Open Access   Article Go Back

A Review On High Utility Itemset Mining

D. Divyashree1 , G. Sunitha2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-03 , Page no. 144-147, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6si3.144147

Online published on Apr 30, 2018

Copyright © D. Divyashree, G. Sunitha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: D. Divyashree, G. Sunitha, “A Review On High Utility Itemset Mining,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.144-147, 2018.

MLA Style Citation: D. Divyashree, G. Sunitha "A Review On High Utility Itemset Mining." International Journal of Computer Sciences and Engineering 06.03 (2018): 144-147.

APA Style Citation: D. Divyashree, G. Sunitha, (2018). A Review On High Utility Itemset Mining. International Journal of Computer Sciences and Engineering, 06(03), 144-147.

BibTex Style Citation:
@article{Divyashree_2018,
author = {D. Divyashree, G. Sunitha},
title = {A Review On High Utility Itemset Mining},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {06},
Issue = {03},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {144-147},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=336},
doi = {https://doi.org/10.26438/ijcse/v6i3.144147}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.144147}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=336
TI - A Review On High Utility Itemset Mining
T2 - International Journal of Computer Sciences and Engineering
AU - D. Divyashree, G. Sunitha
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 144-147
IS - 03
VL - 06
SN - 2347-2693
ER -

           

Abstract

Sequential pattern mining is the imperative data mining problem with expansive application from text analysis to market basket analysis. It is the way towards extricating certain sequential patterns whose support surpasses a predefined limit which is defined by the user according to their interest. With frequent pattern mining, pattern is viewed as fascinating if its event surpasses users determined limit. Notwithstanding, users interest may identify with numerous components that are not really communicated as far as the event recurrence. Since the quantity of sequences can be huge, and users have distinct interest and prerequisites, to get the most fascinating sequential pattern, generally a minimum base support is predefined by clients. Utility mining is a new advancement of data mining innovation. It developed as of late to address the confinement of frequent pattern mining by thinking about the client`s desire or objective and in addition the crude information. An efficient algorithm is to be developed for extracting high utility sequential patterns.

Key-Words / Index Term

Data mining, Frequent Pattern Mining, High Utility Itemset mining, sequential pattern mining

References

[1] R. Agarwal, C. Aggarwal, and V. Prasad, “Depth first generation of long patterns,” in SIGKDD, 2000, pp. 108–118.
[2] R. Agrawal and R. Srikant. “Fast algorithms for mining association rules,” in Proc. of the 20th VLDB Conf., pp.487-499, 1994.
[3] Y. Liu, W. Liao and A. Choudhary, “A fast high utility itemsets mining algorithm,” in Proc. of the Utility-Based Data Mining Workshop, 2005
[4] W. Wang, J. Yang and P. Yu, “Efficient mining of weighted association rules (WAR),” in Proc. of the ACMSIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2000), pp. 270-274, 2000.
[5] S.Meenakshi, P.Sharmila, “A review of high utility patterns,” Computer and Communication Engineering, vol. 5, Issue 8, August 2017
[6] Junqiang Liu, Ke Wang, and Benjamin C.M. Fung “Mining High Utility Patterns in One Phase without Generating Candidates” IEEE Transactions on knowledge and data engineering, vol. 28, no. 5, May 2016.
[7] Mengchi Liu, Junfeng Qu, “Mining High Utility Itemsets without Candidate Generation”, CIKM‟12, October 29–November 2, 2012, Maui, HI, USA. Copyright 2012 ACM 978-1-503.
[8] Philippe Fournier-Viger, Cheng-Wei Wu, Souleymane Zida, Vincent S., “FHM: Faster High-Utility Itemset Mining using Estimated Utility Co-occurrence Pruning”, 21st International Symposium on Methodologies for Intelligent Systems (ISMIS 2014), Springer, LNAI, pp. 83-92
[9] F. Bonchi, F. Giannotti, A. Mazzanti, and D. Pedreschi, “Exante: A preprocessing method for frequent-pattern mining,” IEEE Intelligent Systems, vol. 20, no. 3, pp. 25–31, 2005.
[10] R. Bayardo and R. Agrawal, “Mining the most interesting rules,” in SIGKDD. ACM, 1999, pp. 145–154.
[11] S. Morishita and J. Sese, “Traversing itemset lattice with statistical metric pruning,” in PODS. ACM, 2000, pp. 226–236.
[12] Han J., Pei J., Yin Y., Mao R., “Mining frequent patterns without candidate generation: a frequent-pattern tree approach,” Data Mining Knowledge Discovery in Data. Vol. 8, No. 1, pp. 53-87, 2004.
[13] Liu J., Pan Y., Wang K., and Han J., “Mining frequent item sets by opportunistic projection,” In Special Interest Group on Knowledge Discovery and Data Mining. Association for Computing Machinery, pp.229–238, 2002.
[14] Fournier-Viger P., Wu C.-W., Zida S., and Tseng V.S., “Fhm: Faster high-utility itemset mining using estimated utility Cooccurrence pruning,” In Proceedings of the 21th International Symposium on Methodologies for Intelligent Systems. Springer, pp.83-92, 2014.
[15] Li Y.-C., Yeh J.-S., and Chang C.-C., “Isolated items discarding Strategy for discovering high utility itemsets,” Data &Knowledge Engineering, Vol. 64, No. 1, pp. 198–217, 2008.
[16] Ahmed C. F., Tanbeer S. K., Jeong B.-S., and Lee Y. -K., “Efficient tree structures for high utility pattern mining in incremental databases,” IEEE Transactions on Knowledge and Data Engineering, Vol. 21, No. 12, pp. 1708– 1721, 2009.
[17] Tseng V. S., Shie B.-E., Wu C.-W., and Yu P. S., “Efficient algorithms for mining high utility itemsets from transactional databases,” IEEE Transactions onData Engineering, Vol. 25, No. 8, pp. 1772–1, 86, 2013.