SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 110-114
www.iosrjournals.org
DOI: 10.9790/0661-1732110114 www.iosrjournals.org 110 | Page
Frequent Pattern Mining with Serialization and De-Serialization
Paresh Tanna1
, Dr. Yogesh Ghodasara2
1
(PhD Scholar, School of Computer Science, RK University, India)
2
(Associate Professor, College of Information Tech., Anand Agriculture University, India)
Abstract : Competent frequent pattern mining techniques be critical for finding relationship rules. Here,
examination of subject of finding association rules for objects into an enormous DB of customer purchase
entries is discussed. Ruling huge patterns following DB entry set had guided lots of techniques. Like Apriori,
DHP, ECLAT, FP Growth etc. At this point, we projected new technique known as Frequent Pattern Mining
with Serialization and De-Serialization (FPMSD), that’s proficient for finding frequent patterns. FPMSD
utilizes DLI(down-level-index) i.e. patterns which co-found with delegate item can be recognized rapidly and
straightly using effortless and quickest method. This would happen to advantageous compare to other frequent
pattern mining techniques. Additionally serialization will save produced frequent patterns into a file and de-
serialization will pull through saved patterns from file. This Serialization and De-serialization Technique(SDT)
takes lesser time for patterns entry set gathering than getting this from scratch.
Keywords - Association rule, Frequent pattern mining, DLI, SDT
I. Introduction
The objective of the techniques illustrated here is to perceive links or relatives among detailed items in
huge DB entry sets. This is a universal assignment in lots of data mining problems. These influential probing
methods have an extensive variety of functions in real usage areas [7]. These methods enable market analyst and
to reveal concealed patterns in huge entry sets, like "consumers who purchases item X recurrently also purchase
items Y and Z". This happens through utilization of association rule finding [1]. Association rules are generated
with evaluating facts for recurrent patterns and utilizing criterion support and confidence to classify the mainly
imperative relations [7].
II. Projected Method: Fpmsd
Here projected innovative frequent pattern mining technique with indexing and concept of serialization
and de-serialization. This technique formulates effectual exercise of indexing with serialization and de-
serialization. FPMSD could be utilized for proficient bulky recurrent pattern creation. FPMSD utilizes both
vertical as well as horizontal facts layout for creating bulky recurrent pattern from DB entry sets. Numerous
disputes originated for Apriori[2], DHP[3], ECLAT[5] as well as FP Growth[4] techniques. There is a petite
scope for improvement in FPM to make execution much faster than discussed techniques i.e. use of serialization
and de-serialization technique with indexing for FPM. With some analytical survey, people could uncover
several enhancements which preserve be recommended for these techniques like condense passes of entry sets in
DB, minimize numeral of eligible sets of items, make easy support counting of candidates lacking DB check
up[6]. By taking into consideration testing and evaluation work on these features, experimentation by down-
level-index(DLI) is followed [9]. Object found support count similar to min_sup, the object itself and probable
patterns from this object and their DLI having equal support count as similar to min_sup [9]. This demonstrates
that DLI would takes less execution duration for plenty of task of support count and pattern creation. Also
serialization will save created frequent patterns into a file and de-serialization will recover saved patterns from
file done by preceding step. This Serialization and De-serialization Technique(SDT) takes lesser time for
patterns entry set gathering than getting this from scratch.
FPMSD Algorithm [10]:
Steps:
1. Check if SDT File exists in the given location as per specified criteria else goto step no. 3.
2. De-serialize this SDT file into local object of dataset SDT_Dataset
SDT_Dataset = Deserialization_Itemsets(SDT_FileName)
If no. of transactions in SDT_Dataset is greater than DB_Count i.e. in actual count of actual DB
SDT_Dataset = TransToMatrix_After_Deserialization(SDT_FileName)
(i.e. adding additional transactions details into SDT_Dataset
Else
Frequent Pattern Mining with Serialization and De-Serialization
DOI: 10.9790/0661-1732110114 www.iosrjournals.org 111 | Page
SDT_Dataset = TransToMatrix( ) (i.e. Creating dataset as usual into vertical layout.)
End If
3. Transform listing of entries in DB to Vertical Layout
4. Generate Entry Set from DB.
5. Discover Frequent 1-pattern from the given Vertical Entry Set, is merely the count of entry for transactions
in DB only.
6. Arrange given patterns by chronological sequence in Entry Set by its min_sup.
7. Collect unique listing of items as KeyItemGroup from Entry Set i.e. Listing of patterns only in
chronological sequence with its min_sup
8. Create BooleanTable for every entry available in KeyItemGroup set
9. Create DLI for each entry in KeyItemsGroup
10. For every Entry in KeyItemsGroup
If Entry.DLI < > "Nill"
If Entry.Count == minimum_sup Then
SearchPatternsSimmilarToMinimumSup(Entry, Entry.Count)
Else
SearchPatternsLargerThanMinimumSup(Entry, Entry.Count)
End If
Else
If Entry.Count > minimum_sup
AND Entry_Order < Entry.Length Then
SearchPatternsDLINone(Entry)
End If
End If
Example 1: Taking an illustration of a 10 entries in DB and minimum_sup is 2.
Chronological ordered entries are publicized in Table 3. Next completion of scanning with DB is
characterized by BooleanTable exposed in Table 4. Next Compute junction of DB entries which have specific
frequent patterns in a sequence.
Consider frequent item W2, candidate
= ED1 ∩ ED7
= 1010111 ∩ 1010111
= 1010111
So, ED2’s DLI is W6 W1 W3 W5 i.e. (W2, W6 W1 W3 W5)
Progressing with this procedure consequently for given items and lastly DLI array will be
(W2, W6 W1 W3 W5), (W4, W1 W3), (W6, W1 W3 W5), (W7, W1 W3), (W1, W3), (W3, Ø), (W5, Ø).
Table 3 : Chronological Ordered Entries
TID Items Ordered Items
ED1 W1, W2,W3,W5,W6,W15 W2,W6,W1,W3,W5
ED2 W1,W3,W7 W7,W1,W3
ED3 W5,W9 W5
ED4 W1,W3,W4,W5,W7 W4,W7,W1,W3,W5
ED5 W1,W3,W5,W7,W12 W7,W1,W3,W5
ED6 W5,W10 W5
ED7 W1,W2,W3,W5,W6,W16 W2,W6,W1,W3,W5
ED8 W1,W3,W4 W4,W1,W3
ED9 W1,W3,W5,W7,W13 W7,W1,W3,W5
ED10 W1,W3,W5,W7,W14 W7,W1,W3,W5
Table 4 : BooleanTable
Characterization of DB
TID W2 W4 W6 W7 W1 W3 W5
ED1 1 0 1 0 1 1 1
ED2 0 0 0 1 1 1 0
ED3 0 0 0 0 0 0 1
ED4 0 1 0 1 1 1 1
ED5 0 0 0 1 1 1 1
ED6 0 0 0 0 0 0 1
ED7 1 0 1 0 1 1 1
ED8 0 1 0 0 1 1 0
ED9 0 0 0 1 1 1 1
ED10 0 0 0 1 1 1 1
Frequent Pattern Mining with Serialization and De-Serialization
DOI: 10.9790/0661-1732110114 www.iosrjournals.org 112 | Page
Table 5 : Frequent Pattern Ceneration
ITEMS
W2 W4 W6 W7 W1 W3 W5
W2 : 2
W2,W6 : 2
W2,W1 : 2
W2,W3 : 2
W2,W5 : 2
W2,W6,W1 : 2
W2,W6,W3 : 2
W2,W6,W5 : 2
W2,W1,W3 : 2
W2,W1,W5 : 2
W2,W3,W5 : 2
W2,W6,W1,W3 : 2
W2,W6,W1,W5 : 2
W2,W6,W3,W5 : 2
W2,W1,W3,W5 : 2
W2,W6,W1,W3,W5 : 2
W4 : 2
W4,W1 : 2
W4,W3 : 2
W4,W1,W3 : 2
W6 : 2
W6,W1 : 2
W6,W3 : 2
W6,W5 : 2
W6,W1,W3 : 2
W6,W1,W5 : 2
W6,W3,W5 : 2
W6,W1,W3,W5 : 2
W7 : 5
W7,W1 : 5
W7,W3 : 5
W7,W1,W3 : 5
W7,W5 : 4
W7,W1,W5 : 4
W7,W3,W5 : 4
W7,W1,W3,W5 : 4
W1 : 8
W1,W3 : 8
W1,W5 : 6
W1,W3,W5 : 6
W3 : 8
W3,W5 : 6
W5 : 8
TOTAL = 43
16 4 8 8 4 2 1
In given illustration, minimum_sup is 2, and items W2, W4 and W6 encompass sup_count 2. Therefore
sup_count and frequent patterns creation for those given items is extremely simple. Like, to discover frequent
patterns, simply require to produce potential groupings for item and DLI of item, sup_count would get similar
just like minimum_sup. Following the method we can discover 16 + 4 + 8 = 28 entirety from 43 for W2, W4
and W6 straightly. Next for W7, that has sup_count larger than minimum_sup, frequent patterns would get
probable groupings of item W7 and its DLI (W1 W3) and sup_count would be similar like W7. Item W5 that
doesn’t exist in DLI of W7, compute sup_count for these that is, for W7, W5. Except for remaining similar to
(W7,W1,W5), (W7,W3,W5), (W7,W1,W3,W5) gets similar sup_count as (W7,W5). Discussed procedure is
iteratively followed for W1, W3 as well as W5. As a consequence, this method utilize lesser duration for
frequent patterns creation contrast to discussed techniques. Addition to this DLI, performance is also improved
with Serialization and De-serialization techniques.
Using Serialization and De-Serialization
Serialization will save created frequent patterns into a file and de-serialization will recover saved
patterns from file done by preceding step. This Serialization and De-serialization Technique(SDT) takes lesser
time for patterns entry set gathering than getting this from scratch. Little java code is shared here to get insight
into the concept followed by performance evaluation.
Serialize_Itemsets()
{
FileOutputStream fos = new FileOutputStream(SDTFleName);
ObjectOutputStream oos = new ObjectOutputStream(fos);
oos.writeObject(mapItemTIDS);
oos.writeObject(ll);
oos.writeObject(trans_count);
oos.close();
fos.close();
}
DeSerialize_Itemsets(String SDTFileName)
{
Map<String, BitSet> e = null;
FileInputStream fileIn = new FileInputStream(sdfilename);
ObjectInputStream in = new ObjectInputStream(fileIn);
e = (Map<String, BitSet>) in.readObject();
ll = (LinkedList<Integer>)in.readObject();
tCount = (Integer)in.readObject();
in.close();
fileIn.close();
}
Here, SDTFileName is used as a transitional tool to carry out this task.
Frequent Pattern Mining with Serialization and De-Serialization
DOI: 10.9790/0661-1732110114 www.iosrjournals.org 113 | Page
III. Investigational Output
We contrast the gig of the projected technique by different techniques like Apriori, DHP, ECLAT and
FP Growth. This technique is developed in Java. Here preferring entry set from [8] for generating contradiction
report of projected technique. Each entry set is referred from FIMI repository page http://fimi.cs.helsinki.fi.
Table 6 illustrates distinctiveness of discussed entry sets. Performance time (in secs) requisites by Apriori, DHP,
ECLAT, FP Growth and projected technique i.e. FPMSD are revealed in beneath fig 1st
, 2nd
, 3rd
and 4th
.
Table 6. Dataset Layout
[1st
– Apriori, 2nd
– DHP, 3rd
– ECLAT, 4th
– FP Growth 5th
– FPMSD]
Entry Set Layout No. of Trnas Listing of Techniques Notes
T10I4D100 100 1st
,2nd
,3rd
,4th
,5th Top hundred entries from
T10I4D100K
T10I4D1000 1000 1st
,2nd
,3rd
,4th
,5th Top thousand entries from
T10I4D100K
T10I4D50000 50000 3rd
,5th Top fifty thousand entries from
T10I4D100K
T10I4D100K 100000 3rd
,5th
-
Fig 1. Performance time (in secs) requisites by given techniques
The entry set in Fig. 1 demonstrates that projected FPMSD executes fastest on lesser to larger minimum_sup
with tiny amount of data.
Fig 2. Performance time (in secs) requisites by given techniques
Frequent Pattern Mining with Serialization and De-Serialization
DOI: 10.9790/0661-1732110114 www.iosrjournals.org 114 | Page
The entry set in Fig. 2 demonstrates that projected FPMSD executes fastest on lesser to larger minimum_sup
with some higher to tiny amount of data.
Figure 3. Figure 4.
Fig 3 and 4 shows performance time (in secs) requisites by given techniques
The entry set in Fig. 3 and 4 demonstrates that projected FPMSD executes fastest on lesser to larger
minimum_sup with higher amount of data.
IV. Conclusion
Projected FPMSD executes fastest on lesser to larger minimum_sup with tiny to higher amount of data.
Ccontrasting with Apriori, DHP, ECLAT and FP Growth, projected technique diminishes duration for greater
frequent patterns creation and candidate frequent patterns that sup_count doesn’t required calculation.
References
[1] Data Mining: Concepts and Techniques, Jiawei Han and Micheline Kamber, MORGAN KAUFMANN PUBLISHER, An Imprint
of Elsevier
[2] R. Agrawal and S. Srikant, "Fast Algorithms for Mining Association Rules in Large Databases“, Proceedings of the 20th
International Conference on Very Large Data Bases, September 1994.
[3] J. Park, M. Chen and Philip Yu, "An Effective Hash-Based Algorithm for Mining Association Rules", Proceedings of ACM Special
Interest Group of Management of Data, ACM SIGMOD’95, 1995.
[4] Han, Pei & Yin, "Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach", Data Mining and
Knowledge Discovery, Volume 8, Issue 1 , pp 53-87,2004
[5] M. Zaki, S. Parthasarathy, M. Ogihara, and W. Li, " New Algorithms for Fast Discovery of Association Rules", Proc. 3rd ACM
SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'97, Newport Beach, CA), 283-296 AAAI Press, Menlo Park,
CA, USA 1997
[6] Shruti Aggarwal, Ranveer Kaur, “Comparative Study of Various Improved Versions of Apriori Algorithm”, International Journal of
Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013
[7] Agrawal, R., T. Imielin´ ski, and A. Swami (1993). Mining association rules between sets of items in large databases. In
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, SIGMOD ’93, New York, NY, USA,
pp. 207–216. ACM.
[8] Synthetic Data for Associations and Sequential Patterns. http://fimi.cs.helsinki.fi
[9] W.Song, B.R.Yang, Z.Y.Xu, “Index-BitTableFI: An improved algorithm for mining frequent itemsets,” Knowledge Based Systems
21 (4) , 507–513(2008).
[10] Paresh Tanna, Dr. Yogesh Ghodasara, “Improved Frequent Pattern Mining Algorithm with Indexing,”, IOSR Journal of Computer
Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov – Dec. 2014), PP 73-78.

Contenu connexe

Tendances

Association rule mining
Association rule miningAssociation rule mining
Association rule miningAcad
 
Baisc Deep Learning HandsOn
Baisc Deep Learning HandsOnBaisc Deep Learning HandsOn
Baisc Deep Learning HandsOnSean Yu
 
A Relative Study on Various Techniques for High Utility Itemset Mining from T...
A Relative Study on Various Techniques for High Utility Itemset Mining from T...A Relative Study on Various Techniques for High Utility Itemset Mining from T...
A Relative Study on Various Techniques for High Utility Itemset Mining from T...IRJET Journal
 
Cs501 mining frequentpatterns
Cs501 mining frequentpatternsCs501 mining frequentpatterns
Cs501 mining frequentpatternsKamal Singh Lodhi
 
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016Seattle DAML meetup
 
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kambererror007
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Salah Amean
 
An Introduction to Data Mining with R
An Introduction to Data Mining with RAn Introduction to Data Mining with R
An Introduction to Data Mining with RYanchang Zhao
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
Data structures cs301 power point slides lecture 01
Data structures   cs301 power point slides lecture 01Data structures   cs301 power point slides lecture 01
Data structures cs301 power point slides lecture 01shaziabibi5
 
Information Retrieval 02
Information Retrieval 02Information Retrieval 02
Information Retrieval 02Jeet Das
 
Data mining query languages
Data mining query languagesData mining query languages
Data mining query languagesMarcy Morales
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Tendances (17)

Association rule mining
Association rule miningAssociation rule mining
Association rule mining
 
Baisc Deep Learning HandsOn
Baisc Deep Learning HandsOnBaisc Deep Learning HandsOn
Baisc Deep Learning HandsOn
 
A Relative Study on Various Techniques for High Utility Itemset Mining from T...
A Relative Study on Various Techniques for High Utility Itemset Mining from T...A Relative Study on Various Techniques for High Utility Itemset Mining from T...
A Relative Study on Various Techniques for High Utility Itemset Mining from T...
 
Datamining with R
Datamining with RDatamining with R
Datamining with R
 
Cs501 mining frequentpatterns
Cs501 mining frequentpatternsCs501 mining frequentpatterns
Cs501 mining frequentpatterns
 
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016Frequent Pattern Mining - Krishna Sridhar, Feb 2016
Frequent Pattern Mining - Krishna Sridhar, Feb 2016
 
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & KamberChapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Chapter - 8.3 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
 
Linked lists
Linked listsLinked lists
Linked lists
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
 
An Introduction to Data Mining with R
An Introduction to Data Mining with RAn Introduction to Data Mining with R
An Introduction to Data Mining with R
 
Ijariie1129
Ijariie1129Ijariie1129
Ijariie1129
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
Data structures cs301 power point slides lecture 01
Data structures   cs301 power point slides lecture 01Data structures   cs301 power point slides lecture 01
Data structures cs301 power point slides lecture 01
 
Information Retrieval 02
Information Retrieval 02Information Retrieval 02
Information Retrieval 02
 
binary_search
binary_searchbinary_search
binary_search
 
Data mining query languages
Data mining query languagesData mining query languages
Data mining query languages
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

En vedette

A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsA novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsiosrjce
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 
Task Scheduling using Hybrid Algorithm in Cloud Computing Environments
Task Scheduling using Hybrid Algorithm in Cloud Computing EnvironmentsTask Scheduling using Hybrid Algorithm in Cloud Computing Environments
Task Scheduling using Hybrid Algorithm in Cloud Computing Environmentsiosrjce
 
Identification of Microorganism Associated With Otitis Media among Children i...
Identification of Microorganism Associated With Otitis Media among Children i...Identification of Microorganism Associated With Otitis Media among Children i...
Identification of Microorganism Associated With Otitis Media among Children i...iosrjce
 
Heap graph, software birthmark, frequent sub graph mining.
Heap graph, software birthmark, frequent sub graph mining.Heap graph, software birthmark, frequent sub graph mining.
Heap graph, software birthmark, frequent sub graph mining.iosrjce
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approachiosrjce
 
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...iosrjce
 
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...iosrjce
 
Firm Value and Derivatives Use: Evidence from Nairobi Securities Exchange
Firm Value and Derivatives Use: Evidence from Nairobi Securities ExchangeFirm Value and Derivatives Use: Evidence from Nairobi Securities Exchange
Firm Value and Derivatives Use: Evidence from Nairobi Securities Exchangeiosrjce
 
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...iosrjce
 
Disclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal PrespectiveDisclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal Prespectiveiosrjce
 
A Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian PopulationA Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian Populationiosrjce
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
 
Talent Management Practices in Higher Educational Institutions: German and US...
Talent Management Practices in Higher Educational Institutions: German and US...Talent Management Practices in Higher Educational Institutions: German and US...
Talent Management Practices in Higher Educational Institutions: German and US...iosrjce
 
Utilization of Foundry Waste Sand as a Masonry Mortar
Utilization of Foundry Waste Sand as a Masonry Mortar Utilization of Foundry Waste Sand as a Masonry Mortar
Utilization of Foundry Waste Sand as a Masonry Mortar iosrjce
 
A Study of the Compliance of Practising Quantity Surveyors with the Professio...
A Study of the Compliance of Practising Quantity Surveyors with the Professio...A Study of the Compliance of Practising Quantity Surveyors with the Professio...
A Study of the Compliance of Practising Quantity Surveyors with the Professio...iosrjce
 
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...iosrjce
 
Planta fotovoltaica domestica auto sostenible en la población
Planta fotovoltaica domestica  auto sostenible en la poblaciónPlanta fotovoltaica domestica  auto sostenible en la población
Planta fotovoltaica domestica auto sostenible en la poblaciónmarcelo
 

En vedette (20)

A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsA novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locations
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 
Task Scheduling using Hybrid Algorithm in Cloud Computing Environments
Task Scheduling using Hybrid Algorithm in Cloud Computing EnvironmentsTask Scheduling using Hybrid Algorithm in Cloud Computing Environments
Task Scheduling using Hybrid Algorithm in Cloud Computing Environments
 
Identification of Microorganism Associated With Otitis Media among Children i...
Identification of Microorganism Associated With Otitis Media among Children i...Identification of Microorganism Associated With Otitis Media among Children i...
Identification of Microorganism Associated With Otitis Media among Children i...
 
Heap graph, software birthmark, frequent sub graph mining.
Heap graph, software birthmark, frequent sub graph mining.Heap graph, software birthmark, frequent sub graph mining.
Heap graph, software birthmark, frequent sub graph mining.
 
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy ApproachPose Invariant Face Recognition using Neuro-Fuzzy Approach
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
 
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...
Emission Control Using Methanol, Ethanol And Butanol In Diesel Engine: A Comp...
 
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...
Family Instability and Juvenile Delinquency in Nigeria: A Study of Owerri Mun...
 
Firm Value and Derivatives Use: Evidence from Nairobi Securities Exchange
Firm Value and Derivatives Use: Evidence from Nairobi Securities ExchangeFirm Value and Derivatives Use: Evidence from Nairobi Securities Exchange
Firm Value and Derivatives Use: Evidence from Nairobi Securities Exchange
 
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...
Mixed Methods on the Commercialization of Cash Waqf in Nigeria: An Analysis o...
 
Disclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal PrespectiveDisclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal Prespective
 
Lym 7-universal-pillars
Lym 7-universal-pillarsLym 7-universal-pillars
Lym 7-universal-pillars
 
A Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian PopulationA Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian Population
 
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc NetworksRouting and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networks
 
Dynamic security in penal institutions (Croàcia)
Dynamic security in penal institutions (Croàcia)Dynamic security in penal institutions (Croàcia)
Dynamic security in penal institutions (Croàcia)
 
Talent Management Practices in Higher Educational Institutions: German and US...
Talent Management Practices in Higher Educational Institutions: German and US...Talent Management Practices in Higher Educational Institutions: German and US...
Talent Management Practices in Higher Educational Institutions: German and US...
 
Utilization of Foundry Waste Sand as a Masonry Mortar
Utilization of Foundry Waste Sand as a Masonry Mortar Utilization of Foundry Waste Sand as a Masonry Mortar
Utilization of Foundry Waste Sand as a Masonry Mortar
 
A Study of the Compliance of Practising Quantity Surveyors with the Professio...
A Study of the Compliance of Practising Quantity Surveyors with the Professio...A Study of the Compliance of Practising Quantity Surveyors with the Professio...
A Study of the Compliance of Practising Quantity Surveyors with the Professio...
 
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
Analytical Study and Newer Approach towards Frequent Pattern Mining using Boo...
 
Planta fotovoltaica domestica auto sostenible en la población
Planta fotovoltaica domestica  auto sostenible en la poblaciónPlanta fotovoltaica domestica  auto sostenible en la población
Planta fotovoltaica domestica auto sostenible en la población
 

Similaire à Frequent Pattern Mining with Serialization and De-Serialization

A classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningA classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningIOSR Journals
 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningIJMER
 
An Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
An Efficient Compressed Data Structure Based Method for Frequent Item Set MiningAn Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
An Efficient Compressed Data Structure Based Method for Frequent Item Set Miningijsrd.com
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
Review Over Sequential Rule Mining
Review Over Sequential Rule MiningReview Over Sequential Rule Mining
Review Over Sequential Rule Miningijsrd.com
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
Ijsrdv1 i2039
Ijsrdv1 i2039Ijsrdv1 i2039
Ijsrdv1 i2039ijsrd.com
 
Fp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalabilityFp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalabilityDr.Manmohan Singh
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...ijdpsjournal
 
Mining Regular Patterns in Data Streams Using Vertical Format
Mining Regular Patterns in Data Streams Using Vertical FormatMining Regular Patterns in Data Streams Using Vertical Format
Mining Regular Patterns in Data Streams Using Vertical FormatCSCJournals
 
A Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining TechniquesA Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining Techniquesijsrd.com
 
Discovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureDiscovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureIOSR Journals
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...IJECEIAES
 
Frequent Item Set Mining - A Review
Frequent Item Set Mining - A ReviewFrequent Item Set Mining - A Review
Frequent Item Set Mining - A Reviewijsrd.com
 

Similaire à Frequent Pattern Mining with Serialization and De-Serialization (20)

20120140502006
2012014050200620120140502006
20120140502006
 
J017114852
J017114852J017114852
J017114852
 
A classification of methods for frequent pattern mining
A classification of methods for frequent pattern miningA classification of methods for frequent pattern mining
A classification of methods for frequent pattern mining
 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule Mining
 
Efficient Temporal Association Rule Mining
Efficient Temporal Association Rule MiningEfficient Temporal Association Rule Mining
Efficient Temporal Association Rule Mining
 
A04010105
A04010105A04010105
A04010105
 
An Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
An Efficient Compressed Data Structure Based Method for Frequent Item Set MiningAn Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
An Efficient Compressed Data Structure Based Method for Frequent Item Set Mining
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Review Over Sequential Rule Mining
Review Over Sequential Rule MiningReview Over Sequential Rule Mining
Review Over Sequential Rule Mining
 
B03606010
B03606010B03606010
B03606010
 
R01732105109
R01732105109R01732105109
R01732105109
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
Ijsrdv1 i2039
Ijsrdv1 i2039Ijsrdv1 i2039
Ijsrdv1 i2039
 
Fp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalabilityFp growth tree improve its efficiency and scalability
Fp growth tree improve its efficiency and scalability
 
Scalable frequent itemset mining using heterogeneous computing par apriori a...
Scalable frequent itemset mining using heterogeneous computing  par apriori a...Scalable frequent itemset mining using heterogeneous computing  par apriori a...
Scalable frequent itemset mining using heterogeneous computing par apriori a...
 
Mining Regular Patterns in Data Streams Using Vertical Format
Mining Regular Patterns in Data Streams Using Vertical FormatMining Regular Patterns in Data Streams Using Vertical Format
Mining Regular Patterns in Data Streams Using Vertical Format
 
A Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining TechniquesA Survey of Sequential Rule Mining Techniques
A Survey of Sequential Rule Mining Techniques
 
Discovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureDiscovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining Procedure
 
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
Postdiffset Algorithm in Rare Pattern: An Implementation via Benchmark Case S...
 
Frequent Item Set Mining - A Review
Frequent Item Set Mining - A ReviewFrequent Item Set Mining - A Review
Frequent Item Set Mining - A Review
 

Plus de iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

Plus de iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Dernier

Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 

Dernier (20)

Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 

Frequent Pattern Mining with Serialization and De-Serialization

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. II (May – Jun. 2015), PP 110-114 www.iosrjournals.org DOI: 10.9790/0661-1732110114 www.iosrjournals.org 110 | Page Frequent Pattern Mining with Serialization and De-Serialization Paresh Tanna1 , Dr. Yogesh Ghodasara2 1 (PhD Scholar, School of Computer Science, RK University, India) 2 (Associate Professor, College of Information Tech., Anand Agriculture University, India) Abstract : Competent frequent pattern mining techniques be critical for finding relationship rules. Here, examination of subject of finding association rules for objects into an enormous DB of customer purchase entries is discussed. Ruling huge patterns following DB entry set had guided lots of techniques. Like Apriori, DHP, ECLAT, FP Growth etc. At this point, we projected new technique known as Frequent Pattern Mining with Serialization and De-Serialization (FPMSD), that’s proficient for finding frequent patterns. FPMSD utilizes DLI(down-level-index) i.e. patterns which co-found with delegate item can be recognized rapidly and straightly using effortless and quickest method. This would happen to advantageous compare to other frequent pattern mining techniques. Additionally serialization will save produced frequent patterns into a file and de- serialization will pull through saved patterns from file. This Serialization and De-serialization Technique(SDT) takes lesser time for patterns entry set gathering than getting this from scratch. Keywords - Association rule, Frequent pattern mining, DLI, SDT I. Introduction The objective of the techniques illustrated here is to perceive links or relatives among detailed items in huge DB entry sets. This is a universal assignment in lots of data mining problems. These influential probing methods have an extensive variety of functions in real usage areas [7]. These methods enable market analyst and to reveal concealed patterns in huge entry sets, like "consumers who purchases item X recurrently also purchase items Y and Z". This happens through utilization of association rule finding [1]. Association rules are generated with evaluating facts for recurrent patterns and utilizing criterion support and confidence to classify the mainly imperative relations [7]. II. Projected Method: Fpmsd Here projected innovative frequent pattern mining technique with indexing and concept of serialization and de-serialization. This technique formulates effectual exercise of indexing with serialization and de- serialization. FPMSD could be utilized for proficient bulky recurrent pattern creation. FPMSD utilizes both vertical as well as horizontal facts layout for creating bulky recurrent pattern from DB entry sets. Numerous disputes originated for Apriori[2], DHP[3], ECLAT[5] as well as FP Growth[4] techniques. There is a petite scope for improvement in FPM to make execution much faster than discussed techniques i.e. use of serialization and de-serialization technique with indexing for FPM. With some analytical survey, people could uncover several enhancements which preserve be recommended for these techniques like condense passes of entry sets in DB, minimize numeral of eligible sets of items, make easy support counting of candidates lacking DB check up[6]. By taking into consideration testing and evaluation work on these features, experimentation by down- level-index(DLI) is followed [9]. Object found support count similar to min_sup, the object itself and probable patterns from this object and their DLI having equal support count as similar to min_sup [9]. This demonstrates that DLI would takes less execution duration for plenty of task of support count and pattern creation. Also serialization will save created frequent patterns into a file and de-serialization will recover saved patterns from file done by preceding step. This Serialization and De-serialization Technique(SDT) takes lesser time for patterns entry set gathering than getting this from scratch. FPMSD Algorithm [10]: Steps: 1. Check if SDT File exists in the given location as per specified criteria else goto step no. 3. 2. De-serialize this SDT file into local object of dataset SDT_Dataset SDT_Dataset = Deserialization_Itemsets(SDT_FileName) If no. of transactions in SDT_Dataset is greater than DB_Count i.e. in actual count of actual DB SDT_Dataset = TransToMatrix_After_Deserialization(SDT_FileName) (i.e. adding additional transactions details into SDT_Dataset Else
  • 2. Frequent Pattern Mining with Serialization and De-Serialization DOI: 10.9790/0661-1732110114 www.iosrjournals.org 111 | Page SDT_Dataset = TransToMatrix( ) (i.e. Creating dataset as usual into vertical layout.) End If 3. Transform listing of entries in DB to Vertical Layout 4. Generate Entry Set from DB. 5. Discover Frequent 1-pattern from the given Vertical Entry Set, is merely the count of entry for transactions in DB only. 6. Arrange given patterns by chronological sequence in Entry Set by its min_sup. 7. Collect unique listing of items as KeyItemGroup from Entry Set i.e. Listing of patterns only in chronological sequence with its min_sup 8. Create BooleanTable for every entry available in KeyItemGroup set 9. Create DLI for each entry in KeyItemsGroup 10. For every Entry in KeyItemsGroup If Entry.DLI < > "Nill" If Entry.Count == minimum_sup Then SearchPatternsSimmilarToMinimumSup(Entry, Entry.Count) Else SearchPatternsLargerThanMinimumSup(Entry, Entry.Count) End If Else If Entry.Count > minimum_sup AND Entry_Order < Entry.Length Then SearchPatternsDLINone(Entry) End If End If Example 1: Taking an illustration of a 10 entries in DB and minimum_sup is 2. Chronological ordered entries are publicized in Table 3. Next completion of scanning with DB is characterized by BooleanTable exposed in Table 4. Next Compute junction of DB entries which have specific frequent patterns in a sequence. Consider frequent item W2, candidate = ED1 ∩ ED7 = 1010111 ∩ 1010111 = 1010111 So, ED2’s DLI is W6 W1 W3 W5 i.e. (W2, W6 W1 W3 W5) Progressing with this procedure consequently for given items and lastly DLI array will be (W2, W6 W1 W3 W5), (W4, W1 W3), (W6, W1 W3 W5), (W7, W1 W3), (W1, W3), (W3, Ø), (W5, Ø). Table 3 : Chronological Ordered Entries TID Items Ordered Items ED1 W1, W2,W3,W5,W6,W15 W2,W6,W1,W3,W5 ED2 W1,W3,W7 W7,W1,W3 ED3 W5,W9 W5 ED4 W1,W3,W4,W5,W7 W4,W7,W1,W3,W5 ED5 W1,W3,W5,W7,W12 W7,W1,W3,W5 ED6 W5,W10 W5 ED7 W1,W2,W3,W5,W6,W16 W2,W6,W1,W3,W5 ED8 W1,W3,W4 W4,W1,W3 ED9 W1,W3,W5,W7,W13 W7,W1,W3,W5 ED10 W1,W3,W5,W7,W14 W7,W1,W3,W5 Table 4 : BooleanTable Characterization of DB TID W2 W4 W6 W7 W1 W3 W5 ED1 1 0 1 0 1 1 1 ED2 0 0 0 1 1 1 0 ED3 0 0 0 0 0 0 1 ED4 0 1 0 1 1 1 1 ED5 0 0 0 1 1 1 1 ED6 0 0 0 0 0 0 1 ED7 1 0 1 0 1 1 1 ED8 0 1 0 0 1 1 0 ED9 0 0 0 1 1 1 1 ED10 0 0 0 1 1 1 1
  • 3. Frequent Pattern Mining with Serialization and De-Serialization DOI: 10.9790/0661-1732110114 www.iosrjournals.org 112 | Page Table 5 : Frequent Pattern Ceneration ITEMS W2 W4 W6 W7 W1 W3 W5 W2 : 2 W2,W6 : 2 W2,W1 : 2 W2,W3 : 2 W2,W5 : 2 W2,W6,W1 : 2 W2,W6,W3 : 2 W2,W6,W5 : 2 W2,W1,W3 : 2 W2,W1,W5 : 2 W2,W3,W5 : 2 W2,W6,W1,W3 : 2 W2,W6,W1,W5 : 2 W2,W6,W3,W5 : 2 W2,W1,W3,W5 : 2 W2,W6,W1,W3,W5 : 2 W4 : 2 W4,W1 : 2 W4,W3 : 2 W4,W1,W3 : 2 W6 : 2 W6,W1 : 2 W6,W3 : 2 W6,W5 : 2 W6,W1,W3 : 2 W6,W1,W5 : 2 W6,W3,W5 : 2 W6,W1,W3,W5 : 2 W7 : 5 W7,W1 : 5 W7,W3 : 5 W7,W1,W3 : 5 W7,W5 : 4 W7,W1,W5 : 4 W7,W3,W5 : 4 W7,W1,W3,W5 : 4 W1 : 8 W1,W3 : 8 W1,W5 : 6 W1,W3,W5 : 6 W3 : 8 W3,W5 : 6 W5 : 8 TOTAL = 43 16 4 8 8 4 2 1 In given illustration, minimum_sup is 2, and items W2, W4 and W6 encompass sup_count 2. Therefore sup_count and frequent patterns creation for those given items is extremely simple. Like, to discover frequent patterns, simply require to produce potential groupings for item and DLI of item, sup_count would get similar just like minimum_sup. Following the method we can discover 16 + 4 + 8 = 28 entirety from 43 for W2, W4 and W6 straightly. Next for W7, that has sup_count larger than minimum_sup, frequent patterns would get probable groupings of item W7 and its DLI (W1 W3) and sup_count would be similar like W7. Item W5 that doesn’t exist in DLI of W7, compute sup_count for these that is, for W7, W5. Except for remaining similar to (W7,W1,W5), (W7,W3,W5), (W7,W1,W3,W5) gets similar sup_count as (W7,W5). Discussed procedure is iteratively followed for W1, W3 as well as W5. As a consequence, this method utilize lesser duration for frequent patterns creation contrast to discussed techniques. Addition to this DLI, performance is also improved with Serialization and De-serialization techniques. Using Serialization and De-Serialization Serialization will save created frequent patterns into a file and de-serialization will recover saved patterns from file done by preceding step. This Serialization and De-serialization Technique(SDT) takes lesser time for patterns entry set gathering than getting this from scratch. Little java code is shared here to get insight into the concept followed by performance evaluation. Serialize_Itemsets() { FileOutputStream fos = new FileOutputStream(SDTFleName); ObjectOutputStream oos = new ObjectOutputStream(fos); oos.writeObject(mapItemTIDS); oos.writeObject(ll); oos.writeObject(trans_count); oos.close(); fos.close(); } DeSerialize_Itemsets(String SDTFileName) { Map<String, BitSet> e = null; FileInputStream fileIn = new FileInputStream(sdfilename); ObjectInputStream in = new ObjectInputStream(fileIn); e = (Map<String, BitSet>) in.readObject(); ll = (LinkedList<Integer>)in.readObject(); tCount = (Integer)in.readObject(); in.close(); fileIn.close(); } Here, SDTFileName is used as a transitional tool to carry out this task.
  • 4. Frequent Pattern Mining with Serialization and De-Serialization DOI: 10.9790/0661-1732110114 www.iosrjournals.org 113 | Page III. Investigational Output We contrast the gig of the projected technique by different techniques like Apriori, DHP, ECLAT and FP Growth. This technique is developed in Java. Here preferring entry set from [8] for generating contradiction report of projected technique. Each entry set is referred from FIMI repository page http://fimi.cs.helsinki.fi. Table 6 illustrates distinctiveness of discussed entry sets. Performance time (in secs) requisites by Apriori, DHP, ECLAT, FP Growth and projected technique i.e. FPMSD are revealed in beneath fig 1st , 2nd , 3rd and 4th . Table 6. Dataset Layout [1st – Apriori, 2nd – DHP, 3rd – ECLAT, 4th – FP Growth 5th – FPMSD] Entry Set Layout No. of Trnas Listing of Techniques Notes T10I4D100 100 1st ,2nd ,3rd ,4th ,5th Top hundred entries from T10I4D100K T10I4D1000 1000 1st ,2nd ,3rd ,4th ,5th Top thousand entries from T10I4D100K T10I4D50000 50000 3rd ,5th Top fifty thousand entries from T10I4D100K T10I4D100K 100000 3rd ,5th - Fig 1. Performance time (in secs) requisites by given techniques The entry set in Fig. 1 demonstrates that projected FPMSD executes fastest on lesser to larger minimum_sup with tiny amount of data. Fig 2. Performance time (in secs) requisites by given techniques
  • 5. Frequent Pattern Mining with Serialization and De-Serialization DOI: 10.9790/0661-1732110114 www.iosrjournals.org 114 | Page The entry set in Fig. 2 demonstrates that projected FPMSD executes fastest on lesser to larger minimum_sup with some higher to tiny amount of data. Figure 3. Figure 4. Fig 3 and 4 shows performance time (in secs) requisites by given techniques The entry set in Fig. 3 and 4 demonstrates that projected FPMSD executes fastest on lesser to larger minimum_sup with higher amount of data. IV. Conclusion Projected FPMSD executes fastest on lesser to larger minimum_sup with tiny to higher amount of data. Ccontrasting with Apriori, DHP, ECLAT and FP Growth, projected technique diminishes duration for greater frequent patterns creation and candidate frequent patterns that sup_count doesn’t required calculation. References [1] Data Mining: Concepts and Techniques, Jiawei Han and Micheline Kamber, MORGAN KAUFMANN PUBLISHER, An Imprint of Elsevier [2] R. Agrawal and S. Srikant, "Fast Algorithms for Mining Association Rules in Large Databases“, Proceedings of the 20th International Conference on Very Large Data Bases, September 1994. [3] J. Park, M. Chen and Philip Yu, "An Effective Hash-Based Algorithm for Mining Association Rules", Proceedings of ACM Special Interest Group of Management of Data, ACM SIGMOD’95, 1995. [4] Han, Pei & Yin, "Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach", Data Mining and Knowledge Discovery, Volume 8, Issue 1 , pp 53-87,2004 [5] M. Zaki, S. Parthasarathy, M. Ogihara, and W. Li, " New Algorithms for Fast Discovery of Association Rules", Proc. 3rd ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'97, Newport Beach, CA), 283-296 AAAI Press, Menlo Park, CA, USA 1997 [6] Shruti Aggarwal, Ranveer Kaur, “Comparative Study of Various Improved Versions of Apriori Algorithm”, International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- April 2013 [7] Agrawal, R., T. Imielin´ ski, and A. Swami (1993). Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, SIGMOD ’93, New York, NY, USA, pp. 207–216. ACM. [8] Synthetic Data for Associations and Sequential Patterns. http://fimi.cs.helsinki.fi [9] W.Song, B.R.Yang, Z.Y.Xu, “Index-BitTableFI: An improved algorithm for mining frequent itemsets,” Knowledge Based Systems 21 (4) , 507–513(2008). [10] Paresh Tanna, Dr. Yogesh Ghodasara, “Improved Frequent Pattern Mining Algorithm with Indexing,”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov – Dec. 2014), PP 73-78.