Efficient Algorithms for Mining Frequent Patterns from Sparse and Dense Databases

Journal of Intelligent Systems 24 (2):181-197 (2015)
  Copy   BIBTEX

Abstract

In this article, we present a new approach for frequent pattern mining that runs fast for both sparse and dense databases. Two algorithms, FEM and DFEM, based on our approach are also introduced. FEM applies a fixed threshold as the condition for switching between the two mining strategies; meanwhile, DFEM adopts this threshold dynamically at runtime to best fit the characteristics of the database during the mining process, especially when minimum support threshold is low. Additionally, we present optimization techniques for the proposed algorithms to speed the mining process, reduce the memory usage, and optimize the I/o cost. We also analyze in depth the performance of FEM and DFEM and compare them with several existing algorithms. The experimental results show that FEM and DFEM achieve a significant improvement in execution time and consume less memory than many popular FPM algorithms including the well-known Apriori, FP-growth, and Eclat.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,386

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Synthesizing Global Exceptional Patterns in Different Data Sources.Animesh Adhikari - 2012 - Journal of Intelligent Systems 21 (3):293-323.
Mining Calendar-based Periodic Patterns from Nonbinary Transactions.Jhimli Adhikari - 2014 - Journal of Intelligent Systems 23 (3):277-291.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Classification system for serial criminal patterns.Kamal Dahbur & Thomas Muscarello - 2003 - Artificial Intelligence and Law 11 (4):251-269.
Data mining: Proprietary rights, people and proposals.Dinah Payne & Cherie Courseault Trumbach - 2009 - Business Ethics, the Environment and Responsibility 18 (3):241-252.
KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
Best Unifiers in Transitive Modal Logics.Vladimir V. Rybakov - 2011 - Studia Logica 99 (1-3):321-336.
Classes of Markov-like k-ALGORITHMS.Zdzislaw Grodzki & Jerzy Mycka - 1996 - Reports on Mathematical Logic:83-99.

Analytics

Added to PP
2017-01-11

Downloads
12 (#1,058,801)

6 months
2 (#1,232,442)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references