• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.
Citation: Song Shijie, Hu Huaping, Zhou Jiawei, and Jin Shiyao. A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse[J]. Journal of Computer Research and Development, 2006, 43(1): 68-74.

A Sequential Pattern Mining Algorithm Based on Large-Itemset Reuse

More Information
  • Published Date: January 14, 2006
  • A first-horizontally-last-vertically scanning database sequential pattern mining algorithm (HVSM) based on large-itemset reuse is presented in this paper. The algorithm redefines the length of sequential pattern, which increases the granularity of mining sequential pattern. While considering a database as a vertical bitmap, the algorithm first extends the itemset horizontally, and digs out all the large-itemsets which are called one-large-sequence itemset. Then the algorithm extends the sequence vertically, and takes each one-large-sequence itemset as a “container” for mining k-large-sequence, and generates candidate large sequence by means of taking brother-nodes as child-nodes, and counts the support by recording the 1st-TID. The experiments show that the HVSM can find out frequent sequences faster than the SPAM algorithm for mining the medium-sized and large transaction databases.
  • Related Articles

    [1]Wang Xianghai, Zhang Wenya, Xing Junyu, Lü Fang, Mu Zhenhua. High-order Caputo Fractional Order Differential Operator and Its Application in Image Enhancement[J]. Journal of Computer Research and Development, 2023, 60(2): 448-464. DOI: 10.7544/issn1000-1239.202110942
    [2]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [3]Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju. Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Zhou Yucong, Liu Yi, Wang Rui. Training Deep Neural Networks for Image Applications with Noisy Labels by Complementary Learning[J]. Journal of Computer Research and Development, 2017, 54(12): 2649-2659. DOI: 10.7544/issn1000-1239.2017.20170637
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Ye Jianhong, Song Wen, Sun Shixin. Operating and Analyzing the Reproducibility of Empty Marking Nets[J]. Journal of Computer Research and Development, 2009, 46(8): 1378-1385.
    [8]Bai Chenggang, Su Liang, Zhao Yingchun, Guo Junhong, and Cai Kaiyuan. Is the Reliability of Web Services Related to the Change Rate of Operational Profiles[J]. Journal of Computer Research and Development, 2008, 45(12): 2044-2051.
    [9]Zheng Qingfang, Gao Wen. Adaptive Skin Detection in JPEG Compressed Images[J]. Journal of Computer Research and Development, 2006, 43(7): 1194-1200.
    [10]Bao Fumin, Li Aiguo, Qin Zheng. Image Fusion Using SGNN[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (630) PDF downloads (481) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return