SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511      ISSN: 2249-6645


                     CB Based Approach for Mining Frequent Itemsets
                            K. Jothimani1, Dr. Antony Selvadoss Thanamani2
            *(PhD Research Scholar, Research Department of Computer Science, NGM College, Pollachi ,India)
             ** (Professor and Head, Research Department of Computer Science, NGM College, Pollachi ,India


ABSTRACT : In this paper, we propose a new method                efficientwhen the average transaction length was small;
for discovering frequent itemsets in a transactional data        used lossy counting to mine frequent itemsets; [7],[8],and
stream under the sliding window model. Based on a theory         [9] focused on mining the recent itemsets, which used a
of Chernoff Bound, the proposed method approximates the          regression parameter to adjust and reflect theimportance of
counts of itemsets from certain recorded summary                 recent transactions; [27] presented theFTP-DS method to
information without scanning the input stream for each           compress each frequent itemset; [10] and [1] separately
itemset. Together with an innovative technique called            focused on multiple-level frequentitemset mining and
dynamically approximating to select parameter-values             semi-structure stream mining; [12]proposed a group
properly for different itemsets to be approximated, our          testing technique, and [15] proposeda hash technique to
method is adaptive to streams with different distributions.      improve frequent itemset mining;[16] proposed an in-core
Our experiments show that our algorithm performs much            mining algorithm to speed upthe runtime when distinct
better in optimizing memory usage and mining only the            items are huge or minimumsupport is low; [15] presented
most recent patterns in very less time performance with          two methods separatelybased on the average time stamps
pretty accurate mining result.                                   and frequency-changingpoints of patterns to estimate the
                                                                 approximate supportsof frequent itemsets; [5] focused on
Keywords: Chernoff Bound, DataStream, Frequent                   mining a streamover a flexible sliding window; [11] was a
Itemsets                                                         block-basedstream mining algorithm with DSTree
                                                                 structure; [12] useda verification technique to mine
                 I. INTRODUCTION                                 frequent itemsets over astream when the sliding window is
The most significant tasks in data mining are the process        large; [11] reviewedthe main techniques of frequent
of mining frequent itemsets over data streams. It should         itemset mining algorithmsover data streams and classified
support the flexible trade-off between processing time and       them into categoriesto be separately addressed.
mining accuracy. Mining frequent itemsets in data stream                   The above methods are mostly based on the (ε, δ)
applications is beneficial for a number of purposes such as      approximation scheme,and depend on error parameter ε to
knowledge discovery, trend learning, fraud detection,            control the memory consumption and the running time.
transaction prediction and estimation[1]. However, the           While adilemma between mining precision and memory
characteristics of stream data – unbounded, continuous,          consumption will be caused by the error parameter ε.
fast arriving, and time- changing – make this a challenging      Alittle decrease of ε may make memory consumption
task.                                                            large, and a little increase of ε may degrade
          In data streams, new data are continuously             outputprecision. Since uncertain streams are highly time-
coming as time advances. It is costly even impossible to         sensitive, most data items are more likely to be changedas
store all streaming data received so far due to the memory       time goes by, besides people are generally more interested
constraint. It is assumed that the stream can only be            in the recent data items than those in the past.
scanned once and hence if an item is passed, it can not be                 Thus this needs an efficient model to deal with
revisited, unless it is stored in main memory. Storing large     the time-sensitive items on uncertain streams.Sliding-
parts of the stream, however, is not possible because the        window model is the most reprehensive approach to
amount of data passing by is typically huge. In this paper,      coping with the most recent items in manypractical
we study the problem of finding frequent items in a              applications. So we introduce a Chernoff bound with
continuous stream of items.Many real-world applications          Markov’s inequality to deal this problem
data are more appropriately handled by the data stream                     The remainder of this paperis organized as
model than        by traditional static databases. Such          follows. In Section 2, we give an overview of the
applications can be: stock tickers, network traffic              relatedwork and present our motivation for a new
measurements, transaction flows in retail chains, click          approach. Section 3 goes deeper into presenting the
streams, sensor networks and telecommunications call             problems and gives an extensive statement of our problem.
records. In the sameway, as the data distribution are            Section 4 presents our solution. Experiments are reported
usually changing with time, very often end- users are            Section 5, and Section 6 concludes the paper with the
much more interested in the most recent patterns [3]. For        features of our work.
example, in network monitoring, changes in the past
several minutes of the frequent patterns are useful to                            II. RELATED WORK
detect network intrusions [4].                                 Many previous studies contributed to the efficient mining
          Many methods focusing on frequent itemset            of frequent itemsets (FI) in streaming data [4, 5].
miningover a stream have been proposed. [13] proposed          According to the stream processing model [20], the
FPStreamto mine frequent itemsets, which was                   research of mining frequent itemsets in data streams can
                                                               be divided into three categories: landmark windows [15,
                                                 www.ijmer.com                                               2508 | Page
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511      ISSN: 2249-6645
12, 19, 11, 13], sliding windows [5, 6, 14, 16, 17, 18], and       ζ×|DB|                                            inDB.
damped windows [7, 4], as described briefly as follows. In         Thepreviousdefinitionsconsiderthatthedatabaseisstatic.
the landmark window model, knowledge discovery is                  Letusnowassumethatdataarrivessequentially intheformof
performed based on the values between a specific                   continuousrapid             streams.       Letdatastream
timestamp called landmark and the present. In the sliding                 bi,B bi+1,...,B bnbeaninfinitesequenceofbatches
                                                                   DS=B
window model, knowledge discovery is performed over a
                                                                   ,ai      ai+1 an
fixed number of recently generated data elements which is
the target of data mining.                                         whereeachbatch isassociated with atime period[ak,bk],i.e.
According to the existential uncertain stream model, an            B bk,and letanbethemostrecentbatch
uncertain     stream     US is a          continuous     and
                                                                   Each batch Each batch Bak           consists of a
unboundedsequence of some transactions, {T1 T2 … Tn
                                                                   setof transactions; that is, Each batch Bbk =
…}. Each transaction Ti in US consists of a number of
                                                                   [T1 , T2 , T3, ..., Tk ]. We also assume that
items,and each item x in Ti is associated with a positive
                                                                   batches do not have necessarily the same size.
probability PTi(x), which stands for the possibility
                                                                   Hence, the length
(orlikelihood) that x exists in the transaction Ti. For a
given uncertain stream, there are many possibleinstances
                                                                   The support of an itemset X at a specific time interval [ai
called worlds that are carried by the stream. The possible
                                                                   , bi ] is now denoted by the ratio of the number of
worlds semantics has been widely used
                                                                   customers having X in the current time window to the total
in [8, 9], which can be adopted in this paper to illustrate
                                                                   number of customers. Therefore, given a user-defined
uncertain      streams     clearly.    Each      probability
                                                                   minimum support, the problem of mining itemsets on a
PTi(x)associated with an item x deduces two possible
                                                                   data stream is thus to find all frequent itemsets X over
worlds, pw1 and pw2. In possible world pw1, item x exists
                                                                   an arbitrary time period [ai , bi ], i.e. verifying:
in the transaction Ti, and in possible world pw2, item x
does not exist in Ti. Each possible world pwi is annotated         biXsupportt(X ) ≥ ζ × |Bbi |,t=ai
with an existence probability, denoted as P(pwi) that the
possible world pwi happens. By this semantics, we can get          of the streaming data using as little main memory as
P(pw1)=PTi(x) and P(pw2)=1-PTi(x). In fact, a                      possible.Given a transaction sets X, we are interested in
transaction often contains several items.                          finding strong bounds
   We introduce a new approach which combines the
mathematical model Chernoff bound for this problem. The                     Low End: Pr[X < a]
main attempts were to keep some advantages of the
previous approach and resolve some of its drawbacks, and           High End: Pr[X ≥ a]
consequently to improve run time and memory
consumption. We also revise the Markov’s inequality,               Lemma 1.1 (Markov’s Inequality) Let X be a non-negative
which avoids multiple scans of the entire data sets,               random variable(transaction sets) with finite expectation
optimizing memory usage, and mining only the most                  µ. Then for any α> 0: Pr[X ≥ α] ≤ µ/α.
recent patterns. In this paper, we propose a remarkable
approximating method for discovering frequent itemsets in          Lemma 1.2 (Chebyshev’s Inequality) Let X be a random
a transactional data stream under the sliding window               variable(transaction sets) with finite expectation µ and
model. Based on a theory of Combinatorial Mathematics,             standard deviation σ. Then for any α> 0: Pr[|X − µ| ≥ α σ]
the proposed method approximates the counts of itemsets            ≤ 1/α2.
from certain recorded summary information without
scanning the input stream for each itemset.                        Chebyshev’s inequality follows fromMarkov’s inequality
                                                                   for the variableY = (X − µ)2 (so E[Y ] =Var[X]) and the
                                                                   fact that 𝑥→ 𝑥 2 is a strictly monotonic function on R0 .
             III. PROBLEM DESCRIPTION
           The problem of mining frequent itemsets was             Pr[|X − µ| ≥ α σ] = Pr[(X − µ)2 ≥ α2σ2]
previously defined by [1]: Let I = {i1, i2, . . . im} be a set
of literals, called items. Let database DB be a set of             ≤E[(X − µ)2 ] = 1 / α2
transactions, where each transaction T is a set of items                                   α2σ2
such that T ⊆ I . Associated with each transaction is a            This makes it tempting to use even higher moments to get
unique identifier, called its T I D. A set X ⊆ I is also           better bounds. One way to do thisnicely is by considering
called an itemset, where items within are kept in                  an exponential of the basic form of 𝑒 𝑥 .
lexicographic order. A k-itemset is represented by (x1,
x2, . . . xk ) where x1 < x2 < . . . <xn . The support of          Proof.Lemma 1.3 (Simplified Chernoff Bounds)
an itemset X , denoted support(X ), is the number of
transactions in which that itemset occurs as a subset.             Low End:
An itemset is called a frequent itemset if support(X ) ≥
σ × |DB|          where ζ∈ (0,1)isauser-specifiedminimum                    Pr[X < (1 − δ)µ] < e−µδ2 /2 0 < δ ≤ 1
support             threshold           and              |DB|
standsforthesizeofthedatabase.                                     High End:
           Theproblem            ofminingfrequentitemsets
                                                                            Pr[X ≥ (1 + δ)µ] < e−µδ2 /3 0 < δ ≤ 1
istomineallitemsets whosesupport isgreater orequalthan

                                                   www.ijmer.com                                                    2509 | Page
International Journal of Modern Engineering Research (IJMER)
                 www.ijmer.com               Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511      ISSN: 2249-6645
         Pr[X ≥ (1 + δ)] < e−(1+δ)µ2e − 1 < δ                       V. EXPERIMENTAL RESUTLS
                                                                    All experiments were implemented with C#, compiledwith
Proof.
                                                                    Visual Studio 2005 in Windows Server 2003 andexecuted
For the LowEnd let D = (1 − δ)1−δ. By Taylor expansion              on a Xeon 2.0GHz PC with 4GB RAM. We used 1
we get                                                              synthetic datasets and 1 real-life datasets, which are well-
                                                                    known benchmarks for frequent itemset mining. The
ln D = (1 − δ) ln(1 − δ)                                            T40I10D100K dataset is generated with the IBM synthetic
                                                                    data generator.
= (1 − δ)(−δ − δ2/2 − δ3/3 − . . .)                                    We firstly compared the average runtime of these
                                                                    twoalgorithms under different data sizes when the
= −δ + δ2/2 + δ3/6 + . . .                                          minimumsupport was fixed. As shown in all of the images
                                                                    inFig.5.1, the running time cost of MFI and CBMFI
         > −δ + δ2/2                                                increase following the data size; these results verify
                                                                    thatboth algorithms are sensitive to data size, which is due
By Applying this simplified method in the series we can             tothe using of unchanged absolute minimum support
get the following equation for low end windows.

                𝑒 −𝛿
Hence                      = 𝑒 −µδ2/2
            (1 – δ)1 – δ


                IV. CBMFI ALGORITHM
CBMFI (ChernoffBound Based Mining Frequent Itemsets)
algorithm relies on a verifier function and it is an exact
and efficient algorithm for mining frequent itemsets
sliding windows over data streams. The performance of
CBMFI improves when small delays are allowed in
reporting new frequent itemsets, however this delay can be
set to 0 with a small performance overhead.
  The following algorithm shows how it combines with
CB for Mining frequent itemsets.

CBMFI                                                                       Fig: 5.1 Runtime vs number of Records
Initialization
For all u pick a route rt(u).                                       Memory Cost Evaluation
Place all Mu such that D(u) =6 u into Ce where e is the                To evaluate the memory cost of our algorithm, we
first window on rt(u).                                              comparedthe count of generated items in MFIand
Main Loop r = 0                                                     CBMFI.As shown in Fig.5.2 and Fig.5.3, when we fix the
while( there is a packet not at its destination )                   minimumsupport and increase the data size, the generated
in parallel, for all window ends e = (x, y)                         itemsof both algorithm become more, but the overall
do                                                                  itemscount    of   CBMFIis less       than     that   of
ifCe is not empty,                                                  MFIsinceCBMFIuses simplified method foritemsets.
pick the highest priority itemsets in Ce
                        y = itemsets(T)
if ( a moved itemset is not at its destination )
                     Ce′= next end transaction
 r=r+1

We would like to use a Chernoff bound, so we need to find
some independent Poisson trials somewhere. This requires
a bit of thought, lots of random variables associated with
this algorithm are not independent;

The expected length of a route is k/2, so the total number
of edges on all routes is expected to benk/2. The total
number of edges in a hypercube is nk, so we have E[R(e)]
= 1/2.It follows that E[H] ≤ k/2.  Now       apply     the                Fig: 5.2 Itemset Count cost vsTransation Set
simplified Chernoff bound where δ > 2e − 1:

                       Pr[H ≥ 6k] < 2−6k

This is allowed since 6k = (δ + 1)µ implies δ > 11. By
applying this in the CBMFI algorithm we can get the
efficient result.
                                                    www.ijmer.com                                                   2510 | Page
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com            Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511      ISSN: 2249-6645
                                                                       sliding window”, Proc. 4th IEEE Conf. on Data
                                                                       Mining, Brighton, UK, 2004, pp. 59–66.
                                                                [8]    N. Jiang & L. Gruenwald, “CFI-Stream: mining
                                                                       closed frequent Itemsets in data streams”, Proc. 12th
                                                                       ACM SIGKDD Conf. on Knowledge Discovery and
                                                                       Data Mining, Philadelphia, PA,USA, 2006, pp. 592–
                                                                       597.
                                                                [9]    H.F Li, S.Y. Lee, M.K. Shan, “An Efficient
                                                                       Algorithm for Mining Frequent Itemsets over the
                                                                       Entire History of Data Streams”, In Proceedings of
                                                                       First International Workshop on Knowledge
                                                                       Discovery in Data Streams 9IWKDDS, 2004.
                                                                [10]   H.F Li, S.Y. Lee, M.K. Shan, “Online Mining
                                                                       (Recently) Maximal Frequent Itemsets over Data
                                                                       Streams”, In Proceedings of the 15th IEEE
      Fig: 5.3Itemsets Count cost vs. Minimum Support                  International Workshop on Research Issues on Data
                                                                       Engineering (RIDE), 2005.
   Furthermore, when the minimum support increases,the          [11]   J.H. Chang & W.S. Lee, “A sliding window method
incremental scope of CBMFIis much reduced thanthat of                  for finding recently frequent itemsets over online
MFI, that is because more redundant items when the                     data streams”, Journal of Information science and
overall items count isfixed but the itemsets count                     Engineering, 20(4), 2004, pp. 753–762.
increases.                                                      [12]   J. Cheng, Y. Ke, & W. Ng,” Maintaining frequent
                                                                       itemsets over high-speed data streams”, Proc. 10th
                   VI. CONCLUSION                                      Pacific-Asia Conf. on Knowledge Discovery and
In this paper we considered a problem that how tomine                  Data Mining, Singapore, 2006, pp.462–467.
frequent itemset over stream sliding window using               [13]   C.K.-S. Leung & Q.I. Khan, “DSTree: a tree
Chernoff Bound. We compared twoalgorithmsMFI and                       structure for the mining of frequent sets from data
CBMFI and introduce a compact datastructure, which can                 streams,” Proc. 6th IEEE Conf. on Data Mining,
compress the itemsetstorage and optimize itemset                       Hong Kong, China, 2006, pp. 928–932.
computation, based oncombinatorial mathematical. Our            [14]   B. Mozafari, H. Thakkar, & C. Zaniolo, “Verifying
experimental studies showed that ouralgorithm is effective             and mining frequent patterns from large windows
and efficient.                                                         over data streams”, Proc. 24th Conf. on Data
                                                                       Engineering, Mexico, 2008, pp. 179–188.
                                                                [15]   K.-F. Jea& C.-W. Li, “Discovering frequent itemsets
                      REFERENCES
                                                                       over transactional data streams through an efficient
[1]    R. Agrawal, T. Imielinski, andA. Swami. Mining
                                                                       and stable approximate approach, Expert Systems
       associationrules                 betweensetsofitems
                                                                       with Applications”, 36(10), 2009, pp. 12323–12331.
       inlargedatabase.InProc.           oftheIntl.   Conf.
       onManagement ofData(ACM SIGMOD 93),1993.
[2]    Y.Chen, G.Dong,J. Han, B.Wah, and J. Wang.
       Multi-dimensional regression analysisoftime-series
       data streams. InProc. ofVLDB’02 Conference,
       2002.
[3]    Y.Chi, H.Wang, P.S. Yu, andR.R. Muntz.Moment:
       Maintainingclosedfrequentitemsets over a stream
       sliding window.      In                        Proc.
       ofICDM’04Conference, 2004.
[4]    P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J.
       Srivastava, and P.-N. Tan. Data mining for
       network intrusion detection. In Proc. of the 2002
       National Science Foundation Workshop on Data
       Mining, 2002.
[5]    G.Giannella,             J.Han,J.Pei,X.Yan,andP.Yu.
       Miningfrequentpat-ternsindata
       streamsatmultipletimegranularities.InNextGeneratio
       n DataMining,MIT Press,2003.
[6]    J. Han, J. Pei, B. Mortazavi-asl, Q. Chen, U. Dayal,
       andM. Hsu.Freespan:                Frequentpattern-
       projectedsequential patternmining.                In
       Proc.ofKDD’00Conference, 2000.
[7]    Y. Chi, H. Wang, P.S. Yu, & R.R. Muntz, “Moment:
       maintaining closed frequent itemsets over a stream


                                                www.ijmer.com                                                   2511 | Page

More Related Content

What's hot

NNPDF3.0: parton distributions for the LHC Run II
NNPDF3.0: parton distributions for the LHC Run IINNPDF3.0: parton distributions for the LHC Run II
NNPDF3.0: parton distributions for the LHC Run IIjuanrojochacon
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...hemanthbbc
 
A Short Course in Data Stream Mining
A Short Course in Data Stream MiningA Short Course in Data Stream Mining
A Short Course in Data Stream MiningAlbert Bifet
 
Information Flow and Search in Unstructured Keyword based Social Networks
Information Flow and Search in Unstructured Keyword based Social NetworksInformation Flow and Search in Unstructured Keyword based Social Networks
Information Flow and Search in Unstructured Keyword based Social NetworksPrantik Bhattacharyya
 
Learning to rankの評価手法
Learning to rankの評価手法Learning to rankの評価手法
Learning to rankの評価手法Kensuke Mitsuzawa
 
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data Streams
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data StreamsMining Adaptively Frequent Closed Unlabeled Rooted Trees in Data Streams
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data StreamsAlbert Bifet
 
Wanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash TableWanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash TableAmit Kumar
 
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Junpei Kawamoto
 
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...IJMER
 

What's hot (11)

NNPDF3.0: parton distributions for the LHC Run II
NNPDF3.0: parton distributions for the LHC Run IINNPDF3.0: parton distributions for the LHC Run II
NNPDF3.0: parton distributions for the LHC Run II
 
Ch13
Ch13Ch13
Ch13
 
O(1) DHT
O(1) DHTO(1) DHT
O(1) DHT
 
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
Ieeepro techno solutions   2013 ieee java project -building confidential and ...Ieeepro techno solutions   2013 ieee java project -building confidential and ...
Ieeepro techno solutions 2013 ieee java project -building confidential and ...
 
A Short Course in Data Stream Mining
A Short Course in Data Stream MiningA Short Course in Data Stream Mining
A Short Course in Data Stream Mining
 
Information Flow and Search in Unstructured Keyword based Social Networks
Information Flow and Search in Unstructured Keyword based Social NetworksInformation Flow and Search in Unstructured Keyword based Social Networks
Information Flow and Search in Unstructured Keyword based Social Networks
 
Learning to rankの評価手法
Learning to rankの評価手法Learning to rankの評価手法
Learning to rankの評価手法
 
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data Streams
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data StreamsMining Adaptively Frequent Closed Unlabeled Rooted Trees in Data Streams
Mining Adaptively Frequent Closed Unlabeled Rooted Trees in Data Streams
 
Wanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash TableWanhive vs Chord Distributed Hash Table
Wanhive vs Chord Distributed Hash Table
 
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
Frequency-based Constraint Relaxation for Private Query Processing in Cloud D...
 
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...
GA Based Multi-Objective Time-Cost Optimization in a Project with Resources C...
 

Viewers also liked

Considering User Participation in Light Of level and Stages of Self-Selectio...
Considering User Participation in Light Of level and Stages of  Self-Selectio...Considering User Participation in Light Of level and Stages of  Self-Selectio...
Considering User Participation in Light Of level and Stages of Self-Selectio...IJMER
 
Road User Attitudes towards Safety Initiatives in Kuwait
Road User Attitudes towards Safety Initiatives in KuwaitRoad User Attitudes towards Safety Initiatives in Kuwait
Road User Attitudes towards Safety Initiatives in KuwaitIJMER
 
Design of Elliptical Patch Antenna with Single & Double U-Slot for Wireless ...
Design of Elliptical Patch Antenna with Single & Double U-Slot  for Wireless ...Design of Elliptical Patch Antenna with Single & Double U-Slot  for Wireless ...
Design of Elliptical Patch Antenna with Single & Double U-Slot for Wireless ...IJMER
 
Layered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionLayered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionIJMER
 
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksSecure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksIJMER
 
Investigating the Effect of Pounding on Seismic Response of Isolated Structures
Investigating the Effect of Pounding on Seismic Response of Isolated  StructuresInvestigating the Effect of Pounding on Seismic Response of Isolated  Structures
Investigating the Effect of Pounding on Seismic Response of Isolated StructuresIJMER
 
About the 2-Banach Spaces
About the 2-Banach Spaces About the 2-Banach Spaces
About the 2-Banach Spaces IJMER
 
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesA Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesIJMER
 
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
Pathogenic Bacteria in Corals from Veracruz Reef System  National Park Pathogenic Bacteria in Corals from Veracruz Reef System  National Park
Pathogenic Bacteria in Corals from Veracruz Reef System National Park IJMER
 
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...IJMER
 
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...IJMER
 
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...IJMER
 
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...IJMER
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...IJMER
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewIJMER
 
Di2644594461
Di2644594461Di2644594461
Di2644594461IJMER
 
Ak2418751879
Ak2418751879Ak2418751879
Ak2418751879IJMER
 
Image Denoising Based On Wavelet for Satellite Imagery: A Review
Image Denoising Based On Wavelet for Satellite Imagery: A  ReviewImage Denoising Based On Wavelet for Satellite Imagery: A  Review
Image Denoising Based On Wavelet for Satellite Imagery: A ReviewIJMER
 
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareImplementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareIJMER
 
Heuristics for the Maximal Diversity Selection Problem
Heuristics for the Maximal Diversity Selection ProblemHeuristics for the Maximal Diversity Selection Problem
Heuristics for the Maximal Diversity Selection ProblemIJMER
 

Viewers also liked (20)

Considering User Participation in Light Of level and Stages of Self-Selectio...
Considering User Participation in Light Of level and Stages of  Self-Selectio...Considering User Participation in Light Of level and Stages of  Self-Selectio...
Considering User Participation in Light Of level and Stages of Self-Selectio...
 
Road User Attitudes towards Safety Initiatives in Kuwait
Road User Attitudes towards Safety Initiatives in KuwaitRoad User Attitudes towards Safety Initiatives in Kuwait
Road User Attitudes towards Safety Initiatives in Kuwait
 
Design of Elliptical Patch Antenna with Single & Double U-Slot for Wireless ...
Design of Elliptical Patch Antenna with Single & Double U-Slot  for Wireless ...Design of Elliptical Patch Antenna with Single & Double U-Slot  for Wireless ...
Design of Elliptical Patch Antenna with Single & Double U-Slot for Wireless ...
 
Layered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion DectionLayered Approach & HMM for Network Based Intrusion Dection
Layered Approach & HMM for Network Based Intrusion Dection
 
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh NetworksSecure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
Secure Ticket- Based Anonymity and Traceability in Wireless Mesh Networks
 
Investigating the Effect of Pounding on Seismic Response of Isolated Structures
Investigating the Effect of Pounding on Seismic Response of Isolated  StructuresInvestigating the Effect of Pounding on Seismic Response of Isolated  Structures
Investigating the Effect of Pounding on Seismic Response of Isolated Structures
 
About the 2-Banach Spaces
About the 2-Banach Spaces About the 2-Banach Spaces
About the 2-Banach Spaces
 
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between AttributesA Study on Mathematical Statistics to Evaluate Relationship between Attributes
A Study on Mathematical Statistics to Evaluate Relationship between Attributes
 
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
Pathogenic Bacteria in Corals from Veracruz Reef System  National Park Pathogenic Bacteria in Corals from Veracruz Reef System  National Park
Pathogenic Bacteria in Corals from Veracruz Reef System National Park
 
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...Prediction of Deflection and Stresses of Laminated Composite  Plate with Arti...
Prediction of Deflection and Stresses of Laminated Composite Plate with Arti...
 
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...
OXYSTELMA ESCULENTUM Stem Extracts as Corrosion Inhibitor for Mild Steel in A...
 
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...
 
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...Microstructure Degradation after Prolonged Exploitation of  Heatresistant Ste...
Microstructure Degradation after Prolonged Exploitation of Heatresistant Ste...
 
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...The Contribution of Solar Energy to Reduce Electricity Shortage  in the Gaza ...
The Contribution of Solar Energy to Reduce Electricity Shortage in the Gaza ...
 
Optimization of Tool Wear: A Review
Optimization of Tool Wear: A ReviewOptimization of Tool Wear: A Review
Optimization of Tool Wear: A Review
 
Di2644594461
Di2644594461Di2644594461
Di2644594461
 
Ak2418751879
Ak2418751879Ak2418751879
Ak2418751879
 
Image Denoising Based On Wavelet for Satellite Imagery: A Review
Image Denoising Based On Wavelet for Satellite Imagery: A  ReviewImage Denoising Based On Wavelet for Satellite Imagery: A  Review
Image Denoising Based On Wavelet for Satellite Imagery: A Review
 
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-HardwareImplementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
 
Heuristics for the Maximal Diversity Selection Problem
Heuristics for the Maximal Diversity Selection ProblemHeuristics for the Maximal Diversity Selection Problem
Heuristics for the Maximal Diversity Selection Problem
 

Similar to Db2425082511

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...IJDKP
 
Mining frequent itemsets (mfi) over
Mining frequent itemsets (mfi) overMining frequent itemsets (mfi) over
Mining frequent itemsets (mfi) overIJDKP
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
 
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...ijitcs
 
MINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAMINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAIJDKP
 
MINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAMINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAIJDKP
 
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...Waqas Tariq
 
Paper id 25201431
Paper id 25201431Paper id 25201431
Paper id 25201431IJRAT
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Mining high utility itemsets in data streams based on the weighted sliding wi...
Mining high utility itemsets in data streams based on the weighted sliding wi...Mining high utility itemsets in data streams based on the weighted sliding wi...
Mining high utility itemsets in data streams based on the weighted sliding wi...IJDKP
 
DSTree: A Tree Structure for the Mining of Frequent Sets from Data Streams
DSTree: A Tree Structure for the Mining of Frequent Sets from Data StreamsDSTree: A Tree Structure for the Mining of Frequent Sets from Data Streams
DSTree: A Tree Structure for the Mining of Frequent Sets from Data StreamsAllenWu
 
Mining top k frequent closed itemsets
Mining top k frequent closed itemsetsMining top k frequent closed itemsets
Mining top k frequent closed itemsetsyuanchung
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a reviewTELKOMNIKA JOURNAL
 
Mining Stream Data using k-Means clustering Algorithm
Mining Stream Data using k-Means clustering AlgorithmMining Stream Data using k-Means clustering Algorithm
Mining Stream Data using k-Means clustering AlgorithmManishankar Medi
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringIJECEIAES
 
Ijsrdv1 i2039
Ijsrdv1 i2039Ijsrdv1 i2039
Ijsrdv1 i2039ijsrd.com
 

Similar to Db2425082511 (20)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...
FREQUENT ITEMSET MINING IN TRANSACTIONAL DATA STREAMS BASED ON QUALITY CONTRO...
 
Mining frequent itemsets (mfi) over
Mining frequent itemsets (mfi) overMining frequent itemsets (mfi) over
Mining frequent itemsets (mfi) over
 
386 390
386 390386 390
386 390
 
386 390
386 390386 390
386 390
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
 
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
Mining Maximum Frequent Item Sets Over Data Streams Using Transaction Sliding...
 
MINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAMINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATA
 
MINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATAMINING TECHNIQUES FOR STREAMING DATA
MINING TECHNIQUES FOR STREAMING DATA
 
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...
An Efficient Algorithm for Mining Frequent Itemsets within Large Windows over...
 
Paper id 25201431
Paper id 25201431Paper id 25201431
Paper id 25201431
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Mining high utility itemsets in data streams based on the weighted sliding wi...
Mining high utility itemsets in data streams based on the weighted sliding wi...Mining high utility itemsets in data streams based on the weighted sliding wi...
Mining high utility itemsets in data streams based on the weighted sliding wi...
 
DSTree: A Tree Structure for the Mining of Frequent Sets from Data Streams
DSTree: A Tree Structure for the Mining of Frequent Sets from Data StreamsDSTree: A Tree Structure for the Mining of Frequent Sets from Data Streams
DSTree: A Tree Structure for the Mining of Frequent Sets from Data Streams
 
Aa31163168
Aa31163168Aa31163168
Aa31163168
 
Mining top k frequent closed itemsets
Mining top k frequent closed itemsetsMining top k frequent closed itemsets
Mining top k frequent closed itemsets
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a review
 
Mining Stream Data using k-Means clustering Algorithm
Mining Stream Data using k-Means clustering AlgorithmMining Stream Data using k-Means clustering Algorithm
Mining Stream Data using k-Means clustering Algorithm
 
An Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream ClusteringAn Improved Differential Evolution Algorithm for Data Stream Clustering
An Improved Differential Evolution Algorithm for Data Stream Clustering
 
Ijsrdv1 i2039
Ijsrdv1 i2039Ijsrdv1 i2039
Ijsrdv1 i2039
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Db2425082511

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511 ISSN: 2249-6645 CB Based Approach for Mining Frequent Itemsets K. Jothimani1, Dr. Antony Selvadoss Thanamani2 *(PhD Research Scholar, Research Department of Computer Science, NGM College, Pollachi ,India) ** (Professor and Head, Research Department of Computer Science, NGM College, Pollachi ,India ABSTRACT : In this paper, we propose a new method efficientwhen the average transaction length was small; for discovering frequent itemsets in a transactional data used lossy counting to mine frequent itemsets; [7],[8],and stream under the sliding window model. Based on a theory [9] focused on mining the recent itemsets, which used a of Chernoff Bound, the proposed method approximates the regression parameter to adjust and reflect theimportance of counts of itemsets from certain recorded summary recent transactions; [27] presented theFTP-DS method to information without scanning the input stream for each compress each frequent itemset; [10] and [1] separately itemset. Together with an innovative technique called focused on multiple-level frequentitemset mining and dynamically approximating to select parameter-values semi-structure stream mining; [12]proposed a group properly for different itemsets to be approximated, our testing technique, and [15] proposeda hash technique to method is adaptive to streams with different distributions. improve frequent itemset mining;[16] proposed an in-core Our experiments show that our algorithm performs much mining algorithm to speed upthe runtime when distinct better in optimizing memory usage and mining only the items are huge or minimumsupport is low; [15] presented most recent patterns in very less time performance with two methods separatelybased on the average time stamps pretty accurate mining result. and frequency-changingpoints of patterns to estimate the approximate supportsof frequent itemsets; [5] focused on Keywords: Chernoff Bound, DataStream, Frequent mining a streamover a flexible sliding window; [11] was a Itemsets block-basedstream mining algorithm with DSTree structure; [12] useda verification technique to mine I. INTRODUCTION frequent itemsets over astream when the sliding window is The most significant tasks in data mining are the process large; [11] reviewedthe main techniques of frequent of mining frequent itemsets over data streams. It should itemset mining algorithmsover data streams and classified support the flexible trade-off between processing time and them into categoriesto be separately addressed. mining accuracy. Mining frequent itemsets in data stream The above methods are mostly based on the (ε, δ) applications is beneficial for a number of purposes such as approximation scheme,and depend on error parameter ε to knowledge discovery, trend learning, fraud detection, control the memory consumption and the running time. transaction prediction and estimation[1]. However, the While adilemma between mining precision and memory characteristics of stream data – unbounded, continuous, consumption will be caused by the error parameter ε. fast arriving, and time- changing – make this a challenging Alittle decrease of ε may make memory consumption task. large, and a little increase of ε may degrade In data streams, new data are continuously outputprecision. Since uncertain streams are highly time- coming as time advances. It is costly even impossible to sensitive, most data items are more likely to be changedas store all streaming data received so far due to the memory time goes by, besides people are generally more interested constraint. It is assumed that the stream can only be in the recent data items than those in the past. scanned once and hence if an item is passed, it can not be Thus this needs an efficient model to deal with revisited, unless it is stored in main memory. Storing large the time-sensitive items on uncertain streams.Sliding- parts of the stream, however, is not possible because the window model is the most reprehensive approach to amount of data passing by is typically huge. In this paper, coping with the most recent items in manypractical we study the problem of finding frequent items in a applications. So we introduce a Chernoff bound with continuous stream of items.Many real-world applications Markov’s inequality to deal this problem data are more appropriately handled by the data stream The remainder of this paperis organized as model than by traditional static databases. Such follows. In Section 2, we give an overview of the applications can be: stock tickers, network traffic relatedwork and present our motivation for a new measurements, transaction flows in retail chains, click approach. Section 3 goes deeper into presenting the streams, sensor networks and telecommunications call problems and gives an extensive statement of our problem. records. In the sameway, as the data distribution are Section 4 presents our solution. Experiments are reported usually changing with time, very often end- users are Section 5, and Section 6 concludes the paper with the much more interested in the most recent patterns [3]. For features of our work. example, in network monitoring, changes in the past several minutes of the frequent patterns are useful to II. RELATED WORK detect network intrusions [4]. Many previous studies contributed to the efficient mining Many methods focusing on frequent itemset of frequent itemsets (FI) in streaming data [4, 5]. miningover a stream have been proposed. [13] proposed According to the stream processing model [20], the FPStreamto mine frequent itemsets, which was research of mining frequent itemsets in data streams can be divided into three categories: landmark windows [15, www.ijmer.com 2508 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511 ISSN: 2249-6645 12, 19, 11, 13], sliding windows [5, 6, 14, 16, 17, 18], and ζ×|DB| inDB. damped windows [7, 4], as described briefly as follows. In Thepreviousdefinitionsconsiderthatthedatabaseisstatic. the landmark window model, knowledge discovery is Letusnowassumethatdataarrivessequentially intheformof performed based on the values between a specific continuousrapid streams. Letdatastream timestamp called landmark and the present. In the sliding bi,B bi+1,...,B bnbeaninfinitesequenceofbatches DS=B window model, knowledge discovery is performed over a ,ai ai+1 an fixed number of recently generated data elements which is the target of data mining. whereeachbatch isassociated with atime period[ak,bk],i.e. According to the existential uncertain stream model, an B bk,and letanbethemostrecentbatch uncertain stream US is a continuous and Each batch Each batch Bak consists of a unboundedsequence of some transactions, {T1 T2 … Tn setof transactions; that is, Each batch Bbk = …}. Each transaction Ti in US consists of a number of [T1 , T2 , T3, ..., Tk ]. We also assume that items,and each item x in Ti is associated with a positive batches do not have necessarily the same size. probability PTi(x), which stands for the possibility Hence, the length (orlikelihood) that x exists in the transaction Ti. For a given uncertain stream, there are many possibleinstances The support of an itemset X at a specific time interval [ai called worlds that are carried by the stream. The possible , bi ] is now denoted by the ratio of the number of worlds semantics has been widely used customers having X in the current time window to the total in [8, 9], which can be adopted in this paper to illustrate number of customers. Therefore, given a user-defined uncertain streams clearly. Each probability minimum support, the problem of mining itemsets on a PTi(x)associated with an item x deduces two possible data stream is thus to find all frequent itemsets X over worlds, pw1 and pw2. In possible world pw1, item x exists an arbitrary time period [ai , bi ], i.e. verifying: in the transaction Ti, and in possible world pw2, item x does not exist in Ti. Each possible world pwi is annotated biXsupportt(X ) ≥ ζ × |Bbi |,t=ai with an existence probability, denoted as P(pwi) that the possible world pwi happens. By this semantics, we can get of the streaming data using as little main memory as P(pw1)=PTi(x) and P(pw2)=1-PTi(x). In fact, a possible.Given a transaction sets X, we are interested in transaction often contains several items. finding strong bounds We introduce a new approach which combines the mathematical model Chernoff bound for this problem. The Low End: Pr[X < a] main attempts were to keep some advantages of the previous approach and resolve some of its drawbacks, and High End: Pr[X ≥ a] consequently to improve run time and memory consumption. We also revise the Markov’s inequality, Lemma 1.1 (Markov’s Inequality) Let X be a non-negative which avoids multiple scans of the entire data sets, random variable(transaction sets) with finite expectation optimizing memory usage, and mining only the most µ. Then for any α> 0: Pr[X ≥ α] ≤ µ/α. recent patterns. In this paper, we propose a remarkable approximating method for discovering frequent itemsets in Lemma 1.2 (Chebyshev’s Inequality) Let X be a random a transactional data stream under the sliding window variable(transaction sets) with finite expectation µ and model. Based on a theory of Combinatorial Mathematics, standard deviation σ. Then for any α> 0: Pr[|X − µ| ≥ α σ] the proposed method approximates the counts of itemsets ≤ 1/α2. from certain recorded summary information without scanning the input stream for each itemset. Chebyshev’s inequality follows fromMarkov’s inequality for the variableY = (X − µ)2 (so E[Y ] =Var[X]) and the fact that 𝑥→ 𝑥 2 is a strictly monotonic function on R0 . III. PROBLEM DESCRIPTION The problem of mining frequent itemsets was Pr[|X − µ| ≥ α σ] = Pr[(X − µ)2 ≥ α2σ2] previously defined by [1]: Let I = {i1, i2, . . . im} be a set of literals, called items. Let database DB be a set of ≤E[(X − µ)2 ] = 1 / α2 transactions, where each transaction T is a set of items α2σ2 such that T ⊆ I . Associated with each transaction is a This makes it tempting to use even higher moments to get unique identifier, called its T I D. A set X ⊆ I is also better bounds. One way to do thisnicely is by considering called an itemset, where items within are kept in an exponential of the basic form of 𝑒 𝑥 . lexicographic order. A k-itemset is represented by (x1, x2, . . . xk ) where x1 < x2 < . . . <xn . The support of Proof.Lemma 1.3 (Simplified Chernoff Bounds) an itemset X , denoted support(X ), is the number of transactions in which that itemset occurs as a subset. Low End: An itemset is called a frequent itemset if support(X ) ≥ σ × |DB| where ζ∈ (0,1)isauser-specifiedminimum Pr[X < (1 − δ)µ] < e−µδ2 /2 0 < δ ≤ 1 support threshold and |DB| standsforthesizeofthedatabase. High End: Theproblem ofminingfrequentitemsets Pr[X ≥ (1 + δ)µ] < e−µδ2 /3 0 < δ ≤ 1 istomineallitemsets whosesupport isgreater orequalthan www.ijmer.com 2509 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511 ISSN: 2249-6645 Pr[X ≥ (1 + δ)] < e−(1+δ)µ2e − 1 < δ V. EXPERIMENTAL RESUTLS All experiments were implemented with C#, compiledwith Proof. Visual Studio 2005 in Windows Server 2003 andexecuted For the LowEnd let D = (1 − δ)1−δ. By Taylor expansion on a Xeon 2.0GHz PC with 4GB RAM. We used 1 we get synthetic datasets and 1 real-life datasets, which are well- known benchmarks for frequent itemset mining. The ln D = (1 − δ) ln(1 − δ) T40I10D100K dataset is generated with the IBM synthetic data generator. = (1 − δ)(−δ − δ2/2 − δ3/3 − . . .) We firstly compared the average runtime of these twoalgorithms under different data sizes when the = −δ + δ2/2 + δ3/6 + . . . minimumsupport was fixed. As shown in all of the images inFig.5.1, the running time cost of MFI and CBMFI > −δ + δ2/2 increase following the data size; these results verify thatboth algorithms are sensitive to data size, which is due By Applying this simplified method in the series we can tothe using of unchanged absolute minimum support get the following equation for low end windows. 𝑒 −𝛿 Hence = 𝑒 −µδ2/2 (1 – δ)1 – δ IV. CBMFI ALGORITHM CBMFI (ChernoffBound Based Mining Frequent Itemsets) algorithm relies on a verifier function and it is an exact and efficient algorithm for mining frequent itemsets sliding windows over data streams. The performance of CBMFI improves when small delays are allowed in reporting new frequent itemsets, however this delay can be set to 0 with a small performance overhead. The following algorithm shows how it combines with CB for Mining frequent itemsets. CBMFI Fig: 5.1 Runtime vs number of Records Initialization For all u pick a route rt(u). Memory Cost Evaluation Place all Mu such that D(u) =6 u into Ce where e is the To evaluate the memory cost of our algorithm, we first window on rt(u). comparedthe count of generated items in MFIand Main Loop r = 0 CBMFI.As shown in Fig.5.2 and Fig.5.3, when we fix the while( there is a packet not at its destination ) minimumsupport and increase the data size, the generated in parallel, for all window ends e = (x, y) itemsof both algorithm become more, but the overall do itemscount of CBMFIis less than that of ifCe is not empty, MFIsinceCBMFIuses simplified method foritemsets. pick the highest priority itemsets in Ce y = itemsets(T) if ( a moved itemset is not at its destination ) Ce′= next end transaction r=r+1 We would like to use a Chernoff bound, so we need to find some independent Poisson trials somewhere. This requires a bit of thought, lots of random variables associated with this algorithm are not independent; The expected length of a route is k/2, so the total number of edges on all routes is expected to benk/2. The total number of edges in a hypercube is nk, so we have E[R(e)] = 1/2.It follows that E[H] ≤ k/2. Now apply the Fig: 5.2 Itemset Count cost vsTransation Set simplified Chernoff bound where δ > 2e − 1: Pr[H ≥ 6k] < 2−6k This is allowed since 6k = (δ + 1)µ implies δ > 11. By applying this in the CBMFI algorithm we can get the efficient result. www.ijmer.com 2510 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-2508-2511 ISSN: 2249-6645 sliding window”, Proc. 4th IEEE Conf. on Data Mining, Brighton, UK, 2004, pp. 59–66. [8] N. Jiang & L. Gruenwald, “CFI-Stream: mining closed frequent Itemsets in data streams”, Proc. 12th ACM SIGKDD Conf. on Knowledge Discovery and Data Mining, Philadelphia, PA,USA, 2006, pp. 592– 597. [9] H.F Li, S.Y. Lee, M.K. Shan, “An Efficient Algorithm for Mining Frequent Itemsets over the Entire History of Data Streams”, In Proceedings of First International Workshop on Knowledge Discovery in Data Streams 9IWKDDS, 2004. [10] H.F Li, S.Y. Lee, M.K. Shan, “Online Mining (Recently) Maximal Frequent Itemsets over Data Streams”, In Proceedings of the 15th IEEE Fig: 5.3Itemsets Count cost vs. Minimum Support International Workshop on Research Issues on Data Engineering (RIDE), 2005. Furthermore, when the minimum support increases,the [11] J.H. Chang & W.S. Lee, “A sliding window method incremental scope of CBMFIis much reduced thanthat of for finding recently frequent itemsets over online MFI, that is because more redundant items when the data streams”, Journal of Information science and overall items count isfixed but the itemsets count Engineering, 20(4), 2004, pp. 753–762. increases. [12] J. Cheng, Y. Ke, & W. Ng,” Maintaining frequent itemsets over high-speed data streams”, Proc. 10th VI. CONCLUSION Pacific-Asia Conf. on Knowledge Discovery and In this paper we considered a problem that how tomine Data Mining, Singapore, 2006, pp.462–467. frequent itemset over stream sliding window using [13] C.K.-S. Leung & Q.I. Khan, “DSTree: a tree Chernoff Bound. We compared twoalgorithmsMFI and structure for the mining of frequent sets from data CBMFI and introduce a compact datastructure, which can streams,” Proc. 6th IEEE Conf. on Data Mining, compress the itemsetstorage and optimize itemset Hong Kong, China, 2006, pp. 928–932. computation, based oncombinatorial mathematical. Our [14] B. Mozafari, H. Thakkar, & C. Zaniolo, “Verifying experimental studies showed that ouralgorithm is effective and mining frequent patterns from large windows and efficient. over data streams”, Proc. 24th Conf. on Data Engineering, Mexico, 2008, pp. 179–188. [15] K.-F. Jea& C.-W. Li, “Discovering frequent itemsets REFERENCES over transactional data streams through an efficient [1] R. Agrawal, T. Imielinski, andA. Swami. Mining and stable approximate approach, Expert Systems associationrules betweensetsofitems with Applications”, 36(10), 2009, pp. 12323–12331. inlargedatabase.InProc. oftheIntl. Conf. onManagement ofData(ACM SIGMOD 93),1993. [2] Y.Chen, G.Dong,J. Han, B.Wah, and J. Wang. Multi-dimensional regression analysisoftime-series data streams. InProc. ofVLDB’02 Conference, 2002. [3] Y.Chi, H.Wang, P.S. Yu, andR.R. Muntz.Moment: Maintainingclosedfrequentitemsets over a stream sliding window. In Proc. ofICDM’04Conference, 2004. [4] P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P.-N. Tan. Data mining for network intrusion detection. In Proc. of the 2002 National Science Foundation Workshop on Data Mining, 2002. [5] G.Giannella, J.Han,J.Pei,X.Yan,andP.Yu. Miningfrequentpat-ternsindata streamsatmultipletimegranularities.InNextGeneratio n DataMining,MIT Press,2003. [6] J. Han, J. Pei, B. Mortazavi-asl, Q. Chen, U. Dayal, andM. Hsu.Freespan: Frequentpattern- projectedsequential patternmining. In Proc.ofKDD’00Conference, 2000. [7] Y. Chi, H. Wang, P.S. Yu, & R.R. Muntz, “Moment: maintaining closed frequent itemsets over a stream www.ijmer.com 2511 | Page