Inter Transactional Association Rule Mining using Boolean Matrix
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 2
Abstract
One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal association rule mining, much of the literature focuses on intra transaction association rules, which deal with relations within transactions. Only a few algorithms exist to mine inter transaction association rules, where relations across transactions are analyzed. With the help of inter transactional association rules, one can achieve the benefits to know that the item B follows the item A, but also get an indication on when this is supposed to happen. This paper is presenting preliminary framework to find interesting temporal inter transactional associated patterns with the help of modification in data preparation step and with the help of Boolean matrix to process the data. During the data preparation step, the transaction data are converted to Mega transactions. We apply this step after the generation of 1-frequent items, so that it helps to reduce the number of items in the Mega transactions. And then, completing remaining part of frequent item analysis to discover the temporal relationships from data. As the Boolean matrix is generated from the Mega transactions no more dataset scanning is required and thus minimizes the overall execution time.
Authors and Affiliations
Dipti Rana, N. J. Mistry, M. M. Raghuwanshi
Electro Alert : An automatic meter reading system with GPRS facility
The digital technology, the wireless communication, and the communication have significantly changed the electric meter generation from Traditional Meter to Automatic Meter. A high percentage of electricity revenue is l...
A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...
Client-Merchant Online Payment System Exploiting Visual Cryptography
This paper exhibits another methodology for giving restricted data just that is important for asset exchange amid web shopping along these lines defending client information and expanding client certainty and avoidin...
Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...
Image Segmentation Using Stake-Denotes Algorithm
In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are...