A semi-apriori algorithm for discovering the frequent itemsets

Mining the frequent itemsets are still one of the data mining research challenges. Frequent itemsets generation produce extremely large numbers of generated itemsets that make the algorithms inefficient. The reason is that the most traditional approaches adopt an iterative strategy to discover the itemsets, that's require very large process. Furthermore, the present mining algorithms cannot perform efficiently due to high and repeatedly database scan. In this paper we introduce a new binary-based Semi-Apriori technique that efficiently discovers the frequent itemsets. Extensive experiments had been carried out using the new technique, compared to the existing Apriori algorithms, a tentative result reveal that our technique outperforms Apriori algorithm in terms of execution time.

[1]  Mario Linares Vásquez,et al.  Exploiting stock data: a survey of state of the art computational techniques aimed at producing beliefs regarding investment portfolios , 2008 .

[2]  Sallam Osman Fageeri,et al.  A Log File Analysis Technique Using Binary-Based Approach , 2013, DaEng.

[3]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[4]  Mohammad Naderi Dehkordi A Novel Association Rule Hiding Approach in OLAP Data Cubes , 2013 .

[5]  B. Milović,et al.  Prediction and Decision Making in Health Care using Data Mining , 2012 .

[6]  Witold Pedrycz,et al.  Data Mining: A Knowledge Discovery Approach , 2007 .

[7]  Dan Braha Data mining for design and manufacturing: methods and applications , 2001 .

[8]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[9]  Das Amrita,et al.  Mining Association Rules between Sets of Items in Large Databases , 2013 .

[10]  A Survey of Genetic Algorithm for Association Rule Mining , 2013 .

[11]  S. Ravi,et al.  Relevant association rule mining from medical dataset using new irrelevant rule elimination technique , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[12]  Gulshan Kumar,et al.  Survey on Data Mining Techniques in Intrusion Detection , 2012 .

[13]  Neelamadhab Padhy,et al.  The Survey of Data Mining Applications And Feature Scope , 2012, ArXiv.

[14]  S. U. Kumar,et al.  Bijective soft set based classification of medical data , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.

[15]  Somjit Arch-int,et al.  Association rule hiding in risk management for retail supply chain collaboration , 2013, Comput. Ind..

[16]  Rashmi Data Mining: A Knowledge Discovery Approach , 2012 .

[17]  R. Al Iqbal,et al.  Hybrid clinical decision support system: An automated diagnostic system for rural Bangladesh , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[18]  Jian Pei,et al.  Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).