigData
Raju Gupta
 
Temporal Pattern Mining
Temporal Pattern MiningTemporal Pattern Mining
Temporal Pattern Mining
Prakhar Dhama
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Salah Amean
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theory
Tech_MX
 
Mining Frequent Closed Graphs on Evolving Data Streams
Mining Frequent Closed Graphs on Evolving Data StreamsMining Frequent Closed Graphs on Evolving Data Streams
Mining Frequent Closed Graphs on Evolving Data Streams
Albert Bifet
 
Financial planning in the brain scanner slidecast
Financial planning in the brain scanner slidecastFinancial planning in the brain scanner slidecast
Financial planning in the brain scanner slidecast
Russell James
 
Presentation Internship Brain Connectivity Graph 2014 (ENG)
Presentation Internship Brain Connectivity Graph 2014 (ENG)Presentation Internship Brain Connectivity Graph 2014 (ENG)
Presentation Internship Brain Connectivity Graph 2014 (ENG)
Romain Chion
 
Efficient frequent pattern mining in distributed system
Efficient frequent pattern mining in distributed systemEfficient frequent pattern mining in distributed system
Efficient frequent pattern mining in distributed system
Saurav Kumar
 
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
Improved Frequent Pattern Mining Algorithm using Divide and Conquer Technique...
ijsrd.com
 
burton_discrete_graph theory
burton_discrete_graph theoryburton_discrete_graph theory
burton_discrete_graph theory
guest63f42b
 
REVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining TechniquesREVIEW: Frequent Pattern Mining Techniques
REVIEW: Frequent Pattern Mining Techniques
Editor IJMTER
 
Frequent itemset mining using pattern growth method
Frequent itemset mining using pattern growth methodFrequent itemset mining using pattern growth method
Frequent itemset mining using pattern growth method
Shani729
 
How to read academic research (beginner's guide)
How to read academic research (beginner's guide)How to read academic research (beginner's guide)
How to read academic research (beginner's guide)
Russell James
 
Talking Planned Giving: Words that Work
Talking Planned Giving: Words that Work Talking Planned Giving: Words that Work
Talking Planned Giving: Words that Work
Russell James
 
Ad

Similar to Survey on Frequent Pattern Mining on Graph Data - Slides (20)

BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
MangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
MangaiK4
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
ijsrd.com
 
Mining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databasesMining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databases
IJDMS
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 
Parallel algorithms for multi-source graph traversal and its applications
Parallel algorithms for multi-source graph traversal and its applicationsParallel algorithms for multi-source graph traversal and its applications
Parallel algorithms for multi-source graph traversal and its applications
Subhajit Sahu
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
IOSR Journals
 
Ijetcas14 314
Ijetcas14 314Ijetcas14 314
Ijetcas14 314
Iasir Journals
 
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
TELKOMNIKA JOURNAL
 
Everything you need to know about AutoML
Everything you need to know about AutoMLEverything you need to know about AutoML
Everything you need to know about AutoML
Arpitha Gurumurthy
 
Recognition as Graph Matching
  Recognition as Graph Matching  Recognition as Graph Matching
Recognition as Graph Matching
Vishakha Agarwal
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
RSIS International
 
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
idescitation
 
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
AkankshaRawat53
 
Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructur
IAEME Publication
 
Research Proposal
Research ProposalResearch Proposal
Research Proposal
Komlan Atitey
 
395 404
395 404395 404
395 404
Editor IJARCET
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET Journal
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
Varad Meru
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
IRJET Journal
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
MangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
MangaiK4
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
ijsrd.com
 
Mining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databasesMining closed sequential patterns in large sequence databases
Mining closed sequential patterns in large sequence databases
IJDMS
 
An efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data miningAn efficient algorithm for sequence generation in data mining
An efficient algorithm for sequence generation in data mining
ijcisjournal
 
Parallel algorithms for multi-source graph traversal and its applications
Parallel algorithms for multi-source graph traversal and its applicationsParallel algorithms for multi-source graph traversal and its applications
Parallel algorithms for multi-source graph traversal and its applications
Subhajit Sahu
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
IOSR Journals
 
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
Multi-threaded approach in generating frequent itemset of Apriori algorithm b...
TELKOMNIKA JOURNAL
 
Everything you need to know about AutoML
Everything you need to know about AutoMLEverything you need to know about AutoML
Everything you need to know about AutoML
Arpitha Gurumurthy
 
Recognition as Graph Matching
  Recognition as Graph Matching  Recognition as Graph Matching
Recognition as Graph Matching
Vishakha Agarwal
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
RSIS International
 
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
Distributed Algorithm for Frequent Pattern Mining using HadoopMap Reduce Fram...
idescitation
 
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
PaperReview_ “Few-shot Graph Classification with Contrastive Loss and Meta-cl...
AkankshaRawat53
 
Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructur
IAEME Publication
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET Journal
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
Varad Meru
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
IRJET Journal
 
Ad

More from Kasun Gajasinghe (7)

Building Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 ASBuilding Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Kasun Gajasinghe
 
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 ASBuilding Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Kasun Gajasinghe
 
Distributed caching with java JCache
Distributed caching with java JCacheDistributed caching with java JCache
Distributed caching with java JCache
Kasun Gajasinghe
 
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
Kasun Gajasinghe
 
Siddhi CEP Engine
Siddhi CEP EngineSiddhi CEP Engine
Siddhi CEP Engine
Kasun Gajasinghe
 
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Kasun Gajasinghe
 
Google Summer of Code 2011 Sinhalese flyer
Google Summer of Code  2011 Sinhalese flyer Google Summer of Code  2011 Sinhalese flyer
Google Summer of Code 2011 Sinhalese flyer
Kasun Gajasinghe
 
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 ASBuilding Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Kasun Gajasinghe
 
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 ASBuilding Services with WSO2 Microservices framework for Java and WSO2 AS
Building Services with WSO2 Microservices framework for Java and WSO2 AS
Kasun Gajasinghe
 
Distributed caching with java JCache
Distributed caching with java JCacheDistributed caching with java JCache
Distributed caching with java JCache
Kasun Gajasinghe
 
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
[WSO2] Deployment Synchronizer for Deployment Artifact Synchronization Betwee...
Kasun Gajasinghe
 
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Scheduler Activations - Effective Kernel Support for the User-Level Managemen...
Kasun Gajasinghe
 
Google Summer of Code 2011 Sinhalese flyer
Google Summer of Code  2011 Sinhalese flyer Google Summer of Code  2011 Sinhalese flyer
Google Summer of Code 2011 Sinhalese flyer
Kasun Gajasinghe
 

Recently uploaded (20)

#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 

Survey on Frequent Pattern Mining on Graph Data - Slides

  • 1. Sriskandarajah Suhothayan Kasun Gajasinghe Isuru Loku Narangoda Subash Chaturanga
  • 2. Outline Introduction Basic principles Solution patterns
  • 3. Introduction Graphs can be seen in everywhere. In computer science, graph is viewed as an abstract data structure which represents relationships among data.
  • 4. Graph based data mining Graph based data mining is finding out useful and understandable patterns from graph representation of data. The main subject area of graph based data mining is identifying the frequently occurring subgraph patterns.
  • 5. Approaches In the recent past a significant work has been done in this subject area to develop algorithms to mine graph data efficiently. In this paper we are discussing about such several well known algorithms under following categories. Mathematical Graph Theory Based Approaches Greedy Search Based Approaches Inductive Logic Programming Approach Inductive Database Based Approaches
  • 6. Applications BioInformatics mine biochemical structures finding out biological conserved sub networks Chemical compound analysis Web browsing pattern analysis intrusion network analysis mining communication networks
  • 7. Basic Principles Subgraph categories general subgraphs induced subgraphs connected subgraphs Subgraph Isomorphism Problem This finds whether there exists a one-to-one mapping from a set of vertices to another set.
  • 8. Basic Principles Graph Invariants Quantities to characterize the topological structure of a graph number vertices, degree of each vertex number of edges connected to the vertex
  • 9. Solution Approaches direct Categorization Completeness complete search heuristic search Subgraph isomorphism matching problem Indirect (solves the subgraph similarity problem)
  • 10. Solution Approaches Greedy search Inductive logic programming (ILP) Inductive database Complete level-wise search Support Vector Machine (SVM)
  • 11. Greedy search The conventional solution Categorized into Depth-First search (DFS) and Breadth-First Search (BFS) Beam search The disadvantage: as the search proceeds it prunes the branches which do not fit to the maximum branch number limit
  • 12. Inductive logic programming (ILP) Induction? combination of the 'abduction' (guessing) to select some hypotheses and the 'justification' to seek those hypotheses to justify the observed facts.
  • 13. Inductive logic programming (ILP) positive examples + negative examples => hypothesis + background knowledge background knowledge to control the search process (prune some search paths) introduce predetermined subgraph patterns ILP can be in any of four categories
  • 14. Inductive database Subgraphs and relations among subgraphs are pre-generated sad stored in an inductive database Advantage: fast operation as the basic patterns Disadvantage: large amount of computation and memory utilization
  • 15. Complete level-wise search It's Complete and Direct Here data are not sets of items Rather graphs having the combinations of a vertex set V(G) and an edge set E(G) which include topological information. Extended approach of Apriori algorithm is used
  • 16. Support Vector Machine (SVM) Used for classification and regression analysis A non-probabilistic binary linear classifier SVN is a heuristic search and an indirect method in terms of subgraph isomorphism problem.
  • 17. Categorization Mathematical Graph Theory Based Approaches Greedy Search Based Approaches Inductive Logic Programming Approach Inductive Database Based Approaches Kernel Function Based Approaches
  • 18. Greedy Search Based Approaches Use heuristics to evaluate the solution. Two major works SUBDUE GBI
  • 19. Graph Based Induction (GBI) Has two methods one for chunking and the other for extracting patters. Can arrive at local minimum solutions; using pair wise chunking at each step by the opportunistic beam search. Ability to reconstruct the original graph as and when needed The advantage of GBI is that it can handle both directed and undirected labelled graph even with closed paths which includes closed edges. Use empirical graph size definition, limitation in continuously compressing the graph, graph never becomes a single vertex. Extract substructures and construct a classifier.
  • 20. SUBDUE A graph-based relational learning system Compress the graphs based on Minimum Description Length (MDL) principle Not face high computational complexity (uses computationally constrained beam search) Miss some optimum sub graphs fewer number of highly interesting patterns; than generating a large number of patterns from which interesting patterns need to be identified. Runtime much larger than gSpan and FSG: non-linear with the dataset size (because of the implementation of graph isomorphism problem)
  • 21. Mathematical Approaches Apriori-based methods AGM FSG Pattern Growth methods gSpan
  • 22. Apriori-based Approach AGM Used to mine “frequent induced subgraphs” Works with both directed and undirected graphs Importantly, this algorithm is not limited to the connected graphs. It also supports isolated graphs.
  • 23. AGM Breadth first search. Create new candidates for level k+1 by joining two graphs at level k. AGM generates new graphs by adding a new node: And then proceeds as per Apriori...
  • 24. FSG FSG works better on graph data sets with more edge and vertex labels This is an optimized algorithm of AGM with added techniques for efficiency. FSG increases the efficiency of the candidate generation of frequent subgraphs by introducing the Transaction ID (TID) method. efficient candidate subgraph generation algorithms.
  • 25. FSG FSG is a apriori-based and therefore uses level-wise algorithm Faces two challenges: candidate generation: the generation of size subgraph candidates is more complicated and costly pruning false positives: subgraph isomorphism test is an NP-complete problem
  • 26. gSpan Uses Depth-First-Search (DFS) can be used to find frequent sub graphs one by one from small to large ones. Advantages No candidate generation and false test Better saving of space by DFS. Pattern growth mathod
  • 27. GRAPH DATASET FREQUENT PATTERNS (MIN SUPPORT IS 2) (A) (B) (C) (1) (2)
  • 28. Another three approaches to mine graph based data. Inductive Logic Programming approach Inductive database approach Kernel function based approach
  • 29. ILP approach. ILP systems constructs predictive model for a given data set by searching large space of candidate hypothesis. WARMR – proposed in 1998. Combination of Apriori-like level wise search and IPL method. But have a high computational complexity. FARMER – proposed in 2011. Runs two orders of magnitude than WARMER.
  • 30. Inductive DB approach. Databases which are capable of handling patterns within data. Quite different from from typical data bases. Uses interactive querying process to mine data in these data bases. MolFea is an effort related to this area. Has a better computational efficiency which mines linear fragments in chemical compounds.. Also this performs a complete search of the paths in graph data.
  • 31. Kernel Function based approach This “kernel” function basically defines similarity between two graphs The paper consists of two efforts done based on this approach, which classifies the graphs in to binary classes by SVM (Support Vector - Machine).