Using a Hash-Based Method with Transaction Trimming and Database Scan Reduction
#1

Using a Hash-Based Method with Transaction Trimming and Database Scan Reduction for Mining Association Rules


Presented By:
Jong Soo Park, Ming-Syan Chen and Philip S. Yu

Abstract

In this paper, we examine the issue of mining association rules among items in a large database of sales transactions. Mining association rules means that given a database of sales transactions, to discover all associations among items such that the presence of some items in a transaction will imply the presence of other items in the same transaction. The mining of association rules can be mapped into the problem of discovering large itemsets where a large itemset is a group of items which appear in a su cient number of transactions. The problem of discovering large itemsets can be solved by constructing a candidate set of itemsets rst and then, identifying, within this candidate set, those itemsets that meet the large itemset requirement. Generally this is done iteratively for each large k-itemset in increasing order of k where a large k-itemset is a large itemset with k items. To determine large itemsets from a huge number of candidate large itemsets in early iterations is usually the dominating factor for the overall data mining performance. To address this issue, we develop an e ective algorithm for the candidate set generation. It is a hash based algorithm and is especially e ective for the generation of candidate set for large 2-itemsets. Explicitly, the number of candidate 2-itemsets generated by the proposed algorithm is, in orders of magnitude, smaller than that by previous methods, thus resolving the performance bottleneck. Note that the generation of smaller candidate sets enables us to e ectively trim the transaction database size at a much earlier stage of the iterations, thereby reducing the computational cost for later iterations signi cantly. The advantage of the proposed algorithm also provides us an opportunity of reducing the amount of disk I/O required. Extensive simulation study is conducted to evaluate performance of the proposed algorithm.

read full report
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: transaction form for a bank in vb, banking transaction system, c scan algorithm implementation using java, online transaction system project documentation, transaction number on atm transaction, secure electronics transaction report doc, ppt cost reduction and cost control project,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,385 06-10-2016, 10:27 AM
Last Post: ijasti
  Image Segmentation Using Information Bottleneck Method seminar class 4 4,009 19-01-2013, 12:45 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,959 22-12-2012, 10:54 AM
Last Post: seminar details
  FINGER-SCAN TECHNOLOGIES seminar projects crazy 1 3,318 03-12-2012, 02:36 PM
Last Post: seminar details
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,124 29-11-2012, 12:56 PM
Last Post: seminar details
  distributed database full report project report tiger 3 5,230 05-09-2012, 04:04 PM
Last Post: acceriott
  AI-based Classification and Retrieval of Reusable Software Components computer girl 0 1,044 11-06-2012, 12:07 PM
Last Post: computer girl
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,147 09-06-2012, 06:01 PM
Last Post: computer girl
  Text Classification from Labeled and Unlabeled Documents using EM computer girl 0 798 09-06-2012, 11:28 AM
Last Post: computer girl
  A NOVEL REPLICA DETECTION SYSTEM USING BINARY CLASSIFIERS, R-TREES, AND PCA computer girl 0 1,046 07-06-2012, 05:16 PM
Last Post: computer girl

Forum Jump: