منابع مشابه
Fuzzy Association Rule Mining
Corresponding Author: Lekha. A., Research Scholar, Dr M G R Educational Research Institute, Chennai, India-600095, Assistant Professor, Department of MCA, PESIT, Bangalore Email: [email protected] Abstract: The paper attempts to propose a fuzzy logic association algorithm to predict the risks involved in identifying diseases like breast cancer. Fuzzy logic algorithm is used to find associatio...
متن کاملHybrid Dimension Mining by Fuzzy Association Rule
Mining hybrid dimension fuzzy association rule is one of the important processes in data mining . Apriori algorithm concerned with handling single level, single dimensional association rules. this paper is presenting, a new modification in joining process to reduce the redundant generation of sub items during pruning the candidate itemsets, which can obtain higher efficiency of mining that of o...
متن کاملFuzzy Logic -based Pre-processing for Fuzzy Association Rule Mining
Conventional Association Rule Mining (ARM) algorithms usually deal with datasets with categorical values and expect any numerical values to be converted to categorical ones using ranges (Age = 25 to 60). Fuzzy logic is used to convert quantitative values of attributes to categorical ones so as to eliminate any loss of information arising due to sharp partitioning (using ranges) and then generat...
متن کاملOptimizing Membership Functions using Learning Automata for Fuzzy Association Rule Mining
The Transactions in web data often consist of quantitative data, suggesting that fuzzy set theory can be used to represent such data. The time spent by users on each web page is one type of web data, was regarded as a trapezoidal membership function (TMF) and can be used to evaluate user browsing behavior. The quality of mining fuzzy association rules depends on membership functions and since t...
متن کاملData sanitization in association rule mining based on impact factor
Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2015
ISSN: 1549-3636
DOI: 10.3844/jcssp.2015.71.74