skip to main content
10.1145/3297662.3365790acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Concise Description of Telecom Service Use Through Concept Chains

Authors Info & Claims
Published:10 January 2020Publication History

ABSTRACT

Binary data arise naturally in many fields including shopping carts, pass-fail tests, social networks etc. Descriptive data mining aims to discover a concise set of general patterns in these possibly noisy data. An important tool for describing binary data is Formal Concept Analysis (FCA) which describes the data through formal concepts. As the full lattice of formal concepts can become large even when dealing with relatively modest amounts of data there are several methods to reduce the number of concepts used to describe the data: selecting a subset of "interesting" concepts, finding a subset of concepts that cover the data fully etc. In this paper we apply a novel method of concept chain coverage generation to service use data of a telecommunications company. Concept chain coverage aims to cover the data not with single concepts but with chains of related concepts. The aim is not the full coverage but high enough coverage through a concise set of concept chains. We show that a relatively modest set of concept chains (4 to 10) can describe most of the data and that the performance of the algorithm is very acceptable for this case study.

References

  1. N. Belkhiter, C. Bourhfir, M. Gammoudi, A. Jaoua, N. I. Thanh, and M. Reguig. 1994. Décomposition Rectangulaire Optimale DâĂŹune Relation Binaire: Application Aux Bases De Données Documentaires: INFOR: Information Systems and Operational Research: Vol 32, No 1. INFOR 1 (1994), 33--54. https://www.tandfon-line.com/doi/abs/10.1080/03155986.1994.11732236Google ScholarGoogle Scholar
  2. Radim Belohlavek and Martin Trnecka. 2015. From-below approximations in Boolean matrix factorization: Geometry and new algorithm. J. Comput. System Sci. 81, 8 (Dec. 2015), 1678--1697. https://doi.org/10.1016/j.jcss.2015.06.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Radim Belohlavek and Vilem Vychodil. 2010. Discovery of optimal factors in binary data via a novel method of matrix decomposition. J. Comput. System Sci. 76, 1 (Feb. 2010), 3--20. https://doi.org/10.1016/j.jcss.2009.05.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. A. Davey and H. A. Priestley. 2002. Introduction to lattices and order (2nd ed ed.). Cambridge University Press, Cambridge, UK; New York, NY.Google ScholarGoogle Scholar
  5. R. P. Dilworth. 1950. A Decomposition Theorem for Partially Ordered Sets. Annals of Mathematics 51, 1 (1950), 161--166. https://doi.org/10.2307/1969503Google ScholarGoogle ScholarCross RefCross Ref
  6. Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http://archive.ics.uci.edu/mlGoogle ScholarGoogle Scholar
  7. Bernhard Ganter, Gerd Stumme, and Rudolf Wille. 2005. Formal Concept Analysis: Foundations and Applications. Springer. Google-Books-ID: oyb6BwAAQBAJ.Google ScholarGoogle Scholar
  8. Cyril Goutte, Peter Toft, Egill Rostrup, Finn ÃE. Nielsen, and Lars Kai Hansen. 1999. On Clustering fMRI Time Series. NeuroImage 9, 3 (March 1999), 298--310. https://doi.org/10.1006/nimg.1998.0391Google ScholarGoogle ScholarCross RefCross Ref
  9. Rein Kuusik. 1989. Application of Theory of Monotone Systems for Decision Trees. Number 705. 72 in Transactions of Tallinn Technical University. Tallinna Tehnikaülikool, Tallinn.Google ScholarGoogle Scholar
  10. Amira Mouakher and Sadok Ben Yahia. 2016. QualityCover: Efficient binary relation coverage guided by induced knowledge quality. Information Sciences 355--356 (Aug. 2016), 58--73. https://doi.org/10.1016/j.ins.2016.03.009Google ScholarGoogle Scholar
  11. A. Mouakher and S. Ben Yahia. 2019. On the efficient stability computation for the selection of interesting formal concepts. Inf. Sci. 472 (2019), 15--34.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Mouakher, O. Ktayfi, and S. Ben Yahia. 2019. Scalable computation of the extensional and intensional stability of formal concepts. Int. J. General Systems 48, 1 (2019), 1--32.Google ScholarGoogle ScholarCross RefCross Ref
  13. Oystein Ore. 1943. Chains in partially ordered sets. In Bulletin of the American Mathematical Society 49 (8). https://doi.org/10.1090/S0002-9904-1943-07970-0Google ScholarGoogle Scholar
  14. Ants Torim and Rein Kuusik. 2005. Describing Data Table with Best Decision. In Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization. 158--163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ants Torim, Marko Mets, and Kristo Raun. 2019. Covering Concept Lattices with Concept Chains. (2019).Google ScholarGoogle Scholar
  16. Leo Võhandu, Rein Kuusik, Ants Torim, Eik Aab, and Grete Lind. 2006. Some algorithms for data table (re)ordering using Monotone Systems. (2006), 7.Google ScholarGoogle Scholar
  17. Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo. 2007. The role mining problem: finding a minimal descriptive set of roles. In Proceedings of the 12th ACM symposium on Access control models and technologies. ACM, 175--184.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rudolf Wille. 2009. Restructuring Lattice Theory: an Approach Based on Hierarchies of Concepts. In Formal Concept Analysis (Lecture Notes in Computer Science), Sébastien Ferré and Sebastian Rudolph (Eds.). Springer Berlin Heidelberg, 314--339.Google ScholarGoogle Scholar

Index Terms

  1. Concise Description of Telecom Service Use Through Concept Chains

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          MEDES '19: Proceedings of the 11th International Conference on Management of Digital EcoSystems
          November 2019
          350 pages
          ISBN:9781450362382
          DOI:10.1145/3297662

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 January 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          MEDES '19 Paper Acceptance Rate41of102submissions,40%Overall Acceptance Rate267of682submissions,39%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader