Submit manuscript...
eISSN: 2574-8092

International Robotics & Automation Journal

Research Article Volume 4 Issue 1

Offering a new approach for extracting recurring conceptual links from social networks

Hamid Tabatabaee

Department of Computer Engineering, Islamic Azad University, Iran

Correspondence: Hamid Tabatabaee, Department of Computer Engineering, Islamic Azad University, Iran

Received: November 04, 2017 | Published: January 12, 2018

Citation: Tabatabaee H. Offering a new approach for extracting recurring conceptual links from social networks. Int Rob Auto J. 2018;4(1):4-12. DOI: 10.15406/iratj.2018.04.00084

Download PDF

Abstract

Massive amounts of data in social networks have made researchers look for ways to display a summary of the information provided and extract knowledge from them. Basic methods in the field used the criteria coming from graph theory, but new approaches are trying to take advantage of the realm of traditional data exploration and linked data. One of these new approaches is the approach called conceptual link approach, which was introduced to describe the social networks. In this approach, using the concept of contextual links, knowledge of the social network through a conceptual view of the dramatic structure is summarized as means of social networking. Conceptual perspective provides a summary of existing knowledge on a social network. In order to build this display, it is first needed to extract conceptual links from the intended network. However, extracting these links for networks with larger scale is very time consuming. In this paper, a new method for extracting frequent conceptual link from social networking is provided where by using the concept of dependency, it is tried to accelerate the process of extracting conceptual links. The proposed method will be able to accelerate this process if there are dependencies between data

Keywords: social network analysis, frequent conceptual link, data mining, graph mining, exploring social networks

Introduction

Social network is a social structure that is composed of some agents (generally individuals or organizations) that are connected by one or more kind of ​​dependencies, such as ideas and financial transactions, friends, relatives, Web links, spread of diseases (epidemiology). Social networks exist in different categories some of which could be found in.1 The results of various studies indicate that the capacity of social networks can be used in many individual and social levels in order to identify problems and determine solutions, establishing social relationships, organizational governance, policy making and advising people on track to achieve the objectives. Social network analysis is a powerful diagnostic tool for analyzing the nature and pattern of communication among members of a particular group. Social network analysis helps imagine and analyse complex set of relationships between relevant factors as the maps (graphs or photographs) of connected symbols, and patterns within these categories, and it also helps calculate and review the exact size, shape and density of the network as a whole and calculate the position of each element within it. For example, in the science of epidemiology, social network analysis is used to help understand how patterns of human contact helps or prevents the spread of diseases such as HIV in a population. In addition to social network analysis is a useful tool for surveillance in high volume – for example, Total Information Awareness program has done detailed research on strategies to analyze social networks to determine whether citizens are political threats or not.

From a variety of social networks, online social networking has received attention among researchers. A key aspect of many online social networks is being data–rich, and therefore providing unprecedented challenges and opportunities in terms of knowledge discovery and data mining. One of the most important fields of study of traditional data mining is exploring the frequent pattern. In the field of complex data structures such as networks, the issue of exploring frequent items is discussed in form of finding a subset of nodes (sub–graphs) that occur frequently arises in a network known as graph mining. Although primitive methods in this field have been using measures deriving from graph theory,2 new approaches known as social networks mining or simply link mining try to examine features of node in addition to the network structure to extract a new set of patterns3–6 described a new approach as conceptual link to describe social networking. Conceptual link provides the knowledge about groups of nodes connected to each other in a dense social network, and through a reduced structure, which is called as conceptual view, leads to a meaning display of social network. However, the problem of extracting maximum frequent conceptual link is like extracting of frequent item sets7 with NP–hard complexity.8 In this study, we aim to provide a new approach to accelerate further in the extraction of these links. For this purpose, D–MFCLMin algorithm is presented that by using the concept of dependence between sets of items, and by pruning, the search space reduces the time required to extract frequent conceptual links. The paper will be structured as follows. In the next section, the concept of conceptual links is offered, and then in the third part, suggested methods for the extraction of frequent conceptual links are introduced. In the fourth part, we introduce the proposed method. In part five, test results are presented and finally in section six, conclusions and future works are presented.

Problem description and definitions

In the field of search for frequent conceptual links (FCL), a model is defined as "a set of links between the two groups of nodes, where the nodes in each group share common characteristics." When these patterns are found on the network with enough repetition, they are seen as frequent patterns and called FCL. More formally, assume that G = (V, E) is a network where V is the set of nodes and E is the set of edges with E ⊆ V × V. V is defined as the relation R( A 1 , ..., A N ) MathType@MTEF@5@5@+= feaagKart1ev2aqatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuamaabmaapaqaa8qacaqGbbWdamaaBaaajuaibaWdbiaa igdaa8aabeaajuaGpeGaaiilaiaabckacaGGUaGaaiOlaiaac6caca GGSaGaaeyqa8aadaWgaaqcfasaa8qacaqGobaajuaGpaqabaaapeGa ayjkaiaawMcaaaaa@42FA@ where each Ai is a trait. Thus, every vertex v∈V is defined by the tuple ( a 1 , ...,  a N ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbaoaabmaaba aeaaaaaaaaa8qacaWGHbWdamaaBaaajuaibaWdbiaaigdaa8aabeaa juaGpeGaaiilaiaabccacaGGUaGaaiOlaiaac6cacaGGSaGaaeiiai aadggapaWaaSbaaKqbGeaapeGaamOtaaqcfa4daeqaaaGaayjkaiaa wMcaaaaa@425E@  where k[ 1..N ], v [ A k ] = a k MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeyiaIiIaam4AaiabgIGio=aadaWadaqaa8qacaaIXaGaaiOl aiaac6cacaWGobaapaGaay5waiaaw2faa8qacaGGSaGaaeiiaiaadA hacaqGGaWdamaadmaabaWdbiaadgeapaWaaSbaaKqbGeaapeGaam4A aaqcfa4daeqaaaGaay5waiaaw2faa8qacaqGGaGaeyypa0Jaamyya8 aadaWgaaqcfasaa8qacaWGRbaapaqabaaaaa@4ACE@ , is the attribute value A k MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyqa8aadaWgaaqcfasaa8qacaWGRbaajuaGpaqabaaaaa@395A@ in v. An item is a logical expression as A = x where A is an attribute and x is a value. Empty items are shown as ∅. A set of items is a combination of items, for example A 1 = x MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyqa8aadaWgaaqcfasaa8qacaaIXaaapaqabaqcfa4dbiab g2da9iaabccacaWG4baaaa@3BDB@  and A 2 = y MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyqa8aadaWgaaqcfasaaiaaikdaaeqaaKqba+qacqGH9aqp caqGGaGaamyEaaaa@3BBE@  and A 3 = z MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyqa8aadaWgaaqcfasaaiaaiodaaeqaaKqba+qacqGH9aqp caqGGaGaamOEaaaa@3BC0@ . A set of items, m, which is a combination of k non-empty item is called a k-item set and shown as m k ( | m k | = k ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaahaaqabKqbGeaapeGaam4AaaaajuaGpaWaaeWa aeaadaabdaqaa8qacaWGTbWdamaaCaaabeqcfasaa8qacaWGRbaaaa qcfa4daiaawEa7caGLiWoapeGaaeiiaiabg2da9iaabccacaWGRbaa paGaayjkaiaawMcaaaaa@448B@ . Suppose that m and sm MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4Caiaad2gaaaa@3883@  are two sets of items. If smm MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4Caiaad2gacqGHgksZcaWGTbaaaa@3B76@ , we say that sm MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4Caiaad2gaaaa@3883@  is a subset of items and m is a superset of the items of sm MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4Caiaad2gaaaa@3883@ . For example, sm=xy MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4Caiaad2gacqGH9aqpcaWG4bGaamyEaaaa@3B84@  is a subset of items from m=xyz MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBaiabg2da9iaadIhacaWG5bGaamOEaaaa@3B8B@ . The all sets of t number of items made of V are shown with with It. Moreover, UIt is defined as follows (all set of all sets of t number of items):

U I t =  k=1 t I k MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyvaiaadMeapaWaaWbaaKqbGeqabaWdbiaabshaaaqcfaOa eyypa0JaaiiOamaatahabaGaamysamaaCaaabeqcfasaaiaadUgaaa aajuaGbaGaam4Aaiabg2da9iaaigdaaeaacaWG0baacqWIQisvaaaa @4460@  (1)

Suppose that G is a directed graph. Thus, for any item set m on UIN, Vm is shown as a series of nodes in V that is consistent with the pattern m (literally meet their m) and defined as follows:

Set of links on the left m (LEm): the set of links from E that starts from the nodes and satisfy m.

LE m ={ e E;e=( a, b ), a  V m } MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabweapaWaaSbaaKqbGeaapeGaaeyBaaqcfa4daeqa a8qacqGH9aqpdaGadaWdaeaapeGaamyzaiaacckacqGHiiIZcaWGfb Gaai4oaiaadwgacqGH9aqpdaqadaWdaeaapeGaamyyaiaacYcacaGG GcGaamOyaaGaayjkaiaawMcaaiaacYcacaGGGcGaamyyaiabgIGiol aacckacaWGwbWdamaaBaaajuaibaWdbiaad2gaaKqba+aabeaaa8qa caGL7bGaayzFaaaaaa@522F@

The set of links on the right (RYm) m: the set of links from E that enter the nodes that satisfy m.

RE m ={ e E;e=( a, b ), b  V m } MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabweapaWaaSbaaKqbGeaapeGaaeyBaaqcfa4daeqa a8qacqGH9aqpdaGadaWdaeaapeGaamyzaiaacckacqGHiiIZcaWGfb Gaai4oaiaadwgacqGH9aqpdaqadaWdaeaapeGaamyyaiaacYcacaGG GcGaamOyaaGaayjkaiaawMcaaiaacYcacaGGGcGaamOyaiabgIGiol aacckacaWGwbWdamaaBaaajuaibaWdbiaad2gaaKqba+aabeaaa8qa caGL7bGaayzFaaaaaa@5236@

Definition 1- Conceptual links: suppose that m1 and m2 are two sets of items and V m 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOva8aadaWgaaqcfasaa8qacaWGTbqcfa4aaSbaaKqbGeaa caaIXaaajuaGbeaaa8aabeaaaaa@3B09@  and V m2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOva8aadaWgaaqcfasaa8qacaWGTbGaaGOmaaqcfa4daeqa aaaa@3A2D@  are repectively a set of nodes in V that satisfy m1 and m2. E ( m 1 , m 2 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyra8aadaWgaaqaa8qadaqadaWdaeaapeGaaeyBa8aadaWg aaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaqGTbWdamaaBa aajuaibaWdbiaaikdaa8aabeaaaKqba+qacaGLOaGaayzkaaaapaqa baaaaa@3F95@ is the set of links connecting the nodes in V m 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOva8aadaWgaaqcfasaa8qacaWGTbqcfa4aaSbaaKqbGeaa caaIXaaajuaGbeaaa8aabeaaaaa@3B09@ to the nodes in V m 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOva8aadaWgaaqcfasaa8qacaWGTbqcfa4aaSbaaKqbGeaa caaIYaaajuaGbeaaa8aabeaaaaa@3B0A@ ,

E ( m 1 , m 2 ) =L E m 1  RE m 2 ={  E ; e = ( a, b ) a  V m 1  and b   V m 2 } MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyra8aadaWgaaqaa8qadaqadaWdaeaapeGaamyBa8aadaWg aaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaWGTbWdamaaBa aajuaibaWdbiaaikdaa8aabeaaaKqba+qacaGLOaGaayzkaaaapaqa baWdbiabg2da9iaadYeacaWGfbWdamaaBaaajuaibaWdbiaad2gaju aGdaWgaaqcfasaaiaaigdaaeqaaaWdaeqaaKqbaoaavacabeqabeaa caaMb8oabaWdbiabgMIihdaacaqGGcGaaeOuaiaabweapaWaaSbaaK qbGeaapeGaaeyBaKqbaoaaBaaajuaibaGaaGOmaaqcfayabaaapaqa baWdbiabg2da9maacmaapaqaa8qacaqGLbGaaeiOaiabgIGiolaabc kacaqGfbGaaeiOaiaacUdacaqGGcGaaeyzaiaabckacqGH9aqpcaqG GcWaaeWaa8aabaWdbiaabggacaGGSaGaaeiOaiaabkgaaiaawIcaca GLPaaacaqGGcGaaeyyaiaabckacqGHiiIZcaqGwbWdamaaBaaajuai baqcfa4aaSbaaKqbGeaapeGaamyBaKqbaoaaBaaajuaibaGaaGymaa qabaaapaqabaaabeaajuaGpeGaaeiOaiaabggacaqGUbGaaeizaiaa bckacaqGIbGaaeiOaiabgIGiolaabckacaqGwbWdamaaBaaajuaiba Wdbiaab2gajuaGdaWgaaqcfasaaiaaikdaaKqbagqaaaWdaeqaaaWd biaawUhacaGL9baaaaa@7D3F@ (2)

Definition 2: we call support E ( m 1 , m 2 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyra8aadaWgaaqaa8qadaqadaWdaeaapeGaaeyBa8aadaWg aaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaqGTbWdamaaBa aajuaibaWdbiaaikdaa8aabeaaaKqba+qacaGLOaGaayzkaaaapaqa baaaaa@3F95@ a ratio of links in E that belongs to E ( m 1 , m 2 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyra8aadaWgaaqaa8qadaqadaWdaeaapeGaaeyBa8aadaWg aaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaqGTbWdamaaBa aajuaibaWdbiaaikdaa8aabeaaaKqba+qacaGLOaGaayzkaaaapaqa baaaaa@3F95@ .

supp( E ( m 1 , m 2 ) )= | E ( m 1 , m 2 ) | | E | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4CaiaabwhacaqGWbGaaeiCamaabmaapaqaa8qacaqGfbWd amaaBaaabaWdbmaabmaapaqaa8qacaqGTbWdamaaBaaajuaibaWdbi aaigdaa8aabeaajuaGpeGaaiilaiaab2gapaWaaSbaaKqbGeaapeGa aGOmaaWdaeqaaaqcfa4dbiaawIcacaGLPaaaa8aabeaaa8qacaGLOa GaayzkaaGaeyypa0ZaaSaaa8aabaWdbmaaemaapaqaa8qacaqGfbWd amaaBaaabaWdbmaabmaapaqaa8qacaqGTbWdamaaBaaajuaibaWdbi aaigdaa8aabeaajuaGpeGaaiilaiaab2gapaWaaSbaaKqbGeaapeGa aGOmaaWdaeqaaaqcfa4dbiaawIcacaGLPaaaa8aabeaaa8qacaGLhW UaayjcSdaapaqaa8qadaabdaWdaeaapeGaaeyraaGaay5bSlaawIa7 aaaaaaa@56CB@  (3)
Definition 3: It is said that there is FCL and we write m 1 , m 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaWgaaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaa cYcacaWGTbWdamaaBaaajuaibaWdbiaaikdaa8aabeaaaaa@3C3C@  if support E ( m 1 , m 2 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyra8aadaWgaaqaa8qadaqadaWdaeaapeGaamyBa8aadaWg aaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaWGTbWdamaaBa aajuaibaWdbiaaikdaa8aabeaaaKqba+qacaGLOaGaayzkaaaapaqa baaaaa@3F9B@  is greater than the threshold value of at least β MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeqOSdigaaa@383A@ , ( ( supp( E ( m 1 , m 2 ) )>β ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaaciGGZbGaaiyDaiaacchacaWGWbWaaeWaaeaacaWG fbWdamaaBaaabaWdbmaabmaapaqaa8qacaWGTbWdamaaBaaajuaiba Wdbiaaigdaa8aabeaajuaGpeGaaiilaiaad2gapaWaaSbaaKqbGeaa peGaaGOmaaWdaeqaaaqcfa4dbiaawIcacaGLPaaaa8aabeaaa8qaca GLOaGaayzkaaGaeyOpa4JaeqOSdigacaGLOaGaayzkaaaaaa@4941@ ).

Definition 4: Suppose U I t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyvaiaadMeapaWaaWbaaKqbGeqabaWdbiaabshaaaaaaa@39A7@  is the set of all sets of items of maximum t value in V, the FLt is defined as FCL extracted from the set of items.

FL t  = m 1 U I t ,  m 2 U I t { E ( m 1 , m 2 ) ; | E ( m 1 , m 2 ) | | E | >β} MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaqcfaOa aeiOaiabg2da9maawafabeWdaeaapeGaaeyBa8aadaWgaaqcfasaa8 qacaaIXaaapaqabaqcfa4dbiabgIGiolaadwfacaWGjbWdamaaCaaa juaibeqaa8qacaqG0baaaKqbakaacYcacaqGGcGaaeyBa8aadaWgaa qcfasaa8qacaaIYaaapaqabaqcfa4dbiabgIGiolaadwfacaWGjbWd amaaCaaajuaibeqaa8qacaqG0baaaaqcfayab8aabaWdbiablQIivb aacaGG7bGaaeyra8aadaWgaaqaa8qadaqadaWdaeaapeGaaeyBa8aa daWgaaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaqGTbWdam aaBaaajuaibaWdbiaaikdaaKqba+aabeaaa8qacaGLOaGaayzkaaaa paqabaWdbiaacUdadaWcaaWdaeaapeWaaqWaa8aabaWdbiaabweapa WaaSbaaeaapeWaaeWaa8aabaWdbiaab2gapaWaaSbaaKqbGeaapeGa aGymaaWdaeqaaKqba+qacaGGSaGaaeyBa8aadaWgaaqcfasaa8qaca aIYaaapaqabaaajuaGpeGaayjkaiaawMcaaaWdaeqaaaWdbiaawEa7 caGLiWoaa8aabaWdbmaaemaapaqaa8qacaqGfbaacaGLhWUaayjcSd aaaiabg6da+iabek7aIjaac2haaaa@6EE5@ (4)

Feature 1, being frequent: according to definition 3, if link (m1, m2) is frequent, the set of U I t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyvaiaadMeapaWaaWbaaKqbGeqabaWdbiaabshaaaaaaa@39A7@ and RE m 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabweapaWaaSbaaKqbGeaapeGaaeyBaKqbaoaaBaaa juaibaGaaGOmaaqabaaajuaGpaqabaaaaa@3BCA@  meet the following condition:.

| L E m 1 |>β×| E | و | R E m 2 |>β×| E | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaadYeacaWGfbWdamaaBaaabaWdbiaad2ga daWgaaqcfasaaiaaigdaaeqaaaqcfa4daeqaaaWdbiaawEa7caGLiW oacqGH+aGpcqaHYoGycqGHxdaTdaabdaWdaeaapeGaamyraaGaay5b SlaawIa7aiaacckacaqIizGaaiiOamaaemaapaqaa8qacaWGsbGaam yra8aadaWgaaqaa8qacaWGTbWaaSbaaKqbGeaacaaIYaaajuaGbeaa a8aabeaaa8qacaGLhWUaayjcSdGaeyOpa4JaeqOSdiMaey41aq7aaq Waa8aabaWdbiaadweaaiaawEa7caGLiWoaaaa@5AE1@  (5)

Definition 5- The conceptual sub link: suppose that two sets of items sm1 and sm2 are respectively sub-items of items m1, m2 in UI. Conceptual link (sm1, sm2) is called the sub link of (m1, m2), similarly (m1, m2) is called hyperlink (sm1, sm2) and written as ( s m 1 , s m 2 )( m 1 ,  m 2 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbaoaabmaaba aeaaaaaaaaa8qacaWGZbGaamyBamaaBaaajuaibaGaaGymaaqcfaya baGaaiilaiaabccacaWGZbGaamyBamaaBaaajuaibaGaaGOmaaqcfa yabaaapaGaayjkaiaawMcaa8qacqGHgksZpaWaaeWaaeaapeGaamyB a8aadaWgaaqcfasaa8qacaaIXaaapaqabaqcfa4dbiaacYcacaqGGa GaamyBa8aadaWgaaqcfasaa8qacaaIYaaapaqabaaajuaGcaGLOaGa ayzkaaaaaa@4B16@ .

Feature 2, characteristics of the underlying closure: If a conceptual link l is frequent its entire sub links are frequent. Thus, if a link is not frequent none of its hyperlinks is frequent.

Definition 6- Maximum FCL: Assume that β has a given support threshold value, we say that the maximum f conceptual link (MFCL), any FCL is so that no hyperlink of ĺ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaerbtLhBMfwzUb acfaqcfaOaa8Nobaaa@3A2A@  from l that is frequent exists. More formally :

ĺF L N so that  1ĺ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakqbgoGiKy aawaqefmvESzwyL5gaiuaacaWF6eGaeyicI4Saa8Nraiaa=Xeadaah aaqabKqbGeaacaWGobaeaaaaaaaaa8qacaGGGcWdaiaadohacaWGVb WdbiaacckapaGaamiDaiaadIgacaWGHbGaamiDaaaajuaGpeGaaiiO aiaaigdacqGHckcZpaGaa8Nobaaa@4CE2@ (6)

Previous work

Popular approaches of exploring social networking have been proposed to extract different forms of knowledge from these networks. Similar to the traditional field of data mining, exploring range of social networking addresses a wide range of tasks such as classification, clustering, search for recurring patterns or link prediction. Per se, these methods can be divided into two groups.8

  1. Approaches based on predictive modeling that include techniques that analyze current and past facts to make predictive assumptions about future or unknown events.
  2. Approaches based on descriptive modeling that cover a set of techniques whose aim is to summarize data by identifying some related features to describe how to organize things and how to make them real.

In this study, the focus is on descriptive approach of the social network. These approaches can be divided into 4 categories.

Link based clustering: (also known as Community Detection in research) That searches a dense groups of nodes and its aim is to analyze network to several linked components (communities) in such a way that nodes in each component have high–density connections, while nodes in different components have the lowest density of the proposed methods in this category algorithm SLPA,9 TopGC,10 SVINET,11 MCD,12 CGGC,13 CONCLUDE,14 DSE15 and SPICi16 can be cited.

Hybrid clustering: That simultaneously considers attributes and the structure of the nodes to identify clusters. The aim of this new type of approaches is partitioning of the network for balanced between structural similarities and attributes so that nodes with common attributes are grouped in one partition and the nodes inside partition are densely linked. This type of approaches provides a more conceptual partition of the network that is not necessarily proportional to context. Of clustering methods SA–Cluster4 and CESNA17 can be cited.

Frequent sub–graph mining: That focuses on extracting infrastructure that occur frequently on the network. The most widely used definition of a pattern is as a connected sub graph.18 Therefore, techniques that focus on the search for frequent patterns in social networks aim to identify sub graphs that occur frequently in a database or a very large network of networks, based on a minimum threshold value. Among the prominent methods in this category, Apriori–based algorithms19 and pattern growth20 can be cited.

FCL: Combines network structure information and features of node for providing knowledge about groups of nodes, which have more connections in a social network. Extracting MFCL creates a complexity similar to frequent item set, since it is proven that this complexity is NP–hard. Extracting all MFCLs from a social network may be a challenging problem and computationally severe. According to the definitions of the concept of conceptual links, we deal with the methods provided for extracting these links.

If search space is very broad, discovering all the frequent links in a network is very costly. In a simple approach, it is necessary to produce all set of possible items and then examine the frequency of each pair of them. To reduce this time, at the beginning, FLMIN algorithm21 was proposed. This algorithm used a bottom–up approach by applying feature 2 to gradually reduce the search space to include a superset of items that will potentially exist in FCLs.

In Figure 1, the bottom–up performance levels of FLMIN algorithm are shown. Mark* means that the attribute can take any value. At first, the algorithm begins with the search for frequent links that include a set of one–item items (L1 in the picture section B). Then, using feature 2, we know that one superset of items from the item one–item set that are not in the conceptual link will not be in conceptual links (see L2). In general, at t, search space can be limited only to the subset of items that are in conceptual links of stage t–1. In22 MAX–FL Min algorithm was presented. In this algorithm, the aim is finding MFCLs. Compared with previous algorithm, this algorithm only uses set of items that satisfy feature 1 to create links, and then they are checked for being frequent. In addition, in the process of examining the created link in order to add it to frequent links, this algorithm in addition to being frequent checks lack of existence of maximum frequent link compared to the current link. Moreover, if a frequent link is added to the result list (the list of maximum frequent links) all frequent sub–links will be deleted from the list. In,5 H–MFCL Min algorithm was presented. In this algorithm, to accelerate the extraction of MFCLs, some of the item sets are filtered. The collection of deleted items includes items that are set by their respective number of nodes in the network less than the threshold α. α is an input parameter for the algorithm. The authors have assumed that FCLs exist between the sets of frequent items. In fact, this filtering is done with the argument that there is little likelihood that a collection of items with low frequency can attract a high proportion of links in the network and therefore by filtering these kinds of item sets, despite the reduction in the search space, certain information will not be lost from the final conceptual network.

Figure 1 A sample of conceptual links extracted by FLMIN algorithm.21

The proposed algorithm

In this article, D-MFCL Min algorithm is suggested to extract conceptual links. By pruning the search space by applying the concept of dependency, this algorithm accelerates the extraction of conceptual links. In the following, first we introduce the concept of dependency, and then the proposed algorithms will be introduced and discussed.

Definition 7- Dependency: Suppose mt and nt are two sets of items. Say mt is dependent on nt and show it as n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaerbtLhBMfwzUb acfaqcfaOaa8NBamaaCaaajuaibeqaaiaadshaaaaaaa@3BA6@ m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaad2gada ahaaqcfasabeaacaWG0baaaaaa@38B4@ if per v V m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaadAhacq GHiiIZcaWGwbGaamyBamaaCaaajuaibeqaaiaadshaaaaaaa@3C0E@ , we have v V n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaadAhacq GHiiIZcaWGwbWaaSbaaKqbGeaacaWGUbaajuaGbeaacaWG0baaaa@3C9C@ . We show all dependencies of a set of items such as m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaad2gada ahaaqcfasabeaacaWG0baaaaaa@38B4@ in the form of D( m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaad2gada ahaaqcfasabeaacaWG0baaaaaa@38B4@ ).

D ( m t ) = n t | n t m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamiraiaacIcacaWGTbWdamaaCaaajuaibeqaa8qacaWG0baa aKqbakaacMcacqGH9aqpcaWGUbWdamaaCaaajuaibeqaa8qacaWG0b aaaKqbakaacYhacaWGUbWdamaaCaaajuaibeqaa8qaceWG0bGbauaa aaqcfaOaamyBa8aadaahaaqcfasabeaapeGaamiDaaaaaaa@45E1@ (7)

Definition 8- A set of selected items: Assume that FL t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaaaaa@3997@ is the set of extracted FCL from set of items of maximum t-items. LI sel t ( R I s e l t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaKqba+aadaqadaqaa8qacaWGsbGaamysa8 aadaWgaaqcfasaa8qacaWGZbaajuaGpaqabaWdbiaadwgacaWGSbWd amaaCaaabeqcfasaa8qacaWG0baaaaqcfa4daiaawIcacaGLPaaaaa a@4654@ is a set of set of items used to create these links.

LI sel t = { m ;   E ( m , n )   FL t } RI sel t = { m ;   E ( n , m )   FL t } MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOabaeqabaqcfaieaa aaaaaaa8qacaqGmbGaaeysa8aadaqhaaqcfasaa8qacaqGZbGaaeyz aiaabYgaa8aabaWdbiaabshaaaqcfaOaeyypa0ZaaiWaa8aabaWdbi aad2gacaGG7aGaaiiOaiaabweapaWaaSbaaeaapeWaaeWaa8aabaWd biaab2gacaGGSaGaaeOBaaGaayjkaiaawMcaaaWdaeqaa8qacqGHii IZcaGGGcGaaeOraiaabYeapaWaaWbaaKqbGeqabaWdbiaabshaaaaa juaGcaGL7bGaayzFaaaapaqaa8qacaqGsbGaaeysa8aadaqhaaqcfa saa8qacaqGZbGaaeyzaiaabYgaa8aabaWdbiaabshaaaqcfaOaeyyp a0ZaaiWaa8aabaWdbiaad2gacaGG7aGaaiiOaiaabweapaWaaSbaae aapeWaaeWaa8aabaWdbiaab6gacaGGSaGaaeyBaaGaayjkaiaawMca aaWdaeqaa8qacqGHiiIZcaGGGcGaaeOraiaabYeapaWaaWbaaKqbGe qabaWdbiaabshaaaaajuaGcaGL7bGaayzFaaaaaaa@6739@ (8)

Feature 3: If item set n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaerbtLhBMfwzUb acfaqcfaOaa8NBamaaCaaajuaibeqaaiaadshaaaaaaa@3BA6@ is not in any of the extracted FCLs in FLt  FL t ( n t   LI sel t ( RI sel t ) ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaqcfa4a aeWaa8aabaWdbiaad6gapaWaaWbaaKqbGeqabaWdbiaabshaaaGaae iOaKqbakabgMGiplaabYeacaqGjbWdamaaDaaajuaibaWdbiaaboha caqGLbGaaeiBaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaae OuaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqGSbaapaqa a8qacaqG0baaaaqcfaOaayjkaiaawMcaaaGaayjkaiaawMcaaaaa@5001@ , then none of the sets of items that depend on it ( { m t | n t D ( m t ) } ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiikaiaacUhacaWGTbWdamaaCaaajuaibeqaa8qacaqG0baa aKqbakaacYhacaWGUbWdamaaCaaajuaibeqaa8qacaqG0baaaKqbak abgIGiolaabseadaqadaWdaeaapeGaamyBa8aadaahaaqcfasabeaa peGaaeiDaaaaaKqbakaawIcacaGLPaaacaGG9bGaaiykaaaa@4798@ will be at FL t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaaaaa@3997@ .

Proving: Assume that m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaaaaaaa@38F1@ is one set of the items that depend on the set of items n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOBa8aadaahaaqcfasabeaapeGaaeiDaaaaaaa@38F2@ , and suppose that n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOBa8aadaahaaqcfasabeaapeGaaeiDaaaaaaa@38F2@ is not located in any FCL ( n t LI sel t ( RI sel t ) ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaacaWGUbWdamaaCaaajuaibeqaa8qacaWG0baaaKqb akabgMGiplaabYeacaqGjbWdamaaDaaajuaibaWdbiaabohacaqGLb GaaeiBaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaaeOuaiaa bMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqGSbaapaqaa8qaca qG0baaaaqcfaOaayjkaiaawMcaaaGaayjkaiaawMcaaaaa@4B35@ , so according to definition of FCL, for all series of items such as n j | LE n t   RE n j |   <   β   ×   | E |     ( | R E n t L E m j | < β × | E ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOBamaaBaaajuaibaGaamOAaaqcfayabaGaaiiFaiaabYea caqGfbWdamaaBaaajuaibaWdbiaad6gajuaGpaWaaWbaaKqbGeqaba Wdbiaabshaaaaapaqabaqcfa4aaubiaeqabeqaaiaaygW7aeaapeGa eSykIKKaaiiOaaaacaqGsbGaaeyra8aadaWgaaqcfasaa8qacaqGUb qcfa4damaaBaaajuaibaWdbiaabQgaa8aabeaaaeqaaKqba+qacaGG 8bGaaiiOaiabgYda8iaacckacaqGYoGaaiiOaiabgEna0kaacckada abdaWdaeaapeGaaeyraaGaay5bSlaawIa7aiaabckacaGGGcWaaeWa aeaacaGG8bGaamOuaiaadweapaWaaSbaaKqbGeaapeGaamOBaKqba+ aadaahaaqcfasabeaapeGaamiDaaaaaKqba+aabeaapeGaeSykIKKa amitaiaadweapaWaaSbaaKqbGeaapeGaamyBaKqba+aadaWgaaqcfa saa8qacaWGQbaapaqabaaajuaGbeaapeGaaiiFaiabgYda8iabek7a IjabgEna0kaacYhacaWGfbaacaGLOaGaayzkaaaaaa@7033@ is established. Moreover, according to the definition 6 (dependency), we know that V m t  V n t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOva8aadaWgaaqcfasaa8qacaWGTbqcfa4damaaCaaajuai beqaa8qacaqG0baaaaWdaeqaaKqba+qacqGHgksZcaqGGcGaaeOva8 aadaWgaaqcfasaa8qacaWGUbqcfa4damaaCaaajuaibeqaa8qacaqG 0baaaaqcfa4daeqaaaaa@4362@ , so we have | LE m t |     | LE n t | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaabYeacaqGfbWdamaaBaaajuaibaWdbiaa d2gajuaGpaWaaWbaaKqbGeqabaWdbiaabshaaaaapaqabaaajuaGpe Gaay5bSlaawIa7aiaacckacqGHKjYOcaGGGcWaaqWaa8aabaWdbiaa bYeacaqGfbWdamaaBaaajuaibaWdbiaad6gajuaGpaWaaWbaaKqbGe qabaWdbiaabshaaaaajuaGpaqabaaapeGaay5bSlaawIa7aaaa@4C49@ and | RE m t |     | RE n t | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaabkfacaqGfbWdamaaBaaajuaibaWdbiaa d2gajuaGpaWaaWbaaKqbGeqabaWdbiaabshaaaaajuaGpaqabaaape Gaay5bSlaawIa7aiaacckacqGHKjYOcaGGGcWaaqWaa8aabaWdbiaa bkfacaqGfbWdamaaBaaajuaibaWdbiaad6gajuaGpaWaaWbaaKqbGe qabaWdbiaabshaaaaajuaGpaqabaaapeGaay5bSlaawIa7aaaa@4C55@ , as a result | LE n t   RE n j |   <   β   ×   | E |     ( | R E m t L E n j | < β × | E ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiiFaiaabYeacaqGfbWdamaaBaaajuaibaWdbiaad6gajuaG paWaaWbaaKqbGeqabaWdbiaabshaaaaapaqabaqcfa4aaubiaeqabe qaaiaaygW7aeaapeGaeSykIKKaaiiOaaaacaqGsbGaaeyra8aadaWg aaqcfasaa8qacaqGUbqcfa4damaaBaaajuaibaWdbiaabQgaa8aabe aaaeqaaKqba+qacaGG8bGaaiiOaiabgYda8iaacckacaqGYoGaaiiO aiabgEna0kaacckadaabdaWdaeaapeGaaeyraaGaay5bSlaawIa7ai aabckacaGGGcWaaeWaaeaacaGG8bGaamOuaiaadweapaWaaSbaaKqb GeaacaWGTbqcfa4aaWbaaKqbGeqabaWdbiaadshaaaaajuaGpaqaba WdbiablMIijjaadYeacaWGfbWdamaaBaaajuaibaGaamOBaKqbaoaa BaaajuaibaWdbiaadQgaa8aabeaaaeqaaKqba+qacaGG8bGaeyipaW JaeqOSdiMaey41aqRaaiiFaiaadweaaiaawIcacaGLPaaaaaa@6D36@  and therefore the above features is proven.

Definition 9- parents of item set: For each item set   ( t > 1 ) ،  m t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiiOamaabmaapaqaa8qacaqG0bGaeyOpa4JaaGymaaGaayjk aiaawMcaaiaabYGbcaqGGcGaamyBa8aadaahaaqcfasabeaapeGaae iDaaaaaaa@402F@ two parents are shown as parent 1   ( m t   ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeiCaiaabggacaqGYbGaaeyzaiaab6gacaqG0bGaaGymaiaa bckadaqadaWdaeaapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaa aacaqGGcaajuaGcaGLOaGaayzkaaaaaa@43C4@ and parent 1   ( m t   ) ,  parent 2   ( m t   )   I t 1   MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeiCaiaabggacaqGYbGaaeyzaiaab6gacaqG0bGaaGymaiaa bckadaqadaWdaeaapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaa aajuaGcaqGGcaacaGLOaGaayzkaaGaaiilaiaabckacaqGWbGaaeyy aiaabkhacaqGLbGaaeOBaiaabshacaaIYaGaaeiOamaabmaapaqaa8 qacaWGTbWdamaaCaaajuaibeqaa8qacaqG0baaaKqbakaabckaaiaa wIcacaGLPaaacqGHiiIZcaGGGcGaamysa8aadaahaaqcfasabeaape GaaeiDaiabgkHiTiaaigdaaaGaaiiOaaaa@5A6B@ so that m t =  parent 1   ( m t   )   .  parent 2   ( m t   )     MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaaaajuaGcqGH9aqp caqGGcGaaeiCaiaabggacaqGYbGaaeyzaiaab6gacaqG0bGaaGymai aabckadaqadaWdaeaapeGaamyBa8aadaahaaqcfasabeaapeGaaeiD aaaajuaGcaqGGcaacaGLOaGaayzkaaGaaeiOaiaac6cacaqGGcGaae iCaiaabggacaqGYbGaaeyzaiaab6gacaqG0bGaaGOmaiaabckadaqa daWdaeaapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaaaajuaGca qGGcaacaGLOaGaayzkaaGaaeiOaKqbGiaacckaaaa@5B6C@

Definition 10, Dependency Level: For each item sets m, the dependence level is shown with DL (m) and defined as follows:

DL ( m ) =   { 0                                                                                       i f   D ( m ) =   max n D ( m ) DL ( n ) + 1                                                     e l s e MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeiraiaabYeadaqadaWdaeaapeGaaeyBaaGaayjkaiaawMca aiabg2da9iaabckadaGabaWdaeaafaqabeGabaaabaWdbiaaicdaca GGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaa cckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaai iOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGG GcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacc kacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiO aiaacckacaGGGcGaamyAaiaadAgacaGGGcGaamiramaabmaapaqaa8 qacaqGTbaacaGLOaGaayzkaaGaeyypa0JaaiiOaiabgwGigdWdaeaa daWfqaqaa8qaciGGTbGaaiyyaiaacIhaa8aabaWdbiaad6gacqGHii IZcaqGebWaaeWaa8aabaWdbiaab2gaaiaawIcacaGLPaaaa8aabeaa peGaaeiraiaabYeadaqadaWdaeaapeGaaeOBaaGaayjkaiaawMcaai abgUcaRiaaigdacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaaccka caGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOai aacckacaGGGcGaaiiOaiaacckacaGGGcGaaiiOaiaacckacaGGGcGa aiiOaiaacckacaGGGcGaaiiOaiaadwgacaWGSbGaam4Caiaadwgaaa aacaGL7baaaaa@AA63@ (9)

The proposed algorithm by developing the algorithm in5 by applying feature 3 reduces the search space to extract FCL. The pseudo code for this algorithm is given below. Similar to the algorithm H-MFCL Min, input parameters are α and β that are respectively threshold value related to set of items and supporting links. The same as H-MFCL Min algorithm in,5 in the first step (t = 1), single-item item set LI cand 1 ( RI cand 1 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaGymaaaajuaGpaWaaeWaaeaapeGaaeOuai aabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqGUbGaaeizaaWd aeaapeGaaGymaaaaaKqba+aacaGLOaGaayzkaaaaaa@467E@ are created according to the first and second features (features relating to the collection of eligible items) (lines 6 and 7). After creating these lists, the set of their items are ordered in terms of the amount of support and ascending order. Unlike H-MFCL Min, before the search for FCLs, in this algorithm in step t, the dependencies between items set in tLI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeiDaiaabYeacaqGjbWdamaaDaaajuaibaWdbiaabogacaqG HbGaaeOBaiaabsgaa8aabaWdbiaabshaaaqcfa4aaeWaa8aabaWdbi aabkfacaqGjbWdamaaDaaajuaibaWdbiaabogacaqGHbGaaeOBaiaa bsgaa8aabaWdbiaabshaaaaajuaGcaGLOaGaayzkaaaaaa@47DE@ are obtained. For this purpose, a collection of t items of LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaaeOuai aabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqGUbGaaeizaaWd aeaapeGaaeiDaaaaaKqbakaawIcacaGLPaaaaaa@46E7@ are mutually attached and then, based on the amount of support set of items, the existence of dependency between two attached items is checked. In the absence of dependency, collection of attached items obtained is recorded as one of the candidate items on the list for the next step LI cand t+1 ( RI cand t+1 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaiaabUcacaqGXaaaaKqbaoaabmaapa qaa8qacaqGsbGaaeysa8aadaqhaaqcfasaa8qacaqGJbGaaeyyaiaa b6gacaqGKbaapaqaa8qacaqG0bGaae4kaiaabgdaaaaajuaGcaGLOa Gaayzkaaaaaa@49AB@ (lines 25-11). This insertion is done in a way that the order of the list of items remains in ascending form in terms of the amount of support. After determining the dependencies among the items sets of step t, their dependence level (Relation 9) is calculated and then in LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaaeOuai aabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqGUbGaaeizaaWd aeaapeGaaeiDaaaaaKqbakaawIcacaGLPaaaaaa@46E7@  is ordered by increasing the level of dependence (line 26). After sorting, the search for FCLs is done. Found FCLs are added to FL t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaaaaa@3997@ list and then by removing sub FCLs links located in F L V m a x MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOraiaadYeapaWaaSbaaKqbGeaapeGaamOvaiaad2gacaWG HbGaamiEaaWdaeqaaaaa@3C62@ , are added to F L V m a x MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOraiaadYeapaWaaSbaaKqbGeaapeGaamOvaiaad2gacaWG HbGaamiEaaWdaeqaaaaa@3C62@ as MFCL (lines 44-27).

More exactly, this search is done so that for every item collection m i  LI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaapaqabaqcfa4dbiab gIGiolaabckacaqGmbGaaeysa8aadaWgaaqcfasaa8qacaqGJbGaae yyaiaab6gacaqGKbaapaqabaaaaa@41F1@ and m j RI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGQbaapaqabaqcfa4dbiab gIGiolaabkfacaqGjbWdamaaBaaajuaibaWdbiaabogacaqGHbGaae OBaiaabsgaa8aabeaaaaa@40D5@ , with the proviso that | m i | = t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaab2gapaWaaSbaaKqbGeaapeGaaeyAaaqc fa4daeqaaaWdbiaawEa7caGLiWoacqGH9aqpcaqG0baaaa@3ECE@ or | m j | = t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaab2gapaWaaSbaaKqbGeaapeGaaeOAaaWd aeqaaaqcfa4dbiaawEa7caGLiWoacqGH9aqpcaqG0baaaa@3ECF@ is checked whether the link ( m i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaapaqabaaaaa@38F2@ , m j MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGQbaapaqabaaaaa@38F3@ ) is frequent or not. In the proposed algorithm, before this review at this stage, the dependent items mi and mj are checked. If none of the sets of dependent items are added in FL t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaaaaa@3997@ , reviewing the frequency of this pair is ignored (line 33). It is recalled that the set of items in LI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D5B@ and RI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D61@ are arranged in ascending order of dependency, so when reviewing a set of items, all of the items related to it, has already been investigated at this stage. After this step, similar to H-MFCL Min algorithm, checking the frequency of the link is done (line 34). If the link is frequent, ( m i ,  m j ) ,  m i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaa8aabaWdbiaab2gapaWaaSbaaKqbGeaapeGaaeyAaaWd aeqaaKqba+qacaGGSaGaaeiOaiaab2gapaWaaSbaaKqbGeaapeGaae OAaaqcfa4daeqaaaWdbiaawIcacaGLPaaacaGGSaGaaeiOaiaab2ga paWaaSbaaKqbGeaapeGaaeyAaaWdaeqaaaaa@442F@ are added to LI sel t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaaaa@3C86@ and mj is added to RI sel t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaaaa@3C8C@ after the review of items in LI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D5B@ and RI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D61@ , set of items LI cand t+1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaiaabUcacaqGXaaaaaaa@3EBD@ and RI cand t+1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaiaabUcacaqGXaaaaaaa@3EC3@ are modified to extract FCLs at stage t. At this point, any item sets ( m t + 1 ( m t + 1   LI cand t + 1 ( RI cand t + 1   ) ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaahaaqcfasabeaapeGaaeiDaiabgUcaRiaaigda aaqcfa4aaeWaaeaacaWGTbWdamaaCaaajuaibeqaa8qacaqG0bGaey 4kaSIaaGymaaaajuaGcaqGGcGaeyicI4SaaeitaiaabMeapaWaa0ba aKqbGeaapeGaae4yaiaabggacaqGUbGaaeizaaWdaeaapeGaaeiDai abgUcaRiaaigdaaaqcfa4aaeWaa8aabaWdbiaabkfacaqGjbWdamaa DaaajuaibaWdbiaabogacaqGHbGaaeOBaiaabsgaa8aabaWdbiaabs hacqGHRaWkcaaIXaaaaKqbakaabckaaiaawIcacaGLPaaaaiaawIca caGLPaaaaaa@587A@ ) whose both sets of parent item (Definition 8) are not in LI sel t ( RI sel t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaKqba+aadaqadaqaa8qacaqGsbGaaeysa8 aadaqhaaqcfasaa8qacaqGZbGaaeyzaiaabYgaa8aabaWdbiaabsha aaaajuaGpaGaayjkaiaawMcaaaaa@454C@ are removed from the list (49-45). This elimination is carried out by the lower cylinder head features (Feature 2).

Algorithm 1: D-MFCL Min Algorithm

Require: G = (V;E): Network, β [ 0..1 ] MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabek7aIj abgIGiopaadmaabaGaaGimaiaac6cacaGGUaGaaGymaaGaay5waiaa w2faaaaa@3E69@ : Link support threshold and α [ 0..1 ] MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabeg7aHj abgIGiopaadmaabaGaaGimaiaac6cacaGGUaGaaGymaaGaay5waiaa w2faaaaa@3E67@ :Item set filtering threshold

1. FL Vmax :   S e t   o f   M F C L s ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaSbaaKqbGeaapeGaaeOvaiaab2gacaqG HbGaaeiEaaqcfa4daeqaaiaacQdapeGaaiiOa8aacaWGtbGaamyzai aadshapeGaaiiOa8aacaWGVbGaamOza8qacaGGGcWdaiaad2eacaWG gbGaam4qaiaadYeacaWGZbGaeyiKHWQaeqy1dygaaa@4DE4@

2. LI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaaSbaaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeqaaaaa@3C53@ : Stack of left-hand item set candidates   ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabgcziSk abew9aMbaa@3A2A@

3. RI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaaSbaaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeqaaaaa@3C59@ : Stack of right-hand item set candidates  ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabgcziSk abew9aMbaa@3A2A@

4. FL t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaaaaa@3997@ : List of frequent conceptual links  ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabgcziSk abew9aMbaa@3A2A@

5. t: Iteration 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakabgcziSk aaigdaaaa@391D@ {Generation of the 1-itemsets}

6. LI cand 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaGymaaaaaaa@3D1F@ Generate 1-itemsets m from V such as | V m |   >   α   a n d   | L E m |   >   β   ×   | E | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaaeaacaqGwbWaaSbaaKqbGeaacaWGTbaajuaGbeaaaiaa wEa7caGLiWoacaGGGcGaeyOpa4JaaiiOaiabeg7aHjaacckacaWGHb GaamOBaiaadsgacaGGGcWaaqWaaeaacaWGmbGaamyramaaBaaajuai baGaamyBaaqcfayabaaacaGLhWUaayjcSdGaaiiOaiabg6da+iaacc kacqaHYoGycaGGGcGaey41aqRaaiiOamaaemaabaGaamyraaGaay5b SlaawIa7aaaa@5A24@

7. RI cand 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaGymaaaaaaa@3D25@ Generate 1-itemsets m from V such as | V m |   >   α   a n d   | L E m |   >   β   ×   | E | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaaeaacaqGwbWaaSbaaKqbGeaacaWGTbaajuaGbeaaaiaa wEa7caGLiWoacaGGGcGaeyOpa4JaaiiOaiabeg7aHjaacckacaWGHb GaamOBaiaadsgacaGGGcWaaqWaaeaacaWGmbGaamyramaaBaaajuai baGaamyBaaqcfayabaaacaGLhWUaayjcSdGaaiiOaiabg6da+iaacc kacqaHYoGycaGGGcGaey41aqRaaiiOamaaemaabaGaamyraaGaay5b SlaawIa7aaaa@5A24@

8. Sort LI cand 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaGymaaaaaaa@3D1F@ , RI cand 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaGymaaaaaaa@3D25@ item sets by their Supports

9.    t 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaadshacq GHqgcRcaaIXaaaaa@3A16@

10.  do {Determining Dependencies between LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaacaWG0baaaKqbaoaabmaabaWdbiaabkfacaqGjb WdamaaDaaajuaibaWdbiaabogacaqGHbGaaeOBaiaabsgaa8aabaGa amiDaaaaaKqbakaawIcacaGLPaaaaaa@46BC@ do item sets}

11.     for all item set m i t    LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aKqbakaabckacqGHiiIZcaqGGcGaaeitaiaabMeapaWaa0baaKqbGe aapeGaae4yaiaabggacaqGUbGaaeizaaWdaeaapeGaaeiDaaaajuaG daqadaWdaeaapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yai aabggacaqGUbGaaeizaaWdaeaapeGaaeiDaaaaaKqbakaawIcacaGL Paaaaaa@4EA0@ do

12.         for all item set m i t    LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aKqbakaabckacqGHiiIZcaqGGcGaaeitaiaabMeapaWaa0baaKqbGe aapeGaae4yaiaabggacaqGUbGaaeizaaWdaeaapeGaaeiDaaaajuaG daqadaWdaeaapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yai aabggacaqGUbGaaeizaaWdaeaapeGaaeiDaaaaaKqbakaawIcacaGL Paaaaaa@4EA0@ do

13.              if ( m i t   MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aiaabckaaaa@3B1D@ and m j t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGQbaapaqaa8qacaqG0baa aaaa@39FB@ share t-1 item)

14.                   m k t+1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGRbaapaqaa8qacaqG0bGa ae4kaiaabgdaaaaaaa@3B5E@ join m i t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aaaa@39FA@ and m j t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaaiaadQgaaeaapeGaaeiDaaaaaaa@39DE@

15.                       if  (sup( m k t+1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGRbaapaqaa8qacaqG0bGa ae4kaiaabgdaaaaaaa@3B5E@ ) = sup( m i t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aaaa@39FA@ ))

16.                           add  m j t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaadbaWdbiaabQgaaKqbG8aabaWdbiaabsha aaaaaa@3A07@ to D( m i t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGPbaapaqaa8qacaqG0baa aaaa@39FA@ )

17.                              else

18.                               if | V m k t + 1 |   >   α   a n d   | L E m k t + 1 |   >   β   ×   | E |   ( | R E m k t + 1 | > β   ×   | E | ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaaeaacaqGwbWaaSbaaKqbGeaacaWGTbqcfa4aa0baaKqb GeaacaWGRbaabaGaamiDaiabgUcaRiaaigdaaaaajuaGbeaaaiaawE a7caGLiWoacaGGGcGaeyOpa4JaaiiOaiabeg7aHjaacckacaWGHbGa amOBaiaadsgacaGGGcWaaqWaaeaacaWGmbGaamyramaaBaaajuaiba GaamyBaKqbaoaaDaaajuaibaGaam4AaaqaaiaadshacqGHRaWkcaaI XaaaaaqcfayabaaacaGLhWUaayjcSdGaaiiOaiabg6da+iaacckacq aHYoGycaGGGcGaey41aqRaaiiOamaaemaabaGaamyraaGaay5bSlaa wIa7aiaacckadaqadaqaamaaemaabaGaamOuaiaadweadaWgaaqcfa saaiaad2gajuaGdaqhaaqcfasaaiaadUgaaeaacaWG0bGaey4kaSIa aGymaaaaaKqbagqaaaGaay5bSlaawIa7aiabg6da+iabek7aIjaacc kacqGHxdaTcaGGGcWaaqWaaeaacaWGfbaacaGLhWUaayjcSdaacaGL OaGaayzkaaaaaa@7B83@

19.                                add m k t+1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaqGRbaapaqaa8qacaqG0bGa ae4kaiaabgdaaaaaaa@3B5E@ to LI cand t+1 ( RI cand t+1 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaiaabUcacaqGXaaaaKqbaoaabmaapa qaa8qacaqGsbGaaeysa8aadaqhaaqcfasaa8qacaqGJbGaaeyyaiaa b6gacaqGKbaapaqaa8qacaqG0bGaae4kaiaabgdaaaaajuaGcaGLOa Gaayzkaaaaaa@49AB@

20.                                  parent1 ( m k t+1 )  m i t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaamaabmaabaqcfa ieaaaaaaaaa8qacaqGTbWdamaaDaaajuaibaWdbiaabUgaa8aabaWd biaabshacaqGRaGaaeymaaaaaOWdaiaawIcacaGLPaaajuaicqGHqg cRpeGaaeiOaKqbakaab2gapaWaa0baaKqbGeaacaWGPbaabaWdbiaa bshaaaaaaa@441C@

21.                                parent 2 ( m k t+1 )  m j t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaamaabmaabaqcfa ieaaaaaaaaa8qacaqGTbWdamaaDaaajuaibaWdbiaabUgaa8aabaWd biaabshacaqGRaGaaeymaaaaaOWdaiaawIcacaGLPaaajuaicqGHqg cRpeGaaeiOaKqbakaab2gapaWaa0baaKqbGeaacaWGQbaabaWdbiaa bshaaaaaaa@441D@

22.                           end if

23.                      end if

24.          end for

25.     end for

26.     Sort LI cand t ( RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaaeOuai aabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqGUbGaaeizaaWd aeaapeGaaeiDaaaaaKqbakaawIcacaGLPaaaaaa@46E7@ item sets by their calculated dependency level
{Generation of frequent conceptual  links}

27.    FL t ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaeqajuaibaWdbiaabshaaaqcfa4d aiabgcziSkabew9aMbaa@3DE5@

28.    LI sel t ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaKqba+aacqGHqgcRcqaHvpGzaaa@40D4@

29.    RI sel t ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4CaiaabwgacaqG Sbaapaqaa8qacaqG0baaaKqba+aacqGHqgcRcqaHvpGzaaa@40DA@

30.     for all item set m i    LI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaapaqabaqcfa4dbiaa bckacqGHiiIZcaqGGcGaaeitaiaabMeapaWaaSbaaKqbGeaapeGaae 4yaiaabggacaqGUbGaaeizaaqcfa4daeqaaaaa@43A2@ do

31.         for all item set m i    RI cand MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaapaqabaqcfa4dbiaa bckacqGHiiIZcaqGGcGaaeOuaiaabMeapaWaaSbaaKqbGeaapeGaae 4yaiaabggacaqGUbGaaeizaaqcfa4daeqaaaaa@43A8@ do

32.               if ( | m i | = t or  | m j | = t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaacaGG8bGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaa juaGpaqabaWdbmaaemaapaqaa8qacqGH9aqpcaqG0bGaaeiOaiaab+ gacaqGYbGaaeiOaiaacYhacaqGTbWdamaaBaaajuaibaWdbiaabQga a8aabeaaaKqba+qacaGLhWUaayjcSdGaeyypa0JaaeiDaaGaayjkai aawMcaaaaa@4B79@ )

33.                    if ( ( ( m k , m j ) F L t , m k D ( m i ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiikaiabgoGiKiaacIcacaWGTbWdamaaBaaajuaibaWdbiaa dUgaaKqba+aabeaapeGaaiilaiaad2gapaWaaSbaaKqbGeaapeGaam OAaaWdaeqaaKqba+qacaGGPaGaeyicI4SaamOraiaadYeapaWaaWba aeqabaWdbiaadshaaaGaaiilaiabgcGiIiaad2gapaWaaSbaaKqbGe aapeGaam4Aaaqcfa4daeqaaiabgIGio=qacaWGebGaaiikaiaad2ga paWaaSbaaKqbGeaapeGaamyAaaWdaeqaaKqba+qacaGGPaaaaa@4F94@ and ( ( m i , m k ) F L t , m k D ( m j ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiikaiabgoGiKiaacIcacaWGTbWdamaaBaaajuaibaGaamyA aaqcfayabaWdbiaacYcacaWGTbWdamaaBaaajuaibaGaam4Aaaqaba qcfa4dbiaacMcacqGHiiIZcaWGgbGaamita8aadaahaaqabeaapeGa amiDaaaacaGGSaGaeyiaIiIaamyBa8aadaWgaaqcfasaa8qacaWGRb aajuaGpaqabaGaeyicI48dbiaadseacaGGOaGaamyBaKqbG8aacaWG Qbqcfa4dbiaacMcaaaa@4F16@ )

34.                          if ( ( 1 F L t s u c h   a s   ( m i , m j )   1   a n d   | ( m i , m j ) |   > β   ×   | E | ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaacqGHdicjcaaIXaGaeyicI4SaamOraiaadYeapaWa aWbaaeqabaWdbiaadshaaaWdaiaadohacaWG1bGaam4yaiaadIgape GaaiiOa8aacaWGHbGaam4Ca8qacaGGGcGaaiikaiaad2gapaWaaSba aKqbGeaacaWGPbaajuaGbeaapeGaaiilaiaad2gadaWgaaqcfasaai aadQgaaeqaaKqbakaacMcacqGHckcZcaGGGcGaaGymaiaacckacaGG HbGaaiOBaiaacsgacaGGGcWaaqWaaeaacaGGOaGaamyBa8aadaWgaa qcfasaaiaadMgaaKqbagqaa8qacaGGSaGaamyBamaaBaaajuaibaGa amOAaaqabaqcfaOaaiykaaGaay5bSlaawIa7aiaacckacqGH+aGpcq aHYoGycaGGGcGaey41aqRaaiiOamaaemaabaGaamyraaGaay5bSlaa wIa7aaGaayjkaiaawMcaaaaa@6D99@ )

35.                                 add ( m i , m j ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiikaiaad2gapaWaaSbaaKqbGeaacaWGPbaajuaGbeaapeGa aiilaiaad2gadaWgaaqcfasaaiaadQgaaeqaaKqbakaacMcaaaa@3E3C@ to F L t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamOraiaadYeapaWaaWbaaeqabaWdbiaadshaaaaaaa@396F@

36.                                  remove all  FL Vmax  such as q  ( m i ,   m j ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyCaiaabckacqGHiiIZcaqGGcGaaeOraiaabYeapaWaaSba aKqbGeaapeGaaeOvaiaab2gacaqGHbGaaeiEaaqcfa4daeqaa8qaca qGGcGaae4CaiaabwhacaqGJbGaaeiAaiaabckacaqGHbGaae4Caiaa bckacaqGXbGaaeiOaiabgkOimpaabmaapaqaa8qacaqGTbWdamaaBa aajuaibaWdbiaabMgaa8aabeaajuaGpeGaaiilaiaabckacaqGGcGa aeyBa8aadaWgaaqcfasaa8qacaqGQbaajuaGpaqabaaapeGaayjkai aawMcaaaaa@5954@

37.                                  add (mi,mj ) to FLVmax

38.                                  add m i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaWgaaqcfasaaiaadMgaaKqbagqaaaaa@3965@ to L sel t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaadYeada qhaaqcfasaaabaaaaaaaaapeGaae4CaiaabwgacaqGSbaapaqaa8qa caqG0baaaaaa@3B9D@

39.                                  add m j MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamyBa8aadaWgaaqcfasaaiaadQgaaKqbagqaaaaa@3966@ to R sel t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbakaadkfada qhaaqcfasaaabaaaaaaaaapeGaae4CaiaabwgacaqGSbaapaqaa8qa caqG0baaaaaa@3BA3@

40.                           end if,

41                     end if

42.             end if

43.      end for

44.   end for

45.   for all item set m i  LI cand t + 1 ( RI cand t + 1 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaWgaaqcfasaa8qacaqGPbaapaqabaqcfa4dbiab gIGiolaabckacaqGmbGaaeysa8aadaqhaaqcfasaa8qacaqGJbGaae yyaiaab6gacaqGKbaapaqaa8qacaqG0bGaey4kaSIaaGymaaaajuaG daqadaWdaeaapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yai aabggacaqGUbGaaeizaaWdaeaapeGaaeiDaiabgUcaRiaaigdaaaaa juaGcaGLOaGaayzkaaaaaa@4FBF@ do

46.        if ( parent 1 ( m i )   L sel t ( R sel t )  and  parent 2 ( m i )   L sel t ( R sel t ) ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaacaqGWbGaaeyyaiaabkhacaqGLbGaaeOBaiaabsha caaIXaWaaeWaa8aabaWdbiaab2gapaWaaSbaaKqbGeaapeGaaeyAaa qcfa4daeqaaaWdbiaawIcacaGLPaaacaqGGcGaeyycI8Saaeita8aa daqhaaqcfasaa8qacaqGZbGaaeyzaiaabYgaa8aabaWdbiaabshaaa qcfa4aaeWaa8aabaWdbiaabkfapaWaa0baaKqbGeaapeGaae4Caiaa bwgacaqGSbaapaqaa8qacaqG0baaaaqcfaOaayjkaiaawMcaaiaabc kacaqGHbGaaeOBaiaabsgacaqGGcGaaeiOaiaabchacaqGHbGaaeOC aiaabwgacaqGUbGaaeiDaiaaikdadaqadaWdaeaapeGaaeyBa8aada Wgaaqcfasaa8qacaqGPbaapaqabaaajuaGpeGaayjkaiaawMcaaiaa bckacqGHjiYZcaqGmbWdamaaDaaajuaibaWdbiaabohacaqGLbGaae iBaaWdaeaapeGaaeiDaaaajuaGdaqadaWdaeaapeGaaeOua8aadaqh aaqcfasaa8qacaqGZbGaaeyzaiaabYgaa8aabaWdbiaabshaaaaaju aGcaGLOaGaayzkaaaacaGLOaGaayzkaaaaaa@739E@

47.        remove mi from LI cand t + 1 ( RI cand t + 1 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaiabgUcaRiaaigdaaaqcfa4aaeWaa8 aabaWdbiaabkfacaqGjbWdamaaDaaajuaibaWdbiaabogacaqGHbGa aeOBaiaabsgaa8aabaWdbiaabshacqGHRaWkcaaIXaaaaaqcfaOaay jkaiaawMcaaaaa@4A21@

48.        end if

49.    end for

50.   t t + 1 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaamiDaiabgcziSkaadshacqGHRaWkcaaIXaaaaa@3C11@

 

51.   while FL t     ϕ MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOraiaabYeapaWaaWbaaKqbGeqabaWdbiaabshaaaqcfaOa aeiOaiabgcMi5kaabckacqaHvpGzaaa@3FFA@ and all Combinations() = false

52. return FLVmax

Analysis of the proposed method

First, the cost of H-MFCL Min algorithm is discussed. Suppose that we want check the existence of conceptual link between the two sets of items m 1 i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaaIXaaapaqaa8qacaqGPbaa aaaa@39BE@ and m 2 j MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaaIYaaapaqaaiaadQgaaaaa aa@39B2@ (i = t or j = t) at step t ( m 1 i LI cand t ,  m 2 j RI cand t ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaiiDaiaacIcacaWGTbWdamaaDaaajuaibaWdbiaaigdaa8aa baWdbiaadMgaaaqcfaOaeyicI4SaaeitaiaabMeapaWaa0baaKqbGe aapeGaae4yaiaabggacaqGUbGaaeizaaWdaeaapeGaaeiDaaaajuaG caGGSaGaaeiOaiaab2gapaWaa0baaKqbGeaapeGaaGOmaaWdaeaape GaaeOAaaaapaGaeyicI4Ccfa4dbiaabkfacaqGjbWdamaaDaaajuai baWdbiaabogacaqGHbGaaeOBaiaabsgaa8aabaWdbiaabshaaaqcfa Oaaiykaaaa@53F6@ . To this end, the edges of the network whose source node belong to m 1 i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaadbaWdbiaaigdaaKqbG8aabaGaamyAaaaa aaa@39BC@ and their destination node belongs to m 2 j MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaaIYaaapaqaaiaadQgaaaaa aa@39B2@ will be counted, the cost of this study can be obtained as follows:

C ( m 1 i ,  m 2 j   ) = 2. N . | E | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4qamaabmaapaqaa8qacaqGTbWdamaaDaaajuaibaWdbiaa igdaa8aabaWdbiaabMgaaaqcfaOaaiilaiaabckacaqGTbWdamaaDa aajuaibaWdbiaaikdaa8aabaWdbiaabQgaaaqcfaOaaeiOaaGaayjk aiaawMcaaiabg2da9iaaikdacaGGUaGaaeOtaiaac6cadaabdaWdae aapeGaaeyraaGaay5bSlaawIa7aaaa@4B65@ (10)

In the above equation, N is the number of features of each item set. To search for a node belonging to a set item, it is enough to compare attribute values of nodes with the item set that will have cost of N and because this action should be done for source and destination group of each of the edges, double of these costs will be imposed. In D-MFCL Min algorithm, by taking into account the dependencies, the above costs will change as follows:

C ( m 1 i ,  m 2 j   ) = C d + ( 1 p ) ( 2. N . | E | ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4qamaabmaapaqaa8qacaqGTbWdamaaDaaajuaibaWdbiaa igdaa8aabaWdbiaabMgaaaqcfaOaaiilaiaabckacaqGTbWdamaaDa aajuaibaWdbiaaikdaa8aabaWdbiaabQgaaaqcfaOaaeiOaaGaayjk aiaawMcaaiabg2da9iaaboeapaWaaSbaaKqbGeaapeGaaeizaaWdae qaaKqba+qacqGHRaWkdaqadaWdaeaapeGaaGymaiabgkHiTiaabcha aiaawIcacaGLPaaadaqadaWdaeaapeGaaGOmaiaac6cacaqGobGaai Olamaaemaapaqaa8qacaqGfbaacaGLhWUaayjcSdaacaGLOaGaayzk aaaaaa@54FA@ (11)

In the above relation, C d MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4qa8aadaWgaaqcfasaa8qacaqGKbaapaqabaaaaa@38C3@ is the cost of studying the dependencies of two sets of items m 1 i MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaaIXaaapaqaa8qacaqGPbaa aaaa@39BE@ and m 2 j MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeyBa8aadaqhaaqcfasaa8qacaaIYaaapaqaa8qacaqGQbaa aaaa@39C0@ ،, and p is the possibility that dependencies on these two item sets would stop counting the edges of social networks to check for conceptual link between them. C d MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4qa8aadaWgaaqcfasaa8qacaqGKbaapaqabaaaaa@38C3@ value depends on the number of dependencies of the item sets being checked and the number of conceptual links found in the intended stage. In the algorithm D-MFCL Min, for every pair of items being checked, their dependency of participation in the conceptual links that have been found so far in the current phase is evaluated, so this cost is as follows.

C d = ( | D ( m 1 i ) | +   | D ( m 2 j ) | ) | FL t | MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaae4qa8aadaWgaaqcfasaa8qacaqGKbaapaqabaqcfa4dbiab g2da9maabmaapaqaa8qadaabdaWdaeaapeGaaeiramaabmaapaqaa8 qacaqGTbWdamaaDaaajuaibaWdbiaaigdaa8aabaWdbiaabMgaaaaa juaGcaGLOaGaayzkaaaacaGLhWUaayjcSdGaey4kaSIaaeiOamaaem aapaqaa8qacaqGebWaaeWaa8aabaWdbiaab2gapaWaa0baaKqbGeaa peGaaGOmaaWdaeaapeGaaeOAaaaaaKqbakaawIcacaGLPaaaaiaawE a7caGLiWoaaiaawIcacaGLPaaadaabdaWdaeaapeGaaeOraiaabYea paWaaWbaaKqbGeqabaWdbiaabshaaaaajuaGcaGLhWUaayjcSdaaaa@57A9@ (12)

Therefore, in the following the value of two factors of the dependency factor of set of items and conceptual links are examined.

The number of dependencies of an item set

There is no possibility to determine the exact number of dependencies of a set of items, so we will consider their maximum number. For simplicity, we assume that the number of items in stage t, in LI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeitaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D5B@ are RI cand t MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaaeOuaiaabMeapaWaa0baaKqbGeaapeGaae4yaiaabggacaqG UbGaaeizaaWdaeaapeGaaeiDaaaaaaa@3D61@ equal. According to this assumption, in continuation, this text assumes no difference between the two sets and therefore to be concise we will use the abbreviations It instead of these two sets. As already mentioned, the set of items in each stage are ordered based on the support arranged in ascending. Based on the assumption of the existence of maximum possible dependencies in the set It, the first set of items will not be dependent on any item other, the second set of items only may be dependent on the first set of items, the third dependency will maximally be dependent on two previous items, and the same way, so the maximum number of dependencies between all series of items in the set It is equal to:

| I t | ( | I t |   1 ) 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaSaaa8aabaWdbmaaemaapaqaa8qacaqGjbWdamaaCaaajuai beqaa8qacaqG0baaaaqcfaOaay5bSlaawIa7amaabmaapaqaa8qada abdaWdaeaapeGaaeysa8aadaahaaqcfasabeaapeGaaeiDaaaaaKqb akaawEa7caGLiWoacqGHsislcaqGGcGaaGymaaGaayjkaiaawMcaaa WdaeaapeGaaGOmaaaaaaa@4818@ (13)

By considering the smooth distribution of this dependency between sets of items of this collection, the maximum number of dependencies for each set of item is obtained as:

| D ( m t ) | =   | I t |   1 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaqWaa8aabaWdbiaabseadaqadaWdaeaapeGaaeyBa8aadaah aaqabKqbGeaapeGaaeiDaaaaaKqbakaawIcacaGLPaaaaiaawEa7ca GLiWoacqGH9aqpcaqGGcWaaSaaa8aabaWdbmaaemaapaqaa8qacaqG jbWdamaaCaaabeqcfasaa8qacaqG0baaaaqcfaOaay5bSlaawIa7ai abgkHiTiaabckacaaIXaaapaqaa8qacaaIYaaaaaaa@4B2C@ (14)

It should be noted that the maximum number of items set in a stage can be obtained from the following recurrence relation:

| I M | = T ( N , M ) = { i = 1 N K i M = 1 i = 1 N K i N = M i = M N K i . T ( i 1 , M 1 ) e l s e MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOabaeqabaqcfaieaa aaaaaaa8qacaGG8bGaamysa8aadaahaaqabKqbGeaapeGaamytaaaa juaGcaGG8bGaeyypa0JaamivaiaacIcacaWGobGaaiilaiaad2eaca GGPaaabaGaeyypa0ZaaiqaaeaafaqabeWacaaabaWaaabCaeaacaWG lbWaaSbaaKqbGeaacaWGPbaabeaaaKqbagaacaWGPbGaeyypa0JaaG ymaaqaaiaad6eaaiabggHiLdaabaGaamytaiabg2da9iaaigdaaeaa daqeWbqaaiaadUeadaWgaaqcfasaaiaadMgaaeqaaaqcfayaaiaadM gacqGH9aqpcaaIXaaabaGaamOtaaGaey4dIunaaeaacaWGobGaeyyp a0JaamytaaqaamaaqahabaGaam4samaaBaaajuaibaGaamyAaaqaba qcfaOaaiOlaiaadsfadaqadaqaaiaadMgacqGHsislcaaIXaGaaiil aiaad2eacqGHsislcaaIXaaacaGLOaGaayzkaaaabaGaamyAaiabg2 da9iaad2eaaeaacaWGobaacqGHris5aaqaaiaadwgacaWGSbGaam4C aiaadwgaaaaacaGL7baaaaaa@6DA7@ (15)

In the above relation Ki shows the number of possible values for i-th feature. For example, about the characteristics of gender, the number of possible values is equal to 2.

The number of conceptual links found

The second factor affecting the cost of checking dependencies is the number of conceptual links found in a stage ( | FL t | ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbaoaabmaaba WaaqWaaeaaqaaaaaaaaaWdbiaabAeacaqGmbWdamaaCaaabeqcfasa a8qacaqG0baaaaqcfa4daiaawEa7caGLiWoaaiaawIcacaGLPaaaaa a@3EDF@ . Given the steady growth of the number of conceptual link, the maximum number of conceptual links assessed per pair set of items is equal to:

( 2 | I t | | I t | | I t | 2 ) 2 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaSaaaeaadaqadaqaaiaaikdadaabdaqaaiablQIivjaadMea daahaaqabKqbGeaacaWG0baaaaqcfaOaay5bSlaawIa7amaaemaaba GaamysamaaCaaabeqcfasaaiaadshaaaaajuaGcaGLhWUaayjcSdGa eyOeI0YaaqWaaeaacaWGjbWaaWbaaeqajuaibaGaamiDaaaaaKqbak aawEa7caGLiWoadaahaaqabKqbGeaacaaIYaaaaaqcfaOaayjkaiaa wMcaamaaCaaajuaibeqaaiaaikdaaaaajuaGbaGaaGOmaaaaaaa@5052@ (16)

According to the above values, the number of conceptual links that are checked for every pair of set items on average is equal to

2 | I t | | I t | | I t | 2 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaSaaaeaacaaIYaWaaqWaaeaacqWIQisvcaWGjbWaaWbaaeqa juaibaGaamiDaaaaaKqbakaawEa7caGLiWoadaabdaqaaiaadMeada ahaaqabKqbGeaacaWG0baaaaqcfaOaay5bSlaawIa7aiabgkHiTmaa emaabaGaamysamaaCaaabeqcfasaaiaadshaaaaajuaGcaGLhWUaay jcSdWaaWbaaeqajuaibaGaaGOmaaaaaKqbagaacaaIYaaaaaaa@4D2F@ (17)

According to relations (14) and (17), the overall amount of Cd is obtained as follows:

C d 2 | I t | | I t | 2 | I t | 3 2 MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaam4qamaaBaaajuaibaGaamizaaqcfayabaWaaSaaaeaacaaI YaWaaqWaaeaacqWIQisvcaWGjbWaaWbaaeqajuaibaGaamiDaaaaaK qbakaawEa7caGLiWoadaabdaqaaiaadMeadaahaaqabKqbGeaacaWG 0baaaaqcfaOaay5bSlaawIa7amaaCaaabeqcfasaaiaaikdaaaqcfa OaeyOeI0YaaqWaaeaacaWGjbWaaWbaaeqajuaibaGaamiDaaaaaKqb akaawEa7caGLiWoadaahaaqabKqbGeaacaaIZaaaaaqcfayaaiaaik daaaaaaa@5158@ (18)

Now, with regard to determining the amount of the dependencies cost, we will analyze the behavior of the proposed algorithm. The worst situation in the proposed algorithm occurs, when despite the large amount of dependencies, there is no pruning. The amount of pruning depends on the number of conceptual links found, as the number of conceptual link found is low, an increase in dependency, will be more likely in pruning the set of items. On the other hand, the number of FCLs depends on the amount of β, as the value of this parameter is less more FCLs will be found. Therefore, we expect that the proposed algorithm when β is a small amount show a weaker performance.

Tests and results

In this section, the results of the assessment of the proposed method (D-MFCL Min) are provided. H-MFCL Min method is considered as the method used for comparison. First, in the sub section, data set used is introduced, and then we will examine the results.

A the dataset used

Most existing dataset in the field of social networking only have network connections information. Since the approach of FCL connections are of the methods that by simultaneous use of connections data and the attribute of nodes traits attempts to extract knowledge, we need a dataset that in addition to the links information has node attributes as well. In addition, since in this method, the attributes of the nodes must be homogeneous, using a dataset that relates to several entities is not possible. Due to these limitations, despite the existence of large number of dataset related to social networks, the range of usable dataset is very limited. In this study, dataset of a social network called Pokec was used.23 Pokec is the most popular online social network in Slovakia. This dataset includes altered profiles of the users of this social network with links of friendship between them. It should be noted that in social network Pokec friendship relationship are directed. User's profile includes 59 fields that only eight fields are mandatory. In the Table 1 below, the features of these eight fields are shown. * Frequently areas in Slovakia but some areas included in the Czech and German as well. After reviewing and doing the refinement necessary, of the eight fields, five fields were considered as user features that include public or private profile, gender, region, year of registration and age. Age group means the result of dividing the age declared over 10 that 10 different categories will be achieved ( a g e 10 ) MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeWaaeWaaeaadaWcaaqaaiaadggacaWGNbGaamyzaaqaaiaaigda caaWaaaaaGaayjkaiaawMcaaaaa@3C63@ . Members until 2012 (the time of data extraction) are 1,632,803 and the number of connections is equal to 30,622,564. Due to the large number of nodes and connections, and the incompleteness of much of other fields in this study, only the nodes that have value more than 80 percent of profile were considered, the number of which is 31211 nodes and the number of connections between these nodes is equal to 261,945.

Field Title

Type of Field

Domain

Description

user_id

Integer

The number of users-1

An integer that maps the user name of choice

Public

Boolean

True.. False

Profile's Being Public

Completion percentage

Integer

s[1-100]

The value of the fields

Gender

Boolean

True.. False

Sex

Region

Textual

[1-183]

User living area *

last_login

Date time

1999 to 2012

Last logon of the user

Registration

Date time

1999 to 2012

Time of User's Registration to the System

Age

Integer

[1-100]

User age

Table 1 Mandatory fields feature in Social Network

A tests and results

As mentioned, in order to evaluate the performance of the proposed method, its results were compared with the results of H-MFCL Min algorithm. It should be noted that the output of both methods is similar in the sense that, there are no differences in the extracted FCL in the two methods. In the following figure, conceptual view extracted from Pokec social networking is shown. β MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeqOSdigaaa@383A@ Value for this extraction is selected as 0.25. An interesting feature visible in Figure 2 is the two-way communications between sets of items. In fact, if there are conceptual links between the sets of items A to B there is a conceptual link between B to A set of items. As already mentioned, the mentioned social network is directional, which means that friendship is one-sided. However, with the resulting output, it is revealed that the users of this social network have bilateral friendship relations. By reducing the value of the parameter β MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeqOSdigaaa@383A@ , greater number of items set and FCLs are obtained and the conceptual view obtained becomes larger, so we will stick only to this amount.

Figure 2 The conceptual view extracted from Pokec social network (Beta = 0.25).

Although the proposed algorithm (D-MFCL Min) and H-MFCL Min algorithm extract similar conceptual views from the social network, the time taken to do this is in two algorithms is slightly different. In Figure 3, the period of implementation of each of these two algorithms to extract MFCL from Pokec social network is shown at different values of parameter β MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeqOSdigaaa@383A@ . It should be noted, parameter α value is considered as equal to zero. Both algorithms have been implemented 10 times and the achieved average execution time is considered as the time of their implementation. As can be seen, at high levels of β MathType@MTEF@5@5@+= feaagKart1ev2aaatCvAUfeBSjuyZL2yd9gzLbvyNv2CaerbuLwBLn hiov2DGi1BTfMBaeXatLxBI9gBaerbd9wDYLwzYbItLDharqqtubsr 4rNCHbGeaGqiVCI8FfYJH8YrFfeuY=Hhbbf9v8qqaqFr0xc9pk0xbb a9q8WqFfeaY=biLkVcLq=JHqpepeea0=as0Fb9pgeaYRXxe9vr0=vr 0=vqpWqaaeaabiGaciaacaqabeaadaqaaqaaaOqaaKqbacbaaaaaaa aapeGaeqOSdigaaa@383A@ of both algorithms, there is almost the same performance but with a lower value of this parameter, the difference in the time of two algorithms becomes greater. This difference reviews the proposed methodology to determine the dependencies between items of the sets. It is noteworthy that, unfortunately, the dependency between items dataset are set to zero, so in fact no pruning is done due to the dependency in this trial. However, if there is dependency between sets of items, the possibility of pruning the search space and thus accelerating the extraction of FCLs will be possible link exists no superset concept will result, and thus the difference in performance of the two algorithms will be a greater increase.

Figure 3 The implementation time of the two algorithms, D-MFCL Min and H-MFCL Min in different amounts of Beta.

Conclusions and future works

Widespread use of social networks has caused very high volume of information and knowledge extraction has become one of the areas of interest for researchers. FCLs are one of the approaches to extract knowledge from these networks that in addition to the data related to communications emphasizes the data related to the existence of these networks. In this paper, by introducing and using the concept of dependence, a new algorithm is presented to accelerate the extraction of FCLs. The existence of dependencies between data causes a pruning of portion of the search space and thus accelerates the process of extracting conceptual links. Due to the lack of dependency in the dataset used, this acceleration was not observed, but the test results showed that despite the lack of dependencies, the proposed algorithm compared with H–MFCL Min algorithm has almost the same performance. In this paper, the concept of dependency was used as definitive, while by extending this concept as approximate dependencies, further pruning of the search space was done that it will be done in future work.

Acknowledgments

None.

Conflict of interest

Author declares that there is none of the conflicts.

References

  1. Aggarwal CC. An introduction to social network data analytics. In: Social Network Data Analytics. USA: Springer; 2011. p. 1–15.
  2. West DB. Introduction to graph theory. 2nd USA: Prentice Hall; 2000.
  3. Tian Y, Hankins RA, Patel JM. Efficient aggregation for graph summarization. Proceedings of the ACM SIGMOD international conference on management of data. 2008. p. 567–580.
  4. Zhou Y, Cheng H, Yu JX. Graph clustering based on structural/attribute similarities. VLDB Endow. 2009;2(1):718–729.
  5. Stattner E, Collard M. Towards a hybrid algorithm for extracting maximal frequent conceptual links in social networks. In: IEEE international conference on research challenges in information science. 2013. p. 1–8.
  6. Stattner E, Collard M. Social–based conceptual links: Conceptual analysis applied to social networks. International Conference on Advances in Social Networks Analysis and Mining. 2012.
  7. Yang G. The complexity of mining maximal frequent itemsets and maximal frequent patterns. In: KDD 04: Proceedings of the tenth ACM SIGKDD International Conference on Knowledge Discovery and Data mining. USA: ACM Press; 2004. p. 344–353.
  8. Stattner E, Collard M. Descriptive Modeling of Social Networks. Procedia Computer Science. 2015;52:226–233.
  9. Xie J, Szymanski BK. Towards linear time overlapping community detection in social networks. PAKDD. 2012;7302:25–36.
  10. Macropol K, Singh AK. Scalable discovery of best clusters on large graphs. PVLDB. 2010;3(1):693–702.
  11. Gopalan PK, Blei DM. Efficient discovery of overlapping communities in massive networks. Proc Natl Acad Sci U S A. 2013;110(36):14534–14539.
  12. Riedy J, Bader DA, Meyerhenke H. Scalable multithreaded community detection in social networks. In: Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW). IEEE 26th International. 2012. p. 1619–1628.
  13. Ovelgonne M, Geyer–Schulz A. An ensemble learning strategy for graph clustering. Graph Partitioning and Graph Clustering. 2012. p. 187–206.
  14. De Meo P, Ferrara E, Fiumara G, et al. Mixing local and global information for community detection in large networks. J Comput Syst Sci. 2014;80(1):72–87.
  15. Chen J, Saad Y. Dense sub graph extraction with application to community detection. Knowledge and Data Engineering. IEEE Transactions on. 2012;24(7):1216–1230.
  16. Jiang P, Singh M. Spici: a fast clustering algorithm for large biological networks. Bioinformatics. 2010;26(8):1105–1111.
  17. Yang J, Mcauley J, Leskovec J. Community Detection in Networks with Node Attributes: In Data Mining (ICDM). IEEE 13th International Conference. 2013. p. 1151–1156.
  18. Getoor L, Diehl CP. Link mining: a survey. SIGKDD Explor Newsl. 2005;7(2):3–12.
  19. Agrawal R, Srikant R. Fast Algorithms for Mining Association Rules in Large Databases. VLDB Conference. 1994. p. 487–499.
  20. Han J, Pei J, Yin Y, et al. Mining frequent patterns without candidate generation: A frequent–pattern tree approach. Data Mining and Knowledge Discovery. 2003;8(1):53–87.
  21. Stattner E, Collard M. MAX–FL Min: An Approach for Mining Maximal Frequent Links and Generating Semantical Structures from Social Networks. 23rd International Conference, DEXA. 2012. p. 468–483.
  22. Stattner E, Collard M. FLMin: An Approach for Mining Frequent Links in Social Networks. 4th International Conference. 2012. p. 449–463.
  23. Takac L, Zabovsky M. Data Analysis in Public Social Networks. International Scientific Conference & International Workshop Present Day Trends of Innovations. 2012. p. 1–6.
Creative Commons Attribution License

©2018 Tabatabaee. This is an open access article distributed under the terms of the, which permits unrestricted use, distribution, and build upon your work non-commercially.