• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Mao Yuxing and Shi Baile. An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree[J]. Journal of Computer Research and Development, 2012, 49(3): 598-606.
Citation: Mao Yuxing and Shi Baile. An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree[J]. Journal of Computer Research and Development, 2012, 49(3): 598-606.

An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree

More Information
  • Published Date: March 14, 2012
  • Mining generalized association rules is one of the important research areas in data mining. In real life applications, the transaction database is updated frequently. It makes the maintenance of generalized association rules one of challenging research work. In this paper, firstly, by analyzing and summarizing all the update cases of the taxonomy data, several special properties of updating are concluded; secondly, we project the transaction databases to a new compact structure called GECT (generalized extended canonical-order tree) composed of two header tables that can be used to mine the whole updated tree and the incremental tree. Thirdly, we propose an incremental updating algorithm GECT-IM, which finds most updated frequent itemsets by scanning the updating transactions set instead of the original database; To tackle the limit of GECT-IM, which still need scan the GECT when the infrequent itemsets become frequent, we propose a further optimized structure called PGECT (pre-large generalized extended canonical-order tree) and an efficient algorithm PGECT-IM. Within the certain updating scope, it can find all the updated frequent itemsets without rescanning the original PGECT. The experiments on synthetic datasets show that our algorithms, both GECT-IM and PGECT-IM, are not only correct and complete but also outperform the well-known and current algorithms.
  • Related Articles

    [1]Wang Chuang, Ding Yan, Huang Chenlin, Song Liantao. Bitsliced Optimization of SM4 Algorithm with the SIMD Instruction Set[J]. Journal of Computer Research and Development, 2024, 61(8): 2097-2109. DOI: 10.7544/issn1000-1239.202220531
    [2]Zhao Ziwei, Tu Hang, Liu Qin, Li Li, Yu Tao. An Automated Code Generation of Instruction Set Implementation and Functional Testing for gem5[J]. Journal of Computer Research and Development, 2023, 60(7): 1678-1691. DOI: 10.7544/issn1000-1239.202220158
    [3]Wang Hongkun, Cao Yi, Xiao Li. Image-Based Interactive Visualization of Large-Scale Data Sets[J]. Journal of Computer Research and Development, 2017, 54(4): 855-860. DOI: 10.7544/issn1000-1239.2017.20151056
    [4]Zhang Huizhen, Wang Chao, Li Xi, Zhou Xuehai. An Optimized Code-Generating Algorithm for Reconfigurable Instruction Set Processors[J]. Journal of Computer Research and Development, 2012, 49(9): 2018-2026.
    [5]Li Shaohua, Feng Qilong, Wang Jianxin, and Chen Jianer. Kernelization for Weighted 3-Set Packing Problem[J]. Journal of Computer Research and Development, 2012, 49(8): 17811-786.
    [6]Xia Hui, Jia Zhiping, Zhang Feng, Li Xin, Chen Renhai, Edwin H.-M. Sha. The Research and Application of a Specific Instruction Processor for AES[J]. Journal of Computer Research and Development, 2011, 48(8): 1554-1562.
    [7]Hong Yi, Wang Zhaoqi, Zhu Dengming, Qiu Xianjie. Generation of Fire Animation Based on Level-Set[J]. Journal of Computer Research and Development, 2010, 47(11): 1849-1856.
    [8]Yang Xiaowei, Lu Jie, Zhang Guangquan. An Effective Pruning Algorithm for Least Squares Support Vector Machine Classifier[J]. Journal of Computer Research and Development, 2007, 44(7): 1128-1136.
    [9]Li Yong, Wang Zhiying, Zhao Xuemi, and Yue Hong. Design of Application Specific Instruction-Set Processors Directed by Configuration Stream Driven Computing Architecture[J]. Journal of Computer Research and Development, 2007, 44(4): 714-721.
    [10]Wang Haipeng, Fu Yan, Sun Ruixiang, He Simin, Zeng Rong, Gao Wen. pepReap: A Peptide Identification Algorithm Using Support Vector Machines[J]. Journal of Computer Research and Development, 2005, 42(9): 1511-1518.

Catalog

    Article views (543) PDF downloads (448) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return