Abstract

We have considered the issue of best k high utility itemsets mining, where k is the coveted number of high utility itemsets to be mined. Two effective calculations TKU (mining Top-K Utility itemsets) and TKO (mining Top-K utility itemsets in One stage) are proposed for mining such itemsets without setting least utility limits. TKU is the initial two-stage calculation for mining top-k high utility itemsets, which joins five techniques PE, NU, MD, MC and SE to adequately raise the fringe least utility edges and further prune the hunt space. Then again, TKO is the first stage algorithm produced for top-k HUI mining, which incorporates the novel methodologies RUC, RUZ and EPB to extraordinarily enhance its execution. The proposed calculations have great versatility on extensive datasets and the execution of the proposed algorithms is near the ideal instance of the cutting edge two-stage and one-stage utility mining algorithms.

Authors and Affiliations

D. Vijaya Lakshmi| Final M.Tech Student, Dept of Computer Science and Engineering, Prasiddha College of Engineering and Technology, Anathavaram-Amalapuram-533222, E.g.dt, A.P., G Tatayyanaidu| Asst.Professor, Dept of Computer Science and Engineering, Prasiddha College of Engineering and Technology, Anathavaram-Amalapuram-533222, E.g.dt, A.P., M. Veerabhadra Rao| Head of the Department, Dept of Computer Science and Engineering, Prasiddha College of Engineering and Technology, Anathavaram-Amalapuram-533222, E.g.dt, A.P.

Keywords

Related Articles

Empowering Auditing Scheme through more Security signatures in cloud computing

Maintaining data determined quality in public cloud acts an essential measure in cloud computing. Cloud storage auditing settles the multifaceted nature of data dependability in public cloud. In advance auditing prot...

In this work, a hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed. Varying from the current ideal models, for exampl...

Biometric System Based Electronic Voting Machine with security algorithm and password protection on ARM Microcontroller and GSM

Electronic voting meant for casting vote and counting votes electronically. This voting technology include punch cards, optical scan voting systems and Directrecording electronic (DRE) voting systems. It can also invo...

Thermal Analysis to Estimate Heat Transfer From Heat Sink By Forced Convection Through Open Enclosure

Heat Exchanger is a device used to exchange the heat energy between the two fluids by which increases the operating efficiency. These efficiencies plays a major role for cost effective Operations in the process indus...

A Novel Approach of FPGA Implementation of Transceiver System

This work given a innovative model to design an efficient wireless system which helps to integrate this with other technologies at a low cost. The system read analogue information by a biomedical sensor which is atta...

Download PDF file
  • EP ID EP17007
  • DOI -
  • Views 234
  • Downloads 3

How To Cite

D. Vijaya Lakshmi, G Tatayyanaidu, M. Veerabhadra Rao (2017). . International Journal of Science Engineering and Advance Technology, 5(8), 864-866. https://europub.co.uk/articles/-A-17007