Mining High Utility Itemsets from its Concise and Lossless Representations
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: Mining high utility items from databases using the utility of items is an emerging technology.Recent algorithms have a drawback in the performance level considering memory and time.Novel strategy proposed here is the Miner Algorithm.A vertical data structure is used to store the elements with the utility values. A matrix representation is generated to identify the element co-occurrences and reduce the join operation for the patterns generated. An extensive experimental study with the datasets shows that the resulting algorithmreduces the join operation upto 95% compared with the UP Growth state of the art algorithm.
Authors and Affiliations
Nasreen Ali A. , Arunkumar M
Emotion Recognition using combination of MFCC and LPCCwith Supply Vector Machine
Abstract: Speech is a medium through which emotions are expressed by human being. In this paper, a mixtureof MFCC and LPCC has been proposed for audio feature extraction. One of the greatest advantage of MFCC isthat it i...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threat...
A Novel Three-Dimensional Adaptive Localization (T-Dial)Algorithm for Wireless Sensor Networks
Abstract: Wireless Sensor Networks is one of the most important area of research. Over the time, WSN isexpanding its reach from scientific research and monitoring to industrial as well as military operations. With itsinc...
Quantum Key Distribution Protocols: A Review
Abstract : Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protoc...
Biometric Fingerprint Combination to Improve AnonymityProtection
Abstract: Fingerprint techniques are widely used in authentication systems, therefore its privacy protectionbecomes an important issue. Securing a stored fingerprint template is very important because once fingerpr...