Survey on Discovering rapid Changing Patterns In the presence of Hierarchy
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Frequent item set mining is used that focuses on find out recurrent correlations in the data. Change mining, it focuses on frequent itemsets, focuses on important changes in the set of mined itemsets from one point in time period to another. The finding of frequent generalized itemsets, One dynamic pattern, the history generalized pattern ,that represents the development of an itemset in successive periods,byaccounting the information about its recurrent generalizations characterized by minimal redundancy some time it becomes infrequent. Higen mining, The higen miner, that focuses on avoiding itemset mining followed by postprocessing by developing a support-driven itemset generalization .To focus the attention on the minimally redundant recurrent generalizations and reduce the amount of the generated patterns, the finding a subset of higens, namely the nonredundant higens, Tests do on both real and synthetic datasets show the competence and the effectiveness [1] .
Authors and Affiliations
Priya Sahane, Prof. A. N. Nawathe
A Survey on Digital Image Authentication by DCT and RPM Based Watermarking
Abstract: An image watermarking, data is embedded into cover media to prove ownership. Various Watermarking techniques are proposed by several authors within the last many years that embody spatial domain and transform d...
A Compound Metric for Identification of Fault Prone Modules
Abstract: Software Quality is a significant non-functional requirement that is not fulfilled by many software products. Faulty modules tend to degrade the software quality which may cause customer’s dissatisfaction. Faul...
[i][/i] Biometric-Based Authentication Model for E-Card Payment Technology
Abstract: The goals of this study were to develop and evaluate a model for acceptance of biometric-based access control for payment technologies used in commercial Banks. A wide diversity of systems requires reliab...
A Study of vampire Attack to Avoid the Intruders without Backtracking Method
Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...
A Study on Energy Model Prototyping in Various Simulators of WSN
Simulators are used to abstract the real hardware behaviors and proceed the research more economically. Various simulators of Wireless Sensor Network (WSN) are used to access the performance and transmission processes in...