A Survey of Mining Association Rules Using Constraints

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3

Abstract

As we all know that association rule is used to find out the rules that are associated with the items present in the database that satisfy user specified support and confidence. There are many algorithms for mining association rules. For improving efficiency and effectiveness of mining task. Constraints based mining enable users to concentrate on mining interested association rules instead of the complete set of association rule.”The constraints can be defined as the condition that a pattern has to satisfy ” . This paper provides or gives the major advancement in the approaches for association rule mining using different constraints.

Authors and Affiliations

Varsha Mashoria, Dr. Anju Singh

Keywords

Related Articles

Efficient Detection of SPAM messages and SPAM zombies in the Internet using Naïve-Bayesian and Sequential Probability Ratio Test (SPRT)

The Internet is a global system of interconnected computer networks that provides the communication to serve billions of users worldwide. Compromised machines in the internet allows the attackers to launch various securi...

New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing

Now a days cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating th...

Virtual Machine Selection Algorithm Based on User Requirements in Mobile Cloud Computing Environment

The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hie...

Using 3GPP- A Secure IDS for MANETs

Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directl...

Fast Iterative model for Sequential-Selection-Based Applications

Accelerated multi-armed bandit (MAB) model in Reinforcement-Learning for on-line sequential selection problems is presented. This iterative model utilizes an automatic step size calculation that improves the performance...

Download PDF file
  • EP ID EP650045
  • DOI 10.24297/ijct.v7i3.3441
  • Views 89
  • Downloads 0

How To Cite

Varsha Mashoria, Dr. Anju Singh (2013). A Survey of Mining Association Rules Using Constraints. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 7(3), 620-625. https://europub.co.uk/articles/-A-650045