A Comparative Study of Frequent Subgraph Mining Algorithms
A Comparative Study of Frequent Subgraph Mining Algorithms
2, April 2012
ABSTRACT
Data mining algorithms are facing the challenge to deal with an increasing number of complex objects. Graph is a natural data structure used for modeling complex objects. Frequent subgraph mining is another active research topic in data mining . A graph is a general model to represent data and has been used in many domains like cheminformatics and bioinformatics. Mining patterns from graph databases is challenging since graph related operations, such as subgraph testing, generally have higher time complexity than the corresponding operations on itemsets, sequences, and trees. Many frequent subgraph Mining algorithms have been proposed. SPIN, SUBDUE, g_Span, FFSM, GREW are a few to mention. In this paper we present a detailed survey on frequent subgraph mining algorithms, which are used for knowledge discovery in complex objects and also propose a frame work for classification of these algorithms. The purpose is to help user to apply the techniques in a task specific manner in various application domains and to pave wave for further research.
KEYWORDS
Frequent subgraph mining, Isomorphism, Pattern growth, Apriori
1. INTRODUCTION
Knowledge discovery in complex objects involves understanding the relationship between their components. Examples are the Machine learning in domains such as bioinformatics, drug discovery, adverse drug events and web data mining. Graphs are natural data structures to model such relations, with nodes representing objects and edges the relationships between them. In this context, finding similarity between graphs is important. Simple ways of comparing graphs which are based on pair wise comparison of nodes or edges, are possible in quadratic time, yet may neglect information represented by the structure of the graph. As interaction networks are graphs, where each node represents for example, a protein and each edge represents the presence of an interaction, Conventionally there are two ways of measuring similarity between graphs. One approach is to perform a pair wise comparison of the nodes and/or edges in two networks, and calculate an overall similarity score for the two networks from the similarity of their components. This approach takes time quadratic in the number of nodes and edges, and is thus computationally feasible even for large graphs. However, this strategy is flawed in that it completely neglects the structure of the networks, treating them as sets of nodes and edges instead of graphs. A more principled alternative would be to deem two networks similar if they share many common substructures, or more technically, if they share many common subgraphs. To compute this, however, we would have to solve the so-called
DOI : 10.5121/ijitcs.2012.2203 23
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
subgraph isomorphism problem which is known to be NP-complete, i.e., the computational cost of this problem increases exponentially with problem size, seriously limiting this approach to very small networks. Many heuristics have been developed to speed up sub graph isomorphism by using special canonical labelings of the graphs; none of them, however, can avoid an exponential worst-case computation time.
where vi and vj are nodes in G. If G is weighted then, A can contain non-negative entries other than zeroes and ones. i.e Aij e (0,) if (vi,vj) e E and zero otherwise. Let D be a nxn diagonal matrix with entries Dii = Sj Aij. The matrix P := AD-1 is called the normalized adjacency matrix. Let X be a set of labels which includes the special label e. An edge labeled graph G is associated with a label matrix L e X nxn , such that Lij = iff (vi,vj) . A walk w of length k 1 in a graph is a sequence of nodes v1, v2, ,vk where (vi1, vi) e E for 1 < i k. w is a path if vi vj iff i j, j e {1, . . . , k} . Alternatively, walks are often referred to as paths; paths are then named simple, unique or loopless paths, which may lead to some confusion. To clarify the difference for the remainder of this article, we define a path to be a walk without repetitions of nodes. A cycle is a walk with v1 = vk, a simple cycle does not have any repeated nodes except for v1. A Hamilton path is a path that visits every node in a graph exactly once. An Euler path is a path that visits every edge in a graph exactly once.If a graph is undirected, and that the vertices and edges in a graph are labeled. The labels of an edge e and a vertex v are denoted by l(e) and l(v) respectively. Each vertex (or edge) of a graph is not required to have a unique label and the same label can be assigned to many vertices (or edges) in the same graph. Given a graph G = (V, E), a graph Gs = (Vs , Es ) is a subgraph of G if Vs V and Es E, and is denoted by Gs G. The sub graph Gs is said to be covered by G. If a sub graph Gs G is isomorphic to another graph H, then Gs is called an embedding of H in G. In this report, a sub graph is often called a pattern. The total number of embeddings of Gs in a graph G is called the raw frequency of Gs . Two graphs G1 = (V1, E1) and G2 = (V2, E2) are isomorphic if they are topologically identical to each other, that is, there is a vertex mapping from V1 to V2 such that each edge in E1 is mapped to a single edge in E2 and vice versa. In the case of labeled graphs, this mapping must also preserve the labels on the vertices and edges. When a set of graphs {Gi } are isomorphic to each other, they all are said to belong to the same equivalence class. When the equivalence class of Gi represents an edge, the class is called an edge-type. Given two graphs G1 = (V1, E1) and G2 = (V2, E2), the problem of sub graph isomorphism is to find an isomorphism between G2 and a sub graph of G1. In other words, the sub graph isomorphism problem is to determine whether or not G2 is embedded in G1. Given a sub graph Gs and a graph G, two embeddings of Gs in G are called identical if they use the same set of edges of G, edge-disjoint if they do not have any edges of G in common, and vertex-disjoint if no vertices of G in common. Given a set of all embeddings of a particular sub
24
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
graph Gs in a graph G, the overlap graph of Gs is a graph obtained by creating a vertex for each non-identical embedding and creating an edge for each pair of non-vertex-disjoint embeddings. Contraction of an edge e = uv of a graph G = (V, E) is to merge two endpoints u and v together into a new vertex w by removing the edge e, while keeping all the other edges incident to u and v. The remaining edges that used to be incident to either u or v are connected to w after the contraction. The newly added vertex w represents the original edge e. Note that, if there are multiple edges between two vertices u and v, the contraction of e removes only e. The rest of the multiple edges between u and v become loops around w after the contraction. A subtree of an undirected graph G is an acyclic connected subgraph of G. A subtree T is a spanning tree of G if T contains all nodes in G. Given a graph G, there are many spanning trees. A canonical spanning tree of G is a maximal spanning tree defined on a total order on the trees. A spanning tree is a tree that has paths connecting each node with every other node of the graph. A trie is a data structure that stores the information about the contents of each node in the path from the root to the node, rather than the node itself.
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
corresponding vertexes, and le is the label for the edge connecting the vertexes. Based on the DFS lexicographic order, the M-DFSC of a graph g can be defined as the canonical labeling of g [11] (Yan & Han 2002). Canonical Adjacency Matrix (CAM): Given an adjacency matrix M of a graph g, an encoding of M can be obtained by the sequence obtained from concatenating the lower(or upper) triangular entries of M, including entries on the diagonal. Since different permutations of the set of vertexes correspond to different adjacency matrices, the canonical (CAM) form of g is defined as the maximal (or minimal) encoding. The adjacency matrix from which the canonical form is generated defines the Canonical Adjacency Matrix or CAM[4][5][8](Inokuchi et al. 2000,2002; Kuramochi & Karypis 2001; Huan et al. 2003). 3.2 Subgraph Enumeration The current methods for enumerating all the subgraphs might be classified into two categories: one is the join operation adopted by FSG[5] and AGM [4] and another one is the extension operation . The major concerns for the join operation are that a single join might produce multiple candidates and that a candidate might be redundantly proposed by many join operations. The concern for the extension operation is to restrict the nodes that a newly introduced edge may attach to. Equivalence class based extension (Zaki 2002, 2005) is founded on a DFS-LS representation for trees. Basically, a (k + 1)-subtree is generated by joining two frequent k-subtrees. The two k subtrees must be in the same equivalence class . An equivalence class consists of the class prefix encoding, and a list of members. Each member of the class can be represented as a (l, p) pair, where l is the k-th vertex label and p is the depth-first position of the k-th vertexs parent. It is verified, in Zaki (2002), that all potential (k + 1)-subtrees with the prefix [C] of size (k 1) can be generated by joining each pair of members of the same equivalent class [C]. Equivalence classes can be based on either prefix or suffix.
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
extensions of existing algorithms is also studied in the following sections. Table 1. Algorithms based on Pattern growth approach S.N o Algorithm Input type Graph representation Adjacency list Subgraph generatio n Rightmost extension Frequ ency counti ng DFS Nature of output Limitations
1.
MOFA [2002]
Set of graphs
2.
GSpan [2002]
Set of graphs
Adjacenc y list
Rightmost extension
DFS
3.
CloseGrap h [2003]
Set of graphs
Adjacenc y list
Rightmost extension
DFS
Closed Connecte d frequent graphs Maximal frequent sugraphs Complete set of frequent subgraphs Frequent approxim ate patterns Frequent subgraphs
Failure detection takes lot of time overhead Interesting patterns may be lost Extremely small no. of patterns
4.
Gaston [2004]
Set of graphs
Hash table
Extension
5.
SUBDUE [2005]
Adjacenc y matrix
6.
Gapprox [2006]
Edge Triplet
DFS
7.
HybridGM iner[2006]
Adjacenc y list
Embeddin g Lists
DFS
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
8.
DFS
Frequent subgraphs Frequent Correlate d subgraphs Represent ative graphs Partially labelled frequent subgraphs Frequent significan t patterns Frequent jump patterns Representative graphs
Works on labelled graphs only. Works on labelled graphs only. Needs post processing Works on labelled graphs only.
9.
DFS
10.
Set of graphs Set of partiall y labelled graphs Set of graphs Set of graphs
DFS
11.
DFS
12.
Extension
DFS
Needs post processing Some -times much smaller set of jump patterns. Time for summari-zing the patterns is more than that for mining Extra overhead to check closed property
13.
Rightmost extension
DFS
14.
RP-GD [2010]
Set of graphs
Adjacency list
Rightmost extension
DFS
15.
TSP [2010]
Set of graphs
Adjacenc y list
Extension
TSP tree
28
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
16.
RP-FP [2010]
Set of graphs
Adjacency list
Rightmost extension
DFS
Representative graphs
Table 2. Algorithms based on Apriori approach S. N o 1. Algorithm FARMER [1999] HSIGRAM [1999] AGM [2000] FSG [2001] Input type Set of graphs Single large graph Graph database Set of graphs Graph representation Trie structure Adjacenc y matrix Adjacenc y matrix Adjacenc y list Candidate generation Level-wise search ILP Iterative merging Vertex extension One edge extension Frequenc y counting Trie data structure Maximal independent set Canonical labelling Transactio n identifier (TID) lists Suboptimal CAM tree TID lists Nature of output Frequent subgraphs Frequent subgraphs Frequent subgraphs Frequent connected subgraphs Frequent subgraphs Maximal Frequent subgraphs Maximal frequent subgraphs Maximal frequent subgraphs Limitations Inefficient
2.
Ineffecient
3.
Npcomplete Largely distinct labels on edges needed Npcomplete Incomplete set of Graphs Needs entire DB scan Misses many interesting patterns
4.
5.
Adjacenc y matrix Edge triplet Adjacenc y matrix Sparse graph represent ation.
6.
7.
8.
29
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
9.
Dynamic graphs
Iterative merging
Suffix trees
Extra overhead to identify dynamic patterns Frequent subgraphs are not exact.
10
MUSE [2009]
Adjaceny Matrix
Frequent subgraphs
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
the trie data structure for frequency computation also. HSIGRAM [22] uses adjacency matrix representation of graph. HSIGRAM use iterative merging for subgraph generation. In case of HSIGRAM the aim is to find the maximal independentset of a graph which is constructed out of the embeddings of a frequent subgraph so as to evaluate its frequency. Huan, wang and Prince [7] in 2003 proposed a novel subgraph mining algorithm: FFSM, which employs a vertical search scheme within an algebraic graph framework.It uses a restricted join operation to generate candidates and stores embeddings to avoid explicit subgraph isomorphism testing. It uses a sub-optimal canonical adjacency matrix tree for counting the frequency. Their studies on synthetic and real datasets demonstrated that FFSM achieves a substantial performance gain over the start-of-the art subgraph mining algorithm gSpan. One fundamental challenge for mining recurring subgraphs from semi-structured data sets is the overwhelming abundance of suchpatternsc. In large graph databases, the total number of frequent subgraphs can become too large to allow a full enumeration using reasonable computational resources. Jun Huan, Wei WangPrins, Jiong Yang, Jan [8] proposed a new algorithm, Spin that mines only maximal frequent subgraphs, i.e. subgraphs that are not a part of any other frequent subgraphs. This may exponentially decrease the size of the output set in the best-case; in our experiments on practical data sets, mining maximal frequent subgraphs reduces the total number of mined patterns by two to three orders of magnitude. It first mines all frequent trees from a general graph database and then reconstructs all maximal subgraphs from the mined trees. SPIN offered very good scalability to large graph databases and at least an order of magnitude performance improvement in synthetic graph data sets. The efficiency of the algorithm is also confirmed by a benchmark chemical data set. This algorithm of compressing large number of frequent subgraphs to a much smaller set of maximal subgraphs.lt is used to investigate demanding applications such as finding structure patterns from proteins in the future. Michihiro Kuramochi and George Karypis [9] in 2004 proposed a heuristic algorithm called GREW to overcome the limitations of existing complete or heuristic frequent subgraph discovery algorithms. GREW is designed to operate on a large graph and to find patterns corresponding to connected subgraphs that have a large number of vertex-disjoint embeddings. Their experimental evaluation showed that GREW is efficient, can scale to very large graphs, and find non-trivial patterns that cover large portions of the input graph and the lattice of frequent patterns. Karsten M. Borgwardt, Hans-Peter Kriegel, Peter Wackersreuther [28] investigated how pattern mining on static graphs can be extended to time series of graphs, ie. dynamic graphs. They proposed a framework into which Existing subgraph mining algorithms can be easily integrated and handle dynamic graphs. Experimental results on real-world data confirm the practical feasibility of their approach. In particular, we are looking for subgraphs that are topologically frequent within a large graph and that show insertions and deletions of edges in the same temporal order. It might be used to study frequent motifs in protein-protein interaction dynamics, as well as in social or telecommunication networks. Lini T Thomas Satyanarayana R ValluriKamalakar Karlapalem [13] in 2006 proposed an algorithm MARGIN that mines maximal frequent subgraphs. MARGIN- Maximal frequent mining has triggered much interest since the size of the set of maximal frequent subgraphs is much smaller to that of the set of frequent subgraphs. The set of candidate subgraphs which are likely to be maximally frequent are the set of -edge frequent subgraphs that have a z-edge infrequent supergraph. The Margin algorithm computessuch a candidate set efficiently and finds
31
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
the maximal subgraphs by a post-processing step. They have proved that the performance of the Margin algorithm is 20 times faster than gSpan for certain datasets. ZhaonianZou, Jianzhong Li, and Shuo Zhang [17] in 2010 proposed an algorithm for Mining Frequent Subgraph Patterns from Uncertain Graph Data. In many real applications, graph data is subject to uncertainties due to incompleteness and imprecision of data. Mining such uncertain graph data is semantically different from and computationally more challenging than mining conventional exact graphdata. A novel model of uncertain graphs is presented, and the frequent subgraph pattern mining problem is formalized by introducing a new measure, called expected support. An approximate mining algorithm called MUSE (Mining Uncertain Sub graph pattErns), is proposed to find a set of approximately frequent subgraph patterns by allowing an error tolerance on expected supports of discovered subgraph patterns. The algorithm uses efficient methods to determine whether a subgraph pattern can be output or not and new pruning method to reduce the complexity of examining subgraph patterns. Analytical and experimental results showed that the algorithm is very efficient, accurate, and scalable for large uncertain graph databases. This is the first algorithm to investigate the problem of mining frequent sub graph patterns from uncertain graph data. 4.1.2 Pattern-growth approach In order to avoid the overhead of apriori algorithms, non-Apriority-based algorithms have been developed, most of which adopt the pattern-growth methodology, as discussed below. Patterngrowth-based graph pattern mining algorithms include gSpan by Yan and Han (2002), MoFa by Borgelt and Berthold (2002), FFSM by Huan et al. (2003), SPIN by Huan et al. (2004), and Gaston by Nijssen and Kok (2004). These algorithms are inspired by PrefixSpan (Pei et al. 2001), TreeMinerV (Zaki 2002), and FREQT (Asai et al. 2002) at mining sequences and trees, respectively. The pattern-growth mining algorithm extends a frequent graph by adding a new edge, in every possible position. A potential problem with the edge extension is that the same graph can be discovered many times. The gSpan [11] algorithm solves this problem by introducing a right-most extension technique, where the only extensions take place on the rightmost path. A right-most path is the straight path from the starting vertex v0 to the last vertex vn, according to a depth-first search on the graph. Typical pattern growth algorithms are discussed in the following paragraphs. Frequency counting process for Gaston is carried out with the help of embedding lists, where all the occurrences of a particular label are stored in the embedding lists. Borgelt and Berthold [10] in 2002 presented an algorithm Mofa to find fragments in a set of molecules that help to discriminate between different classes for instance, activity in a drug discovery context. Yan and Han [11] in 2002 investigated new approaches for frequent graphbased pattern mining in graph datasets and proposed a novel algorithm called gSpan. gSpan is a graph-based substructure pattern mining. This discovered frequent substructures without candidate generation. Yan and Han [12] in 2003 proposed to mine closed frequent graph patterns. A graph g is closed in a database if there exists no proper subgraph of g that has the same support as g. A closed graph pattern mining algorithm, CloseGraph, is developed by exploring several interesting looping methods. Their performance studies shown that CloseGraph not only dramatically reduces unnecessary subgraphs to be generated, but also substantially increases the efficiency of mining, especially in the presence of large graph patterns. Yong Liu, Jianzhong Li, Hong Gao [23] in 2009 studied the problem of mining frequent jump
32
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
patterns from graph databases. They have showed that Mining frequent jump patterns can dramatically reduce the number of output graph patterns, and still capture interesting graph patterns. By integrating the operation of checking jump patterns into the well-known DFS code tree enumeration framework, they presented an efficient algorithm JPMiner for this new problem. Their experimental evaluation of JPMiner using both real and synthetic datasets, showed that the number of frequent jump patterns is much smaller than that of closed frequent graph patterns, and also JPMiner is efficient and scalable in mining frequent jump patterns. Chia-HuiChang and Cheng-Tao Ho in 2006 proposed an hybrid algorithm HybridGMiner which is based on pattern growth approach. It combines the embedding listing and canonical form to take the advantage of generating new frequent patterns from existing patterns. It is a hybrid of Mofa and gspan. Most of existing frequent subgraph mining algorithms are used to deal with undirected unlabeled marked graph. A few of them aim at directed graph or labeled graph because it is very complex to consider that. But in the real world, a lot of connections have directions and labels, so directed labeled graph mining is more meaningful. Yuhua Li Quan Lin and Duan Yanan [25] Bi in 2009 analyzed a financial network by modelling it as a directed weighted graph. They proposed a new algorithm mSpan for directed labeled graph frequent pattern mining. Based on FP-growth, the algorithm gets a minimum edge code and an abstract node code sequence to identify a directed graph pattern uniquely through minimum extension. It also solved the graph pattern isomorphic problem and the redundant extension problem. Their experiment showed that mSpan can mine all frequent directed, labeled graph patterns. Shijie Zhang , Jiong Yang and Shirong Li [31] in 2009 proposed RING an integrated method for frequent representative subgraph mining . It involves a two-step process. The first stage is to compute the pattern distribution. It randomly mine a set of frequent subgraph patterns, cluster the patterns, and select the centers of the clusters as the initial representative patterns. Based on this, we will know how the frequent patterns are distributed approximately. In the second stage, it adopts a depth first searching algorithm to mine representative to a pre-set space limit. Houqun YANG, Zhongshi HE, Xing WU [32] in 2009 proposed an algorithm based on node pruning, path pruning and structure pruning that applied pattern-weakening support constraints in mining partially labeled subgraphs. The main idea is to push forward the check conditions into the process of mining so that user can interact with the process of mining partially labeled subgraphs, and reach the final object for improving mining efficiency. The results showed that it can eliminate effectively subgraph mining search space by pushing forward the constraint into the process of mining and to a certain extent reduce the mining cost in both space and time. Cheng-Te Li, Hsun-Ping Hsieh [26] proposed a novel algorithm, TSP-algorithm (Temporal Subgraph Patterns algorithm) to mine the patterns which contain temporal information and forms a connective subgraph. The proposed method recursively grows the patterns in a depth-first search manner. Since the TSP-algorithm only needs to scan the database once and does not generate unnecessary candidates, the experiment results showed that the TSP-algorithm outperforms the modified Apriori on time-efficiency and memory usage in both synthetic and real datasets. Jianzhong Li, Yong Liu, and Hong GaoWe [27] in 2011 investigated the problem of summarizing frequent subgraphs by a smaller set of representative patterns. They showed that some special graph patterns, called _-jump patterns , must be representative patterns. Based on
33
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
the fact,they devised two algorithms, RP RP-FP and RP-GD, to mine a representative set that GD, summarizes frequent subgraphs. RP-FP derives a representative set from frequent closed FP subgraphs, whereas RP-GD mines a representative set from graph databases directly. Three GD novel heuristic strategies, Last Last-Succeed-First-Check, Reverse-Path-Trace, and NephewTrace, Nephew Representative-Based-Cover, are proposed to further improve the efficiency of RP , RP-GD. RP-FP can provide a tight ratio bound but has heavy computation cost. RP GD cannot provide a ratio RP-GD bound guarantee but is more efficient than RP ut RP-FP.
Sayan Ranu , Ambuj K. Singh [34] proposed a highly scalable technique, called GraphSig, to mine significant subgraphs from large graph databases. It converts each graph into a set of feature vectors where each vector represents a region within the graph. Domain knowledge is used to select a meaningful feature set. It accesses only a small portion of the exponential search eature ccesses space, and groups candidate subgraphs into sets based on their similarity. As a result, frequent subgraph mining can be performed on each set with a high frequency threshold. It is experimentally proved to be scalable. rimentally
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
4.5 Extension of Existing algorithms Many algorithms have been proposed, which are either extensions of the existing algorithms or a hybrid of two or more existing algorithms. FCP-Miner[ 29 ], is one such a fast approximate algorithm, which uses a very effective skipping mechanism that eliminates the processing of majority of graphs during the mining. It is shown that the missing pairs of frequent correlated sub graphs due to approximation are only a small set of marginally correlated pairs. Extensive experiments verified that the algorithm is both efficient and effective. A Hybrid fragment mining algorithm[30 ] which is a combination of Mofa and FSG is proposed in 2004. It uses a search strategy which is a combination of BFS and DFS. It is proved to be more efficient than both Mofa and FSG. Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han[33], investigated the problem of mining frequent approximate patterns from a massive network and proposed a method called gApprox. gApprox not only finds approximate network patterns, which is the key for many knowledge discovery applications on structural data, but also enriches the library of graph mining methodologies by introducing several novel techniques. A new general framework, called gPrune, is proposed by Feida Zhuy Xifeng Yany Jiawei Hany Philip S. Yuz [35] to incorporate all the constraints in such a way that they recursively reinforce each other through the entire mining process. A new concept, Pattern-inseparable Dataantimonotonicity, is proposed to handle the structural constraints unique in the context of graph, which, combined with known pruning properties, provides a comprehensive and unified classification framework for structural constraints. The exploration of these anti - monotonicities in the context of graph pattern mining is a significant extension to the known classification of constraints, and deepens our understanding of the pruning properties of structural graph constraint. The major advantage of this algorithm is it can be applied to both apriori and pattern growth approach.
5. APPLICATION DOMAINS
Graph mining is useful in the areas of chemo-informatics, Bio-informatics, study of biological networks, Web analysis, Traffic analysis in telecommunication networks, social human behavior analysis, financial network analysis and wireless networks. In this paper we present a classification of algorithms based on their suitability to specific application domains.
35
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
6. RESEARCH DIRECTIONS
We have abundant literature published in research into frequent pattern mining. But still there iterature are several critical research problems that need to be solved before frequent pattern mining can become a cornerstone approach in data mining applications. First, the most focus focused and extensively studied topic in frequent pattern mining is perhaps scalable mining methods. Second is the efficiency of the frequent subgraph mining algorithms. Third is not on whether we can derive the complete set of frequent patterns under certain constraints efficiently but on whether constraints we can derive a compact but high quality set of patterns that are most useful in applications and whether we can mine such patterns directly and efficiently. Fourth, to make frequent pattern mining an essential task in data mining. Classification is an essential task in data mining. We can generate frequent patterns in such a way that, they can become input for classification or clustering models.
7. CONCLUSION
In this paper, we present a brief overview of the current status and future directions of frequent pattern mining. There are various inter-disciplinary domains like chemo informatics, informatics bioinformatics etc. where mining of recurrent patterns across large collection of networks is lection required. Due to increasing size and complexity of patterns in the is a need for efficient graph . there mining algorithm. With over a decade of extensive research, there have been hundreds of research publications and tremendous research, development and application activities in this domain. Many algorithms for frequent subgraph mining have been proposed so far. Most of the algorithms, they focus only on a static set of graphs. Very few algorithms are for mining patterns from dynamic set of graphs. Also all the algorithms proposed so far, outperform each other, either in terms of memory requirements or in terms of few orders of magnitude of computation time. None of them completely address the issue of NP completeness of the subgraph mining NP-completeness mini problem. Also the algorithms mine either a specific set of patterns or a complete set of patterns
36
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
which may not be significant. So there is a need for an efficient algorithm which can mine significant patterns specific to the application, both from a static or dynamic set of graphs in less than polynomial time. Also the mined interesting patterns can used as input to other data mining tasks such as for classification or clustering for further knowledge discovery. Hence lot of research is required towards the improvements suggested.
8. REFERENCES
[1] [2] [3] D. J. Cook and L. B. Holder, Substructure discovery using minimum description length and background knowledge Journal of Artificial intelligence Research, 1, 1994, 231-255. S. Fortin. The graph isomorphism problem. Technical Report TR96-20, Department of Computing Science, University of Alberta, 1996. L. Dehaspe, H. Toivonen, and R. D. King. Finding frequent substructures in chemical compounds. In R. Agrawal, P. Stolorz, and G. Piatetsky-Shapiro, editors, Proc. of the 4th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-98), pages 3036. AAAI Press, 1998. A. Inokuchi, T.Washio, and H. Motoda. An apriori-based algorithm for mining frequent substructures from graph data. In PKDD00. M.Kuramochi and G. Karypis . Frequent Subgraph Discovery. In ICDM01. M. Deshpande, M. Kuramochi, and G. Karypis. Frequent sub-structure based approaches for classifying chemical compounds. In Proc. of 2003 IEEE International Conference on Data Mining (ICDM), 2003. J. Huan, W.Wang, and J. Prins. Efficient mining of frequent subgraph in the presence of isomorphism. UNC computer science technique report TR03-021, 2003. J. Huan, W. Wang, J. Prins, and J. Yang. Spin: Mining maximal frequent subgraphs from graph databases. UNC Technical Report TR04-018, 2004. M. Kuramochi and G. Karypis. GREW A Scalable frequent subgraph discovery algorithm. Technical Report 04-024, University of Minnesota, Department of Computer Science, 2004. C. Borgelt and M. R. Berhold. Mining molecular fragments: Finding relevant substructures of molecules. Proc. 2nd IEEE Intl Conf. Data Mining (ICDM 02), pp. 51-58, 2002. X. Yan and J. Han. gSpan: Graph-based substructure pattern mining. Proc. 2nd IEEE Intl Conf. Data Mining (ICDM 02), pp. 721-724, 2002. X. Yan and J. Han. CloseGraph: Mining closed frequentgraph patterns. Proc. 9th ACM SIGKDD Intl Conf. Knowledge Discov-ery and Data Mining (KDD 03), pp. 286-295, 2003.(closegraph) L. T. Thomas, S. R. Valluri, and K. Karlapalem. Margin:Maximal frequent subgraph mining. Proc. 6th IEEE Intl Conf. Data mining (ICDM 06), pp. 1097-1101, 2006. M. Kuramochi and G. Karypis. Grew-a scalable frequent subgraph discovery algorithm. In ICDM, pages 439442,2004. Thomas, L., Valluri, S. and Karlapalem, K., Isg: Itemset based subgraph mining. Technical Report, IIIT, Hyderabad, December2009. Kuramochi, M. and Karypis, G., Finding frequent patterns in alarge sparse graph. Data Min. Knowledge Discovery, 2005, (3),243271. ZhaonianZou, Jianzhong Li, Hong Gao, and Shuo Zhang : Frequent Subgraph Patterns from Uncertain Graph Data. IEEE Transactions On Knowledge And Data Engineering, Vol. 22, No. 9, September 2010. 37
[7] [8] [9] [10] [11] [12] [13] [14] [15]. [16] [17]
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
[18] [19]
Nijssen, S. and Kok, J., Faster association rules for multiple relations. In IJCAI01: Seventeenth International Joint Conference on Artificial Intelligence, 2001, vol. 2, pp. 891896. Nijssen, S. and Kok, J., A quickstart in frequent structure mining can make a difference. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2004, pp. 647652. Chang Hun You, Lawrence B. Holder and Diane J. Cook :Graph-based Data Mining in Dynamic Networks: Empirical Comparison of Compression-based and Frequency-based Subgraph Mining inInternational Conference on Data Mining Workshops IEEE , 2004. Cordella, L.P., Foggia, P., Sansone, C. and Vento, M. 2001. An Improved Algorithm for Matching Large Graphs, In Proceedings of the 3rd IAPR-TC15 Workshop on Graph-based Representation in Pattern Recognition, 149159. Chuntao Jiang, Frans Coenen and Michele Zito, A Survey of Frequent Subgraph Mining Algorithms:The Knowledge Engineering Review, Vol. 00:0, 131.c 2004. Yong Liu, Jianzhong Li, Hong Gao, JPMiner: Mining Frequent Jump Patterns From Graph Databases. In the proceedings of Sixth International Conference on Fuzzy Systems and Knowledge Discovery 2009. Varun Krishna, N. N. R. Ranga Suri and G. Athithan,A comparative survey of algorithms for frequent subgraph discovery, Current Science, Vol. 100, No. 2, 25 January 2011 Yuhua Li Quan Lin Gang Zhong Dongsheng Duan Yanan Jin Wei Bi, A Directed Labeled Graph Frequent Pattern Mining Algorithm based on Minimum Code. In the proceedings of Third International Conference on Multimedia and Ubiquitous Engineering 2009. Hsun-Ping Hsieh, Cheng-Te Li, Mining Temporal Subgraph Patterns in Heterogeneous Information Networks: In the proceedings of IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust. Jianzhong Li, Yong Liu, and Hong Gao, Efficient Algorithms for Summarizing Graph Patterns: IEEE Transactions On Knowledge And Data Engineering, Vol. 23, No. 9, September 2011. Bianca Wackersreuther, Peter Wackersreuther, Annahita Oswald : Frequent Subgraph Discovery in Dynamic Networks, ACM 978-1-4503-0214-2 2010. Yiping Ke, James Cheng, Jeffrey Xu Yu Efficient Discovery of Frequent Correlated Subgraph Pairs: In the proceedings of Ninth IEEE International Conference on Data Mining 2009. Thorsten Meinl, Michael R. Berthold, Hybrid fragment miining with MoFa and FSG: In the proceedings of IEEE International Conference on Systems, Man and Cybernetics 2004. Shijie Zhang , Jiong Yang , Shirong Li RING: An Integrated Method for Frequent Representative Subgraph Mining: In the proceedings of Ninth IEEE International Conference on Data Mining 2009. Houqun YANG, Zhongshi HE, Xing WU, Mining Partially Labeled Subgraphs Using Support Constraints: In the proceedings of Sixth International Conference on Fuzzy Systems and Knowledge Discovery 2009. Chen Chen, Xifeng Yan, Feida Zhu, Jiawei Han, gApprox: Mining Frequent Approximate Patterns from a Massive Network. Sayan Ranu , Ambuj K. Singh, GraphSig: A Scalable Approach to Mining Significant Subgraphs in Large Graph Databases, In the proceedings IEEE International Conference on Data Engineering 2009.
[20]
[21]
[22] [23]
[24] [25]
[26]
[32]
[33] [34]
38
International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.2, April 2012
Authors
1. K.Lakshmi, Asst. Prof /Dept of MCA, Sir M.Visvesvaraya Institute of Technology, Bangalore. 2. Dr. T. Meyyappan, M.Sc., M.Phil., M.B.A., Ph.D., Associate Professor, Department of Computer Science and Engineering, Alagappa University,Karaikudi, Tamilnadu.
39