期刊文献+

一种基于倒排索引的频繁项集挖掘方法 被引量:1

A Frequent Item Set Mining Method Based on Inverted Index
下载PDF
导出
摘要 针对频繁项集挖掘算法中多次扫描数据库、生成大量无效频繁项集的问题,提出一种基于倒排索引和二维数组的挖掘算法。通过一次扫描数据库建立包含事务的倒排索引,解决多次扫描数据库的问题。在二维数组存储候选频繁项集时,引入标志位约束,避免产生大量无效的频繁项集。与其他算法在不同规模的数据集上进行性能比较,发现算法在数据集超过25万时执行效率优于其他算法。通过实验验证了所提出算法的高效性和可行性。 In mining algorithm for frequent itemsets with repeatedly scanning database and mining result itemsets are not frequent. In this paper,a new mining algorithm is developed based on inverted index and two-dimensional array. The problem of multiple scans of the database is solved by creating an inverted index with transaction by scanning the database once. When a two-dimensional array stores candidate frequent itemsets,a flag bit constraint is introduced to avoid generating a large number of invalid frequent itemsets. Compared with other algorithms on different scale data sets,it is found that the algorithm performs better than other algorithms when the data set exceeds 250,000. The results from experiments shows that the proposed algorithm is efficient and feasible.
作者 贾丽波 姜晓明 叶青 陈占芳 JIA Libo;JIANG Xiaoming;YE Qing;CHEN Zhanfang(School of Computer Science and Technology,Changchun University of Science and Technology,Changchun 130022)
出处 《长春理工大学学报(自然科学版)》 2019年第2期117-119,124,共4页 Journal of Changchun University of Science and Technology(Natural Science Edition)
基金 吉林省科技厅项目(KYC-JC-XM-2018-03) 吉林省教育厅科技攻关项目(KYC-JC-XM-2016-021)
关键词 频繁项集挖掘 倒排索引 二维数组 frequent item set mining inverted index two-dimensional array
  • 相关文献

参考文献4

二级参考文献40

  • 1陈耿,朱玉全,杨鹤标,陆介平,宋余庆,孙志挥.关联规则挖掘中若干关键技术的研究[J].计算机研究与发展,2005,42(10):1785-1789. 被引量:62
  • 2CHENG J, KE Y, NG W, LU A. FG-index: Towards verification-free query processing on graph databases[C]/ / International Conference on Management of Data. Beijing, 2007: 857-872.
  • 3BERENDT B, HOTHO A, STUMME G Semantic web mining[C]// Conference International Semantic Web (ISWC). 2002: 264-278.
  • 4MISRA S, BARTHWAL R, OBAIDAT M S. Communication detection in an integrated internet of things and social network architecture[C]// Communication QOS, Reliability and Modeling Syposium. IEEE, 2012: 2787-2805.
  • 5WASSERMAN S, IACOBUCCI F. Social network analysis: Methods and applications[M]. Cambridge University Press, 1994.
  • 6YAN L, WANG J. Extracting regular behaviors from social media networks[C]// Third International Conference on Multimedia Information Networking and Security. 2011.
  • 7CALVIN K. Logic induction of valid behavior specifications for intrusion detection[C]// IEEE Symposium on Security and Privacy (S&P). 2000: 142-155.
  • 8HILMI Y, ZAKl M J. Graph indexing for reachability queries[C]// 26th International Conference on Data Engineering Workshops (ICDEW). 2010: 321-324.
  • 9XIAOGANG Y, YE T, TAO P, CANFENG C, JIAN M. Semantic-based graph index for mobile photo search[C]// Second International Workshop on Education Technology and Computer Science. 2010: 193-197.
  • 10PENG T, WANG W, GONG X, TIAN Y, YANG X. A graph indexing approach for content-based recommendation system[C]// IEEE Second International Conference on Multimedia and Information Technology (MMIT). 2010: 93-97.

共引文献9

同被引文献4

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部