EFFICIENT TRANSACTION REDUCTION IN ACTIONABLE PATTERN MINING FOR HIGH VOLUMINOUS DATASETS BASED ON BITMAP AND CLASS LABELS
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 7
Abstract
Frequent pattern mining in databases plays an indispensable role in many data mining tasks namely, classification, clustering, and association rules analysis. When a large number of item sets are processed by the database, it needs to be scanned multiple times. Consecutively, multiple scanning of the database increases the number of rules generation, which then consume more system resources. Existing CCARM (Combined and Composite Association Rule Mining) algorithm used minimum support in order to generate combined actionable association rules, which in turn suffer from the large number of generating rules. Explosion of a large number of rules is the major problem in frequent pattern mining that adds difficult to find the interesting frequent patterns. This paper presents an efficient transaction reduction technique named TR-BC to mine the frequent pattern based on bitmap and class labels. The proposed approach reduces the rule generation by counting the item support and class support instead of only item support. Moreover, the database storage is compressed by using bitmap that significantly reduces the number of database scan. The rules are reduced by horizontal and vertical transaction and then finally combined rules are generated by eliminating the redundancy. Experimental results validate the performance of the proposed approach and expose that proposed method is more effective and efficient than previously proposed algorithm.
Authors and Affiliations
K. Kavitha , Dr. E. Ramaraj
Safety Measures Using Sextic Curve Cryptography
This paper proposes Sextic Curve Cryptography, which is used to increase the safety measures. The methods to find the critical points in the SCC based on Atriphtaloid symmetric curve using point addition and point doubli...
Computational Approaches for determination of Most Probable RNA Secondary Structure Using Different Thermodynamics Parameters
ABSTRACT : Many bioinformatics studies require the analysis of RNA structures. More specifically, extensive work is done to elaborate efficient algorithms able to predict the 2-D folding structures of RNA. The core of RN...
On the Design of Simulation Package for GPRS Network
The main objective of this paper is to describe a new designed software tool to simulate the GPRS network. The proposed simulation technique shows how to connect the components together so as to achieve the correct netwo...
SURVEY OF DIGITAL WATERMARKING USING DCT
Digital Watermarking is not a new name in the technology world but there are many new issues arise related with watermark. This paper surveys recent advances in watermarking techniques in digital images. The aim of digi...
Improved Self Fused Check pointing Replication for Handling Multiple Faults in Cloud Computing
The performance of checkpointing replication fault tolerance technique is severely bottlenecks due to handling of number of replicas generated for a large number of nodes to tolerate multiple faults such as multiple fail...