<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Dynamic Programming Approach for Construction of Association Rule Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Fawaz Alsolami</string-name>
          <email>fawaz.alsolami@kaust.edu.sa</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Talha Amin</string-name>
          <email>talha.amin@kaust.edu.sa</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Igor Chikalov</string-name>
          <email>igor.chikalov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mikhail Moshkov</string-name>
          <email>mikhail.moshkov@kaust.edu.sa</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Beata Zielosko</string-name>
          <email>beata.zielosko@us.edu.pl</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer, Electrical and Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Thuwal</institution>
          <addr-line>23955-6900</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Computer Science, University of Silesia 39</institution>
          ,
          <addr-line>Bedzinska St., 41-200 Sosnowiec</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <fpage>12</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>In the paper, an application of dynamic programming approach for optimization of association rules from the point of view of knowledge representation is considered. Experimental results present cardinality of the set of association rules constructed for information system and lower bound on minimum possible cardinality of rule set based on the information obtained during algorithm work.</p>
      </abstract>
      <kwd-group>
        <kwd>association rules</kwd>
        <kwd>decision rules</kwd>
        <kwd>dynamic programming</kwd>
        <kwd>set cover problem</kwd>
        <kwd>rough sets</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>Association rules are popular form of knowledge representation. They are used in
various areas such as business field for decision making and effective marketing,
sequencepattern in bioinformatics, medical diagnosis, etc. One of the most popular application
of association rules is market basket analysis that finds associations between different
items that customers place in their shopping baskets.</p>
      <p>
        There are many approaches for mining association rules. The most popular, is
Apriori algorithm based on frequent itemsets [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. During years, many new algorithms were
designed which are based on, e.g., transaction reduction [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], sampling the data [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], and
others [
        <xref ref-type="bibr" rid="ref7 ref9">7, 9</xref>
        ].
      </p>
      <p>
        The most popular measures for association rules are support and confidence,
however in the literature many other measures have been proposed [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. In this paper, we
are interested in the construction of rules which cover many objects. Maximization of
the coverage allows us to discover major patterns in the data, and it is important from the
point of view of knowledge representation. Unfortunately, the problem of construction
of rules with maximum coverage is N P -hard [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The most part of approaches, with
the exception of brute-force and Apriori algorithm, cannot guarantee the construction
of rules with the maximum coverage. The proposed dynamic programming approach
allows one to construct such rules.
      </p>
      <p>
        Application of rough sets theory to the construction of rules for knowledge
representation or classification tasks are usually connected with the usage of decision
table [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] as a form of input data representation. In such a table, one attribute is
distinguished as a decision attribute and it relates to a rule consequence. However, in the
last years, associative mechanism of rule construction, where all attributes can occur as
premises or consequences of particular rules, is popular. Association rules can be
defined in many ways. In the paper, a special kind of association rules is studied, i.e., they
relate to decision rules. Similar approach was considered in [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ], where a greedy
algorithm for minimization of length of association rules was studied. In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], a
dynamic programming approach to optimization of association rules relative to coverage
was investigated.
      </p>
      <p>When association rules for information systems are studied and each attribute is
sequentially considered as the decision one, inconsistent tables are often obtained, i.e.,
tables containing equal rows with different decisions. In the paper, two possibilities of
removing inconsistency of decision tables are considered. If in some tables there are
equal rows with, possibly, different decisions, then (i) each group of identical rows is
replaced with a single row from the group with the most common decision for this
group, (ii) each group of identical rows is replaced with a single row from the group
with the set of decisions attached to rows from the considered group. In the first case,
usual decision tables are obtained (decision tables with single-valued decisions) and, for
a given row, we should find decision attached to this row. In the second case, decision
tables with many-valued decisions are obtained and, for a given row, we should find an
arbitrary decision from the set of decisions attached to this row.</p>
      <p>For each decision table obtained from the information system, we construct a system
of exact rules in the following way: during each step, we choose a rule which covers
the maximum number of previously uncovered rows. We stop the construction when all
rows of the table are covered. If the obtained system of rules is short enough, then it
can be considered as an intelligible representation of the knowledge extracted from the
decision table. Otherwise, we can consider approximate rules, and stop the construction
of the rule system when the most part of the rows (for example 90% of the rows) are
covered.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], the presented algorithm was proposed as application for multi-stage
optimization of decision rules for decision tables. We extend it to association rules. The
presented algorithm can be considered as a simulation of a greedy algorithm for
construction of partial covers. So we can use lower bound on the minimum cardinality for
partial cover based on the information about greedy algorithm work which was obtained
in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>The paper consists of five sections. Section 2 contains main notions. In Sect. 3,
algorithm for construction of system of association rule systems is presented. Section 4
contains experimental results for decision tables from UCI Machine Learning
Repository, and Section 5 – short conclusions.</p>
    </sec>
    <sec id="sec-2">
      <title>Main Notions</title>
      <p>An information system I is a rectangular table with n+1 columns labeled with attributes
f1, . . . , fn+1. Rows of this table are filled by nonnegative integers which are interpreted
as values of attributes.</p>
      <p>An association rule for I is a rule of the kind</p>
      <p>(fi1 = a1) ∧ . . . ∧ (fim = am) → fj = a,
where fj ∈ {f1, . . . , fn+1}, fi1 , . . . , fim ∈ {f1, . . . , fn+1} \ {fj }, and a,a1,. . . ,am
are nonnegative integers.</p>
      <p>The notion of an association rule for I is based on the notions of a decision table
and decision rule. We consider two kinds of decision tables: with many-valued decisions
and with single-valued decisions.</p>
      <p>A decision table with many-valued decisions T is a rectangular table with n columns
labeled with (conditional) attributes f1, . . . ,fn. Rows of this table are pairwise different
and are filled by nonnegative integers which are interpreted as values of conditional
attributes. Each row r is labeled with a finite nonempty set D(r) of nonnegative integers
which are interpreted as decisions (values of a decision attribute). For a given row r of
T , it is necessary to find a decision from the set D(r).</p>
      <p>A decision table with single-valued decisions T is a rectangular table with n
columns labeled with (conditional) attributes f1, . . . ,fn. Rows of this table are
pairwise different and are filled by nonnegative integers which are interpreted as values of
conditional attributes. Each row r is labeled with a nonnegative integer d(r) which is
interpreted as a decision (value of a decision attribute). For a given row r of T , it is
necessary to find the decision d(r). Decision tables with single-valued decisions can
be considered as a special kind of decision tables with many-valued decisions in which
D(r) = {d(r)} for each row r.</p>
      <p>For each attribute fi ∈ {f1, . . . , fn+1}, the information system I is transformed
into a table Ifi . The column fi is removed from I and a table with n columns labeled
with attributes f1, . . . , fi−1, fi+1, . . . , fn+1 is obtained. Values of the attribute fi are
attached to the rows of the obtained table Ifi as decisions.</p>
      <p>The table Ifi can contain equal rows. We transform this table into two decision
tables – with many-valued and single-valued decisions. A decision table Im−v with
fi
many-valued decisions is obtained from the table Ifi by replacing each group of equal
rows with a single row from the group with the set of decisions attached to all rows
from the group. A decision table Is−v with single-valued decisions is obtained from
fi
the table Ifi by replacing each group of equal rows with a single row from the group
with the most common decision for this group.</p>
      <p>The set {Ifm1−v, . . . , Ifmn−+1v} of decision tables with many-valued decisions obtained
from the information system I is denoted by Φm−v(I). We denote by Φs−v(I) the set
{Ifs1−v, . . . , Ifsn−+v1 } of decision tables with single-valued decisions obtained from the
information system I. Since decision tables with single-valued decisions are a special
case of decision tables with many-valued decisions, we consider the notion of decision
rule for tables with many-valued decisions.</p>
      <p>Let T ∈ Φm−v(I). For simplicity, let T = Ifmn−+1v. The attribute fn+1 will be
considered as a decision attribute of the table T . We denote by Row(T ) the set of rows of
T . Let D(T ) = Sr∈Row(T ) D(r).</p>
      <p>A decision table is called empty if it has no rows. The table T is called degenerate if
it is empty or has a common decision, i.e., Tr∈Row(T ) D(r) 6= ∅. We denote by N (T )
the number of rows in the table T and, for any t ∈ ω, we denote by Nt(T ) the number
of rows r of T such that t ∈ D(r). By mcd(T ) we denote the most common decision
for T which is the minimum decision t0 from D(T ) such that Nt0 (T ) = max{Nt(T ) :
t ∈ D(T )}. If T is empty then mcd(T ) = 0.</p>
      <p>For any conditional attribute fi ∈ {f1, . . . , fn}, we denote by E(T, fi) the set of
values of the attribute fi in the table T . We denote by E(T ) the set of conditional
attributes for which |E(T, fi)| ≥ 2.</p>
      <p>Let T be a nonempty decision table. A subtable of T is a table obtained from T by
the removal of some rows. Let fi1 , . . . , fim ∈ {f1, . . . , fn} and a1, . . . , am ∈ ω where
ω is the set of nonnegative integers. We denote by T (fi1 , a1) . . . (fim , am) the subtable
of the table T containing the rows from T which at the intersection with the columns
fi1 , . . . , fim have numbers a1, . . . , am, respectively.</p>
      <p>As an uncertainty measure for nonempty decision tables we consider relative
misclassification error rme(T ) = (N (T )−Nmcd(T )(T ))/N (T ) where Nmcd(T )(T ) is the
number of rows r in T containing the most common decision for T in D(r).</p>
      <p>A decision rule over T is an expression of the kind
(fi1 = a1) ∧ . . . ∧ (fim = am) → fn+1 = t
(1)
where fi1 , . . . , fim ∈ {f1, . . . , fn}, and a1, . . . , am, t are numbers from ω. It is
possible that m = 0. For the considered rule, we denote T 0 = T , and if m &gt; 0 we denote
T j = T (fi1 , a1) . . . (fij , aj ) for j = 1, . . . , m. We will say that the decision rule (1)
covers the row r = (b1, . . . , bn) of T if r belongs to T m, i.e., bi1 = a1, . . . , bim = am.</p>
      <p>A decision rule (1) over T is called a decision rule for T if t = mcd(T m), and if
m &gt; 0, then T j−1 is not degenerate for j = 1, . . . , m, and fij ∈ E(T j−1). We denote
by DR(T ) the set of decision rules for T .</p>
      <p>Let ρ be a decision rule for T which is equal to (1). The value rme(T, ρ) =
rme(T m) is called the uncertainty of the rule ρ. Let α be a real number such that
0 ≤ α ≤ 1. We will say that a decision rule ρ for T is an α-decision rule for T if
rme(T, ρ) ≤ α. If α = 0 (in this case, for each row r covered by ρ, the set D(r)
contains the decision on the right-hand side of ρ) then we will say that ρ is an exact rule.
We denote by DRα(T ) the set of α-decision rules for T .
3</p>
    </sec>
    <sec id="sec-3">
      <title>Algorithm for Construction of Association Rule System</title>
      <p>α-Decision rules for tables from Φm−v(I) can be considered as α-association rules
(modification for many-valued decision model) for the information system I.
αDecision rules for decision tables from Φs−v(I) can be considered as α-association
rules (modification for single-valued decision model) for the information system I. In
this section, we consider an algorithm for construction of an association rule system for
I in the frameworks of both many-valued decision model and single-valued decision
model. Since decision tables with single-valued decisions are a special kind of
decision tables with many-valued decisions, we will discuss mainly many-valued decision
model.</p>
      <p>Let T = Ifmn−+1v. Let S be a nonempty finite set of α-decision rules for T (system of
α-decision rules for T ), and β be a real number such that 0 ≤ β ≤ 1. We say that S is
a β-system of α-decision rules for T if rules from S cover at least (1 − β)N (T ) rows
of T .</p>
      <p>
        We describe an algorithm α-β-Rules which, for a decision table T , and real numbers
α and β, 0 ≤ α ≤ 1, and 0 ≤ β ≤ 1, constructs a β-system of α-decision rules for T .
During each step, we choose (based on a dynamic programming algorithm [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]) a
decision rule which covers maximum number of uncovered previously rows. We stop when
the constructed rules cover at least (1 − β)N (T ) rows of T . We denote by Ruleα,β (T )
the constructed system of rules.
      </p>
      <p>We denote by C(T, α, β) the minimum cardinality of a β-system of α-decision
rules for T . It is clear that C(T, α, β) ≤ |Ruleα,β (T )|. Using information based on the
work of algorithm α-β-Rules, we can obtain lower bound on the parameter C(T, α, β).
During the construction of β-system of α-decision rules for T , let the algorithm
αβ-Rules selects consequently rules ρ1, . . . , ρt. Let B1, . . . , Bt be sets of rows of T
covered by rules ρ1, . . . , ρt, respectively. Set B0 = ∅, δ0 = 0 and, for i = 1, . . . , t,
set δi = |Bi \ (B0 ∪ . . . ∪ Bi−1)|. The information derived from the algorithm’s work
consists of the tuple (δ1, . . . , δt) and the numbers N (T ) and β.</p>
      <p>
        From the results obtained in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] regarding a greedy algorithm for the set cover
problem it follows that C(T, α, β) ≥ l(T, α, β) where
l(T, α, β)) = max
⌈(1 − β)N (T )⌉ − (δ0 + . . . + δi)
δi+1
: i = 0, . . . , t − 1 .
      </p>
      <p>Using algorithm α-β-Rules, for each decision table T ∈ Φm−v(I), we
construct the set of rules Ruleα,β (T ). As a result, we obtain the system of rules
(αassociation rules for the information system I – modification for many-valued
decision model) Ruleαm,−βv(I) = ST ∈Φm−v(I) Ruleα,β (T ). This system contains, for each
T ∈ Φm−v(I), a subsystem which is a β-system of α-decision rules for T . We denote
by Cm−v(I, α, β) the minimum cardinality of such system. One can show that</p>
      <p>Lm−v(I, α, β) ≤ Cm−v(I, α, β) ≤ U m−v(I, α, β),
Lm−v(I, α, β) = PT ∈Φm−v(I) l(T, α, β) and U m−v(I, α, β) = Ruleαm,−βv(I) .</p>
      <p>We can do the same for the set Φs−v(I) of decision tables with single-valued
decisions. As a result, we obtain the system of rules (α-association rules for the information
system I – modification for single-valued decision model) Rulesα−,βv(I) = ST ∈Φs−v(I)
Ruleα,β (T ) which contains, for each T ∈ Φs−v(I), a subsystem which is a β-system of
α-decision rules for T . Denote Cs−v(I, α, β) the minimum cardinality of such system.
One can show that</p>
      <p>Ls−v(I, α, β) ≤ Cs−v(I, α, β) ≤ U s−v(I, α, β),
Ls−v(I, α, β) = PT ∈Φs−v(I) l(T, α, β) and U s−v(I, α, β) = Rulesα−,βv(I) .
4</p>
    </sec>
    <sec id="sec-4">
      <title>Experimental Results</title>
      <p>
        Experiments were made using data sets from UCI Machine Learning Repository [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
and software system Dagger [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Some decision tables contain conditional attributes
that take unique value for each row. Such attributes were removed. In some tables, there
were equal rows with, possibly, different decisions. In this case each group of identical
rows was replaced with a single row from the group with the most common decision
for this group. In some tables there were missing values. Each such value was replaced
with the most common value of the corresponding attribute.
      </p>
      <p>Prepared 12 data sets were considered as information systems. Table 1 contains
name (column “Information system”), number of rows (column “Rows”), and number
of attributes (column “Attr”) for each of the considered information systems. Table 1
presents also upper / lower bounds (see descriptions at the end of the previous section)
on Cm−v(I, α, β) (column “many-val”) and on Cs−v(I, α, β) (column “single-val”)
for pairs (α = 0, β = 0) and (α = 0.3, β = 0.2).</p>
      <p>We can see that, for tables with many-valued decisions, upper and lower bounds
on the number of rules are less than or equal to the bounds for decision tables with
single-valued decision. We considered a threshold</p>
      <p>30 × (number of attributes)
as a reasonable upper bound on the number of rules if a system of rules is used for
knowledge representation. In the case α = 0 and β = 0, the threshold is exceeded
for five information systems (see numbers in bold): balance-scale, breast-cancer, cars,
hayes-roth-data, and tic-tac-toe. The consideration of approximate rules and partial
covers can improve the situation. In the case α = 0.3 and β = 0.2, the threshold is
exceeded for three information systems (balance-scale, breast-cancer, and tic-tac-toe) if
we consider decision tables with single-valued decisions and for two information
systems (breast-cancer and tic-tac-toe) if we consider decision tables with many-valued
decisons.</p>
      <p>For four information systems (balance-scale, breast-cancer, cars, and
hayes-rothdata), upper / lower bounds on Cm−v(I, α, β)) and on Cs−v(I, α, β)) for β ∈
{0, 0.01, 0.05, 0.1, 0.15, 0.2} and α ∈ {0, 0.1, 0.3} can be found in Tables 2, 3, 4, and
5.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        In the paper, an algorithm for construction of association rule system is proposed. It
simulates the work of greedy algorithm for set cover problem. Experimental results present
cardinality of the set of association rules constructed for information system and lower
bound on minimum possible cardinality of such set based on the information about the
algorithm work. In the future, the length of constructed association rules will be
studied also. We are planning to extend an approach proposed in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] for decision rules to
construction of association rule systems. This approach allows one to construct rules
with coverage close to maximum and requires less time than the dynamic programming
approach.
Acknowledgements
Research reported in this publication was supported by the King Abdullah University
of Science and Technology (KAUST).
      </p>
      <p>The authors wish to express their gratitude to anonymous reviewers for useful
comments.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Imielin´ski, T.,
          <string-name>
            <surname>Swami</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mining association rules between sets of items in large databases</article-title>
          .
          <source>In: SIGMOD '93</source>
          , pp.
          <fpage>207</fpage>
          -
          <lpage>216</lpage>
          . ACM (
          <year>1993</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srikant</surname>
          </string-name>
          , R.:
          <article-title>Fast algorithms for mining association rules in large databases</article-title>
          . In: Bocca,
          <string-name>
            <given-names>J.B.</given-names>
            ,
            <surname>Jarke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Zaniolo</surname>
          </string-name>
          , C. (eds.) VLDB, pp.
          <fpage>487</fpage>
          -
          <lpage>499</lpage>
          . Morgan Kaufmann (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Alkhalid</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chikalov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hussain</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moshkov</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zielosko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Dagger: A tool for analysis and optimization of decision trees and rules</article-title>
          . In: Computational Informatics,
          <string-name>
            <given-names>Social</given-names>
            <surname>Factors</surname>
          </string-name>
          and New Information Technologies:
          <article-title>Hypermedia Perspectives and Avant-Garde Experiences in the Era of Communicability Expansion</article-title>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>39</lpage>
          . Blue Herons (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Alsolami</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Amin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chikalov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moshkov</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Multi-stage optimization of decision rules for knowledge discovery and representation</article-title>
          .
          <source>Knowledge and Information Systems</source>
          (
          <year>2015</year>
          ), (submitted)
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Asuncion</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Newman</surname>
            ,
            <given-names>D.J.:</given-names>
          </string-name>
          <article-title>UCI Machine Learning Repository</article-title>
          (http: //wwwicsuciedu/~mlearn/,
          <year>2007</year>
          ), http://www.ics.uci.edu/~mlearn/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bonates</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>P.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kogan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Maximum patterns in datasets</article-title>
          .
          <source>Discrete Applied Mathematics</source>
          <volume>156</volume>
          (
          <issue>6</issue>
          ),
          <fpage>846</fpage>
          -
          <lpage>861</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Borgelt</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Simple algorithms for frequent item set mining</article-title>
          . In: Koronacki,
          <string-name>
            <surname>J.</surname>
          </string-name>
          , Ras´,
          <string-name>
            <surname>Z.W.</surname>
          </string-name>
          , Wierzchon´,
          <string-name>
            <given-names>S.T.</given-names>
            ,
            <surname>Kacprzyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (eds.)
          <source>Advances in Machine Learning II, Studies in Computational Intelligence</source>
          , vol.
          <volume>263</volume>
          , pp.
          <fpage>351</fpage>
          -
          <lpage>369</lpage>
          . Springer Berlin Heidelberg (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Glass</surname>
            ,
            <given-names>D.H.</given-names>
          </string-name>
          :
          <article-title>Confirmation measures of association rule interestingness</article-title>
          .
          <source>Knowledge-Based Systems 44(0)</source>
          ,
          <fpage>65</fpage>
          -
          <lpage>77</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Han,
          <string-name>
            <given-names>J</given-names>
            .,
            <surname>Kamber</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Data Mining: Concepts and Techniques</article-title>
          . Morgan Kaufmann (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Moshkov</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piliszczuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zielosko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Greedy algorithm for construction of partial association rules</article-title>
          .
          <source>Fundam. Inform</source>
          .
          <volume>92</volume>
          (
          <issue>3</issue>
          ),
          <fpage>259</fpage>
          -
          <lpage>277</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Moshkov</surname>
            ,
            <given-names>M.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piliszczuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zielosko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>On construction of partial association rules</article-title>
          . In: Wen,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Polkowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Tsumoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>G</surname>
          </string-name>
          . (eds.) RSKT, LNCS, vol.
          <volume>5589</volume>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>183</lpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Pawlak</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skowron</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Rudiments of rough sets</article-title>
          .
          <source>Inf. Sci</source>
          .
          <volume>177</volume>
          (
          <issue>1</issue>
          ),
          <fpage>3</fpage>
          -
          <lpage>27</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Toivonen</surname>
          </string-name>
          , H.:
          <article-title>Sampling large databases for association rules</article-title>
          . In: Vijayaraman,
          <string-name>
            <given-names>T.M.</given-names>
            ,
            <surname>Buchmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.P.</given-names>
            ,
            <surname>Mohan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Sarda</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.L</surname>
          </string-name>
          . (eds.) VLDB, pp.
          <fpage>134</fpage>
          -
          <lpage>145</lpage>
          . Morgan Kaufmann (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Zielosko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Optimization of approximate decision rules relative to coverage</article-title>
          . In: Kozielski,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Mrózek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Kasprowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Małysiak-Mrózek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Kostrzewa</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.)
          <article-title>BDAS 2014</article-title>
          .
          <article-title>LNCS</article-title>
          , vol.
          <volume>8537</volume>
          , pp.
          <fpage>170</fpage>
          -
          <lpage>179</lpage>
          . Springer (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zielosko</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Global optimization of exact association rules relative to coverage</article-title>
          . In: Kryszkiewicz,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Bandyopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            , Rybin´ski, H.,
            <surname>Pal</surname>
          </string-name>
          , S.K. (eds.)
          <article-title>PReMI 2015</article-title>
          . LNCS, vol.
          <volume>9124</volume>
          , pp.
          <fpage>428</fpage>
          -
          <lpage>437</lpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>