An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining

Abstract

 Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes either implicitly or explicitly called as temporal data. This paper focuses on an encoding method for the temporal database that reduces the memory utilization during processing. The first approach involves temporal mining applying the conventional algorithms like Apriori, AprioriTid and AprioriHybrid to an encoded temporal database that has a better performance than that when applied over a static database. The second approach involves weighted temporal mining over an encoded temporal database consisting of items which are prioritized by assigning weights. These weights are given according to the importance of the item from the user’s perspective. A fuzzy mining approach involving AprioriTid for weighted association rule mining gives better results than quantitative values. Also a method for positive and negative temporal mining extends traditional associations to include association rules of forms A=> ¬B, ¬A => ¬B, A=> ¬B, which indicate negative associations between itemsets. The experimental results are drawn from the complaints database of the telecommunication system which presents the most feasible temporal mining method with reduced time and computational complexities.

Authors and Affiliations

C. Balasubramanian , K. Duraiswamy , V. Palanisamy

Keywords

Related Articles

A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks

This paper proposes a new hashing and caching strategy (NHC) in order to reduce the overall location management cost in wireless mobile networks. It uses caches whose up-to-date information is responsible for dropping th...

Operating System based Compliance Validation of  Trusted Computing

The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted  component, operation or process is one whose behavior is pr...

Outlier Detection for Multidimensional Medical Data

The knowledge-rich nature of the Medical Information domain has made it an ideal environment where knowledge on data mining should have to be unearthed from large data collection for dialysis’ of growing unknown diseases...

Role of soft computing as a tool in data mining

we live in a world where we can be overwhelmed with information; therefore it has become increasingly important to extract relevant information from the explosive amount of data for. Data Mining is the iterative and inte...

Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform

Significant features of the ECG signal include the P wave, the QRS complex, and the T wave. This paper focuses on the detection of the P wave and T wave. Determining the position of the P wave and T wave is complicated d...

Download PDF file
  • EP ID EP97167
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

C. Balasubramanian, K. Duraiswamy, V. Palanisamy (2010). An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining. International Journal of Computer Science and Information Technologies, 1(3), 163-168. https://europub.co.uk/articles/-A-97167