An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes either implicitly or explicitly called as temporal data. This paper focuses on an encoding method for the temporal database that reduces the memory utilization during processing. The first approach involves temporal mining applying the conventional algorithms like Apriori, AprioriTid and AprioriHybrid to an encoded temporal database that has a better performance than that when applied over a static database. The second approach involves weighted temporal mining over an encoded temporal database consisting of items which are prioritized by assigning weights. These weights are given according to the importance of the item from the user’s perspective. A fuzzy mining approach involving AprioriTid for weighted association rule mining gives better results than quantitative values. Also a method for positive and negative temporal mining extends traditional associations to include association rules of forms A=> ¬B, ¬A => ¬B, A=> ¬B, which indicate negative associations between itemsets. The experimental results are drawn from the complaints database of the telecommunication system which presents the most feasible temporal mining method with reduced time and computational complexities.
Authors and Affiliations
C. Balasubramanian , K. Duraiswamy , V. Palanisamy
AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...
Retrieving Business Applications using Open Web API’s Web Mining – Executive Dashboard Application Case Study
Web mining is new area of research in information technology; so many business applications that utilize data mining and text mining techniques to extract useful business information on the we...
The Foot Step of mobile network - wireless network architecture
In this paper we discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place...
Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture
Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by them...
A Multiobjective Genetic Algorithm for Feature Selection in Data Mining
The rapid advance of computer based highthroughput technique have provided unparalleled opportunities for humans to expand capabilities in production, services, communications, and research. Meanwhile, immense quantities...