0% found this document useful (0 votes)
3 views

Performance Analysis of Embedded Tree-Based Pattern Mining Algorithm With Sentiment Analysis (1)

The document presents an analysis of an Embedded Tree-Based Pattern Mining Algorithm integrated with Sentiment Analysis to enhance the understanding of human interactions in meetings. It discusses the algorithms used to extract interaction flow patterns and sentiment from meeting data, emphasizing the importance of analyzing not just the content but also the dynamics of interactions. The experimental results demonstrate the effectiveness of the proposed algorithms in accurately capturing and classifying interaction types during meetings.

Uploaded by

Narmadha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Performance Analysis of Embedded Tree-Based Pattern Mining Algorithm With Sentiment Analysis (1)

The document presents an analysis of an Embedded Tree-Based Pattern Mining Algorithm integrated with Sentiment Analysis to enhance the understanding of human interactions in meetings. It discusses the algorithms used to extract interaction flow patterns and sentiment from meeting data, emphasizing the importance of analyzing not just the content but also the dynamics of interactions. The experimental results demonstrate the effectiveness of the proposed algorithms in accurately capturing and classifying interaction types during meetings.

Uploaded by

Narmadha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Performance Analysis of Embedded Tree-Based Pattern

Mining Algorithm with Sentiment Analysis


P.Maheswari , S.Sudhaa, S.Nandhini
K.Anusree III-BCA
Department of computer Applications
K.S.R college of Arts and Science For Women
Thiruchengode 637215, Tamilnadu, India
Email Id: [email protected], [email protected], [email protected]
[email protected]

Abstract - Human interaction is one of the most important characteristics of group social dynamics in meetings.
The sequence of human interaction is generally represented as a tree. Tree structure is used to capture how the
person interacts in meetings and to discover the interactions flow. The human interaction are proposing as an
idea, giving comments, ask opinion, acknowledge, etc., Frequent interaction tree pattern mining algorithm and
Frequent interaction sub tree pattern mining algorithm are utilized to analysis the structure and to extract
interaction flow patterns, where co-occurring only the tags are considered.
Tree-Based Pattern Mining Algorithm (TBPMA) not considers the verbal behaviors. To address issues of verbal
behaviors, Sentimental Analysis (SA) Algorithm is integrated with Tree Based Pattern mining Algorithm for
classifying the document. A sentiment analysis approach is introduced to extract sentiments associated with
opinions of positive or negative for specific subjects from the document instead of classifying the whole
document into positive or negative. Embedded Tree-Based Pattern Mining Algorithm (ETBPMA) is used to
construct frequency of embedded tree orders. It is used to find the correct position of the node in tree
representation and also improve the accuracy level of the tree orders.

Keywords-Tree mining, Sentiment Analysis, Frequent sub-tree mining, embedded sub-tree mining, interaction
mining

I.INTRODUCTION
Human Interaction is a vital event to understand this communicative information and different from
communicative information. Understanding human physical interactions (e.g. turn-taking and
behavior is essential in applications including addressing), the human interactions here are defined
automated surveillance, video archival/retrieval, as behaviors among meeting participants with respect
medical diagnosis, and human-computer interaction. to the Current topic, such as proposing an idea,
The advent of smart meeting that automatically giving some comments, expressing positive opinion,
records a meeting [1] and analyzes the generated and requesting information. When incorporated with
audio-visual content for future viewing .While most semantics (i.e. user intention or attitude towards a
of current smart meeting systems analyze the meeting topic), interactions are more meaningful in
content for understanding what conclusion was made, understanding conclusion drawing and meeting
it is more interesting and important to know how a organization. The interaction issues including turn-
conclusion was made, for example, did all members taking, gaze behavior, influence and talkativeness
agree on the outcome? Who did not give his and analyzing user interactions during poster
opinion? Who spoke a little or a lot? etc., such presentation in an exhibition room are mainly
kind of group social dynamics can be useful for focus on detecting physical interactions between
determining whether meeting was well organized participants without any relations with topics.
and whether the conclusion was rational. Human
interaction plays an important role in understanding
The context information is gathered through Info –a user requests information about a proposal;
multiple sensors e.g. video cameras, microphones, ask Opinion– a user asks someone else’s opinion
and motion sensors. The various interactions imply about a proposal; posOpinion – a user expresses
different user [3] [4] roles, attitudes, and intentions positive opinion, i.e. follow a proposal; and
about a topic during a discussion.. We create a set of negOpinion – a user expresses negative opinion, i.e.
human interactions that includes seven categories: against a proposal.
propose, comment, acknowledgement, request Info,
ask Opinion, posOpinion, and negOpinion. The The context used in our interaction detection
detailed meanings are described as: propose – a user includes head motion, notice from others, speech
proposes an idea with respect to a topic; comment – manner, talking time, interaction juncture, and
a user gives comments on a proposal; information about previous interaction. Head motion
acknowledgement – a user confirms someone else’s (e.g. Drowsy) is very common and used often
comment or explanation, e.g. yeah and OK; request

in detection of human response (acknowledgement interaction flow as a key feature [4] and (iv) index
or agreement). For example, when a user is proposing meetings for further ease of access in database.
some idea, he is usually being looked at by most of
the participants. Attention from others can be treated There have been several works done in discovering
as how many persons looking at the target user Human behavior patterns by using stochastic
during the interaction. Thus the problem can be techniques. Bakeman and Gottman [5] applied
roughly turned into detection of face direction. The sequential analysis to observe and analyze human
face orientation is determined as the one whose interactions. Magnusson [6] proposed a pattern
vector makes the smallest angle. Speech tone refers detection method, called T-pattern to discover hidden
to whether a statement is a question or a normal one. time patterns in human behavior. T-pattern has been
Speaking time is another important indicator in adopted in several applications such as interaction
detection the type of human interaction. analysis and sports research .Although the purpose
of these techniques is similar to our work, conduct
II.RELATED WORKS analysis on human interaction in meetings and
Frequent-pattern mining has been studied address the problem of discovering interaction
extensively in data mining, with many algorithms patterns from the perspective of data mining.
proposed and implemented (for example, Apriori
[Agrawal & Srikant1994],FP-growth [Han, Pei, & Casas-Garriga[7] proposed algorithms to mine
Yin2000], CLOSET [Pei, Han, & Mao2000], and unbounded episodes (those with unfixed window
CHARM [Zaki & Hsiao2002]). Frequent pattern width or interval) from a sequence of events on a
mining and its associated methods have been time line. The work is generally used to extract
popularly used in association rule mining [Agrawal & frequent episodes, i.e., collections of events occurring
Srikant1994], sequential pattern mining [Agrawal & frequently together. Morita et al. [8] proposed a
Srikant1995], structured pattern mining [Kuramochi pattern mining method for the interpretation of
& Karypis2001], iceberg cube computation [Beyer & human interactions in a poster exhibition. It extracts
Ramakrishnan1999], cube gradient analysis [Imielin- simultaneously occurring patterns of primitive
ski, Khachiyan, & Abdulghani2002], associative actions such as gaze and speech. Sawamoto et al. [8]
classification [Liu, Hsu, & Ma1998], frequent presented a method for extracting important
pattern-based clustering [Wang et al.2002], and so interaction patterns in medical interviews (i.e.,
on. doctor-patient communication) using non-verbal
information.
Data mining is useful in discovering implicit,
previously unknown, and potentially valuable Sasa Junuzovic et al. proposed that Capturing the
information or knowledge from large datasets. For relevant aspects is more important for offline meeting
instance, frequent pattern mining [1], [2], [3] is viewing, which is for remotely attending a meeting.
helpful in finding frequently occurring pat-terns, such The reason is that during an ongoing meeting, remote
as interaction patterns from meetings. The discovered attendees can interrupt the conversation to ask for
interaction patterns help to (i) estimate the clarifications, which is not possible in the case of a
effectiveness of decisions made in meetings, (ii) person watching a recorded meeting. The aspects of a
designate whether a meeting discussion is fruitful, meeting that are important are meeting-dependent. In
(iii) compare two meeting discussions using general, meetings can be roughly classified into two
types. In one type of meeting, there are a large
number of attendees, but only a few of them are frequently. Thus, traditional meeting viewing
active. An example of such a meeting is a lecture in interfaces for such meetings have an automatic
which there is one lecturer and a large audience. In speaker view, which always shows the current
the other type of meeting, there are a small number of speaker.
attendees, but the majority of them are active.
III. TREE BASED PATTERN MINING
Motivated by concepts in social psychology, which
highlight the group and multimodal nature of Tree-Based Pattern Mining algorithm is
communication, recent work has viewed meetings as designed for interaction flow. Frequent tree pattern
sequences of no overlapping Multimodal actions mining algorithm is used for each tree TD, for
performed by the group of participants thus implying exchanging the places of siblings (i.e., performs
that such actions are relevant to segment and commutation processing) to generate the full set of
recognize. A key aspect of interactive meetings is Isomorphic Trees, ITD. [8] [9] The tree dataset is
the current speaker, who is, by definition, changing constructed by using String Encoding method which
is explained under here
.
A. String Encoding example string code for tree is PRO-(COM-
ACK)*REQ*ACK. First, tree dataset (TD)
String Encoding defines an Application
is constructed. Then Tree based mining
Programming Interface (API) for encoding
algorithm calculates the support of each
strings to binary data, and decoding strings
node (tree) in ITD. Then it selects the tree
from binary data. To represent a Tree
Dataset (TD), String Encoding method is whose supports are larger than
used. The first node of the root is (minsupport). It finally outputs the frequent
represented using “-”, and sub tree is patterns as frequent trees. Frequent
represented by using “()”, sibling interaction tree pattern mining Algorithm
relationships are represented using “*”. The (FITPM) is projected in Fig 1.

Frequent Interaction Tree Pattern Mining Algorithm


Input: a tree database TD and a minsupport σ
Output: all frequent tree patterns.
Step1: In tree database TD, generate its full isomorphic trees dataset, ITD.
Step2: After database ITD generation, count the number of occurrences for each tree t.
Step3: Calculate the support of each tree.
Step4: Select the trees whose supports are larger than σ (minsup).
Step5: Output the frequent trees.
Where, TD - A dataset of interaction trees.
ITD - The full set of isomorphic trees to TD
T - A Tree ,σ - A support threshold minsup

Fig 1. Frequent Interaction Tree Pattern Mining Algorithm


For each tree in TD, to generate full set isomorphic existing frequent i-sub trees to generate the set [10] of
trees. The purpose of generating isomorphic trees is to candidates with i + 1 nodes. If there are any trees
ease string matching. It then calculates the support of whose supports are larger than σ, it selects them to
each tree in ITD; it selects the trees whose supports
form and repeats the procedure. Otherwise, it
are larger than σ and detects isomorphic trees with in
stops to output the frequent sub trees.
them. If m trees are isomorphic, it selects one of them
Given a tree or sub tree T and a data set of trees TD,
and discards the others. It finally outputs the frequent
the support of T is defined as in equation 1.
trees. Frequent Interaction Sub Tree Pattern Mining
supp (T) = Number of Occurrences in T
Algorithm (FISTPM) is projected in Fig 2. (1)
Calculate the support of each node and selects the Total Number of Trees in TD
nodes whose supports are larger than σ to form the set If the value of supp (T) is more than a threshold
of frequent nodes. Then adds a frequent node to value minsupp T, It is called a “frequent tree” or
“frequent sub tree.”
Frequent Interaction Sub Tree Pattern Mining Algorithm
Input: a tree database TD and a support threshold σ
Output: all frequent sub tree patterns with respect to σ
Step1: Initialize the value i = 0
Step2: Scan database TD, calculate the support of each node
Step3: Select the nodes whose supports are larger than σ to form
Step4: Then add a frequent node to existing frequent i-sub trees to generate the set of
candidates with i+1nodes.
i= i+1
for each tree in ,do
for each node in ,do
join and to generate
Step5:calculate the support of each tree in
(Subtree_Support_Calcultating(TD, )
Step6: If there are any trees whose supports are larger than σ, then select them to form
and return to Step (4).
Step7 :else output the frequent sub trees whose supports are larger than σ
Where, tk - A sub tree with k nodes, i.e., k-sub tree
Ck - A set of candidates with k-nodes, Fk - A set of frequent k-sub trees

Fig 2.Frequent Interaction Sub Tree Pattern Mining Algorithm

IV. EMBEDDED TREE BASED INTERACTION PATTERN MINING


WITH SENTIMENT ALGORITHM

Mining frequent sub tree from databases of labelled in tree-like databases. Using a new data structure
trees is a new research field that has many practical called scope-list, which is a canonical representation
applications in areas such as computer networks, of the tree node, the algorithm first generates all
Web mining, Bioinformatics, XML document candidate trees, then enumerates into embedded
mining, etc. These applications share a requirement ordered trees. Embedded Tree Based Interaction
for capture the complex relations among data entities. Pattern Mining [9] with Sentiment Algorithm is
In this thesis an efficient algorithm is introduced for presented in Fig 3 and this algorithm Flow chart is
mining frequent, ordered, an embedded sub tree [8] projected in Fig 4.

Embedded Tree Based Interaction Pattern Mining with Sentiment Algorithm


Input: our own dataset
Output: embedded ordered trees
Step 1: For each sentence of the review text, semantic annotation is performed, and prior
sentiment scores are assigned to each word.
Step 2 :The grammatical dependencies are determined, and the sentence is broken into
independent clauses.
Step 3: The contextual sentiment score is calculated by traversing the dependency tree
based on its clause structure.
Step 4: Processing all the clauses of the sentence.
Step 5: To generate all candidates trees, and compute the embedded ordered trees.
Fig 3. Embedded Tree Based Interaction Pattern Mining with Sentiment Algorithm

Start

Dataset

Review Text

Calculate sentiment score

Process all clauses of sentence

Compute into embedded ordered trees

End
Fig 4.Flow chart for ETPM with SA Algorithm

V. EXPERIMENTAL RESULT AND DISCUSSIONS

The goal of experimental analysis is to interaction of the meetings. Each meeting have four
calculate the accuracy of the proposed algorithms participants seated around a table. In order to use a
for interaction in the meetings. The detailed correct data for mining, the interaction types such
description of dataset used to conduct experiment as Positive Content, Negative Content, Comments
and their discussions of the results are given below. and Acknowledgement are tuned. The six Text
A. .Data sets documents used for conducting experiments are
This work involves real meetings average about given in Table 1.
15 minutes. Video camera, microphones and
motion sensors are used for capturing the PRO
S.No Document Name
1. Ext.txt
2. Inp1.txt COM
3. Inp2.txt
4. Inp3.txt
5. Inp4.txt
6. Inp5.txt
COM
TABLE 1. TEXT DOCUMENTS
The accuracy is a parameter used to evaluate The Performance of Tree-Based Pattern Mining
the efficiency of the proposed algorithms and the Algorithm (TBPMA), Embedded Tree Based Pattern
same is defined as follows. Mining algorithm (ETBPM) and TBPMA with SA
and ETBPM with SA are evaluated and analyzed
B .Performance Analysis thoroughly.

Tree-Based Pattern Mining Algorithm (TBPMA)


Tree-Based Pattern Mining algorithm is designed FTPMA algorithm first exchanges the places of
for analyzing interaction flow of the human interaction in siblings to generate the full set of Isomorphic Trees,
meetings. Frequent Tree Pattern Mining Algorithm ITD. For instance, the tree PRO-COM*ACK can be
(FTPMA) is used for each tree in TD, for exchanging transformed into two trees, PRO-COM*ACK and
the places of siblings to generate the full set of PRO-ACK*COM. If the siblings of a tree are the
isomorphic trees, ITD. same (e.g., PRO-COM*COM), then the process can
be discarded. The purpose of generating isomorphic
Frequent Tree Pattern Mining Algorithm trees is to easy string matching. It generates
Isomorphic Tree which is shown in Fig 5.

PRO

COM

COM

Fig 5. Isomorphic Tree


Frequent Interaction Sub Tree Pattern Mining to generate the set of candidates with i + 1 node. If
Algorithm there are any trees whose supports are larger than σ,
Frequent Interaction Sub Tree Pattern Mining
FSTPMA selects them to form and repeats the
algorithm (FSTPMA) calculates the support of each
procedure. Otherwise, it stops outputting the
node and selects the nodes whose supports are larger
frequent sub trees. Fig 6 and Fig 7 represent the
than σ, and to form the set of frequent nodes. Then
tree and interaction tree respectively.
adds a frequent node to existing frequent i-sub trees

R
R

PRO PRO PRO


P4 P2 P2

POS NEG POS NEG


P3 P3 P1 P4

ACK COM
P1 P2

ACK POS
P2 P1

POS
P3

POS
P4

COM
P2

COM
P4

POS
P3

COM
Fig 6.Representation of Tree Fig 7. Representation of Interaction
Tree

Sentiment Analysis Algorithm polarity of a document. Sentiment Analysis frame


Sentiment Analysis (SA) or opinion mining refers work is projected in Fig 8. The inputs are GD
to identify and extract subjective information in the contents (dataset). The classifier (sentiment lexicon)
source materials. The application of SA are natural is used to classify the sentence into positive or
language processing, computational linguistics, and negative. Finally the patterns such as
text analytics .Generally speaking, sentiment analysis Acknowledgement, Comments, and Neutral results
aims to determine the attitude of a speaker or a writer are evaluated based on measures.
with respect to some topic or the overall contextual

Sentiment analytics

Other Event processing


Data set
events

Classifier

Positive Negative

Fig 8. Sentiment analysis framework

Embedded Tree Based Interaction Pattern Mining to the root of the sub tree is to be taken into account
Algorithm during the candidate enumeration phase. The sample
The Embedded Sub trees used to find the correct interaction tree based on the Embedded Sub tree is
position of the node in a tree representation. In such, shown in Fig 9.
sub trees the distances of the nodes with respective

PR

POS NE NE CO

PO PO PO CO

NE COM
Fig 9.Interaction Tree based on Embedded Sub Tree

TABLE 2. COMPUTATIONAL RESULT

Positive content Negative content Comments Acknowledgement


Doc
ET TB ET TB ET ET TB ET ET ET
name TBP TBP ETB TBP TBP TBP
BP PS BS PS BS BP PS BS BP BS
MA MA PM MA MA SA
M A A A A M A A M A
Ext.
12.76 13.3 14.5 14 13 13.4 14 13 59.8 60 63 61 9.2 9 9 8.6
txt
Inp1.
8.7 8.6 8.5 9 21.4 20.2 20 21 60.5 61.5 62 64 9.5 9.2 9 9.4
txt
Inp2. 12.
12.3 12.5 13 18 18 19 20 57.5 57.9 58 57 10.7 10 10 10
txt 9
Inp3. 13.
12.5 12.8 13 19.5 18.8 19 18 57.2 58 58 59 9 9.6 10 9
txt 3
Inp4.
1.3 2.7 3.4 3.2 17.1 17.5 18.3 18.7 76.5 76.1 76 78 2 2.5 2.8 3.8
txt

Inp5. 6.4 5.8 5.6 5.8 18.5 18.9 19.7 17 69 69.9 70 69 3.1 3.1 3.2 3.2
txt

Five text files have been taken from the internet and given as input to pre-processing in order to classify the
vocabularies as a verb, subject, object and so on.

TABLE 2. AVERAGE RESULTS OF THE TEST DATA


Interaction Types TBPMA ETBPM TBPSA ETBSA

Positive content 8.9 9.2 9.6 9.7

Negative content 17.5 17.8 18.3 17.95

Comments 63.4 63.9 64.5 64.66

Acknowledgement 7.1 7.2 7.3 7.3


From the Table 3 the accuracy of Tree Based Based Pattern Mining Algorithm? The TBPM with
Pattern Mining Algorithm for the positive content is SA algorithm achieves 64.5% of accuracy for
8.9% whereas 9.2% of accuracy is achieved by comments and it is 0.6% higher than ETBPM
Embedded Tree Based Pattern Mining Algorithm and algorithm. ETB with SA achieves the accuracy
it is 0.3%more than the Tree Based Pattern Mining 64.66% which is 0.16% of higher than TBPM with
Algorithm but the TBPM with Sentiment Analysis SA.
algorithm achieves 9.6% accuracy, which is more
than 0.4%, as compared to ETBPM. ETB with SA The maximum accuracy of an Acknowledgement
achieves 9.7% of accuracy, which is 0.1% is higher in Tree Based Pattern Mining Algorithm is 7.1%
than TBPM with SA. whereas 7.2% of accuracy is produced by ETBPM
algorithm. ETBPM algorithm achieves accuracy of
Likewise the accuracy of Negative Content in Tree 7.3 % which is 0.1%more than the Tree Based
Based Pattern Mining Algorithm is 17.5% where as Pattern Mining Algorithm. But TBPM with SA and
the accuracy of ETBPM algorithm is 17.8%. It is ETB with SA algorithms produce accuracy of 7.3%
0.3% higher than Tree Based Pattern Mining which is 0.1 % higher than ETBPM and 0.2% higher
Algorithm. The ETB with SA algorithm achieves than TBPMA.
17.95% of accuracy which is more than 0.15% higher
than ETBPM algorithm and TBPM with SA The computational results clearly explain that the
algorithm achieves 18.3 % of accuracy which is0.35 ETBPM algorithms perform better for the Positive
% more than ETB with SA. Content, Comments and Acknowledgement compare
to others whereas TBPMA with SA is better for
The accuracy of TBPMA for Comments is 63.4% Negative Content. Fig 10 shows the performance
whereas ETBPM algorithm, achieves 63.9% of analysis chart of these algorithms.
accuracy. Which is 0.5% accuracy higher than Tree

70
60
50
40
30
20 TBPMA
10 ETBPM
0 TBPMSA
t t ts t ETBSA
ten ten en en
n on m m
C o C om ge
ve e C led
iti ativ ow
os eg n
P N ck
A
Fig 10.Performance analysis chart of TBPMA, ETBPM, SA and ETB with SA algorithm

VI.CONCLUSION AND FUTURE ENHANCEMENT

In this thesis, TBPM with Sentiment SA approach automatically identify the contextual
Analysis and Embedded-Sub Tree Based Pattern polarity for sentiment expressions. The
Mining Algorithms with SA are proposed for mining Experimental result shows that the ETBPM with
the frequent interactions in the meetings. TBPM with SA algorithm is discover frequent interaction
Positive Content, Comments and [9] Gosta Grahne and Jianfei Zhu “Efficiently
Acknowledgement interaction types. ETBPM with Using Prefix-trees in Mining Frequent Item
SA produces highest accuracy 9.7%, 64.66% and sets “In Proceedings of VLDB’94, pages
7.3% for Positive Content, Comments and 487–499,2001.
Acknowledgement respectively. With this [10] C. Wang, M. Hong, J. Pei, H. Zhou, W.
approach, a new data structure called scope-list to Wang, and B. Shi, “Efficient Pattern-Growth
compute the frequency of embedded tree orders in Methods for Frequent Tree Pattern Mining,”
ETBM algorithm. Proc. Pacific-Asia Conf. Knowledge
TBPM with SA algorithm is better to Discovery and Data Mining (PAKDD ’04),
discover the frequent interaction in meetings, pp. 441-451, 2002
whereas Negative Content achieved 18.3% of [11] Anna Fariha “Mining Frequent Patterns from
accuracy compared to another approach. In the Human Interactions in Meetings Using
future, it will be using a different type of pattern Directed Acyclic Graphs “In Proceedings of
mining method for several applications based on ACM SIGMOD’98, pages 85–93.
the discovered patterns. [12] Jia-Ling Koh “A Tree-based Approach for
Efficiently Mining Approximate Frequent
References Item sets “under Contract No. 98-2221-E-
[1] Ahmed, C.F., Tanbeer, S.K., Jeong, B.-S., 003-017andNSC98-2631-S-003-002.
Lee, Y.-K.: An efficient candidate pruning [13] Zhiwen Yu, Hideki Aoyama, Motoyuki
technique for high utility pattern mining. In: Ozeki, Yuichi Nakamura “Collaborative
PAKDD 2009. LNAI 5476, pp. 749–756. Capturing and Detection of Human
Springer (2009) Interactions in Meetings” The authors are at
[2] Leung, C.K.-S., Mateo, M.A.F., Brajczuk, the Kyoto University, Japan.
D.A.: A tree-based approach for frequent [14] Jian Pei and Jiawei Han “Prefix Span:
pattern mining Mining Sequential Patterns Efficiently by
fromuncertaindata.In:PAKDD2008.LNAI50 Prefix-Projected Pattern Growth”
12,pp.653–661.Springer(2008). Engineering Research Council of Canada
[3] Tanbeer, S.K., Ahmed, C.F., Jeong, B.-S., Lee, (grant NSERC-A3723).
Y.-K.: Discovering periodic-frequent [15] Kiran Kumar Reddi “Generating Optimized
patterns Decision Tree Based on Discrete Wavelet
intransactionaldatabases.In:PAKDD2009.L Transform “Kiran Kumar Reddi et al. /
NAI5476,pp.242–253.Springer(2009). International Journal of Engineering Science
[4] Yu, Z., Yu, Z., Zhou, X., Becker, C., and Technology Vol. 2(3), 2010, 157-164.
Nakamura, Y.: Tree-based mining for dis-
covering patterns of human
interactioninmeetings.IEEETKDE24(4),759
–768(2012).
[5] R.Bakeman and J.M. Guttmann, “Observing
Interaction:“An Introduction to Sequential
Analysis”, Cambridge Univ. Press, 1997.
[6] M.S. Magnusson, “Discovering Hidden Time
Patterns in Behavior’s-Patterns and Their
Detection,” Behavior
ResearchMethods,InstrumentsandComputers
,vol.32,no.1,pp.93-110,2000.
[7] G.Casas-Garriga,“Discovering unbounded
Episodes in Sequential Data,” Proc.
European Conf. Principles and Practice of
Knowledge Discovery in Databases (PKDD
‟03), pp. 83-94, 2003.
[8] T. Morita, Y. Hirano, Y. Sumi, S. Kajita, and
K. Mase, “A Pattern Mining Method for
Interpretation of Interaction,”
Proc.Int‟lConf.MultimodalInterfaces(ICMI‟
05),pp.267-273,2005.

You might also like