Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Using a Hash-Based Method with Transaction Trimming and Database Scan Reduction
Post: #1

Using a Hash-Based Method with Transaction Trimming and Database Scan Reduction for Mining Association Rules

Presented By:
Jong Soo Park, Ming-Syan Chen and Philip S. Yu


In this paper, we examine the issue of mining association rules among items in a large database of sales transactions. Mining association rules means that given a database of sales transactions, to discover all associations among items such that the presence of some items in a transaction will imply the presence of other items in the same transaction. The mining of association rules can be mapped into the problem of discovering large itemsets where a large itemset is a group of items which appear in a su cient number of transactions. The problem of discovering large itemsets can be solved by constructing a candidate set of itemsets rst and then, identifying, within this candidate set, those itemsets that meet the large itemset requirement. Generally this is done iteratively for each large k-itemset in increasing order of k where a large k-itemset is a large itemset with k items. To determine large itemsets from a huge number of candidate large itemsets in early iterations is usually the dominating factor for the overall data mining performance. To address this issue, we develop an e ective algorithm for the candidate set generation. It is a hash based algorithm and is especially e ective for the generation of candidate set for large 2-itemsets. Explicitly, the number of candidate 2-itemsets generated by the proposed algorithm is, in orders of magnitude, smaller than that by previous methods, thus resolving the performance bottleneck. Note that the generation of smaller candidate sets enables us to e ectively trim the transaction database size at a much earlier stage of the iterations, thereby reducing the computational cost for later iterations signi cantly. The advantage of the proposed algorithm also provides us an opportunity of reducing the amount of disk I/O required. Extensive simulation study is conducted to evaluate performance of the proposed algorithm.

read full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ct scan component ppt, seminar on biometrics in e transaction, transaction processing europe, dbms project for transaction management, implemented code for hash function in ns2, microsoft transaction, transaction processing efficiency,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Host-Based Intrusion Detection Using user signatures nit_cal 2 686 06-10-2016 10:27 AM
Last Post: ijasti
  Image Segmentation Using Information Bottleneck Method seminar class 4 2,994 19-01-2013 12:45 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 3,221 22-12-2012 10:54 AM
Last Post: seminar details
  FINGER-SCAN TECHNOLOGIES seminar projects crazy 1 2,804 03-12-2012 02:36 PM
Last Post: seminar details
  distributed database full report project report tiger 3 4,450 05-09-2012 04:04 PM
Last Post: acceriott
  AI-based Classification and Retrieval of Reusable Software Components computer girl 0 550 11-06-2012 12:07 PM
Last Post: computer girl
  Text Classification from Labeled and Unlabeled Documents using EM computer girl 0 360 09-06-2012 11:28 AM
Last Post: computer girl
Last Post: computer girl
  Grayscale Image Retrieval using DCT on Row mean, Column mean and Combination computer girl 0 403 06-06-2012 04:57 PM
Last Post: computer girl
  The 8051 Microcontroller and Embedded Systems Using Assembly and C computer girl 0 496 04-06-2012 05:41 PM
Last Post: computer girl