A Comparative Study of FP-growth Variations
Finding frequent itemsets in databases is crucial in data mining for purpose of extracting association rules. Many algorithms were developed to find those frequent itemsets. This paper presents a summarization and a comparative study of the available FP-growth algorithm variations produced for minin...
| Main Authors: | Aiman Moyaid, Said, P.D.D., Dominic, Azween, Abdullah |
|---|---|
| Format: | Citation Index Journal |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/794/ http://scholars.utp.edu.my/id/eprint/794/1/20090535.pdf |
Similar Items
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A Binary Replication Strategy for Large-scale Mobile Environments
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
Improving mining efficiency: A new scheme for extracting association rules
by: Said, Aiman Moyaid, et al.
Published: (2009)
by: Said, Aiman Moyaid, et al.
Published: (2009)
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A New Hybrid Model Based Decision Support System For Supplier Selection Process: A Case Study from Purchasing Department, UTP
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)
by: Naseebullah, M., et al.
Published: (2010)
A new auditing scheme for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
by: Azad, Saiful, et al.
Published: (2021)
by: Azad, Saiful, et al.
Published: (2021)
Modelling of single sourcing, multiperiod, multivendor, multibuyer based VMI
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A SCM framework to describe CRM
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
A hybrid decision model for the selection of capital equipment using AHP in conjoint analysis under fuzziness
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A decision support system for performance appraisal
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Multiattribute analysis of the offshore outsourcing location decision using a decision support system framework
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A comparative representation approach to modern
heuristic search methods in a job shop
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
by: Dominic P, Dhanapal Durai, et al.
Published: (2008)
Climate Control and Monitoring with Wireless Sensor Network: A Case Study
by: Asfandyar , khan, et al.
Published: (2010)
by: Asfandyar , khan, et al.
Published: (2010)
Survivability Using Adaptive Reconfigurable Systems
by: Azween, Abdullah
Published: (2009)
by: Azween, Abdullah
Published: (2009)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Legacy Model Reconfiguration Using Graph-Theoretic
by: Azween, Abdullah
Published: (2008)
by: Azween, Abdullah
Published: (2008)
Visualizing the construction of incremental Disorder Trie Itemset data structure (DOSTrieIT) for Frequent Pattern Tree (FP-Tree)
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks
by: Muhammad , Ayaz, et al.
Published: (2009)
by: Muhammad , Ayaz, et al.
Published: (2009)
Biologically-Inspired Modeling of Filtering Noise in Signal Sound
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Model of Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer, Irwan, et al.
Published: (2009)
by: Hammuzamer, Irwan, et al.
Published: (2009)
The Impact of Overclocking the CPU to the Genetic Algorithm
by: Ahmed , Hikmat, et al.
Published: (2009)
by: Ahmed , Hikmat, et al.
Published: (2009)
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
by: Muhammad, Ayaz, et al.
Published: (2009)
by: Muhammad, Ayaz, et al.
Published: (2009)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Survivable System by Critical Service Recovery
Model: Single Service Analysis
by: Irving , Paputungan, et al.
Published: (2009)
by: Irving , Paputungan, et al.
Published: (2009)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Dynamic Cluster Based Routing for Underwater
Wireless Sensor Networks
by: Muhammad, Ayaz, et al.
Published: (2010)
by: Muhammad, Ayaz, et al.
Published: (2010)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
Evaluating Intrusion Detection Approaches Using a Multi-criteria Decision Making Technique
by: I. , Ahmad, et al.
Published: (2010)
by: I. , Ahmad, et al.
Published: (2010)
Energy Efficient Routing in Wireless Sensor Network : Research Issues and
Challenges
by: Noor , Zaman, et al.
Published: (2010)
by: Noor , Zaman, et al.
Published: (2010)
Similar Items
-
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008) -
A Binary Replication Strategy for Large-scale Mobile Environments
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009) -
Improving mining efficiency: A new scheme for extracting association rules
by: Said, Aiman Moyaid, et al.
Published: (2009) -
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009) -
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009)