Bridging Crisp-Set Qualitative Comparative Analysis and Association Rule Mining: A Formal and Computational Integration
Abstract
:1. Introduction
2. Literature Review
3. Materials and Methods
3.1. QCA
- Both are conducive to the outcome R;
- ;
- There exists a such that
- is conducible to outcome R for all .
- and are irreducible with .
- 1.
- If is compatible with M, then .
- 2.
- If is conducive to the outcome R, and the sample dataset M is consistent (there are no contradictions), then .
3.2. Association Rules Mining Model
- Support: The proportion of transactions in T containing both X and Y:
- Confidence: The conditional probability that a transaction containing X also contains Y:
- FP-Growth (Frequent Pattern Growth), which eliminates the need for candidate generation by using a compact tree structure to store transactions [44].
- ECLAT (Equivalence Class Clustering and bottom-up Lattice Traversal), which relies on a depth-first search strategy and intersection operations to find frequent item sets [45].
- CHARM (Closed Association Rule Mining), which focuses on discovering closed item sets to reduce redundancy [46].
- RARM (Rapid Association Rule Mining), optimized for high-dimensional datasets by leveraging specialized data structures [47].
3.3. The Equivalence Theorem
- The item set is , with items.
- The transaction database is , where the transaction is related to the csQCA case in the following way: , whereThus, each transaction can be regarded as a collection of n elements, which are either the variables or their negation , together with the presence of the outcome R or its absence r.
3.4. Reducible Association Rules
- ⊆
- Let ; then, from Remark 2, we know that all transactions have the length and that they contain each variable once, either in its affirmative () or negative () form. Therefore, since , it is ensured that either
- ⊇
- Let . If , then , and if , then . In either case, , and therefore, .
4. Examples
4.1. Internet Blockades in Election Times
4.1.1. csQCA Approach
- is the variable set. More precisely, ISP refers to “State-Owned Internet Service Providers” (ISPs). These ISPs play a crucial role, especially in contexts where the government has direct control over the telecommunications infrastructure, such as the national Internet backbone, allowing it to exert significant influence over Internet access and availability. AT is the variable “Autocracy”. It is used to categorize the political regime of a country, distinguishing between “1” if the regime is an autocracy and “0” if it is a democracy. EV refers to the occurrence of violence associated with the electoral process.
- . The outcome variable is “Internet Shutdown”.
- M is the data matrix given in Table 2.
4.1.2. Positive and Negative Association Rule Solution
- (a)
- Generate Candidate Item Sets as Subsets of the Universal Item Set I given in (13): Start with individual items (1 item set), then iteratively combine frequent item sets from the previous step to form larger candidate item sets (k item sets).
- (b)
- Prune Using Minimum Support: Eliminate candidates that do not meet a user-defined minimum support threshold (frequency in the dataset). This relies on the Apriori principle: any subset of a frequent item set must itself be frequent.
- (c)
- Repeat: Continue to generate and prune item sets of increasing size until no new frequent item sets are found.
- (d)
- Form Association Rules: From the final frequent item sets, generate rules (e.g., X → Y) and filter them using a minimum confidence threshold (how often Y appears when X is present).
4.2. Opposition to Immigration in Europe
4.2.1. csQCA Solution
- 1.
- LOWEDU * UNITY.
- 2.
- LOWEDU * NOFRIEND * THREAT.
- 3.
- LOWEDU * NOFRIEND * MAN.
- 4.
- UNITY * NOFRIEND * THREAT * MAN.
4.2.2. Positive and Negative Association Rule Solution
- 1.
- Rule 1: LOWEDU * UNITY.
- 2.
- Rule 8: LOWEDU * MAN * NOFRIEND.
- 3.
- Rule 9: LOWEDU * NOFRIEND * THREAT.
- 4.
- Rule 15: MAN * NOFRIEND * THREAT * UNITY.
4.3. Numerical Experiments
5. Discussion
- 1.
- A one-to-one relationship can be established between a csQCA problem and a particular type of positive and negative binary association rule mining problem (Theorem 1). To our knowledge, this relationship has not been explored previously.
- 2.
- All the solutions generated by the csQCA algorithm were previously captured by the association rule mining algorithm. In other words, the emerging solution set from association rules acts as a superset of the emerging solutions from the csQCA approach. In this way, association rules show greater potential to generate a broader spectrum of solutions compared to the csQCA methodology.
- 3.
- The procedure used for obtaining solutions is completely different. While csQCA follows a top-down approach, in which the most complex solutions are obtained first, and, from the Quine–McCluskey minimization, simpler irreducible solutions are found, in ARM, a bottom-up approach is used (Apriori algorithm), starting with the simplest solutions and obtaining increasingly complex solutions.However, the Apriori algorithm does not simplify reducible solutions, since the objective for which it is designed is to obtain all frequent configurations. Despite this, we showed that it is not necessary to perform a Quine–McCluskey minimization since, as shown in Theorem 2, if two interesting rules are reducible, their reduction is also an interesting rule; thus, it is enough to filter and eliminate the reducible rules.
- 4.
- QCA originated in the context of social science research, where, traditionally, datasets have been relatively small in order to facilitate the extraction of interpretable solutions. In contrast, association rule mining emerged from the need to identify patterns within large-scale databases. As a result, the algorithms developed for ARM are specifically designed to operate efficiently on large datasets. Given the relationship established between QCA and association rule mining, this connection yields the possibility of using ARM techniques to obtain QCA-like solutions even when large datasets are involved, overcoming the traditional computational limitations of QCA.
- 5.
- Furthermore, it is important to emphasize that the solutions obtained through both methodologies exhibit identical robustness metrics, with confidence in association rule mining corresponding directly to consistency in csQCA. Additionally, all identified solutions adhere to an “if–then” structure, reinforcing their logical interpretability. Finally, both approaches are fundamentally grounded in set theory.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
QCA | Qualitative Comparative Analysis. |
csQCA | Crisp-Set QCA. |
fsQCA | Fuzzy-Set QCA. |
AR | Association rule. |
ARM | Association rule mining. |
References
- Ragin, C.C. The Comparative Method: Moving Beyond Qualitative and Quantitative Strategies; University of California Press: Oakland, CA, USA, 1987. [Google Scholar]
- Pagliarin, S.; La Mendola, S.; Vis, B. The “qualitative” in qualitative comparative analysis (QCA): Research moves, case-intimacy and face-to-face interviews. Qual. Quant. 2023, 57, 489–507. [Google Scholar] [CrossRef]
- Hanckel, B.; Petticrew, M.; Thomas, J.; Green, J. The use of Qualitative Comparative Analysis (QCA) to address causality in complex systems: A systematic review of research on public health interventions. BMC Public Health 2021, 21, 877. [Google Scholar] [CrossRef] [PubMed]
- Agrawal, R.; Imieliński, T.; Swami, A. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 25–28 May 1993; Association for Computing Machinery: New York, NY, USA, 1993. SIGMOD ’93. pp. 207–216. [Google Scholar] [CrossRef]
- Schneider, C.Q.; Wagemann, C. Set-Theoretic Methods for the Social Sciences: A Guide to Qualitative Comparative Analysis; Strategies for Social Inquiry; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar] [CrossRef]
- Swiatczak, M.D. Different algorithms, different models. Qual. Quant. 2022, 56, 1913–1937. [Google Scholar] [CrossRef]
- Ragin, C.C.; Sonnett, J. Between Complexity and Parsimony: Limited Diversity, Counterfactual Cases, and Comparative Analysis. In Vergleichen in der Politikwissenschaft; VS Verlag für Sozialwissenschaften: Wiesbaden, Germany, 2005; pp. 180–197. [Google Scholar] [CrossRef]
- Duşa, A. QCA with R. A Comprehensive Resource; Springer International Publishing: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
- Ragin, C.; Rihoux, B. Qualitative comparative analysis (CQA): State of the art and prospects. Qual. Multi-Method Res. 2004, 2, 3–13. [Google Scholar] [CrossRef]
- De Cock, M.; Cornelis, C.; Kerre, E. Elicitation of fuzzy association rules from positive and negative examples. Fuzzy Sets Syst. 2005, 149, 73–85. [Google Scholar] [CrossRef]
- Muyeba, M.; Khan, M.S.; Coenen, F. A Framework for Mining Fuzzy Association Rules from Composite Items. In Proceedings of the New Frontiers in Applied Data Mining, Bangkok, Thailand, 27–30 April 2010; Chawla, S., Washio, T., Minato, S.i., Tsumoto, S., Onoda, T., Yamada, S., Inokuchi, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 62–74. [Google Scholar]
- Korhonen-Kurki, K.; Jenniver Sehring, M.B.; Gregorio, M.D. Enabling factors for establishing REDD+ in a context of weak governance. Clim. Policy 2014, 14, 167–186. [Google Scholar] [CrossRef]
- Aversa, P.; Furnari, S.; Haefliger, S. Business model configurations and performance: A qualitative comparative analysis in Formula One racing, 2005–2013. Ind. Corp. Change 2015, 24, 655–676. [Google Scholar] [CrossRef]
- Kumar, S.; Sahoo, S.; Lim, W.M.; Kraus, S.; Bamel, U. Fuzzy-set qualitative comparative analysis (fsQCA) in business and management research: A contemporary overview. Technol. Forecast. Soc. Change 2022, 178, 121599. [Google Scholar] [CrossRef]
- Mangalampalli, A.; Pudi, V. Fuzzy association rule mining algorithm for fast and efficient performance on very large datasets. In Proceedings of the 2009 IEEE International Conference on Fuzzy Systems, Jeju Island, Republic of Korea, 20–24 August 2009; pp. 1163–1168. [Google Scholar] [CrossRef]
- Ho, G.; Ip, W.; Wu, C.; Tse, Y. Using a fuzzy association rule mining approach to identify the financial data association. Expert Syst. Appl. 2012, 39, 9054–9063. [Google Scholar] [CrossRef]
- Chien, B.C.; Cheng, M.C. A color image segmentation approach based on fuzzy similarity measure. In Proceedings of the 2002 IEEE World Congress on Computational Intelligence, 2002 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE’02. Proceedings (Cat. No.02CH37291), Honolulu, HI, USA, 12–17 May 2002; Volume 1, pp. 449–454. [Google Scholar] [CrossRef]
- Tan, P.; Steinbach, M.; Kumar, V. Introduction to Data Mining; Always Learning, Pearson: London, UK, 2014. [Google Scholar]
- Ragin, C.C.; Shulman, D.; Weinberg, A.S.; Gran, B.K. Complexity, Generality, and Qualitative Comparative Analysis. Field Methods 2003, 15, 323–340. [Google Scholar] [CrossRef]
- Fiss, P.C. A Set-Theoretic Approach to Organizational Configurations. Acad. Manag. Rev. 2007, 32, 1180–1198. [Google Scholar] [CrossRef]
- Woodside, A.G. Moving beyond multiple regression analysis to algorithms: Calling for adoption of a paradigm shift from symmetric to asymmetric thinking in data analysis and crafting theory. J. Bus. Res. 2013, 66, 463–472. [Google Scholar] [CrossRef]
- Rihoux, B.; Ragin, C. Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques; SAGE Publications, Inc.: Thousand Oaks, CA, USA, 2009. [Google Scholar] [CrossRef]
- Vis, B. The Comparative Advantages of fsQCA and Regression Analysis for Moderately Large-N Analyses. Sociol. Methods Res. 2012, 40, 168–198. [Google Scholar] [CrossRef]
- Seawright, J. Qualitative Comparative Analysis vis-A-vis Regression. Stud. Comp. Int. Dev. 2005, 40, 3–26. [Google Scholar] [CrossRef]
- Buxton, E.K.; Vohra, S.; Guo, Y.; Fogleman, A.; Patel, R. Pediatric population health analysis of southern and central Illinois region: A cross sectional retrospective study using association rule mining and multiple logistic regression. Comput. Methods Programs Biomed. 2019, 178, 145–153. [Google Scholar] [CrossRef]
- Changpetch, P.; Lin, D.K. Model selection for logistic regression via association rules analysis. J. Stat. Comput. Simul. 2013, 83, 1415–1428. [Google Scholar] [CrossRef]
- Zhao, J.; Yan, C. User acceptance of information feed advertising: A hybrid method based on sem and qca. Future Internet 2020, 12, 209. [Google Scholar] [CrossRef]
- Mguirris, I.; Amdouni, H.; Gammoudi, M.M. A new validation method of fuzzy association rules based on the Structural Equation Modeling. In Proceedings of the 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, China, 15–17 August 2015; pp. 624–633. [Google Scholar] [CrossRef]
- Kim, C.; Costello, F.J.; Lee, K.C. Integrating Qualitative Comparative Analysis and Support Vector Machine Methods to Reduce Passengers’ Resistance to Biometric E-Gates for Sustainable Airport Operations. Sustainability 2019, 11, 5349. [Google Scholar] [CrossRef]
- Chiu, A.; Xu, Y. Bayesian Rule Set: A Quantitative Alternative to Qualitative Comparative Analysis. J. Politics 2023, 85, 280–295. [Google Scholar] [CrossRef]
- Álamos Concha, P.; Pattyn, V.; Rihoux, B.; Schalembier, B.; Beach, D.; Cambré, B. Conservative solutions for progress: On solution types when combining QCA with in-depth Process-Tracing. Qual. Quant. 2022, 56, 1965–1997. [Google Scholar] [CrossRef]
- Fu, M. scpQCA: Enhancing mvQCA Applications through Set-Covering-Based QCA Method. arXiv 2024. [Google Scholar] [CrossRef]
- Ljungstrom, B.M.; Denk, T.; Sarenmalm, E.K.; Axberg, U. Use of qualitative comparative analysis (QCA) in an explanatory sequential mixed methods design to explore combinations of family factors that could have an impact on the outcome of a parent training program. Child. Youth Serv. Rev. 2025, 170, 108120. [Google Scholar] [CrossRef]
- Merminod, V.; Rowe, F. Identification de configurations par la méthode Fuzzy set Qualitative Comparative Analysis: Illustration par la contribution de la technologie PLM au respect du temps de développement. SystèMes D’Inf. Manag. 2018, 23, 71–97. [Google Scholar] [CrossRef]
- Llopis-Albert, C.; Merigo, J.M.; Xu, Y. Application of Fuzzy Set/Qualitative Comparative Analysis to Public Participation Projects in Support of the EU Water Framework Directive. Water Environ. Res. 2018, 90, 73–82. [Google Scholar] [CrossRef]
- Shalahuddin, M.; Sunindyo, W.; Effendi, M.; Surendro, K. Fuzzy-set qualitative comparative analysis (fsQCA) for validating causal relationships in system dynamics models. Eng. Rep. 2024, 6, e12855. [Google Scholar] [CrossRef]
- Greckhamer, T.; Misangyi, V.F.; Fiss, P.C. The Two QCAs: From a Small-N to a Large-N Set Theoretic Approach. In Configurational Theory and Methods in Organizational Research; Research in the Sociology of Organizations; Emerald Group Publishing Limited: Leeds, UK, 2013; Volume 38, pp. 49–75. [Google Scholar] [CrossRef]
- Oana, I.E.; Schneider, C.Q.; Thomann, E. Qualitative Comparative Analysis Using R: A Beginner’s Guide; Methods for Social Inquiry, Cambridge University Press: Cambridge, UK, 2021. [Google Scholar] [CrossRef]
- McCluskey, E.J. Minimization of Boolean functions. Bell Syst. Tech. J. 1956, 35, 1417–1444. [Google Scholar] [CrossRef]
- Quine, W.V. The Problem of Simplifying Truth Functions. Am. Math. Mon. 1952, 59, 521–531. [Google Scholar] [CrossRef]
- Quine, W.V. A Way to Simplify Truth Functions. Am. Math. Mon. 1955, 62, 627–631. [Google Scholar] [CrossRef]
- Hegland, M. Algorithms for Association Rules. In Advanced Lectures on Machine Learning: Machine Learning Summer School 2002 Canberra, Australia, February 11–22, 2002 Revised Lectures; Springer: Berlin/Heidelberg, Germany, 2003; pp. 226–234. [Google Scholar] [CrossRef]
- Hegland, M. The Apriori Algorithm—A Tutorial. In Mathematics and Computation in Imaging Science and Information Processing; World Scientific Publishing Co.: Singapore, 2007; pp. 209–262. [Google Scholar] [CrossRef]
- Han, J.; Pei, J.; Yin, Y. Mining frequent patterns without candidate generation. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 16–18 May 2000; Association for Computing Machinery: New York, NY, USA, 2000. SIGMOD ’00. pp. 1–12. [Google Scholar] [CrossRef]
- Zaki, M. Scalable algorithms for association mining. IEEE Trans. Knowl. Data Eng. 2000, 12, 372–390. [Google Scholar] [CrossRef]
- Zaki, M.J.; Hsiao, C.J. CHARM: An Efficient Algorithm for Closed Itemset Mining. In Proceedings of the 2002 SIAM International Conference on Data Mining (SDM), Arlington, VA, USA, 11–13 April 2002; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 2002; pp. 457–473. [Google Scholar] [CrossRef]
- Das, A.; Ng, W.K.; Woon, Y.K. Rapid association rule mining. In Proceedings of the Tenth International Conference on Information and Knowledge Management, Atlanta, GA, USA, 5–10 November 2001; Association for Computing Machinery: New York, NY, USA, 2001. CIKM ’01. pp. 474–481. [Google Scholar] [CrossRef]
- Savasere, A.; Navathe, S.; Omiecinski, E. Mining for Strong Negative Associations in a Large Database of Customer Transactions. In Proceedings of the 2013 IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, Australia, 8–12 April 2013; IEEE Computer Society: Los Alamitos, CA, USA, 1998; p. 494. [Google Scholar] [CrossRef]
- Wu, X.; Zhang, C.; Zhang, S. Efficient Mining of Both Positive and Negative Association Rules. ACM Trans. Inf. Syst. 2004, 22, 381–405. [Google Scholar] [CrossRef]
- Khedr, A.; Ramadan, R.; Abdel-Mageid, S. Qmr: Quine-mccluskey for rule minimization in rule-based systems. Int. J. Intell. Comput. Inf. Sci. 2012, preprint. [Google Scholar]
- Freyburg, T.; Garbe, L. Authoritarian Practices in the Digital Age| Blocking the Bottleneck: Internet Shutdowns and Ownership at Election Times in Sub-Saharan Africa. Int. J. Commun. 2018, 12, 21. [Google Scholar]
- Cornelis, C.; Yan, P.; Zhang, X.; Chen, G. Mining Positive and Negative Association Rules from Large Databases. In Proceedings of the 2006 IEEE Conference on Cybernetics and Intelligent Systems, Taipei, Taiwan, 8–11 October 2006; pp. 1–6. [Google Scholar] [CrossRef]
- Emmenegger, P.; Schraff, D.; Walter, A. QCA, the Truth Table Analysis and Large-N Survey Data: The Benefits of Calibration and the Importance of Robustness Tests. In Proceedings of the 2nd International QCA Expert Workshop, Zurich, Switzerland, 5–7 November 2014. [Google Scholar]
- R Core Team. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, 2023. [Google Scholar]
- Hahsler, M.; Gruen, B.; Hornik, K. Arules—A Computational Environment for Mining Association Rules and Frequent Item Sets. J. Stat. Softw. 2005, 14, 1–25. [Google Scholar] [CrossRef]
- Hahsler, M.; Chelluboina, S.; Hornik, K.; Buchta, C. The arules R-Package Ecosystem: Analyzing Interesting Patterns from Large Transaction Datasets. J. Mach. Learn. Res. 2011, 12, 1977–1981. [Google Scholar]
- Mendel, J.M.; Korjani, M.M. Theoretical aspects of Fuzzy Set Qualitative Comparative Analysis (fsQCA). Inf. Sci. 2013, 237, 137–161. [Google Scholar] [CrossRef]
- Agrawal, A.; Knoeber, C.R. Firm Performance and Mechanisms to Control Agency Problems between Managers and Shareholders. J. Financ. Quant. Anal. 1996, 31, 377–397. [Google Scholar] [CrossRef]
- Ragin, C.C. Redesigning Social Inquiry; University of Chicago Press: Chicago, IL, USA, 2008. [Google Scholar]
Ref | Area | Sample Size | Objectives | QCA | AR | LRM | SEM | Main Findings |
---|---|---|---|---|---|---|---|---|
Ragin et al. (2003) [19] | Sociology | 41 villages in Southern India | Analyze the strengths and weaknesses of QCA and compare with logistic regression. | ✓ | ✓ | QCA emphasizes combinatorial complexity; stats focus on net effects. QCA suits moderate n and is error-sensitive. Both can complement each other. | ||
Seawright (2005) [24] | Political Science | ∼80–100 electoral processes in Latin America (1980–1996) | Compare QCA with regression analysis regarding assumptions for causal inference. | ✓ | ✓ | QCA requires assumptions at least as stringent as those used in regression analysis. | ||
Buxton et al. (2019) [25] | Biomedicine | 65.4K patients (2013–2016) | Discover unknown correlations using AR and logistic regression. | ✓ | ✓ | AR identifies patterns; LRM removes false associations, enhancing clinical relevance. | ||
Changpetch (2013) [26] | Computer Science | 432 robots | Model selection through optimal combinations of main effects and interactions using AR. | ✓ | ✓ | Combining both methods improves model fit and interpretability. | ||
Zhao and Yan (2020) [27] | Computer Science | 229 Internet users | Combine SEM and QCA to analyze individual and combined variable effects. | ✓ | ✓ | Their combination yields more compelling result interpretations. | ||
Vis (2012) [23] | Political Science | 53 governments in 18 democracies (1985–2003) | Assess pros and cons of QCA and regression models. | ✓ | ✓ | Both have strengths and drawbacks for moderate-n studies. |
N. | Case (Country, Election Year) | ISP State Ownership | Autocracy | Electoral Violence | Internet Shutdown |
---|---|---|---|---|---|
1 | Benin, 2015 | 1 | 0 | 0 | 0 |
2 | Benin, 2016 | 1 | 0 | 0 | 0 |
3 | Botswana, 2014 | 1 | 0 | 0 | 0 |
4 | Burkina Faso, 2015 | 0 | 0 | 0 | 0 |
5 | Burundi, 2015 | 1 | 1 | 1 | 1 |
6 | CAR, 2015 | 0 | 1 | 0 | 0 |
7 | CAR, 2016 | 0 | 0 | 0 | 0 |
8 | Chad, 2016 | 1 | 1 | 1 | 1 |
9 | Djibouti, 2016 | 0 | 1 | 1 | 1 |
10 | Equatorial Guinea, 2016 | 1 | 0 | 0 | 0 |
11 | Ethiopia, 2015 | 1 | 1 | 0 | 1 |
12 | Gabon, 2016 | 1 | 1 | 0 | 1 |
13 | Gambia, 2016 | 0 | 0 | 1 | 1 |
14 | Ghana, 2016 | 1 | 1 | 0 | 1 |
15 | Guinea, 2015 | 0 | 0 | 0 | 0 |
16 | Guinea-Bissau, 2014 | 1 | 0 | 0 | 0 |
17 | Ivory Coast, 2015 | 0 | 0 | 0 | 0 |
18 | Ivory Coast, 2016 | 0 | 0 | 0 | 0 |
19 | Lesotho, 2015 | 1 | 0 | 0 | 0 |
20 | Malawi, 2014 | 0 | 0 | 0 | 0 |
21 | Mauritania, 2014 | 0 | 0 | 0 | 0 |
22 | Mozambique, 2014 | 0 | 1 | 0 | 0 |
23 | Namibia, 2014 | 1 | 0 | 1 | 0 |
24 | Niger, 2016 | 1 | 0 | 0 | 0 |
25 | Nigeria, 2015 | 1 | 0 | 0 | 0 |
26 | Republic of Congo, 2016 | 1 | 0 | 0 | 0 |
27 | South Africa | 1 | 0 | 0 | 0 |
28 | Sudan, North, 2015 | 0 | 1 | 1 | 1 |
29 | Tanzania, 2015 | 1 | 0 | 1 | 0 |
30 | Togo, 2015 | 1 | 1 | 0 | 1 |
31 | Uganda, 2016 | 0 | 1 | 1 | 1 |
32 | Zambia, 2015 | 1 | 0 | 0 | 0 |
33 | Zambia, 2016 | 1 | 0 | 1 | 0 |
ISP | AT | EV | IS | Const. 1 | Cases | |
---|---|---|---|---|---|---|
0 | 0 | 1 | 1 | 1 | 1 | Gambia_16 |
0 | 1 | 1 | 1 | 3 | 1 | Djibouti_16, Sudan, North_15, Uganda_16 |
1 | 1 | 0 | 1 | 4 | 1 | Gabon_16, Ghana_16, Ethiopia_15, Togo_15 |
1 | 1 | 1 | 1 | 2 | 1 | Burundi_15, Chad_16 |
0 | 0 | 0 | 0 | 7 | 0 | Burkina Faso_15, CAR_15, Guinea_15, Ivory Coast_16, Malawi_14, Mauritania_14 |
0 | 1 | 0 | 0 | 2 | 0 | CAR_15, Mozambique_14 |
1 | 0 | 0 | 0 | 11 | 0 | Republic of Congo_16, Benin_15, Benin_16, Botswana_14, Lesotho_15, Guinea Bissau_16, Ivory Coast_16, Niger_16, Nigeria_15, Equatorial Guinea_16, Zambia_15, South Africa_14 |
1 | 0 | 1 | 0 | 3 | 0 | Namibia_14, Tanzania_15, Zambia_16 |
Solution | Consistency | Coverage | |||||
---|---|---|---|---|---|---|---|
isp * EV | 4 | 10 | 4 | 1 | 0.4 | ||
ISP * AT | 6 | 10 | 6 | 1 | 0.6 | ||
5 | 10 | 5 | 1 | 0.5 |
Item Set | Count | Association Rule | Count Ant. | Supp. | Conf. |
---|---|---|---|---|---|
{“isp”, “IS”} | 4 | isp → IS | 13 | 0.12 | 0.31 |
{“at”, “IS”} | 1 | at → IS | 22 | 0.03 | 0.05 |
{“ev”, “IS”} | 4 | ev → IS | 24 | 0.12 | 0.17 |
{“ISP”, “IS”} | 6 | ISP → IS | 20 | 0.18 | 0.30 |
{“AT”, “IS”} | 9 | AT → IS | 11 | 0.27 | 0.82 |
{“EV”, “IS”} | 6 | EV → IS | 9 | 0.18 | 0.67 |
{“isp”, “EV”, “IS”} | 4 | isp * EV → IS | 4 | 0.12 | 1.00 |
{“ISP”, “EV”, “IS”} | 2 | ISP * EV → IS | 5 | 0.06 | 0.40 |
{“ISP”, “ev”, “IS”} | 4 | ISP * EV → IS | 15 | 0.12 | 0.27 |
{“ISP”, “AT”, “IS”} | 6 | ISP * AT → IS | 6 | 0.18 | 1.00 |
{“isp”, “AT”, “IS”} | 3 | isp * AT → IS | 5 | 0.09 | 0.60 |
{“AT”, “ev”, “IS”} | 4 | AT * ev → IS | 6 | 0.12 | 0.67 |
{“AT”, “EV”, “IS”} | 5 | AT * EV → IS | 5 | 0.15 | 1.00 |
{“at”, “EV”, “IS”} | 1 | AT * ev → IS | 4 | 0.03 | 0.25 |
{“isp”, “at”, “IS”} | 1 | AT * ev → IS | 8 | 0.03 | 0.13 |
{“isp”, “at”, “EV”, “IS”} | 1 | isp * at * EV → IS | 1 | 0.03 | 1.00 |
{“isp”, “AT”, “EV”, “IS”} | 3 | isp * AT * EV → IS | 3 | 0.09 | 1.00 |
{“ISP”, “AT”, “ev”, “IS”} | 4 | ISP * AT * ev → IS | 4 | 0.12 | 1.00 |
{“ISP”, “AT”, “EV”, “IS”} | 2 | ISP * AT * EV → IS | 2 | 0.06 | 1.00 |
LOWEDU | UNITY | NOFRIEND | THREAT | MAN | OPPOSITION | n | |
---|---|---|---|---|---|---|---|
1 | 0 | 1 | 1 | 1 | 1 | 1 | 22 |
2 | 1 | 0 | 1 | 0 | 1 | 1 | 47 |
3 | 1 | 0 | 1 | 1 | 0 | 1 | 163 |
4 | 1 | 0 | 1 | 1 | 1 | 1 | 64 |
5 | 1 | 1 | 0 | 0 | 0 | 1 | 41 |
6 | 1 | 1 | 0 | 0 | 1 | 1 | 24 |
7 | 1 | 1 | 0 | 1 | 0 | 1 | 98 |
8 | 1 | 1 | 0 | 1 | 1 | 1 | 76 |
9 | 1 | 1 | 1 | 0 | 0 | 1 | 83 |
10 | 1 | 1 | 1 | 0 | 1 | 1 | 40 |
11 | 1 | 1 | 1 | 1 | 0 | 1 | 196 |
12 | 1 | 1 | 1 | 1 | 1 | 1 | 193 |
13 | 0 | 0 | 0 | 0 | 0 | 0 | 93 |
14 | 0 | 0 | 0 | 0 | 1 | 0 | 123 |
15 | 0 | 0 | 0 | 1 | 0 | 0 | 26 |
16 | 0 | 0 | 0 | 1 | 1 | 0 | 40 |
17 | 0 | 0 | 1 | 0 | 0 | 0 | 56 |
18 | 0 | 0 | 1 | 0 | 1 | 0 | 47 |
19 | 0 | 0 | 1 | 1 | 0 | 0 | 19 |
20 | 0 | 0 | 1 | 1 | 1 | 0 | 30 |
21 | 0 | 1 | 0 | 0 | 0 | 0 | 22 |
22 | 0 | 1 | 0 | 0 | 1 | 0 | 37 |
23 | 0 | 1 | 0 | 1 | 0 | 0 | 5 |
24 | 0 | 1 | 0 | 1 | 1 | 0 | 17 |
25 | 0 | 1 | 1 | 0 | 0 | 0 | 21 |
26 | 0 | 1 | 1 | 0 | 1 | 0 | 49 |
27 | 0 | 1 | 1 | 1 | 0 | 0 | 7 |
28 | 1 | 0 | 0 | 0 | 0 | 0 | 101 |
29 | 1 | 0 | 0 | 0 | 1 | 0 | 59 |
30 | 1 | 0 | 0 | 1 | 0 | 0 | 172 |
31 | 1 | 0 | 0 | 1 | 1 | 0 | 156 |
32 | 1 | 0 | 1 | 0 | 0 | 0 | 96 |
LHS → OPPOSITION | Support | Coverage | Count | |
---|---|---|---|---|
1 | LOWEDU * UNITY | 0.34 | 0.34 | 751 |
2 | LOWEDU * threat * UNITY | 0.08 | 0.08 | 188 |
3 | LOWEDU * MAN * UNITY | 0.15 | 0.15 | 333 |
4 | LOWEDU * nofriend * UNITY | 0.11 | 0.11 | 239 |
5 | LOWEDU * NOFRIEND * UNITY | 0.23 | 0.23 | 512 |
6 | LOWEDU * man * UNITY | 0.19 | 0.19 | 418 |
7 | LOWEDU * THREAT * UNITY | 0.25 | 0.25 | 563 |
8 | LOWEDU * MAN * NOFRIEND | 0.15 | 0.15 | 344 |
9 | LOWEDU * NOFRIEND * THREAT | 0.28 | 0.28 | 616 |
10 | LOWEDU * MAN * threat * UNITY | 0.03 | 0.03 | 64 |
11 | LOWEDU * nofriend * threat * UNITY | 0.03 | 0.03 | 65 |
12 | LOWEDU * NOFRIEND * threat * UNITY | 0.06 | 0.06 | 123 |
13 | LOWEDU * man * threat * UNITY | 0.06 | 0.06 | 124 |
14 | LOWEDU * MAN * nofriend * UNITY | 0.04 | 0.04 | 100 |
15 | MAN * NOFRIEND * THREAT * UNITY | 0.10 | 0.10 | 215 |
16 | LOWEDU * MAN * NOFRIEND * UNITY | 0.10 | 0.10 | 233 |
17 | LOWEDU * MAN * THREAT * UNITY | 0.12 | 0.12 | 269 |
18 | LOWEDU * man * nofriend * UNITY | 0.06 | 0.06 | 139 |
19 | LOWEDU * nofriend * THREAT * UNITY | 0.08 | 0.08 | 174 |
20 | LOWEDU * man * NOFRIEND * UNITY | 0.13 | 0.13 | 279 |
21 | LOWEDU * NOFRIEND * THREAT * UNITY | 0.17 | 0.17 | 389 |
22 | LOWEDU * man * THREAT * UNITY | 0.13 | 0.13 | 294 |
23 | LOWEDU * MAN * NOFRIEND * threat | 0.04 | 0.04 | 87 |
24 | LOWEDU * MAN * NOFRIEND * THREAT | 0.12 | 0.12 | 257 |
25 | LOWEDU * MAN * NOFRIEND * unity | 0.05 | 0.05 | 111 |
26 | LOWEDU * man * NOFRIEND * THREAT | 0.16 | 0.16 | 359 |
27 | LOWEDU * NOFRIEND * THREAT * unity | 0.10 | 0.10 | 227 |
28 | lowedu * MAN * NOFRIEND * THREAT * UNITY | 0.01 | 0.01 | 22 |
29 | LOWEDU * MAN * nofriend * threat * UNITY | 0.01 | 0.01 | 24 |
30 | LOWEDU * MAN * NOFRIEND * threat * UNITY | 0.02 | 0.02 | 40 |
31 | LOWEDU * man * nofriend * threat * UNITY | 0.02 | 0.02 | 41 |
32 | LOWEDU * man * NOFRIEND * threat * UNITY | 0.04 | 0.04 | 83 |
33 | LOWEDU * MAN * nofriend * THREAT * UNITY | 0.03 | 0.03 | 76 |
34 | LOWEDU * MAN * NOFRIEND * THREAT * UNITY | 0.09 | 0.09 | 193 |
35 | LOWEDU * man * nofriend * THREAT * UNITY | 0.04 | 0.04 | 98 |
36 | LOWEDU * man * NOFRIEND * THREAT * UNITY | 0.09 | 0.09 | 196 |
37 | LOWEDU * MAN * NOFRIEND * threat * unity | 0.02 | 0.02 | 47 |
38 | LOWEDU * MAN * NOFRIEND * THREAT * unity | 0.03 | 0.03 | 64 |
39 | LOWEDU * man * NOFRIEND * THREAT * unity | 0.07 | 0.07 | 163 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dom Luís, A.; Benítez, R.; Bas, M.d.C. Bridging Crisp-Set Qualitative Comparative Analysis and Association Rule Mining: A Formal and Computational Integration. Mathematics 2025, 13, 1939. https://doi.org/10.3390/math13121939
Dom Luís A, Benítez R, Bas MdC. Bridging Crisp-Set Qualitative Comparative Analysis and Association Rule Mining: A Formal and Computational Integration. Mathematics. 2025; 13(12):1939. https://doi.org/10.3390/math13121939
Chicago/Turabian StyleDom Luís, Acácio, Rafael Benítez, and María del Carmen Bas. 2025. "Bridging Crisp-Set Qualitative Comparative Analysis and Association Rule Mining: A Formal and Computational Integration" Mathematics 13, no. 12: 1939. https://doi.org/10.3390/math13121939
APA StyleDom Luís, A., Benítez, R., & Bas, M. d. C. (2025). Bridging Crisp-Set Qualitative Comparative Analysis and Association Rule Mining: A Formal and Computational Integration. Mathematics, 13(12), 1939. https://doi.org/10.3390/math13121939