A Survey on Fuzzy Association Rule Mining Methodologies
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 6
Abstract
Fuzzy association rule mining (Fuzzy ARM) uses fuzzy logic to generate interesting association rules. These association relationships can help in decision making for the solution of a given problem. Fuzzy ARM is a variant of classical association rule mining. Classical association rule mining uses the concept of crisp sets. Because of this reason classical association rule mining has several drawbacks. To overcome those drawbacks the concept of fuzzy association rule mining came. Today there is a huge number of different types of fuzzy association rule mining algorithms are present in research works and day by day these algorithms are getting better. But as the problem domain is also becoming more complex in nature, continuous research work is still going on. In this paper, we have studied several well-known methodologies and algorithms for fuzzy association rule mining. Four important methodologies are briefly discussed in this paper which will show the recent trends and future scope of research in the field of fuzzy association rule mining.
Authors and Affiliations
Aritra Roy
Detecting Masquerade in Face Recognition System – A Literature survey
A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of masq...
Feature Based Semantic Polarity Analysis Through Ontology
Abstract: Opinion mining, a trending research area where customers feels that opinions of others are alwaysimportant for making decisions while purchasing the products. Here the problem is to collect those opinions...
Detecting Masquerade in Face Recognition System – A Literature survey
A masquerader is an (often external) attacker is one who, after succeeding in obtaining a legitimateuser’s credentials, attempts to use the stolen identity to carry out malicious actions.Automatic detection of...
Severe SOA Security Threats on SOAP Web Services– A Critical Analysis
Abstract: Enterprise Application Integration (EAI) involves several technologies; among them, the popular and recent one is Service Oriented Architecture (SOA). Mainly, SOA is used for developing loosely coupled di...
Bandwidth allocation mechanisms in the next mobile generation: A practical Approach
Abstract: This paper presents an algorithm for bandwidth management in integrated LTE network and WLAN. The proposed algorithm also suitable for multimedia network (image, telephone and videophone). A software tool is im...