Parallel and distributed approach for incremental closed regular pattern mining

Author(s):  
M. Sreedevi ◽  
G. Vijay Kumar ◽  
L. S.S. Reddy
2017 ◽  
Vol 75 ◽  
pp. 172-186 ◽  
Author(s):  
Syed Khairuzzaman Tanbeer ◽  
Mohammad Mehedi Hassan ◽  
Ahmad Almogren ◽  
Mansour Zuair ◽  
Byeong-Soo Jeong

2018 ◽  
Vol 7 (2.20) ◽  
pp. 61
Author(s):  
M Sreedevi ◽  
V Harika ◽  
N Anilkumar ◽  
G Sai Thriveni

Extracting general patterns from a multidimensional database is a tricky task. Designing an algorithm to seek the frequency or no. of occurring patterns and really first-class transaction dimension of a mining pattern, general patterns from a multidimensional database is the objective of the task. Analysis prior to mining required patterns from database hence, Apriori algorithm is used. After the acquiring patterns, they have been improved to many further patterns. Nevertheless, to mine the required patterns from a multidimensional database we use FP development algorithm. Here, now we have carried out a pop-growth procedure to mine fashionable patterns from multidimensional database established on their repute values. Utilizing this opportunity, we studied about recognizing patterns which give the reputation of every object or movements inside the entire database. Whereas Apriori and FP-growth algorithm is determined by the aid or frequency measure of an object set. As a result, to acquire required patterns utilizing these programs one has to mine FP-growth tree recursively which involves extra time consumption. We have utilized a mining process, which is meant for multidimensional recognized patterns. It overcomes the limitations of present mining ways by implementing lazy pruning method followed by showing downward closure property.  


Information sharing among the associations is a general development in a couple of zones like business headway and exhibiting. As bit of the touchy principles that ought to be kept private may be uncovered and such disclosure of delicate examples may impacts the advantages of the association that have the data. Subsequently the standards which are delicate must be secured before sharing the data. In this paper to give secure information sharing delicate guidelines are bothered first which was found by incessant example tree. Here touchy arrangement of principles are bothered by substitution. This kind of substitution diminishes the hazard and increment the utility of the dataset when contrasted with different techniques. Examination is done on certifiable dataset. Results shows that proposed work is better as appear differently in relation to various past strategies on the introduce of evaluation parameters.


Author(s):  
Jaya Pratha Sebastiyar ◽  
Martin Sahayaraj Joseph

Distributed joint congestion control and routing optimization has received a significant amount of attention recently. To date, however, most of the existing schemes follow a key idea called the back-pressure algorithm. Despite having many salient features, the first-order sub gradient nature of the back-pressure based schemes results in slow convergence and poor delay performance. To overcome these limitations, the present study was made as first attempt at developing a second-order joint congestion control and routing optimization framework that offers utility-optimality, queue-stability, fast convergence, and low delay.  Contributions in this project are three-fold. The present study propose a new second-order joint congestion control and routing framework based on a primal-dual interior-point approach and established utility-optimality and queue-stability of the proposed second-order method. The results of present study showed that how to implement the proposed second-order method in a distributed fashion.


2012 ◽  
Vol 3 (2) ◽  
pp. 298-300 ◽  
Author(s):  
Soniya P. Chaudhari ◽  
Prof. Hitesh Gupta ◽  
S. J. Patil

In this paper we review various research of journal paper as Web Searching efficiency improvement. Some important method based on sequential pattern Mining. Some are based on supervised learning or unsupervised learning. And also used for other method such as Fuzzy logic and neural network


Sign in / Sign up

Export Citation Format

Share Document