Computational Intelligence - August 2017 - 49

shopping data set3 from Tianchi Data Lab
for evaluating the effectiveness of the proposed method. This dataset includes two
parts: customer's historical behavior dataset containing 1,103,702 users' historical
records in one year and a human-labeled
goods match ground truth dataset containing 23,105 records. We extracted all
users' history records as the basic transaction database (denoted as T ). Note that
some of the items in labeled ground truth
sets do not appear in T. Thus we
removed the items from the initial ground
truth data that do not appear in T and
finally obtained 4,009 records as the
goods match ground truth dataset. Each
customer's purchased goods can be
viewed as a transaction. For a customer
who wants to buy a good 'G', we first
collect all records in T containing 'G' as a
transaction database. Based on this transaction database, we aim to recommend a set
of interesting goods to the customer.
Print area recommendation in
SmartPrint. Assume that we have the
log transaction database recording how
previous users clipped the Web pages
from a Web site, where each transaction
refers to a set of content areas (or clips)
selected on a Web page. Given a Web
page from the same Web site, we aim to
recommend the informative print areas
in SmartPrint for this Web page. Let I
be the complete set of distinct clips in
the database. For a given Web page in
SmartPrint, we can get a set S 3 I of
clips which are included in this Web
page. Thus, the task is to select a subset
of S for the print area recommendation.
We adopted the ground truth data of
selected print areas on the 2,000 Web
pages from the 100 major print-worthy
Web sites used in [4] for evaluating the
effectiveness of our proposed method.
In addition, in order to show the
efficiency of the proposed algorithm, we
adopt the IBM synthetic data generator
for generating large data sets with different characteristics [35].
2) Comparison Methods
In the following, we show that the
-p roposed algorithm MOPM is both
3

https://tianchi.aliyun.com/datalab/dataSet.htm?id=13

effective and efficient for solving the
problem of task-oriented pattern mining. To this end, we compare MOPM
with several state-of-the-art algorithms
and its variants.
1)	MFI: This baseline method is based
on maximal frequent itemset mining [21] (MFI for short) over the
transaction database. To be specific,
we first obtain all the maximal frequent itemsets, and then among
them select the one with the largest
number of items for pattern recommendation. This baseline needs users
to specify a prior parameter min_sup.
2)	DOFIA: DOFIA [4] is currently the
best algorithm for the problem of
task-oriented pattern mining over
the transaction database shown in
Equation (1). This baseline is needed
to specify the prior parameters min_
sup, min_occ and m for users.
3)	SGA: We extended a single genetic
algorithm [36] (named SGA) to solve
the problem shown in Equation (1).
The SGA was initially developed for
solving continuous optimization
benchmark test problems. Note that
SGA still needs to specify the prior
parameter m for users.
4)	MOPM (Random): In order to
show the effectiveness of the proposed initialization strategy used in
MOPM, we also compare MOPM
with a variant of MOPM, MOPM
(Random), where all components
keep the same as MOPM except for
the population initialization by random strategy.
5)	MOPM (-Area): In order to show
the effectiveness of the proposed
measure Area, we also compare
MOPM with a variant of MOPM,
MOPM (-Area). MOPM (-Area)
means that MOPM without the metric area, i.e., using only two objectives
support and occupancy.
Note that MOPM does not need to
specify the prior parameters min_sup,
min_occ, m for users. All algorithms were
implemented with C++ language and
the experiments were performed using
Red Hat on a server with 8 ) Intel(R)
E5620 @2.40GHz and 24GB of main
memory. For MOPM, we adopt the rec-

ommended parameter values used in
NSGA-II [6] as follows. The crossover
probability p c is set to 1.0 and the
mutation probability p m is set to 1 I
( I denotes the numbers of items). The
population size popSize is set to
^ I /50 + 1 h # 50. The algor ithm
stops when the current population
h a s more than 90% individuals
which are unchanged in the successive
5 -generations.
3) Evaluation Metrics
For the application of goods match recommendation, we adopt leave-one-out
cross validation to evaluate the recommendation performance. In other words,
we iteratively select one record from the
goods match ground truth dataset as the
query and select the first item f in this
query as the preference of the user, and
the records containing f in historical
behavior dataset of customers are used
to generate a transaction database for
recommendation. Then, we can average
these performance values over the 4,009
records to get the average performance.
Similarly, for the application of print
area recommendation, we iteratively
select one page as the query and the log
data on the left Web pages from the
same Web site are used to generate the
transaction database for recommendation. The recommended pattern refers
to a set of print areas on the given Web
page. Then, we can get the average
-performance by averaging these performance values over 2,000 Webpages.
For the evaluation metrics, based on
the recommended pattern and the
ground truth query, we can calculate the
precision Pre, recall Rec and F1 score:
M (R, G)
,
M (R)
M (G, R)
,
Rec =

M (G)
F1 = 2 # Pre # Rec ,
Pre + Rec
Pre =

	

(6)

where M ^R, G h is the number of
c-ommon items between recommended pattern R and ground truth pattern G and M (R) is the number of
items in R.

AUGUST 2017 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

49



Table of Contents for the Digital Edition of Computational Intelligence - August 2017

Computational Intelligence - August 2017 - Cover1
Computational Intelligence - August 2017 - Cover2
Computational Intelligence - August 2017 - 1
Computational Intelligence - August 2017 - 2
Computational Intelligence - August 2017 - 3
Computational Intelligence - August 2017 - 4
Computational Intelligence - August 2017 - 5
Computational Intelligence - August 2017 - 6
Computational Intelligence - August 2017 - 7
Computational Intelligence - August 2017 - 8
Computational Intelligence - August 2017 - 9
Computational Intelligence - August 2017 - 10
Computational Intelligence - August 2017 - 11
Computational Intelligence - August 2017 - 12
Computational Intelligence - August 2017 - 13
Computational Intelligence - August 2017 - 14
Computational Intelligence - August 2017 - 15
Computational Intelligence - August 2017 - 16
Computational Intelligence - August 2017 - 17
Computational Intelligence - August 2017 - 18
Computational Intelligence - August 2017 - 19
Computational Intelligence - August 2017 - 20
Computational Intelligence - August 2017 - 21
Computational Intelligence - August 2017 - 22
Computational Intelligence - August 2017 - 23
Computational Intelligence - August 2017 - 24
Computational Intelligence - August 2017 - 25
Computational Intelligence - August 2017 - 26
Computational Intelligence - August 2017 - 27
Computational Intelligence - August 2017 - 28
Computational Intelligence - August 2017 - 29
Computational Intelligence - August 2017 - 30
Computational Intelligence - August 2017 - 31
Computational Intelligence - August 2017 - 32
Computational Intelligence - August 2017 - 33
Computational Intelligence - August 2017 - 34
Computational Intelligence - August 2017 - 35
Computational Intelligence - August 2017 - 36
Computational Intelligence - August 2017 - 37
Computational Intelligence - August 2017 - 38
Computational Intelligence - August 2017 - 39
Computational Intelligence - August 2017 - 40
Computational Intelligence - August 2017 - 41
Computational Intelligence - August 2017 - 42
Computational Intelligence - August 2017 - 43
Computational Intelligence - August 2017 - 44
Computational Intelligence - August 2017 - 45
Computational Intelligence - August 2017 - 46
Computational Intelligence - August 2017 - 47
Computational Intelligence - August 2017 - 48
Computational Intelligence - August 2017 - 49
Computational Intelligence - August 2017 - 50
Computational Intelligence - August 2017 - 51
Computational Intelligence - August 2017 - 52
Computational Intelligence - August 2017 - 53
Computational Intelligence - August 2017 - 54
Computational Intelligence - August 2017 - 55
Computational Intelligence - August 2017 - 56
Computational Intelligence - August 2017 - 57
Computational Intelligence - August 2017 - 58
Computational Intelligence - August 2017 - 59
Computational Intelligence - August 2017 - 60
Computational Intelligence - August 2017 - 61
Computational Intelligence - August 2017 - 62
Computational Intelligence - August 2017 - 63
Computational Intelligence - August 2017 - 64
Computational Intelligence - August 2017 - 65
Computational Intelligence - August 2017 - 66
Computational Intelligence - August 2017 - 67
Computational Intelligence - August 2017 - 68
Computational Intelligence - August 2017 - 69
Computational Intelligence - August 2017 - 70
Computational Intelligence - August 2017 - 71
Computational Intelligence - August 2017 - 72
Computational Intelligence - August 2017 - 73
Computational Intelligence - August 2017 - 74
Computational Intelligence - August 2017 - 75
Computational Intelligence - August 2017 - 76
Computational Intelligence - August 2017 - Cover3
Computational Intelligence - August 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com