A Survey of Mining Association Rules Using Constraints
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3
Abstract
As we all know that association rule is used to find out the rules that are associated with the items present in the database that satisfy user specified support and confidence. There are many algorithms for mining association rules. For improving efficiency and effectiveness of mining task. Constraints based mining enable users to concentrate on mining interested association rules instead of the complete set of association rule.â€The constraints can be defined as the condition that a pattern has to satisfy †. This paper provides or gives the major advancement in the approaches for association rule mining using different constraints.
Authors and Affiliations
Varsha Mashoria, Dr. Anju Singh
Efficient Detection of SPAM messages and SPAM zombies in the Internet using Naïve-Bayesian and Sequential Probability Ratio Test (SPRT)
The Internet is a global system of interconnected computer networks that provides the communication to serve billions of users worldwide. Compromised machines in the internet allows the attackers to launch various securi...
New Approach for Managing Keys in Cloud & Use Cases for Cloud Computing
Now a days cloud computing is best innovative technology in the field of IT. In its broadest usage, the term cloud computing refers to the delivery of IT resources over the internet as opposed to hosting and operating th...
Virtual Machine Selection Algorithm Based on User Requirements in Mobile Cloud Computing Environment
The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hie...
Using 3GPP- A Secure IDS for MANETs
Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directl...
Fast Iterative model for Sequential-Selection-Based Applications
Accelerated multi-armed bandit (MAB) model in Reinforcement-Learning for on-line sequential selection problems is presented. This iterative model utilizes an automatic step size calculation that improves the performance...