2017
DOI: 10.1016/j.bdr.2017.06.006
|View full text |Cite
|
Sign up to set email alerts
|

Frequent Itemsets Mining for Big Data: A Comparative Analysis

Abstract: Itemset mining is a well-known exploratory data mining technique used to discover interesting correlations hidden in a data collection. Since it supports different targeted analyses, it is profitably exploited in a wide range of different domains, ranging from network traffic data to medical records. With the

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(33 citation statements)
references
References 26 publications
0
32
0
Order By: Relevance
“…Highlighted itemsets are the un-pruned candidates generated in optimized phases. It can be seen that C 4 ⊂ C' 4 and C 5 ⊂ C' 5 . When both types of phases count the support for C 3 , C 4 , C 5 or C 3 , C' 4 , C' 5 and check against min_sup, the same set of frequent itemsets are generated at the end of phases.…”
Section: Pass K+2mentioning
confidence: 99%
See 2 more Smart Citations
“…Highlighted itemsets are the un-pruned candidates generated in optimized phases. It can be seen that C 4 ⊂ C' 4 and C 5 ⊂ C' 5 . When both types of phases count the support for C 3 , C 4 , C 5 or C 3 , C' 4 , C' 5 and check against min_sup, the same set of frequent itemsets are generated at the end of phases.…”
Section: Pass K+2mentioning
confidence: 99%
“…Candidate 4 and 5-itemsets are different and distinguished as C 4 & C' 4 and C 5 & C' 5 for simple phase and optimized phase respectively. Simple phase uses apriori-gen() to generate C 4 and C 5 while optimized phase uses non-apriori-gen() to generate C' 4 and C' 5 . No more candidate generation is possible further so, both stop here.…”
Section: Pass K+2mentioning
confidence: 99%
See 1 more Smart Citation
“…This is the frequency array for itemset {A, D}. Thus, the rule A, D ⇒ + has confidence 1 and support 0.5, and satisfies the minimum thresholds [2] . Rule A ⇒ + is not generated, as one of the subpatterns of A has already produced one rule.…”
Section: Algorithm 2: Cap-growthmentioning
confidence: 99%
“…Mining frequent itemsets from transactional databases play an important role in many data mining applications, e.g., social network mining ( Jiang, Leung, & Zhang, 2016;Moosavi, Jalali, Misaghian, Shamshirband, & Anisi, 2017 ), finding gene expression patterns ( Becquet, Blachon, Jeudy, Boulicaut, & Gandrillon, 2001;Creighton & Hanash, 2003;Cremaschi et al, 2015;Mallik, Mukhopadhyay, & Maulik, 2015 ), web log pattern mining ( Diwakar Tripathia & Edlaa, 2017;Han, Cheng, Xin, & Yan, 2007;Iváncsy, Renáta, & Vajk, 2006;Yu & Korkmaz, 2015 ). In recent years, many algorithms have been proposed for efficient mining of frequent itemsets ( Apiletti et al, 2017;Bodon, 2003;Burdick, Calimlim, Flannick, Gehrke, & Yiu, 2005;Gan, Lin, Fournier-Viger, Chao, & Zhan, 2017;Han, Pei, & Yin, 20 0 0;Kosters & Pijls, 2003;Liu, Lu, Yu, Wang, & Xiao, 2003;Pei, Tung, & Han, 2001;Uno, Kiyomi, & Arimura, 2004;Vo, Pham, Le, & Deng, 2017 ). These algorithms take a transactional database and support threshold (minimum itemset support) as input and mines complete set of frequent itemsets with support greater than minimum itemset support .…”
Section: Introductionmentioning
confidence: 99%