Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

Data Analytics (IT-3006)

Kalinga Institute of Industrial Technology


Deemed to be University
Bhubaneswar-751024

School of Computer Engineering

Strictly for internal circulation (within KIIT) and reference only. Not for outside circulation without permission

3 Credit Lecture Note – Unit 4


Course Contents
2

Sr # Major and Detailed Coverage Area Hrs


4 Frequent Itemsets and Associations 6
Introduction to Frequent Itemsets, Market-Basket
Model, Algorithm for Finding Frequent Itemsets,
Association Rule Mining, Apriori Algorithm

School of Computer Engineering


3

School of Computer Engineering


Introduction
4

 Data mining is the process of analyzing massive volumes of data to discover


patterns and relationships that helps business to solve problems, mitigate
risks, and seize new opportunities. Frequent itemsets play an essential role in
data mining tasks where the need is to find interesting patterns, such as
correlations, sequences, episodes, classifiers, clusters and association rules.
Note: association rules are "if-then" statements, that help to show the
probability of relationships between data items, within large data sets in
various types of databases.
 For instance, customers of an on-line bookstore, each itemset is represented
by the set of books he or she has purchased. A set of books, such as {“Machine
Learning,” “The Elements of Statistical Learning,” “Pattern Classification,”} is a
frequent itemset if it has been bought by sufficiently many customers.
 Many techniques have been invented to mine for frequent events. These
techniques work well in practice on smaller datasets, but are not suitable for
truly big data. Applying frequent itemset mining to large databases is a
challenge as very large databases do not fit into main memory.

School of Computer Engineering


Frequent Itemsets
5

Let I= {i1, ..., ik} be a set of items. Let D, be a set of transactions where each transaction T
is a set of items such that T ⊆ I. Each transaction is associated with an identifier, called
TID. Let A be a set of items. A transaction T is said to contain A if and only if A ⊆ T.
Transaction TID Items bought What is k-itemset?
T1 10 Beer, Nuts, Diaper  When k=1, then k-Itemset is itemset 1.
T2 20 Beer, Coffee, Diaper  When k=2, then k-Itemset is itemset 2.
T3 30 Beer, Diaper, Eggs  When k=3, then k-Itemset is itemset 3.
T4 40 Nuts, Eggs, Milk
 When k=4, then k-Itemset is itemset 4.
 When k=5, then k-Itemset is itemset 5.
T5 50 Nuts, Coffee, Diaper, Eggs, Milk

What is a frequent itemset?


An itemset is frequent if its support is no less than “minimum support”. Support of an
item is the number of transactions in which the item appears. E.g. support of Beer is 3,
support of Eggs is 3, support for Coffee is 2 and so on. Minimum support is always
according to the choice. One can select any minimum support to decide that the itemset
is frequent or not. If the minimum support is 3, then the frequent itemset are {Beer},
{Nuts}, {Diaper}, {Eggs}, {Beer, Diaper}.

School of Computer Engineering


Class Exercise
6

Determine the frequent Itemsets.

School of Computer Engineering


7

School of Computer Engineering


Market-Basket Model
8

What is Market Basket Analysis?


 It is a technique which identifies the strength of association between pairs of
products purchased together and identify patterns of co-occurrence. A co-occurrence
is when two or more things take place together.
 It creates If-Then scenario rules, for example, if item A is purchased then item B is
likely to be purchased. The rules are probabilistic in nature or, in other words, they
are derived from the frequencies of co-occurrence in the observations. Frequency is
the proportion of baskets that contain the items of interest. The rules can be used in
pricing strategies, product placement, and various types of cross-selling strategies.
 Market Basket Analysis takes data at transaction level, which lists all items bought by
a customer in a single purchase. The technique determines relationships of what
products were purchased with which other product(s). These relationships are then
used to build profiles containing If-Then rules of the items purchased.
 The rules could be written as: If {A} Then {B}. The If part of the rule (the {A}) is
known as the antecedent and the THEN part of the rule is known as the consequent
(the {B}). The antecedent is the condition and the consequent is the result.

School of Computer Engineering


What is Market Basket Analysis cont…
9

 For example, you are in a supermarket to buy milk. Referring to the below example,
there are nine baskets containing varying combinations of milk, cheese, apples, and
bananas.
 Question - are you more likely to buy apples or cheese in the same transaction than
somebody who did not buy milk?

 The next step is to determine the relationships and the rules. So, association rule
mining is applied in this context. It is a procedure which aims to observe frequently
occurring patterns, correlations, or associations from datasets found in various kinds
of databases such as relational databases, transactional databases, and other forms of
repositories.
School of Computer Engineering
Market-Basket Model cont…
10
 The association rule has three measures that express the degree of confidence in the
rule, i.e. Support, Confidence, and Lift. Since the market-basket has its origin in retail
application, it is sometimes called transaction.
 Support: The number of transactions that include items in the {A} and {B} parts of
the rule as a percentage of the total number of transactions. It is a measure of how
frequently the collection of items occur together as a percentage of all transactions.
Example: Referring to the earlier dataset, Support(milk) = 6/9, Support(cheese) =
7/9, Support(milk & cheese) = 6/9. This is often expressed as milk => cheese i.e.
bought milk and cheese together.
 Confidence: It is the ratio of the no of transactions that includes all items in {B} as
well as the no of transactions that includes all items in {A} to the no of transactions
that includes all items in {A}. Example: Referring to the earlier dataset,
Confidence(milk => cheese) = (milk & cheese)/(milk) = 6/ 6.
 Lift: The lift of the rule A=>B is the confidence of the rule divided by the expected
confidence, assuming that the itemsets A and B are independent of each other.
Example: Referring to the earlier dataset, Lift(milk => cheese) = [(milk &
cheese)/(milk) ]/[cheese/Total] = [6/6] / [7/9] = 1/0.777.

School of Computer Engineering


Class Exercise
11

Basket Item(s) How many items? Support Confidence Lift

Milk ? ?
Cheese ? ?
1 Milk => Cheese ? ? ? ?
Apple, Milk ? ?
2 (Apple, Milk) => Cheese ? ? ? ?

Apple, Cheese ? ?

3 (Apple, Cheese) => Milk ? ? ? ?

School of Computer Engineering


Class Exercise cont…
12

School of Computer Engineering


Class Exercise
13

 Support(Grapes) ?
 Confidence({Grapes, Apple} => {Mango}) ?
 Lift ({Grapes, Apple} => {Mango}) ?

School of Computer Engineering


Market-Basket Model cont…
14

The likelihood of a customer buying both A and B


together is ‘lift-value’ times more than the chance if
purchasing alone.
 Lift (A => B) = 1 means that there is no correlation
within the itemset.
 Lift (A => B) > 1 means that there is a positive
correlation within the itemset, i.e., products in the
itemset, A, and B, are more likely to be bought together.
 Lift (A => B) < 1 means that there is a negative
correlation within the itemset, i.e., products in itemset,
A, and B, are unlikely to be bought together.
School of Computer Engineering
15

School of Computer Engineering


Algorithm for Finding Frequent Itemsets
16

 Algorithm for finding frequent itemsets is a kind of


market basket analysis methodology that helps to find
patterns or relationships.
 These relationships are represented in the form of
association rules.
 Frequent itemsets algorithm is widely used due to its
wide applications in pattern mining, correlations, and
constraints that are based on frequent patterns,
sequential patterns, and many other data mining tasks.
 This technique is used to find sets of products that are
frequently bought together.
School of Computer Engineering
17

School of Computer Engineering


Association Rule Mining
18

 Association Rules Mining search for frequent patterns, associations,


correlations, or causal structures between sets of items or objects in
transaction databases, relational databases, and other available information
repositories.
 Association rules mining help to predict the occurrence of one item based on
the occurrences of other items in a set of transactions.
 Examples:
 People who buy bread will also buy milk.
 People who buy milk will also buy eggs
 People who bought soda will also buy potato chips
 People who buy bread will also buy jam
So

Apriori algorithm is helpful in mining frequent itemsets and relevant


association rules.

School of Computer Engineering


19

School of Computer Engineering


The Apriori Algorithm
20

 Imagine you’re at the supermarket, and in your mind, you have the items you
wanted to buy. But you end up buying a lot more than you were supposed to.
This is called impulsive buying and brands use the Apriori algorithm to
leverage this phenomenon.
 The Apriori algorithm uses frequent itemsets to generate association rules,
and it is designed to work on the databases that contain transactions.
 With the help of these association rule, it determines how strongly or how
weakly two objects are connected.
 It is the iterative process for finding the frequent itemsets from the large
dataset.
 This algorithm uses a breadth-first search and Hash Tree to calculate the
itemset associations efficiently.
 It is mainly used for market basket analysis and helps to find those products
that can be bought together. It can also be used in the healthcare field to find
drug reactions for patients.

School of Computer Engineering


Hash Tree
21

 Hash tree is a data structure used for data verification and synchronization.
 It is a tree data structure where each non-leaf node is a hash of it’s child
nodes. All the leaf nodes are at the same depth and are as far left as possible.
 It is also known as Merkle Tree.

top hash
hash(hA+B) + hash(hC+D) = hA+B+C+D

hash(hA) + hash (hB) = hA+B hash(hC) + hash (hD) = hC+D

hash(A) = hA hash(B) = hB hash(C)= hC hash(D) )= hD

A B C D

School of Computer Engineering


The Apriori Algorithm cont…
22

Apriori says the probability that item I is not frequent if:


 P(I) < minimum support threshold, then I is not frequent.
 P (I+A) < minimum support threshold, then I+A is not frequent, where A is
another item which also belongs to itemset.
 If an itemset set has value less than minimum support then all of its
supersets will also fall below minimum support, and thus can be ignored.
This property is called the Antimonotone property.

The steps followed in the Apriori algorithm of data mining are:


 Join Step: This step generates (k+1) itemset from k-itemsets by joining each
item with itself.
 Prune Step: This step scans the count of each item in the database. If the
candidate item does not meet minimum support, then it is regarded as
infrequent and thus it is removed. This step is performed to reduce the size
of the candidate itemsets.

School of Computer Engineering


Steps for Apriori Algorithm
23

Below are the main steps for the Apriori algorithm:


1. Calculate the support of itemsets (of size k = 1) in the
transactional database. This is called generating the candidate
set.
2. Prune the candidate set by eliminating items with a support
less than the given threshold.
3. Join the frequent itemsets to form sets of size k + 1, and repeat
the above sets until no more itemsets can be formed. This will
happen when the set(s) formed have a support less than​ the
given support.
Note:
Support refers to items’ frequency of occurrence and confidence is
a conditional probability.
School of Computer Engineering
Apriori Algorithm Example
24

Step-1: Calculating C1 and L1:


In the first step, a table is created that contains
support count (The frequency of each itemset
individually in the dataset) of each itemset in
the given dataset. This table is called the
candidate set or C1.

C1
Itemset Support Count
A 6
Now, we will take out all the itemsets that
have the greater support count that the B 7
minimum support (2). It will give us the C 6
table for the frequent itemset L1. Since all
D 2
the itemsets have greater or equal support
count than the minimum support, except the E 1
E, so E itemset will be removed.
School of Computer Engineering
Apriori Algorithm Example cont…
25 L1
Itemset Support Count Step-2: Candidate Generation C2, and L2:
In this step, we will generate C2 with the help
A 6 of L1. In C2, we will create the pair of the
B 7 itemsets of L1 in the form of subsets. After
C 6 creating the subsets, we will again find the
support count from the main transaction table
D 2 of datasets, i.e., how many times these pairs
C2 have occurred together in the given dataset. So,
we will get the below table for C2:
Itemset Support Count
{A, B} 4
Again, we need to compare the C2 Support
{A,C} 4 count with the minimum support count, and
{A, D} 1 after comparing, the itemset with less support
count will be eliminated from the table C2. It
{B, C} 4
will give us the below table for L2. In this case,
{B, D} 2 {A,D}, {C,D} itemset will be removed.
{C, D} 0
School of Computer Engineering
Apriori Algorithm Example cont…
26
L2
Step-3: Candidate Generation C3, and L3:
Itemset Support Count For C3, we will repeat the same two processes,
{A, B} 4 but now we will form the C3 table with subsets
{A, C} 4 of three itemsets together, and will calculate
the support count from the dataset. It will give
{B, C} 4 the below table:
{B, D} 2
C3
Now we will create the L3 table. As we can Itemset Support Count
see from the above C3 table, there is only
{A, B, C} 2
one combination of itemset that has
support count equal to the minimum {B, C, D} 0
support count. So, the L3 will have only one {A, C, D} 0
combination, i.e., {A, B, C}.
L3
{A, B, D} 0

Itemset Support Count


{A, B, C} 2

School of Computer Engineering


Apriori Algorithm Example cont…
27

Step-4: Finding the association rules for the subsets:


To generate the association rules, first, we will create a new table (AR) with the possible
rules from the occurred combination. For all the rules, we will calculate the confidence
using formula sup(A^B)/A. After calculating the confidence value for all rules, we will
exclude the rules that have less confidence than the minimum threshold (50%).
AR
Rules Support Confidence
A^B → C 2 sup{(A^B)^C}/sup(A^B)= 2/4 = 0.5 =50%
B^C → A 2 sup{(B^C) ^A}/sup(B^C)= 2/4=0.5=50%
A^C → B 2 sup{(A^C)^B}/sup(A^C)= 2/4=0.5=50%
C → A^B 2 sup{(C^( A^B)}/sup(C)= 2/5=0.4=40%
A → B^C 2 sup{(A^( B^C)}/sup(A)= 2/6=0.33=33.33%
B → B^C 2 sup{(B^( B^C)}/sup(B)= 2/7=0.28=28%
As the given threshold or minimum confidence is 50%, so the first three rules A^B → C,
B^C → A, and A^C → B can be considered as the strong association rules for the given
problem.
School of Computer Engineering
Apriori Algorithm Flow
28

School of Computer Engineering


Class Exercise
29

Transaction List of items Minimum support = 2


T1 I1, I2, I3 Minimum confidence = 50%
T2 I2, I3, I4
T3 I4, I5
T4 I1, I2, I4
T5 I1, I2, I3, I5
T6 I1, I2, I3, I4

Find frequent itemsets and generate association rules for them.


Illustrate it with step-by-step process.

School of Computer Engineering


Class Exercise
30

Choose minimum support and minimum confidence to your choice.

Find frequent itemsets.

School of Computer Engineering


31

School of Computer Engineering

You might also like