DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
Journal Title: International Journal on Computer Science and Engineering - Year 2015, Vol 7, Issue 11
Abstract
Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding association rules. One of the most common algorithms is Apriori. It is used to mine frequent item sets from large database. It uses the support statistical measure for pruning the frequent items. When the higher minimum support is used to reduce the number of frequent items for rules generation, this algorithm misses some of the bigger combination of significant frequent items. This proposed DMSA (Dynamic Minimum Support Apriori) generates significant frequent items in large database for association rules generation.
Authors and Affiliations
Saravanan. Suba , Dr. Christopher. T
Performance evaluation of H.264 decoder on different processors
H.264/AVC (Advanced Video Coding) is the newest video coding standard of the moving video coding experts group. The decoder is standardized by imposing restrictions on the bit stream and syntax, and defining the process...
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Message Encryption Using Deceptive Text and Randomized Hashing
In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and...
Efficient Parallel Data Processing in the Cloud
Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamic...
Justified Cross-Site Scripting Attacks Prevention from Client-Side
Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScrip...