Efficient Dynamic Weighted Frequent Pattern Mining by using a Prefix-Tree

2010 ◽  
Vol 17D (4) ◽  
pp. 253-258 ◽  
Author(s):  
Byeong-Soo Jeong ◽  
Ahmed Farhan
Author(s):  
Mengling Feng ◽  
Jinyan Li ◽  
Guozhu Dong ◽  
Limsoon Wong

This chapter surveys the maintenance of frequent patterns in transaction datasets. It is written to be accessible to researchers familiar with the field of frequent pattern mining. The frequent pattern maintenance problem is summarized with a study on how the space of frequent patterns evolves in response to data updates. This chapter focuses on incremental and decremental maintenance. Four major types of maintenance algorithms are studied: Apriori-based, partition-based, prefix-tree-based, and conciserepresentation- based algorithms. The authors study the advantages and limitations of these algorithms from both the theoretical and experimental perspectives. Possible solutions to certain limitations are also proposed. In addition, some potential research opportunities and emerging trends in frequent pattern maintenance are also discussed.


2014 ◽  
Vol 55 ◽  
pp. 125-139 ◽  
Author(s):  
Gwangbum Pyun ◽  
Unil Yun ◽  
Keun Ho Ryu

2009 ◽  
Vol 179 (5) ◽  
pp. 559-583 ◽  
Author(s):  
Syed Khairuzzaman Tanbeer ◽  
Chowdhury Farhan Ahmed ◽  
Byeong-Soo Jeong ◽  
Young-Koo Lee

Information sharing among the associations is a general development in a couple of zones like business headway and exhibiting. As bit of the touchy principles that ought to be kept private may be uncovered and such disclosure of delicate examples may impacts the advantages of the association that have the data. Subsequently the standards which are delicate must be secured before sharing the data. In this paper to give secure information sharing delicate guidelines are bothered first which was found by incessant example tree. Here touchy arrangement of principles are bothered by substitution. This kind of substitution diminishes the hazard and increment the utility of the dataset when contrasted with different techniques. Examination is done on certifiable dataset. Results shows that proposed work is better as appear differently in relation to various past strategies on the introduce of evaluation parameters.


2011 ◽  
Vol 22 (8) ◽  
pp. 1749-1760
Author(s):  
Yu-Hong GUO ◽  
Yun-Hai TONG ◽  
Shi-Wei TANG ◽  
Leng-Dong WU

Sign in / Sign up

Export Citation Format

Share Document