Frequent itemset mining in high dimensional data: a review
This paper provides a brief overview of the techniques used in frequent itemset mining. It discusses the search strategies used; i.e. depth first vs. breadth-first, and dataset representation; i.e. horizontal vs. vertical representation. In addition, it reviews many techniques used in several algori...
| Main Authors: | Md. Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Springer
2019
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/67014/ http://irep.iium.edu.my/67014/1/67014_Frequent%20Itemset%20Mining%20in%20High%20Dimensional%20Data.pdf http://irep.iium.edu.my/67014/2/67014_Frequent%20Itemset%20Mining%20in%20High%20Dimensional%20Data_SCOPUS.pdf |
Similar Items
RARE: mining colossal closed itemset in high dimensional data
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019)
by: Zulkurnain, Nurul Fariza
Published: (2019)
HYBRID: an efficient unifying process to mine frequent itemsets
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
Towards scalable algorithm for closed itemset mining in high-dimensional data
by: Md. Zaki, Fatimah Audah, et al.
Published: (2017)
by: Md. Zaki, Fatimah Audah, et al.
Published: (2017)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
by: Md Zaki, Fatimah Audah, et al.
Published: (2019)
by: Md Zaki, Fatimah Audah, et al.
Published: (2019)
Design and dimensional analysis of interdigital sensor for blood glucose measurement through non-invasive method
by: Zaharudin, Zarimin, et al.
Published: (2020)
by: Zaharudin, Zarimin, et al.
Published: (2020)
Pavement condition analysis via vehicle mounted accelerometer data
by: Mohiddeen, Ahmad Jazlan, et al.
Published: (2020)
by: Mohiddeen, Ahmad Jazlan, et al.
Published: (2020)
High performance hierarchical torus network
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
by: Rahman, M.M. Hafizur, et al.
Published: (2012)
Study on capacitance performance of gallium nitride (GaN) diodes in high dose electron irradiation
by: Abdullah, Yusof, et al.
Published: (2019)
by: Abdullah, Yusof, et al.
Published: (2019)
Effects of high neutron fluence on the electrical characteristics of InAs quantum dot structures
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
by: Ahmad Fauzi, Dhiyauddin, et al.
Published: (2013)
Highly sensitive Escherichia coli shear horizontal surface acoustic wave biosensor with silicon dioxide nanostructures
by: Ten, Seng Teik, et al.
Published: (2017)
by: Ten, Seng Teik, et al.
Published: (2017)
Review on hand gesture recognition
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2011)
by: Bilal, Sara Mohammed Osman Saleh, et al.
Published: (2011)
High quality acquisition of surface electromyography – conditioning circuit design
by: Shobaki, Mohammed M., et al.
Published: (2013)
by: Shobaki, Mohammed M., et al.
Published: (2013)
Mining Web usage using FRS
by: Omar, Rosli, et al.
Published: (2018)
by: Omar, Rosli, et al.
Published: (2018)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Human path detection : a review
by: Khan, Imran Moez, et al.
Published: (2011)
by: Khan, Imran Moez, et al.
Published: (2011)
Human posture recognition : literature review
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Scalable video coding : a review
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
by: Maarif, Haris Al Qodri, et al.
Published: (2011)
High performance Hierarchical Torus Network under adverse traffic patterns
by: Rahman, M.M. Hafizur, et al.
Published: (2010)
by: Rahman, M.M. Hafizur, et al.
Published: (2010)
Automatic identity recognition systems : a review
by: Alqudah, Assal Ali Mustafa, et al.
Published: (2011)
by: Alqudah, Assal Ali Mustafa, et al.
Published: (2011)
Harmful data that affect ethical, religious, and social values of Internet users in education process
by: Hameed, Shihab A.
Published: (2011)
by: Hameed, Shihab A.
Published: (2011)
High gain UWB horn antenna for concealed metal detection and microwave imaging application
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
by: Shaikh, Faraz Ahmed, et al.
Published: (2017)
Low power and high voltage swing cascode Pierce oscillator for MEMS SAW resonators
by: Md Hamzah, Mohd Haidar, et al.
Published: (2016)
by: Md Hamzah, Mohd Haidar, et al.
Published: (2016)
Enhanced sigma protocol for high speed mobile node in IP based communication system
by: Anwar, Farhat
Published: (2011)
by: Anwar, Farhat
Published: (2011)
A review of municipal solid waste management in Malaysia
by: Tarmudi, Zamali, et al.
Published: (2012)
by: Tarmudi, Zamali, et al.
Published: (2012)
Free space optic communications – a review of quality parameters
by: Alma, Husagic, et al.
Published: (2011)
by: Alma, Husagic, et al.
Published: (2011)
Optimum concentric circular array antenna with high gain
and side lobe reduction at 5.8 GHz
by: Zaid, Mohammed, et al.
Published: (2017)
by: Zaid, Mohammed, et al.
Published: (2017)
Flat-gain single-stage amplifier using high concentration erbium doped fibers in single-pass and double-pass configurations
by: Hamida, Belal Ahmed, et al.
Published: (2012)
by: Hamida, Belal Ahmed, et al.
Published: (2012)
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Fuzzy logic based temperature control of thermoelectric cooler for single photon avalanche diode application
by: Samsuddin, Nurul Izzati, et al.
Published: (2011)
by: Samsuddin, Nurul Izzati, et al.
Published: (2011)
Reverse leakage current mechanisms in quantum dot laser structures
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
by: Hasbullah, Nurul Fadzlin, et al.
Published: (2011)
Capacitance-voltage characterization of commercial gallium nitride diodes subjected to electron radiation
by: Hedzir, Anati Syahirah, et al.
Published: (2016)
by: Hedzir, Anati Syahirah, et al.
Published: (2016)
The impact of scaling on single event upset in 6T and 12T SRAMs from 130 to 22 nm CMOS technology
by: Yusop, N. S., et al.
Published: (2018)
by: Yusop, N. S., et al.
Published: (2018)
3MeV-electron beam induced threshold voltage shifts and drain current degradation on ZVN3320FTA & ZVP3310FTA commercial MOSFETs
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
by: Abubakkar, Sheik Fareed Ookar, et al.
Published: (2014)
IoT Light Weight (LWT) crypto functions
by: Jaleel, Nubila, et al.
Published: (2019)
by: Jaleel, Nubila, et al.
Published: (2019)
Correlation between defect density and current leakage in InAs∕GaAs quantum dot-in-well structures
by: Sanchez, A. M., et al.
Published: (2009)
by: Sanchez, A. M., et al.
Published: (2009)
Cognitive radio vs intelligent antenna
by: Mat Nawi, Siti Rabani, et al.
Published: (2011)
by: Mat Nawi, Siti Rabani, et al.
Published: (2011)
Performance configuration of Raman-EDFA hybrid optical amplifier for WDM applications
by: Saidin, Norazlina, et al.
Published: (2017)
by: Saidin, Norazlina, et al.
Published: (2017)
Similar Items
-
RARE: mining colossal closed itemset in high dimensional data
by: Md Zaki, Fatimah Audah, et al.
Published: (2018) -
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019) -
HYBRID: an efficient unifying process to mine frequent itemsets
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018) -
Towards scalable algorithm for closed itemset mining in high-dimensional data
by: Md. Zaki, Fatimah Audah, et al.
Published: (2017) -
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)