Multilevel Association Rule
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 1
Abstract
The problems of developing models and algorithms for multilevel association mining pose for new challenges for mathematics and computer science. These problems become more challenging when some form of uncertainty in data or relationships in data exists. In this , we present a partition technique for the multilevel association rule mining problem. Taking out association rules at multiple levels helps in discovering more specific and applicable knowledge. In multilevel association rule there are two methods Boolean matrix and Hash based method. A Boolean Matrix based approach has been employed to discover frequent itemsets, the item forming a rule come from different levels. It adopts Boolean relational calculus to discover maximum frequent itemsets at lower level. When using this algorithm first time, it scans the database once and will generate the association rules. Apriori property is used in prune the item sets. It is not necessary to scan the database again; it uses Boolean logical operation to generate the multilevel association rules and also use top-down progressive deepening method. Hash-based algorithm for the candidate set generation. Explicitly, the number of candidate 2-itemsets generated by the proposed algorithm is, in orders of magnitude, smaller than that by previous methods, thus resolving the performance bottleneck. Note that the generation of smaller candidate sets enables us to effectively trim the transaction database size at a much earlier stage of the iterations, thereby reducing the computational cost for later iterations significantly. Extensive simulation study is conducted to evaluate performance of the proposed algorithm.
Authors and Affiliations
Monali Deshmukh, Madhu Nashipudimath
Randomize Dissemination Path for Secure Data Transmission in Mobile Ad-Hoc Network
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. The nodes are free to move arbitrarily. Due to lack of a centralized secure infrastructure, the communication is prone to security attacks and the no...
Pseudo-Code Attack (PCA) in Software Engineering
Software development has been more important in recent technological advancements in both hardware and software. The creation of scripting languages is critical to the development of software. The development of programm...
Utilization of Admixtures in Self-Compacting High Performance Concrete
Flowable concrete or self-consolidating or self-compacting concrete (SCC) is a particularly flowable, non-segregating concrete which flows, plugs formwork, and captures the utmost congested rebars with none use of mechan...
A Novel Healthcare Application for Hospital Bed Booking System
With the increasing need for more better way to consume a service during the Covid-19 pandemic, as well as the need of more flexible way to register for the beds in the hospitals, this paper introduces a Web Application...
Identification of Communities from Social Networks
A social network is a social structure of people, related (directly or indirectly) to each other through a common relation or interest. Social network analysis (SNA) is the study of social networks to understand their st...