An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 3
Abstract
Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes either implicitly or explicitly called as temporal data. This paper focuses on an encoding method for the temporal database that reduces the memory utilization during processing. The first approach involves temporal mining applying the conventional algorithms like Apriori, AprioriTid and AprioriHybrid to an encoded temporal database that has a better performance than that when applied over a static database. The second approach involves weighted temporal mining over an encoded temporal database consisting of items which are prioritized by assigning weights. These weights are given according to the importance of the item from the user’s perspective. A fuzzy mining approach involving AprioriTid for weighted association rule mining gives better results than quantitative values. Also a method for positive and negative temporal mining extends traditional associations to include association rules of forms A=> ¬B, ¬A => ¬B, A=> ¬B, which indicate negative associations between itemsets. The experimental results are drawn from the complaints database of the telecommunication system which presents the most feasible temporal mining method with reduced time and computational complexities.
Authors and Affiliations
C. Balasubramanian , K. Duraiswamy , V. Palanisamy
A Two Stage Language Independent Named Entity Recognition for Indian Languages
This paper describes about the development of a two stage hybrid Named Entity Recognition (NER) system for Indian Languages particularly for Hindi, Oriya, Bengali and Telugu. We have used both statistical Maximum Entrop...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
Synthesis of DSP Systems using Data Flow Graphs for Silicon Area Reduction
This paper presents a methodology to reduce the area of DSP architecture on silicon using folding. Folding is particularly important and has impact on large DSP circuits/architectures. This technique is powerful to redu...
An overview of interval encoded temporal mining involving prioritized mining, fuzzy mining, and positive and negative rule mining
Databases and data warehouses have become a vital part of many organizations. So useful information and helpful knowledge have to be mined from transactions. In real life, media information has time attributes eith...
Micro-Processor based Improved Ultrasonic Direction and Range Finder
This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an IEEE conference. The authors must follow the instructions given in the document for t...