Survey on Discovering rapid Changing Patterns In the presence of Hierarchy
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Frequent item set mining is used that focuses on find out recurrent correlations in the data. Change mining, it focuses on frequent itemsets, focuses on important changes in the set of mined itemsets from one point in time period to another. The finding of frequent generalized itemsets, One dynamic pattern, the history generalized pattern ,that represents the development of an itemset in successive periods,byaccounting the information about its recurrent generalizations characterized by minimal redundancy some time it becomes infrequent. Higen mining, The higen miner, that focuses on avoiding itemset mining followed by postprocessing by developing a support-driven itemset generalization .To focus the attention on the minimally redundant recurrent generalizations and reduce the amount of the generated patterns, the finding a subset of higens, namely the nonredundant higens, Tests do on both real and synthetic datasets show the competence and the effectiveness [1] .
Authors and Affiliations
Priya Sahane, Prof. A. N. Nawathe
Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic
Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security Issues
Technical solutions, introduced by policies and implantations are essential requirements of an information security program. Advanced technologies such as intrusion detection and prevention system (IDPS) an...
Monitoring Wireless Sensor Network using Android based Smart Phone Application
Abstract: Wireless Sensor Network application’s is use in detection of natural calamities like forest fire detection, flood detection, , earth quick early detection ,snow detection, traffic congestion and various o...
Securing Medical Text Data using Cuckoo Search based Advanced Encryption Standard (AES)
The internet plays vital role in the current digital era. The growth of the internet makes more advancement in all the fields including virtual medical treatment, online medical prescription and even online medical suppl...
“Design and Detection of Mobile Botnet Attacks”
Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation m...