MaRFI: Maximal Regular Frequent Itemset Mining using a pair of Transaction-ids
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Frequent pattern mining is the fundamental and most dominant research area in data mining. Maximal frequent patterns are one of the compact representations of frequent itemsets. There is more number of algorithms to find maximal frequent patterns that are suitable for mining transactional databases. Users not only interested in occurrence frequency but may be interested on frequent patterns that occur at regular intervals. A frequent pattern is regular-frequent, if it occurs at less than or equal to user given maximum regularity threshold. Occurrence behaviour (regularity) of a pattern may be considered as important criteria along with occurrence frequency. There is no suitable algorithm to mine maximal regular-frequent patterns retrieving at once in transactional databases also satisfies downward closure property. Thus we are introducing a new single-pass algorithm called MaRFI (Maximal Regular Frequent Itemset) which mines maximal regular-frequent patterns in transactional databases using pair of transaction-ids instead of using item-ids. Our experimental results show that our algorithm is efficient in finding maximal regular-frequent patterns.
Authors and Affiliations
G. Vijay Kumar , Dr. V. Valli Kumari
A Review on Tissue Segmentation and Feature Extraction of MRI Brain images
Magnetic resonance imaging (MRI) is an important diagnostic imaging technique for the early detection of brain cancer. Brain cancer is one of the most dangerous diseases occurring commonly among human beings. The chances...
“Brain to Brain Communication: Without any Interface images, thoughts can be exchanged between minds”
“Brain-Computing Interface” technology is used by the scientists that allow computer to analyze brain signals. This new technology in the field of research and development will bring a great benefit to the people who ca...
An effective cluster formation with security in mobile ad hoc network
Mobile ad hoc networks have attracted much attention due to their mobility and easy deployment. However, the wireless and dynamic nature of network renders them more vulnerable to various types of security attacks than t...
Operating System Security : Security Policies
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...
A Comparative Study on ATM Security with Multimodal Biometric System
Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...