SlideShare a Scribd company logo
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
17
Extracting frequent pattern from Human
Interaction in Meeting using Tree based Approach
Prashant Puri and Kirti Korabu
Department of Information Technology, Sinhgad College of Engineering, Pune,India
Abstract
Human Interaction in meetings is one of the famous fields of social dynamics. Meeting is integral part of
every organization. In this, meeting outcome is extracted using tree based approach. Meetings contents or
conversation are available in forms such as audio, video and text. In this, pattern of meeting is extracted
from text document. An interaction is represented in the form of tree. Meeting Output is generated using
data mining technique. Firstly the contents are filtered, extracted and steamed. Secondly classification is
done into six categories propose, comment, acknowledgement, request Info, ask Opinion, pos Opinion, and
neg Opinion. Next the interaction tree is constructed which represent the interaction flow of meeting.
Finally the meeting output is generated from interaction tree using frequent pattern mining algorithm. The
behavior of person is determined which includes a person who proposed a lot of ideas, a person with
positive or negative attitude.
Keywords
Social Dynamics, Stop words, Frequency based Classification, Frequent Pattern Mining, Human
Interaction In Meetings
1.Introduction
Group social dynamics is one of the important areas in the field of research. Human interaction in
meeting is one of the important characteristics of group dynamics. Group social dynamics is
important for understanding the nature of meeting or understanding how conclusion was reached
Meetings are important for purpose of information exchange, problem solving, knowledge
sharing and creation. Meetings content a large amount of social and communication information.
Study of meetings explores the social behavior of participants in meetings which help us to
understand the conclusion of meetings, whether all members agreed on outcome, who did not
give opinion, who spoke little or lot. Extracted information from meetings is useful to predict the
human interaction which is useful for meetings participants, meeting organizer, meeting sponsor.
In this paper, techniques for extracting information from meeting to predict the human interaction
are discussed. Meeting contents are available in three forms audio, video and text which is used to
predict the human interactions. To predict the human interaction feature extraction and
classification of extracted feature is done. Feature extraction, classification, construction of
interaction tree and determine frequent pattern for meeting are discussed in this paper on basis of
text data.
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
18
The remainder of this paper is organized as follows. Section II discusses related work. Section III
discussed the implementation of system. Section IV explores some applications. Finally, we
conclude the paper in Section V.
2.Related Work
Various researches have been conducted on discovering knowledge about human actions by
applying the concept of data mining. Casas-Garriga [3] proposed algorithms to mine unbounded
episodes from a sequence of events. The work is used to extract frequent episodes, i.e.,
collections of events occurring frequently together. Morita [5] proposed a pattern mining method
for the interpretation of human interactions in a poster exhibition. It extracts simultaneously
occurring patterns of primitive actions such as gaze and speech.I.McCowan[2] proposed the
technique to detect the group level interest in meetings.Zhiwen Yu[6] adopted a multimodal
method to infer human interaction based on a variety of features, such as speech tone, speaking
time, interaction occasion, gestures, attention and information about the previous session. Four
kinds of classification models, Support Vector Machine (SVM) uses LIBSVM, Bayesian Net,
Naive Bayes, and Decision Trees [9] are selected to infer the type of each interaction. The results
show that SVM is most appropriate and achieves a recognition rate of approximately 80 percent
[1]. Please refer to the earlier paper [7] for details about the human interaction recognition.
Zhiwen Yu proposed a tree base mining method that discovers patterns of human interaction in
meetings [8]. Garg[4] proposed an approach to recognize participant roles in meetings.
3.Implementations of System
In this system, the meeting output is predicted form conversation of the participants. The
conversations of participants are input to the system as text file. To predict the output flow of the
meeting is identify and from the flow interaction tree is constructed. A frequent pattern mining
algorithm is used to extract the output of the meeting. Also the meeting behavior and person
behavior is determined from the system. To extract the content of meeting following are the
measure steps
1. Extraction
2. Classification
3. Designing the Interaction tree.
4. Determining the meeting Output.
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
19
3.1EXTRACTION
In this step, contents of the meeting are filter to remove the stop words from statements in text
file that contains the conversation. After removal of stop words, the steaming is performed to
classify the words or phrase to the particular category.
a.Stop Word :- These are the words that some users leave out of an statement. By dropping stop
words from an statement, the index size can typically be reduced by as much as 30% for a word
level index. A stop word typically is a word which doesn't contain much "informational"content.
For example, some example stop words are: "and", "the", "of", "it", "as", etc.
Eg : Statement before removing stop word
I think we should stage a concert to raise money.
After Extarction: * think * * stage * concert * raise money.
Here I, we, should,a and to is removed form statement.
b.Stemming :- A stemming is a process of linguistic normalization, in which the variant forms of
a word are reduced to a common form, for example,
Connection
Connections
Connective ---> connect
Connected
Document
Extraction
Classification
InteractionTree
MeetingOutput
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
20
3.2CLASSIFICATION
Classification Input to classification is filtered words from extraction. The extracted words from
setp1 are classified into following categories propose, comment, Query, ask Opinion, pos
Opinion, neg Opinion and acknowledgement. Classification is done using frequency based
classification algorithm. Under each category there is list of word if word exits in a statement, the
given statement is classified to a category to which that word belong.
e.g1: Concerts take too long to organize.
As “too long” is negative phrase this statement will come under negative category.
e.g2: Yes tweets are very famous.
As “Yes” is positive word this statement will come under positive category.
3.3 DESIGNING THE INTERACTION TREE
In this, flow of conversation is determined. The flow is identified once the interaction tree is
constructed using the output of the classification step. This step will give the exact flow of
interaction in the meeting and attitude of participants in the meeting. Tree will be constructed
according to the following process.
1st
statement Elena: I think we should stage a concert to raise money. As it is a first
statement, it is proposed statement. Here Pro (E) means Propose by Elena
2nd
statement Lucas@Elena: Concerts take too long to organize. Let us have a bakesale. Here
Lucas@Elena means lucas reply to elena. As it is again a proposed statement and reply to first
this statement will child of first. So the tree will be as follow
3rd
statement Barbara@Elena: My cousin is in a band called The Tweets that might play for
free. Here Barbara response to Elena. As it is a positive response to 1st
statement, it will be other
child to first.
Pro
(E)
Pro
(E)
Pro
(L)
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
21
3.4 MEETING OUTPUT-
The interaction tree is used to generate the meeting output. A frequent pattern mining algorithm is
used to extract the frequent pattern from a tree generated from meeting interaction. A pattern is
frequent trees or subtrees in the tree database. Following is the algorithm to find frequent tree and
subtree.
Algorithm 1. fitm (TD, α) (Frequent interaction tree pattern mining)
Input: a tree database TD and a support threshold α
Output: all frequent tree patterns with respect to α
Procedure:
(1) scan database TD, generate its full set of isomorphic trees, ITD
(2) scan database ITD, count the number of occurrences for each tree t
(3) calculate the support of each tree
(4) select the trees whose supports are larger than α and detect isomorphic trees; if m trees are
isomorphic, select one of them and discard the others
(5) output the frequent trees
Algorithm 2. fistm (TD; α) (Frequent interaction subtree pattern mining)
Input: a tree database TD and a support threshold α
Output: all frequent subtree patterns with respect to α
Procedure:
(1) i= 0
(2) scan database TD, calculate the support of each node
(3) select the nodes whose supports are larger than α to
form F1
(4) i =i + 1
(5) for each tree ti
in Fi
, do
(6) for each node t1
in F1
, do
(7) join ti
and t1
to generate Ci+1
(8) Subtree Support Calculating (TD; ti+1
)
//calculate the support of each tree in Ci+1
(9) if there are any trees whose supports are larger than α, then select them to form Fiþ1 and
return to Step (4)
(10) else output the frequent subtrees whose supports are Larger than α
Pro
(E)
Pro
(L)
Pos
(B)
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
22
Subprocedure. Subtree Support Calculating (TD, st)
(1) count=0
(2) supp(st)= 0
(3) for each tree t € TD do
(4) create subtrees S of t with any item s € S, |s| = |st|
(5) flag false
(6) for each item s €S do
(7) generate isomorphic trees IS of s
(8) for each item is € IS do
(9) if tsc(is)= tsc(st) then
(10) count =count + 1
(11) flag = true
(12) break
(13) if flag = true then
(14) break
(15) supp(st)= count/|TD|
(16) return supp(st)
Table 1 .Notation
Notation Description
TD A dataset of interaction trees
ITD The full set of isomorphic trees to TD
T A tree
tk
A subtree with k nodes i.e k-subtree
Ck
A set of candidates with k nodes
Fk
A set of frequent k- subtrees
Α A support threshold minsup
The support of T is defined as
‫)ܶ(݌݌ݑݏ‬ =
݊‫ܶ	݂݋	ݏ݁ܿ݊݁ݎ݅ܿܿ݋	݂݋	ݎܾ݁݉ݑ‬
‫ܦܶ	݊݅	ݏ݁݁ݎݐ	݂݋	ݎܾ݁݉ݑ݊	݈ܽݐ݋ݐ‬
:
4.Applications
1. Corporate Meetings; - Meeting is integral part of every organization To analyze the
meeting output is of great concerned for organization. So this system can help the
company to predict the meeting output.
2. Business Analyst:- Business Analyst is always concerned for participant behavior in
meeting. The participant behavior means who talks most time or who talks for very less
time, who talks positively or negatively in meetings.
3. Civil Court:- This system is used for Lawyers to analyze the case study and accordingly
study the different cases.
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
23
4. Statistics Evaluation of Viewers for Reality Show:- Viewers give their views for the
show online for eg on facebook , tweeter so these views can be categories and result of
viewers can be evaluate.
5.Conclusion
In this report, human interaction system is proposed which extract the contents of meeting and
predicts the output of meeting. A tree based mining approach is used for discovering frequent
patterns of human interaction in meetings discussion. For filtering the meeting contents stop
words removal and steaming is applied. To classify the conversation simple classification
technique is used. Frequent pattern mining algorithm is used to extract the frequent tree and
meeting output is generated. Proposed system also predicts behavior of meeting and determined
the behavior of participants. It determines the persons who proposed a lot of ideas, the persons
who were critical, whether all members agreed on the outcome, who did not give his opinion,
who spoke a little or a lot.
ACKNOWLEDGEMENTS
It is my pleasure to get this opportunity to thank my beloved and respected Guide Prof.
K.S.Korabu who imparted his valuable knowledge specifically related to image processing. We
are grateful to department of Information Technology SCOE, Pune for providing us infrastructure
facilities and moral support.
REFERENCES
[1] G. Casas-Garriga, “Discovering Unbounded Episodes in Sequential Data,” Proc. European Conf.
Principles and Practice of Knowledge Discovery in Databases (PKDD ’03), pp. 83-94, 2003.
[2] T. Morita, Y. Hirano, Y. Sumi, S. Kajita, and K. Mase, “A Pattern Mining Method for Interpretation of
Interaction,” Proc. Int’l Conf.Multimodal Interfaces (ICMI ’05), pp. 267-273, 2005.
[3] D. Gatica-Perez, I. McCowan, D. Zhang, and S. Bengio, “Detecting Group Interest-Level in
Meetings,” Proc. IEEE Int’l Conf. Acoustic, Speech, and Signal Processing, vol. 1, pp. 489-492, 2005.
[4] Zhiwen Yu; Zhiyong Yu; Aoyama, H.; Ozeki, M.; Nakamura, Y., "Capture, recognition, and
visualization of human semantic interactions in meetings," Pervasive Computing and Communications
(PerCom), 2010 IEEE International Conference on , vol., no., pp.107,115, March 29 2010-April 2
2010.
[5] Z.W. Yu, Z.Y. Yu, Y. Ko, X. Zhou, and Y. Nakamura, “Inferring Human Interactions in Meetings: A
Multimodal Approach,” Proc. Sixth Int’l Conf. Ubiquitous Intelligence and Computing (UIC ’09),pp.
14-24, July 2009.
[6] Z.W. Yu, Z.Y. Yu, Y. Ko, X. Zhou, and Y. Nakamura, “Tree-based mining for discovering patterns of
human interaction in meetings,” Proc.IEEE Transactions on knowledge and data engineering, vol. 24,
no. 4, april 2012.
[7] Garg, N. P., Favre, S., Salamin, H., Tur, D. H., and Vinciarelli, A Role Recognition for Meeting
Participants: an Approach Based on Lexical Information and Social Network Analysis. In Proc. ACM
Multimedia 2008, 693-696.
[8] Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin,”A Practical Guide to Support Vector
Classification”
[9] Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001),
http://www.csie.ntu.edu.tw/~cjlin/libsvm
International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
24
[10]Weka (2008), http://www.cs.waikato.ac.nz/ml/weka/ .
[11]Minqing Hu and Bing Liu."Mining and Summarizing Customer Reviews."Proceedings of the ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2004), Aug 22-
25, 2004, Seattle,Washington, USA,
Author
Prashant P Puri He is student at Sinhgad College of Engineering, Pune. He received his
bachelor degree in Information Technology in 2011, and currently pursuing M.E. His
current research interest includes developing mining methods for inferring human
interactions in meetings in the domain of Data Mining.
Kirti Korabu She received her bachelor degree and Master Degree in Computer science.
She has a experience of 18.5 yrs and currently working as Associate Professor in Sinhgad
College of Engineering. She has published five international journal papers. Her current
research interest includes Data Mining, Information Retrieval, Software Engineering,
Database Management Systems, Data Structures and Algorithms, Theory of computation.
She is member of LMISTE, LMCSI.

More Related Content

PDF
Extracting frequent pattern from human
PPT
Multidimensional Patterns of Disturbance in Digital Social Networks
PDF
A fuzzy logic based on sentiment
PDF
Poster
PPT
Multi-mediated community structure in a socio-technical network
PDF
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
PDF
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...
PDF
Deep bidirectional transformers for online discussion understanding
Extracting frequent pattern from human
Multidimensional Patterns of Disturbance in Digital Social Networks
A fuzzy logic based on sentiment
Poster
Multi-mediated community structure in a socio-technical network
HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COO...
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...
Deep bidirectional transformers for online discussion understanding

What's hot (13)

PDF
NLP BASED INTERVIEW ASSESSMENT SYSTEM
PPT
KASW'08 - Invited Talk
PDF
IRJET - Automatic Text Summarization of News Articles
PDF
Generating domain specific sentiment lexicons using the Web Directory
PDF
Speaker specific feature based clustering and its applications in language in...
PDF
A Text Mining Research Based on LDA Topic Modelling
PDF
IRJET - Cyberbulling Detection Model
PDF
Supervised Approach to Extract Sentiments from Unstructured Text
PDF
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
PDF
Liberty_Borjal_BA_Dissertation_June_2011
PDF
Taxonomy and survey of community
PDF
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
NLP BASED INTERVIEW ASSESSMENT SYSTEM
KASW'08 - Invited Talk
IRJET - Automatic Text Summarization of News Articles
Generating domain specific sentiment lexicons using the Web Directory
Speaker specific feature based clustering and its applications in language in...
A Text Mining Research Based on LDA Topic Modelling
IRJET - Cyberbulling Detection Model
Supervised Approach to Extract Sentiments from Unstructured Text
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
Liberty_Borjal_BA_Dissertation_June_2011
Taxonomy and survey of community
A FILM SYNOPSIS GENRE CLASSIFIER BASED ON MAJORITY VOTE
Ad

Similar to Extracting frequent pattern from Human Interaction in Meeting using Tree based Approach (20)

PDF
Extracting frequent pattern from Human Interaction in Meeting using Tree base...
PDF
System Based Mining for Discovering Human Interaction in Meetings
PDF
Tree Based Mining for Discovering Patterns of Human Interactions in Meetings
PDF
Improved method for pattern discovery in text mining
PDF
Improved method for pattern discovery in text mining
PDF
Text Mining: (Asynchronous Sequences)
PDF
"Analysis of Different Text Classification Algorithms: An Assessment "
PDF
Using data mining methods knowledge discovery for text mining
PDF
Text Mining at Feature Level: A Review
DOC
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
PDF
Using data mining methods knowledge discovery for text mining
PDF
A novel approach for text extraction using effective pattern matching technique
PDF
A comparative study on different types of effective methods in text mining
PDF
Classification of News and Research Articles Using Text Pattern Mining
PDF
WITH SEMANTICS AND HIDDEN MARKOV MODELS TO AN ADAPTIVE LOG FILE PARSER
PDF
WITH SEMANTICS AND HIDDEN MARKOV MODELS TO AN ADAPTIVE LOG FILE PARSER
PDF
Adaptive Learning and Mining for Data Streams and Frequent Patterns
PDF
PDF
Modern association rule mining methods
PDF
A Review on Text Mining in Data Mining
Extracting frequent pattern from Human Interaction in Meeting using Tree base...
System Based Mining for Discovering Human Interaction in Meetings
Tree Based Mining for Discovering Patterns of Human Interactions in Meetings
Improved method for pattern discovery in text mining
Improved method for pattern discovery in text mining
Text Mining: (Asynchronous Sequences)
"Analysis of Different Text Classification Algorithms: An Assessment "
Using data mining methods knowledge discovery for text mining
Text Mining at Feature Level: A Review
Applying Clustering Techniques for Efficient Text Mining in Twitter Data
Using data mining methods knowledge discovery for text mining
A novel approach for text extraction using effective pattern matching technique
A comparative study on different types of effective methods in text mining
Classification of News and Research Articles Using Text Pattern Mining
WITH SEMANTICS AND HIDDEN MARKOV MODELS TO AN ADAPTIVE LOG FILE PARSER
WITH SEMANTICS AND HIDDEN MARKOV MODELS TO AN ADAPTIVE LOG FILE PARSER
Adaptive Learning and Mining for Data Streams and Frequent Patterns
Modern association rule mining methods
A Review on Text Mining in Data Mining
Ad

More from ijcax (20)

PDF
On Fuzzy Soft Multi Set And Its Application In Information Systems
PDF
Developing Product Configurator Tool Using Cads’ API With the Help of Paramet...
PDF
The Study Of Cuckoo Optimization Algorithm For Production Planning Problem
PDF
Blind Aid : Travel Aid for Blind - IJCAx
PDF
Data Mining Application in Advertisement Management of Higher Educational Ins...
PDF
Survey on Content Based Image Retrieval - ijcax
PDF
Cell Charge Approximation for Accelerating Molecular Simulation on CUDA-Enabl...
PDF
CFP : 5th International Conference on Advances in Computing & Information Tec...
PDF
Call for Papers - 6th International Conference on Natural Language Processing...
PDF
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
PDF
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
PDF
On Increasing of an Integration Rate of Bipolar Heterotransistors in the Fram...
PDF
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
PDF
On Increasing of an Integration Rate of Bipolar Heterotransistors in the Fram...
PDF
Call for Papers - 2nd International Conference on AI & Civil Engineering (AIC...
PDF
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
PDF
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
PDF
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PDF
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PDF
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
On Fuzzy Soft Multi Set And Its Application In Information Systems
Developing Product Configurator Tool Using Cads’ API With the Help of Paramet...
The Study Of Cuckoo Optimization Algorithm For Production Planning Problem
Blind Aid : Travel Aid for Blind - IJCAx
Data Mining Application in Advertisement Management of Higher Educational Ins...
Survey on Content Based Image Retrieval - ijcax
Cell Charge Approximation for Accelerating Molecular Simulation on CUDA-Enabl...
CFP : 5th International Conference on Advances in Computing & Information Tec...
Call for Papers - 6th International Conference on Natural Language Processing...
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
On Increasing of an Integration Rate of Bipolar Heterotransistors in the Fram...
On Decreasing of Mismatch-Induced Stress During Growth of Films During Magnet...
On Increasing of an Integration Rate of Bipolar Heterotransistors in the Fram...
Call for Papers - 2nd International Conference on AI & Civil Engineering (AIC...
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Lesson notes of climatology university.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
01-Introduction-to-Information-Management.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Lesson notes of climatology university.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
Supply Chain Operations Speaking Notes -ICLT Program
Pharma ospi slides which help in ospi learning
O5-L3 Freight Transport Ops (International) V1.pdf
GDM (1) (1).pptx small presentation for students
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
01-Introduction-to-Information-Management.pdf
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
2.FourierTransform-ShortQuestionswithAnswers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Module 4: Burden of Disease Tutorial Slides S2 2025
Insiders guide to clinical Medicine.pdf

Extracting frequent pattern from Human Interaction in Meeting using Tree based Approach

  • 1. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 17 Extracting frequent pattern from Human Interaction in Meeting using Tree based Approach Prashant Puri and Kirti Korabu Department of Information Technology, Sinhgad College of Engineering, Pune,India Abstract Human Interaction in meetings is one of the famous fields of social dynamics. Meeting is integral part of every organization. In this, meeting outcome is extracted using tree based approach. Meetings contents or conversation are available in forms such as audio, video and text. In this, pattern of meeting is extracted from text document. An interaction is represented in the form of tree. Meeting Output is generated using data mining technique. Firstly the contents are filtered, extracted and steamed. Secondly classification is done into six categories propose, comment, acknowledgement, request Info, ask Opinion, pos Opinion, and neg Opinion. Next the interaction tree is constructed which represent the interaction flow of meeting. Finally the meeting output is generated from interaction tree using frequent pattern mining algorithm. The behavior of person is determined which includes a person who proposed a lot of ideas, a person with positive or negative attitude. Keywords Social Dynamics, Stop words, Frequency based Classification, Frequent Pattern Mining, Human Interaction In Meetings 1.Introduction Group social dynamics is one of the important areas in the field of research. Human interaction in meeting is one of the important characteristics of group dynamics. Group social dynamics is important for understanding the nature of meeting or understanding how conclusion was reached Meetings are important for purpose of information exchange, problem solving, knowledge sharing and creation. Meetings content a large amount of social and communication information. Study of meetings explores the social behavior of participants in meetings which help us to understand the conclusion of meetings, whether all members agreed on outcome, who did not give opinion, who spoke little or lot. Extracted information from meetings is useful to predict the human interaction which is useful for meetings participants, meeting organizer, meeting sponsor. In this paper, techniques for extracting information from meeting to predict the human interaction are discussed. Meeting contents are available in three forms audio, video and text which is used to predict the human interactions. To predict the human interaction feature extraction and classification of extracted feature is done. Feature extraction, classification, construction of interaction tree and determine frequent pattern for meeting are discussed in this paper on basis of text data.
  • 2. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 18 The remainder of this paper is organized as follows. Section II discusses related work. Section III discussed the implementation of system. Section IV explores some applications. Finally, we conclude the paper in Section V. 2.Related Work Various researches have been conducted on discovering knowledge about human actions by applying the concept of data mining. Casas-Garriga [3] proposed algorithms to mine unbounded episodes from a sequence of events. The work is used to extract frequent episodes, i.e., collections of events occurring frequently together. Morita [5] proposed a pattern mining method for the interpretation of human interactions in a poster exhibition. It extracts simultaneously occurring patterns of primitive actions such as gaze and speech.I.McCowan[2] proposed the technique to detect the group level interest in meetings.Zhiwen Yu[6] adopted a multimodal method to infer human interaction based on a variety of features, such as speech tone, speaking time, interaction occasion, gestures, attention and information about the previous session. Four kinds of classification models, Support Vector Machine (SVM) uses LIBSVM, Bayesian Net, Naive Bayes, and Decision Trees [9] are selected to infer the type of each interaction. The results show that SVM is most appropriate and achieves a recognition rate of approximately 80 percent [1]. Please refer to the earlier paper [7] for details about the human interaction recognition. Zhiwen Yu proposed a tree base mining method that discovers patterns of human interaction in meetings [8]. Garg[4] proposed an approach to recognize participant roles in meetings. 3.Implementations of System In this system, the meeting output is predicted form conversation of the participants. The conversations of participants are input to the system as text file. To predict the output flow of the meeting is identify and from the flow interaction tree is constructed. A frequent pattern mining algorithm is used to extract the output of the meeting. Also the meeting behavior and person behavior is determined from the system. To extract the content of meeting following are the measure steps 1. Extraction 2. Classification 3. Designing the Interaction tree. 4. Determining the meeting Output.
  • 3. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 19 3.1EXTRACTION In this step, contents of the meeting are filter to remove the stop words from statements in text file that contains the conversation. After removal of stop words, the steaming is performed to classify the words or phrase to the particular category. a.Stop Word :- These are the words that some users leave out of an statement. By dropping stop words from an statement, the index size can typically be reduced by as much as 30% for a word level index. A stop word typically is a word which doesn't contain much "informational"content. For example, some example stop words are: "and", "the", "of", "it", "as", etc. Eg : Statement before removing stop word I think we should stage a concert to raise money. After Extarction: * think * * stage * concert * raise money. Here I, we, should,a and to is removed form statement. b.Stemming :- A stemming is a process of linguistic normalization, in which the variant forms of a word are reduced to a common form, for example, Connection Connections Connective ---> connect Connected Document Extraction Classification InteractionTree MeetingOutput
  • 4. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 20 3.2CLASSIFICATION Classification Input to classification is filtered words from extraction. The extracted words from setp1 are classified into following categories propose, comment, Query, ask Opinion, pos Opinion, neg Opinion and acknowledgement. Classification is done using frequency based classification algorithm. Under each category there is list of word if word exits in a statement, the given statement is classified to a category to which that word belong. e.g1: Concerts take too long to organize. As “too long” is negative phrase this statement will come under negative category. e.g2: Yes tweets are very famous. As “Yes” is positive word this statement will come under positive category. 3.3 DESIGNING THE INTERACTION TREE In this, flow of conversation is determined. The flow is identified once the interaction tree is constructed using the output of the classification step. This step will give the exact flow of interaction in the meeting and attitude of participants in the meeting. Tree will be constructed according to the following process. 1st statement Elena: I think we should stage a concert to raise money. As it is a first statement, it is proposed statement. Here Pro (E) means Propose by Elena 2nd statement Lucas@Elena: Concerts take too long to organize. Let us have a bakesale. Here Lucas@Elena means lucas reply to elena. As it is again a proposed statement and reply to first this statement will child of first. So the tree will be as follow 3rd statement Barbara@Elena: My cousin is in a band called The Tweets that might play for free. Here Barbara response to Elena. As it is a positive response to 1st statement, it will be other child to first. Pro (E) Pro (E) Pro (L)
  • 5. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 21 3.4 MEETING OUTPUT- The interaction tree is used to generate the meeting output. A frequent pattern mining algorithm is used to extract the frequent pattern from a tree generated from meeting interaction. A pattern is frequent trees or subtrees in the tree database. Following is the algorithm to find frequent tree and subtree. Algorithm 1. fitm (TD, α) (Frequent interaction tree pattern mining) Input: a tree database TD and a support threshold α Output: all frequent tree patterns with respect to α Procedure: (1) scan database TD, generate its full set of isomorphic trees, ITD (2) scan database ITD, count the number of occurrences for each tree t (3) calculate the support of each tree (4) select the trees whose supports are larger than α and detect isomorphic trees; if m trees are isomorphic, select one of them and discard the others (5) output the frequent trees Algorithm 2. fistm (TD; α) (Frequent interaction subtree pattern mining) Input: a tree database TD and a support threshold α Output: all frequent subtree patterns with respect to α Procedure: (1) i= 0 (2) scan database TD, calculate the support of each node (3) select the nodes whose supports are larger than α to form F1 (4) i =i + 1 (5) for each tree ti in Fi , do (6) for each node t1 in F1 , do (7) join ti and t1 to generate Ci+1 (8) Subtree Support Calculating (TD; ti+1 ) //calculate the support of each tree in Ci+1 (9) if there are any trees whose supports are larger than α, then select them to form Fiþ1 and return to Step (4) (10) else output the frequent subtrees whose supports are Larger than α Pro (E) Pro (L) Pos (B)
  • 6. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 22 Subprocedure. Subtree Support Calculating (TD, st) (1) count=0 (2) supp(st)= 0 (3) for each tree t € TD do (4) create subtrees S of t with any item s € S, |s| = |st| (5) flag false (6) for each item s €S do (7) generate isomorphic trees IS of s (8) for each item is € IS do (9) if tsc(is)= tsc(st) then (10) count =count + 1 (11) flag = true (12) break (13) if flag = true then (14) break (15) supp(st)= count/|TD| (16) return supp(st) Table 1 .Notation Notation Description TD A dataset of interaction trees ITD The full set of isomorphic trees to TD T A tree tk A subtree with k nodes i.e k-subtree Ck A set of candidates with k nodes Fk A set of frequent k- subtrees Α A support threshold minsup The support of T is defined as ‫)ܶ(݌݌ݑݏ‬ = ݊‫ܶ ݂݋ ݏ݁ܿ݊݁ݎ݅ܿܿ݋ ݂݋ ݎܾ݁݉ݑ‬ ‫ܦܶ ݊݅ ݏ݁݁ݎݐ ݂݋ ݎܾ݁݉ݑ݊ ݈ܽݐ݋ݐ‬ : 4.Applications 1. Corporate Meetings; - Meeting is integral part of every organization To analyze the meeting output is of great concerned for organization. So this system can help the company to predict the meeting output. 2. Business Analyst:- Business Analyst is always concerned for participant behavior in meeting. The participant behavior means who talks most time or who talks for very less time, who talks positively or negatively in meetings. 3. Civil Court:- This system is used for Lawyers to analyze the case study and accordingly study the different cases.
  • 7. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 23 4. Statistics Evaluation of Viewers for Reality Show:- Viewers give their views for the show online for eg on facebook , tweeter so these views can be categories and result of viewers can be evaluate. 5.Conclusion In this report, human interaction system is proposed which extract the contents of meeting and predicts the output of meeting. A tree based mining approach is used for discovering frequent patterns of human interaction in meetings discussion. For filtering the meeting contents stop words removal and steaming is applied. To classify the conversation simple classification technique is used. Frequent pattern mining algorithm is used to extract the frequent tree and meeting output is generated. Proposed system also predicts behavior of meeting and determined the behavior of participants. It determines the persons who proposed a lot of ideas, the persons who were critical, whether all members agreed on the outcome, who did not give his opinion, who spoke a little or a lot. ACKNOWLEDGEMENTS It is my pleasure to get this opportunity to thank my beloved and respected Guide Prof. K.S.Korabu who imparted his valuable knowledge specifically related to image processing. We are grateful to department of Information Technology SCOE, Pune for providing us infrastructure facilities and moral support. REFERENCES [1] G. Casas-Garriga, “Discovering Unbounded Episodes in Sequential Data,” Proc. European Conf. Principles and Practice of Knowledge Discovery in Databases (PKDD ’03), pp. 83-94, 2003. [2] T. Morita, Y. Hirano, Y. Sumi, S. Kajita, and K. Mase, “A Pattern Mining Method for Interpretation of Interaction,” Proc. Int’l Conf.Multimodal Interfaces (ICMI ’05), pp. 267-273, 2005. [3] D. Gatica-Perez, I. McCowan, D. Zhang, and S. Bengio, “Detecting Group Interest-Level in Meetings,” Proc. IEEE Int’l Conf. Acoustic, Speech, and Signal Processing, vol. 1, pp. 489-492, 2005. [4] Zhiwen Yu; Zhiyong Yu; Aoyama, H.; Ozeki, M.; Nakamura, Y., "Capture, recognition, and visualization of human semantic interactions in meetings," Pervasive Computing and Communications (PerCom), 2010 IEEE International Conference on , vol., no., pp.107,115, March 29 2010-April 2 2010. [5] Z.W. Yu, Z.Y. Yu, Y. Ko, X. Zhou, and Y. Nakamura, “Inferring Human Interactions in Meetings: A Multimodal Approach,” Proc. Sixth Int’l Conf. Ubiquitous Intelligence and Computing (UIC ’09),pp. 14-24, July 2009. [6] Z.W. Yu, Z.Y. Yu, Y. Ko, X. Zhou, and Y. Nakamura, “Tree-based mining for discovering patterns of human interaction in meetings,” Proc.IEEE Transactions on knowledge and data engineering, vol. 24, no. 4, april 2012. [7] Garg, N. P., Favre, S., Salamin, H., Tur, D. H., and Vinciarelli, A Role Recognition for Meeting Participants: an Approach Based on Lexical Information and Social Network Analysis. In Proc. ACM Multimedia 2008, 693-696. [8] Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin,”A Practical Guide to Support Vector Classification” [9] Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http://www.csie.ntu.edu.tw/~cjlin/libsvm
  • 8. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014 24 [10]Weka (2008), http://www.cs.waikato.ac.nz/ml/weka/ . [11]Minqing Hu and Bing Liu."Mining and Summarizing Customer Reviews."Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2004), Aug 22- 25, 2004, Seattle,Washington, USA, Author Prashant P Puri He is student at Sinhgad College of Engineering, Pune. He received his bachelor degree in Information Technology in 2011, and currently pursuing M.E. His current research interest includes developing mining methods for inferring human interactions in meetings in the domain of Data Mining. Kirti Korabu She received her bachelor degree and Master Degree in Computer science. She has a experience of 18.5 yrs and currently working as Associate Professor in Sinhgad College of Engineering. She has published five international journal papers. Her current research interest includes Data Mining, Information Retrieval, Software Engineering, Database Management Systems, Data Structures and Algorithms, Theory of computation. She is member of LMISTE, LMCSI.