Disk Resident Taxonomy Mining for Large Temporal Datasets
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
Mining patterns under constraints in large data is a significant task to advantage from the multiple uses of the patterns embedded in these data sets. It is obviously a difficult task because of the exponential growth of the search space. Extracting the patterns under various kinds of constraints in such type of data is a challenging research. First, a memory-based, efficient pattern-growth algorithm, Forest Mine, is proposed for mining frequent patterns for the data sets and then consolidating global frequent patterns. For dense data sets, Forest-mine is integrated with FP-Tree dynamically by detecting the swapping condition and constructing FPtrees for efficient mining. Such efforts ensure that forest mine is scalable in both large and medium sized databases and in both sparse and dense data sets.
Authors and Affiliations
P. Lakshmi Bhanu| M.Tech Student Department of Computer Science & Engineering, Pragati Engineering College East Godavari (dt), A.P,India, Mrs. N. Leelavathy| Professor & HOD Department of Computer Science & Engineering, Pragati Engineering College East Godavari (dt), A.P,India , Mrs. G. Satya Suneetha| Associate Professor Department of Computer Science & Engineering, Pragati Engineering College East Godavari (dt), A.P,India
Modeling and Simulation Of Transformer-less Grid Connected Photovoltaic System With Artificial Neural Network Based Power Converter
This paper describes a novel transformer less grid connected ANN based power converter with negative grounding for a photovoltaic generation system. The negative terminal of the solar cell array can be directly conne...
Application Of Integrated Interface Schema (Iis) Over Multiple Wdbs To Enhance Data Unit Annotation
An annotation wrapper for the search site is automatically build and can be used to interpret new result pages from the same web database. A growing number of databases have become web accessible through HTML form ba...
Encryption is used in a correspondence framework to secure data in the transmitted messages from sender to receiver. To execute the encryption in addition to decryption ye transmitter and receiver ought to have compa...
Design An Optimal Scheduling Algoritm That Minimize The Cost And Task Comletion Time
Cloud computing has emerged as a popular computing model to support on demand services. It is a style of computing where massively scalable resources are delivered as a service to external customers using Internet tec...
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks
Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...