A Fast & Memory Efficient Technique for Mining Frequent Item Sets from a Data Set
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Frequent/Periodic item set mining is a extensively used data mining method for market based analysis,privacy preserving and it is also a heart favourite theme for the resarchers. A substantial work has been devoted to this research and tremendous progression made in this field so far. Frequent/ Periodic itemset mining is used for search and to find back the relationship in a given data set. This paper introduces a new way which is more efficient in time and space frequent itemset mining. Our method scans the database only one time whereas the previous algorithms scans the database many times which utilizes more time and memory related to new one. In this way,the new algorithm will reduced the complexity (time & memory) of frequent pattern mining. We present efficient techniques to implement the new approach.
Authors and Affiliations
Richa Mathur , Virendra Kumar
Classification Algorithms for Predicting Computer Science Students Study Duration
The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than fou...
Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support
Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solvi...
Uses of Genetic Algorithm in Cryptanalysis of RSA
Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of codi...
Computational Method for Forensic Verification of offline Signatures
Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...
BEST-1: A Light Weight Block Cipher
Abstract: The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices becaus...