SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 154
MINING ELEVATED SERVICE ITEMSETS ON TRANSACTIONAL
RECORDSETS USING SLICING
V.Suganthi1
, J.Kalai Vani2
1
Associate Professor, Information Technology, IFET College of Engineering, Villupuram, India
2
Assistant Professor, Information Technology, IFET College of Engineering, Villupuram, India
Abstract
Large transactions take very long time to access the data and the system performance will be degraded and the speed will be
reduced. In order to maintain large transactions in an easy and faster way a concept called slicing is used in this paper. Slicing is
a process of grouping of two data into a single data in order to reduce the space and also to reduce the time taken to produce the
data. The slicing uses two concepts as generalization and bucketization. Generalization is a process where the grouped data can
be viewed separately if required in order to get a clear view of the data in the database. Bucketization is the process where the
data are found with the help of the age perspective. The original data and the duplicate data are separated using this process. The
slicing partitions the data both horizontally and vertically. The main advantage of the slicing is that it handles the high
dimensional data.
Keywords: Generalization, Bucketization, Slicing, Attribute partitioning.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Data mining is the process of processing large volumes of
data (usually stored in a database), searching for patterns
and relationships within that data. Data mining is the
exploration and analysis of large quantities of data in order
to discover meaningful patterns and rules. Data stream
mining has become an emerging research topic in the data
mining field, and finding frequent Itemsets is an important
task in data stream mining with wide applications. Recently,
utility mining is receiving extensive attentions with two
issues reconsidered: First, the utility (e.g., profit) of each
item may be different in real applications; second, the
frequent Itemsets might not produce the highest utility. A
novel algorithm named GUIDE (Generation of temporal
maximal Utility Itemsets from Data streams) which can find
temporal maximal utility Itemsets from data streams. A
novel data structure, namely, TMUI-tree (Temporal
Maximal Utility Itemsets tree), is also proposed for
efficiently capturing the utility of each itemset with one-
time scanning.
1) GUIDE is the first one-pass utility-based algorithm
for mining temporal maximal utility Itemsets from data
streams, and
2) TMUI-tree is efficient and easy to maintain. The
experimental results show that our approach
outperforms other existing utility mining algorithms
like Two-Phase algorithm under the data stream
environment.
However, mining high utility itemsets from databases is not
an easy task since downward closure property [1] in
frequent itemset mining does not hold. In other words,
pruning search space for high utility itemset mining is
difficult because a superset of a low-utility itemset may be a
high utility itemset. To address this problem we propose two
concepts called generalization and bucketization with
slicing.
1.1 Existing System
In the existing system the data were separate and each and
every process was done individually and the processing took
a long time to execute the output from the database. And
also the data can be collapsed and there can be a chance for
data loss to occur. In existing two algorithms were used
(UP-Growth and UP-Growth+) [2].UP-Growth is where the
data are added in the database and the UP-Growth+ is where
the data are deleted from the database. The UP-Growth and
UP-Growth+ is managed using the UP-Growth Tree.
1.2 Disadvantages of Existing System
 Long processing time and the system performance is
degraded.
 The space occupied by each data is more and thus
transactions time will also be more.
 There is a chance of data loss.
 Backup of the data are taken that are deleted from the
database.
2. PROPOSED SYSTEM
In this paper we propose two concepts called generalization
and bucketization. Slicing is used to combine two data from
the tables and generate in a single table to reduce the space.
The generalization is used to view the tables separately to
get a clear view of data and to check them if any error has
occurred. Bucketization is a process where the original data
and the duplicate data are compared and the correct result is
generated with the help of age perspective. These are used to
combine the data of two table into a single table in order to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 155
reduce the space and to generate the result without waiting
time and without degrading the system performance. The
slicing uses two concepts they are generalization and
bucketization. Generalization is the process where the data
separated using the slicing is viewed according to the
convenience of the user. The bucketization is the process
where the data can be separated according to the age
perspective as shown in Fig-1.
In Slicing, each attribute is in exactly one column. An
extension is the notion of over- lapping slicing, which
duplicates an attribute in more than one column. Slicing is
quite different from marginal publication in a number of
aspects. First, marginal publication can be viewed as a
special case of slicing which does not have horizontal
partitioning. Slicing is a promising technique for handling
high- dimensional data.
Fig -1: Overall Architecture
2.1 Advantages of Proposed Work
 As the data are combined into one table the space will
be reduced.
 The transactions will be fast without degrading the
systems performance.
 There is no chance of data loss.
3. DESIGN AND IMPLEMENTATION
This paper has the following modules
 Formalization of slicing
 Attribute partitioning
 Multiset
 Bucketization
3.1 Formalization of Slicing
Slicing is a promising technique for handling high
dimensional data. By partitioning attributes into columns,
we protect privacy by breaking the association of
uncorrelated attributes and preserve data utility by
preserving the association between highly correlated
attributes. Privacy-preserving data mining is the area of data
mining that used to safeguard sensitive information from
unsanctioned disclosure .The problem of privacy-preserving
data mining has become more important in recent years
because of the increasing ability to store personal data about
users. A number of techniques such as randomization and k-
anonymity, bucketization, generalization have been
proposed in recent years in order to perform privacy-
preserving data mining. For high-dimension data by using
generalization significant amount of information is lost
according to recent works.
3.2 Attribute Partitioning
When column generalization is applied, to achieve the same
level of privacy against attribute dis-closure, bucket sizes
can be smaller. While column generalization may result in
information loss, smaller bucket-sizes allow better data
utility. Therefore, there is a trade-off between column
generalization and tuple partitioning. In this paper, we
mainly focus on the tuple partitioning algorithm. The trade-
off between column generalization and tuple partitioning is
the subject of future work. Attribute partitioning refers to
the process where the tables are separated according to the
tuple partitioning algorithm and the data are partitioned
without any data loss.
The data are separated using slicing inorder to reduce the
space and to execute the result without degrading the system
performance. The attributes here refers to the data that are
extracted from the database after combining them into a
single table using slicing. The partitioning is done based on
the data that are already there in the database. Each data has
its own representation in the database. Tuple partitioning is
the algorithm that is used here, that is the data are
partitioned according to the tuple(row) based. Thus the
attributes are partitioned according to the row, to combine
the data of two tables into a single table inorder to reduce
the space and to maintain the system performance.
3.3 Multiset
The Multiset is a process where the data are grouped and
displayed so that the count of people will be given with the
gender. Here the same aged people and also the people with
different age are shown in different categories. By doing this
the data can be easily viewed and the data can be fastly
accessed. The data can be accessed very fastly so that the
system performance will not be degraded.
The notion of multiset (or bag) is a generalization of the
notion of set in which members are allowed to appear more
than once. For example, there is a unique set that contains
the elements a and b and no others, but there are many
multisets with this property, such as the multiset that
contains two copies of a and one of b or the multiset that
contains three copies of both a and b. The Multiset is the
process where the data that are combined are generated
separately and viewed inorder to the convenience of the
user.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 156
It also reduces the space and time to search to get the data
from the database and to get a clear view of the data in the
database. Large database transactions can degrade the
system performance, so that the data are combined using
slicing. The combined data are viewed using the Multiset
generalization process.
3.4 Bucketization
Bucketization is to consider the number of matching buckets
for original tuples and that for fake tuples. If they are similar
enough, membership information is protected because the
adversary cannot distinguish original tuples from fake
tuples. Since the main focus of this paper is attribute
disclosure, we do not intend to propose a comprehensive
analysis for membership disclosure protection. We use the
standard SVD-based prediction method.3 As in Netflix
Prize, prediction accuracy is measured as the rooted-mean-
square-error (RMSE). We compare slicing against the
baseline method.
The baseline method will simply predict any user’s rating on
a movie as the average rating of that movie. Intuitively, the
baseline method considers the following data publishing
algorithm: the algorithm releases, for each movie, the
average rating of that movie from all users. The baseline
method only depends on the global statistics of the data set
and does not assume any knowledge about any particular
user.
An ongoing problem in Database As a Service (DAS) is
how to increase the efficiency of retrieving encrypted data
from remote untrusted servers without compromising
security[2]. Bucketization is a privacy preserving technique
for executing SQL queries over encrypted data on a DAS
server. Bucketization partitions encrypted attributes into
queryable tables (buckets), thereby disguising which records
are requested. While a number of bucketization techniques
are optimized for uniform query access, many Internet and
private network access patterns reflect a non-uniform or
Zipf-like trend. [3], [4], [5].
If query access is non-uniform, existing techniques may be
subject to substantial performance degradation [6]. In order
to evaluate that possibility, this thesis presents new
bucketization technique, Query Sensitive Bucketization
(QSB) that capitalizes on the probability distribution of non-
uniform queries.
Two existing uniform bucketization techniques were
implemented to (1) evaluate their performance when the
distribution of queries is non-uniform, and (2) evaluate their
performance relative to QSB. Among the measures used for
performance analysis, a new security metric is presented,
which quantifies the risk of an adversary estimating the true
value distribution of an encrypted data store. Unlike existing
security metrics, the new metric expresses information
disclosed by the pattern of query access over an encrypted
bucket set. Results showed that QSB improves query
efficiency over uniform techniques, while maintaining a
high level of data security.
QSB is not only an efficient example of query-based
bucketization for DAS, but a conceptual model for future
research, in which data are organized to accommodate a
variety of query access patterns, thereby improving query
efficiency and database security.
4. SCREENSHOTS
4.1 Admin Login Page
Fig-2: Admin Login Page
4.2 Creating the Dataset
Fig-3: Creating the Dataset
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 157
4.3 Generalization Process
Fig-4: Generalization Process
4.4 Bucketization Process before Entering the
Values
Fig-4: Bucketization process before entering the values.
4.5 Bucketization Process after Entering the Values
Fig-5: Bucketization process after entering the values
4.6 Multiset Generalization
Fig-6: Multiset Generalization
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 158
4.7 Sliced Table
Fig-7: Sliced Table
4.8 One Attribute Column Slicing
Fig-8: One Attribute Column Slicing
5. CONCLUSIONS
Thus this paper is used to transact the large data from the
database in an easy and efficient way so that there is no data
loss. And the large data can be combined together in order
to reduce the space and transaction of the data are done in a
faster way using the slicing. In this paper we mainly focus
on the tuple partitioning that is only the particular rows can
be grouped in order to combine the tables and generate the
result. In future we can use the column generalization, in
which particular column can be grouped accordingly. And
also the column generalization may result in information
loss.
REFERENCES
[1]. R. Chan, Q. Yang, and Y. Shen, “Mining High Utility
Itemsets,” Proc. IEEE Third Int’l Conf. Data Mining, pp.
19-26, Nov. 2003.
[2]. V.S. Tseng, C.-W. Wu, B.-E. Shie, and P.S. Yu, “UP-
Growth: An Efficient Algorithm for High Utility Itemsets
Mining,” Proc. 16th
ACM SIGKDD Conf. Knowledge
Discovery and Data Mining (KDD’10), pp. 253-262, 2010.
[3]. B.-E. Shie, H.-F. Hsiao, V., S. Tseng, and P.S. Yu,
“Mining High Utility Mobile Sequential Patterns in Mobile
Commerce Environments,” Proc. 16th Int’l Conf. DAtabase
Systems for Advanced Applications (DASFAA ’11), vol.
6587/2011, pp. 224-238, 2011
[4]. M.Y. Eltabakh, M. Ouzzani, M.A. Khalil, W.G. Aref,
and A.K. Elmagarmid, “Incremental Mining for Frequent
Patterns in Evolving Time Series Databases,” Technical
Report CSD TR#08-02, Purdue Univ., 2008. 9
[5]. J.H. Chang, “Mining Weighted Sequential Patterns in a
Sequence Database with a Time-Interval Weight,”
Knowledge-Based Systems, vol. 24, no. 1, pp. 1-9, 2011.
[6]. C.F. Ahmed, S.K. Tanbeer, B.-S. Jeong, and Y.-K. Lee,
“Efficient Tree Structures for High Utility Pattern Mining in
Incremental Databases,” IEEE Trans. Knowledge and Data
Eng., vol. 21, no. 12,pp. 1708-1721, Dec. 2009.
BIOGRAPHIES
Mrs.V.Suganthi received her B.E. in
CSE from Jayaram college of
Engineering and Technology,
Bharathidasan university and her
M.Tech in IT from Sathyabama
University. She has got one year of
Industry Experience. She is currently working as an
Associate Professor in the department of Information
Technology, IFET College of Engineering, Villupuram,
India. She has published one International Journal. Her areas
of interests includes Computer Networks, Programming
Paradigms, Network Security.
Ms.J.Kalai vani received her B.E in
CSE from VRS College of Engineering
and Technology, Villupuram and
M.Tech in CSE from Manonmaniam
Sundaranar University. She is currently
working as an Assistant Professor in the
Department of Information Technology, IFET College of
Engineering, Villupuram, India. She has published a book
on Computer Graphics. She has published three papers in
international journals. Her area of interests includes
Computer Networks, Cryptography and Network Security,
Computer Graphics.

More Related Content

What's hot

EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUPEVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUPijdms
 
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...AM Publications
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Editor IJARCET
 
IRJET- Recognition of Plants using Leaf Image with Neural Network and Com...
IRJET-  	  Recognition of Plants using Leaf Image with Neural Network and Com...IRJET-  	  Recognition of Plants using Leaf Image with Neural Network and Com...
IRJET- Recognition of Plants using Leaf Image with Neural Network and Com...IRJET Journal
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...Editor IJMTER
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataIRJET Journal
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationeSAT Journals
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSijcses
 
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE csandit
 

What's hot (16)

EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUPEVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
EVALUATE DATABASE COMPRESSION PERFORMANCE AND PARALLEL BACKUP
 
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...
 
Assigment 2
Assigment 2Assigment 2
Assigment 2
 
Fg33950952
Fg33950952Fg33950952
Fg33950952
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343
 
LITERATURE SURVEY ON BIG DATA AND PRESERVING PRIVACY FOR THE BIG DATA IN CLOUD
LITERATURE SURVEY ON BIG DATA AND PRESERVING PRIVACY FOR THE BIG DATA IN CLOUDLITERATURE SURVEY ON BIG DATA AND PRESERVING PRIVACY FOR THE BIG DATA IN CLOUD
LITERATURE SURVEY ON BIG DATA AND PRESERVING PRIVACY FOR THE BIG DATA IN CLOUD
 
IRJET- Recognition of Plants using Leaf Image with Neural Network and Com...
IRJET-  	  Recognition of Plants using Leaf Image with Neural Network and Com...IRJET-  	  Recognition of Plants using Leaf Image with Neural Network and Com...
IRJET- Recognition of Plants using Leaf Image with Neural Network and Com...
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological Data
 
Digital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communicationDigital image hiding algorithm for secret communication
Digital image hiding algorithm for secret communication
 
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKSMULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS
 
T9
T9T9
T9
 
Project Report (Summer 2016)
Project Report (Summer 2016)Project Report (Summer 2016)
Project Report (Summer 2016)
 
50120140505015 2
50120140505015 250120140505015 2
50120140505015 2
 
1771 1775
1771 17751771 1775
1771 1775
 
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
 

Viewers also liked

Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...eSAT Publishing House
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...eSAT Publishing House
 
Static analysis of portal axle output shaft using
Static analysis of portal axle output shaft usingStatic analysis of portal axle output shaft using
Static analysis of portal axle output shaft usingeSAT Publishing House
 
Emergency preparedness plan in educational institution
Emergency preparedness plan in educational institutionEmergency preparedness plan in educational institution
Emergency preparedness plan in educational institutioneSAT Publishing House
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool weareSAT Publishing House
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
 
Automated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry piAutomated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry pieSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Performance of lateritic concrete under
Performance of lateritic concrete underPerformance of lateritic concrete under
Performance of lateritic concrete undereSAT Publishing House
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
Studies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertiesStudies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertieseSAT Publishing House
 
Design and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemDesign and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemeSAT Publishing House
 
An automatic wave probe reference setting mechanism
An automatic wave probe reference setting mechanismAn automatic wave probe reference setting mechanism
An automatic wave probe reference setting mechanismeSAT Publishing House
 
Managing cost and performing balancing at cloud platform
Managing cost and performing balancing at cloud platformManaging cost and performing balancing at cloud platform
Managing cost and performing balancing at cloud platformeSAT Publishing House
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingeSAT Publishing House
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometriceSAT Publishing House
 
Picosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedPicosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedeSAT Publishing House
 
Survey and analysis of underground water of five
Survey and analysis of underground water of fiveSurvey and analysis of underground water of five
Survey and analysis of underground water of fiveeSAT Publishing House
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureeSAT Publishing House
 

Viewers also liked (20)

Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...
 
Static analysis of portal axle output shaft using
Static analysis of portal axle output shaft usingStatic analysis of portal axle output shaft using
Static analysis of portal axle output shaft using
 
Emergency preparedness plan in educational institution
Emergency preparedness plan in educational institutionEmergency preparedness plan in educational institution
Emergency preparedness plan in educational institution
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wear
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...
 
Automated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry piAutomated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry pi
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Performance of lateritic concrete under
Performance of lateritic concrete underPerformance of lateritic concrete under
Performance of lateritic concrete under
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
Studies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertiesStudies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion properties
 
Design and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemDesign and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning system
 
An automatic wave probe reference setting mechanism
An automatic wave probe reference setting mechanismAn automatic wave probe reference setting mechanism
An automatic wave probe reference setting mechanism
 
Managing cost and performing balancing at cloud platform
Managing cost and performing balancing at cloud platformManaging cost and performing balancing at cloud platform
Managing cost and performing balancing at cloud platform
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecasting
 
Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometric
 
Picosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascadedPicosecond optical pulse generation using cascaded
Picosecond optical pulse generation using cascaded
 
Survey and analysis of underground water of five
Survey and analysis of underground water of fiveSurvey and analysis of underground water of five
Survey and analysis of underground water of five
 
A study on wind speed distributions
A study on wind speed distributionsA study on wind speed distributions
A study on wind speed distributions
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
 

Similar to Mining elevated service itemsets on transactional recordsets using slicing

A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismseSAT Journals
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudeSAT Journals
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET Journal
 
Data preprocessing for efficient external sorting
Data preprocessing for efficient external sortingData preprocessing for efficient external sorting
Data preprocessing for efficient external sortingeSAT Journals
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
 
An Efficient Approach for Clustering High Dimensional Data
An Efficient Approach for Clustering High Dimensional DataAn Efficient Approach for Clustering High Dimensional Data
An Efficient Approach for Clustering High Dimensional DataIJSTA
 
IRJET-Clustering Techniques for Mushroom Dataset
IRJET-Clustering Techniques for Mushroom DatasetIRJET-Clustering Techniques for Mushroom Dataset
IRJET-Clustering Techniques for Mushroom DatasetIRJET Journal
 
A Survey Report on High Utility Itemset Mining for Frequent Pattern Mining
A Survey Report on High Utility Itemset Mining for Frequent Pattern MiningA Survey Report on High Utility Itemset Mining for Frequent Pattern Mining
A Survey Report on High Utility Itemset Mining for Frequent Pattern MiningIJSRD
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...Editor IJMTER
 
Mining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce FrameworkMining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce FrameworkIRJET Journal
 
Elimination of data redundancy before persisting into dbms using svm classifi...
Elimination of data redundancy before persisting into dbms using svm classifi...Elimination of data redundancy before persisting into dbms using svm classifi...
Elimination of data redundancy before persisting into dbms using svm classifi...nalini manogaran
 
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...Editor IJMTER
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisIRJET Journal
 

Similar to Mining elevated service itemsets on transactional recordsets using slicing (20)

A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 
V33119122
V33119122V33119122
V33119122
 
Anonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloudAnonymization of data using mapreduce on cloud
Anonymization of data using mapreduce on cloud
 
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
IRJET- An Integrity Auditing &Data Dedupe withEffective Bandwidth in Cloud St...
 
Data preprocessing for efficient external sorting
Data preprocessing for efficient external sortingData preprocessing for efficient external sorting
Data preprocessing for efficient external sorting
 
B017550814
B017550814B017550814
B017550814
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid Systems
 
Ijcatr04071003
Ijcatr04071003Ijcatr04071003
Ijcatr04071003
 
A Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid SystemsA Survey of File Replication Techniques In Grid Systems
A Survey of File Replication Techniques In Grid Systems
 
An Efficient Approach for Clustering High Dimensional Data
An Efficient Approach for Clustering High Dimensional DataAn Efficient Approach for Clustering High Dimensional Data
An Efficient Approach for Clustering High Dimensional Data
 
IRJET-Clustering Techniques for Mushroom Dataset
IRJET-Clustering Techniques for Mushroom DatasetIRJET-Clustering Techniques for Mushroom Dataset
IRJET-Clustering Techniques for Mushroom Dataset
 
A Survey Report on High Utility Itemset Mining for Frequent Pattern Mining
A Survey Report on High Utility Itemset Mining for Frequent Pattern MiningA Survey Report on High Utility Itemset Mining for Frequent Pattern Mining
A Survey Report on High Utility Itemset Mining for Frequent Pattern Mining
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
PERFORMING DATA MINING IN (SRMS) THROUGH VERTICAL APPROACH WITH ASSOCIATION R...
 
Mining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce FrameworkMining High Utility Patterns in Large Databases using Mapreduce Framework
Mining High Utility Patterns in Large Databases using Mapreduce Framework
 
Elimination of data redundancy before persisting into dbms using svm classifi...
Elimination of data redundancy before persisting into dbms using svm classifi...Elimination of data redundancy before persisting into dbms using svm classifi...
Elimination of data redundancy before persisting into dbms using svm classifi...
 
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
A Survey on Improve Efficiency And Scability vertical mining using Agriculter...
 
Fast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data AnalysisFast Range Aggregate Queries for Big Data Analysis
Fast Range Aggregate Queries for Big Data Analysis
 
1699 1704
1699 17041699 1704
1699 1704
 
1699 1704
1699 17041699 1704
1699 1704
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Mining elevated service itemsets on transactional recordsets using slicing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 154 MINING ELEVATED SERVICE ITEMSETS ON TRANSACTIONAL RECORDSETS USING SLICING V.Suganthi1 , J.Kalai Vani2 1 Associate Professor, Information Technology, IFET College of Engineering, Villupuram, India 2 Assistant Professor, Information Technology, IFET College of Engineering, Villupuram, India Abstract Large transactions take very long time to access the data and the system performance will be degraded and the speed will be reduced. In order to maintain large transactions in an easy and faster way a concept called slicing is used in this paper. Slicing is a process of grouping of two data into a single data in order to reduce the space and also to reduce the time taken to produce the data. The slicing uses two concepts as generalization and bucketization. Generalization is a process where the grouped data can be viewed separately if required in order to get a clear view of the data in the database. Bucketization is the process where the data are found with the help of the age perspective. The original data and the duplicate data are separated using this process. The slicing partitions the data both horizontally and vertically. The main advantage of the slicing is that it handles the high dimensional data. Keywords: Generalization, Bucketization, Slicing, Attribute partitioning. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Data mining is the process of processing large volumes of data (usually stored in a database), searching for patterns and relationships within that data. Data mining is the exploration and analysis of large quantities of data in order to discover meaningful patterns and rules. Data stream mining has become an emerging research topic in the data mining field, and finding frequent Itemsets is an important task in data stream mining with wide applications. Recently, utility mining is receiving extensive attentions with two issues reconsidered: First, the utility (e.g., profit) of each item may be different in real applications; second, the frequent Itemsets might not produce the highest utility. A novel algorithm named GUIDE (Generation of temporal maximal Utility Itemsets from Data streams) which can find temporal maximal utility Itemsets from data streams. A novel data structure, namely, TMUI-tree (Temporal Maximal Utility Itemsets tree), is also proposed for efficiently capturing the utility of each itemset with one- time scanning. 1) GUIDE is the first one-pass utility-based algorithm for mining temporal maximal utility Itemsets from data streams, and 2) TMUI-tree is efficient and easy to maintain. The experimental results show that our approach outperforms other existing utility mining algorithms like Two-Phase algorithm under the data stream environment. However, mining high utility itemsets from databases is not an easy task since downward closure property [1] in frequent itemset mining does not hold. In other words, pruning search space for high utility itemset mining is difficult because a superset of a low-utility itemset may be a high utility itemset. To address this problem we propose two concepts called generalization and bucketization with slicing. 1.1 Existing System In the existing system the data were separate and each and every process was done individually and the processing took a long time to execute the output from the database. And also the data can be collapsed and there can be a chance for data loss to occur. In existing two algorithms were used (UP-Growth and UP-Growth+) [2].UP-Growth is where the data are added in the database and the UP-Growth+ is where the data are deleted from the database. The UP-Growth and UP-Growth+ is managed using the UP-Growth Tree. 1.2 Disadvantages of Existing System  Long processing time and the system performance is degraded.  The space occupied by each data is more and thus transactions time will also be more.  There is a chance of data loss.  Backup of the data are taken that are deleted from the database. 2. PROPOSED SYSTEM In this paper we propose two concepts called generalization and bucketization. Slicing is used to combine two data from the tables and generate in a single table to reduce the space. The generalization is used to view the tables separately to get a clear view of data and to check them if any error has occurred. Bucketization is a process where the original data and the duplicate data are compared and the correct result is generated with the help of age perspective. These are used to combine the data of two table into a single table in order to
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 155 reduce the space and to generate the result without waiting time and without degrading the system performance. The slicing uses two concepts they are generalization and bucketization. Generalization is the process where the data separated using the slicing is viewed according to the convenience of the user. The bucketization is the process where the data can be separated according to the age perspective as shown in Fig-1. In Slicing, each attribute is in exactly one column. An extension is the notion of over- lapping slicing, which duplicates an attribute in more than one column. Slicing is quite different from marginal publication in a number of aspects. First, marginal publication can be viewed as a special case of slicing which does not have horizontal partitioning. Slicing is a promising technique for handling high- dimensional data. Fig -1: Overall Architecture 2.1 Advantages of Proposed Work  As the data are combined into one table the space will be reduced.  The transactions will be fast without degrading the systems performance.  There is no chance of data loss. 3. DESIGN AND IMPLEMENTATION This paper has the following modules  Formalization of slicing  Attribute partitioning  Multiset  Bucketization 3.1 Formalization of Slicing Slicing is a promising technique for handling high dimensional data. By partitioning attributes into columns, we protect privacy by breaking the association of uncorrelated attributes and preserve data utility by preserving the association between highly correlated attributes. Privacy-preserving data mining is the area of data mining that used to safeguard sensitive information from unsanctioned disclosure .The problem of privacy-preserving data mining has become more important in recent years because of the increasing ability to store personal data about users. A number of techniques such as randomization and k- anonymity, bucketization, generalization have been proposed in recent years in order to perform privacy- preserving data mining. For high-dimension data by using generalization significant amount of information is lost according to recent works. 3.2 Attribute Partitioning When column generalization is applied, to achieve the same level of privacy against attribute dis-closure, bucket sizes can be smaller. While column generalization may result in information loss, smaller bucket-sizes allow better data utility. Therefore, there is a trade-off between column generalization and tuple partitioning. In this paper, we mainly focus on the tuple partitioning algorithm. The trade- off between column generalization and tuple partitioning is the subject of future work. Attribute partitioning refers to the process where the tables are separated according to the tuple partitioning algorithm and the data are partitioned without any data loss. The data are separated using slicing inorder to reduce the space and to execute the result without degrading the system performance. The attributes here refers to the data that are extracted from the database after combining them into a single table using slicing. The partitioning is done based on the data that are already there in the database. Each data has its own representation in the database. Tuple partitioning is the algorithm that is used here, that is the data are partitioned according to the tuple(row) based. Thus the attributes are partitioned according to the row, to combine the data of two tables into a single table inorder to reduce the space and to maintain the system performance. 3.3 Multiset The Multiset is a process where the data are grouped and displayed so that the count of people will be given with the gender. Here the same aged people and also the people with different age are shown in different categories. By doing this the data can be easily viewed and the data can be fastly accessed. The data can be accessed very fastly so that the system performance will not be degraded. The notion of multiset (or bag) is a generalization of the notion of set in which members are allowed to appear more than once. For example, there is a unique set that contains the elements a and b and no others, but there are many multisets with this property, such as the multiset that contains two copies of a and one of b or the multiset that contains three copies of both a and b. The Multiset is the process where the data that are combined are generated separately and viewed inorder to the convenience of the user.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 156 It also reduces the space and time to search to get the data from the database and to get a clear view of the data in the database. Large database transactions can degrade the system performance, so that the data are combined using slicing. The combined data are viewed using the Multiset generalization process. 3.4 Bucketization Bucketization is to consider the number of matching buckets for original tuples and that for fake tuples. If they are similar enough, membership information is protected because the adversary cannot distinguish original tuples from fake tuples. Since the main focus of this paper is attribute disclosure, we do not intend to propose a comprehensive analysis for membership disclosure protection. We use the standard SVD-based prediction method.3 As in Netflix Prize, prediction accuracy is measured as the rooted-mean- square-error (RMSE). We compare slicing against the baseline method. The baseline method will simply predict any user’s rating on a movie as the average rating of that movie. Intuitively, the baseline method considers the following data publishing algorithm: the algorithm releases, for each movie, the average rating of that movie from all users. The baseline method only depends on the global statistics of the data set and does not assume any knowledge about any particular user. An ongoing problem in Database As a Service (DAS) is how to increase the efficiency of retrieving encrypted data from remote untrusted servers without compromising security[2]. Bucketization is a privacy preserving technique for executing SQL queries over encrypted data on a DAS server. Bucketization partitions encrypted attributes into queryable tables (buckets), thereby disguising which records are requested. While a number of bucketization techniques are optimized for uniform query access, many Internet and private network access patterns reflect a non-uniform or Zipf-like trend. [3], [4], [5]. If query access is non-uniform, existing techniques may be subject to substantial performance degradation [6]. In order to evaluate that possibility, this thesis presents new bucketization technique, Query Sensitive Bucketization (QSB) that capitalizes on the probability distribution of non- uniform queries. Two existing uniform bucketization techniques were implemented to (1) evaluate their performance when the distribution of queries is non-uniform, and (2) evaluate their performance relative to QSB. Among the measures used for performance analysis, a new security metric is presented, which quantifies the risk of an adversary estimating the true value distribution of an encrypted data store. Unlike existing security metrics, the new metric expresses information disclosed by the pattern of query access over an encrypted bucket set. Results showed that QSB improves query efficiency over uniform techniques, while maintaining a high level of data security. QSB is not only an efficient example of query-based bucketization for DAS, but a conceptual model for future research, in which data are organized to accommodate a variety of query access patterns, thereby improving query efficiency and database security. 4. SCREENSHOTS 4.1 Admin Login Page Fig-2: Admin Login Page 4.2 Creating the Dataset Fig-3: Creating the Dataset
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 157 4.3 Generalization Process Fig-4: Generalization Process 4.4 Bucketization Process before Entering the Values Fig-4: Bucketization process before entering the values. 4.5 Bucketization Process after Entering the Values Fig-5: Bucketization process after entering the values 4.6 Multiset Generalization Fig-6: Multiset Generalization
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 158 4.7 Sliced Table Fig-7: Sliced Table 4.8 One Attribute Column Slicing Fig-8: One Attribute Column Slicing 5. CONCLUSIONS Thus this paper is used to transact the large data from the database in an easy and efficient way so that there is no data loss. And the large data can be combined together in order to reduce the space and transaction of the data are done in a faster way using the slicing. In this paper we mainly focus on the tuple partitioning that is only the particular rows can be grouped in order to combine the tables and generate the result. In future we can use the column generalization, in which particular column can be grouped accordingly. And also the column generalization may result in information loss. REFERENCES [1]. R. Chan, Q. Yang, and Y. Shen, “Mining High Utility Itemsets,” Proc. IEEE Third Int’l Conf. Data Mining, pp. 19-26, Nov. 2003. [2]. V.S. Tseng, C.-W. Wu, B.-E. Shie, and P.S. Yu, “UP- Growth: An Efficient Algorithm for High Utility Itemsets Mining,” Proc. 16th ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD’10), pp. 253-262, 2010. [3]. B.-E. Shie, H.-F. Hsiao, V., S. Tseng, and P.S. Yu, “Mining High Utility Mobile Sequential Patterns in Mobile Commerce Environments,” Proc. 16th Int’l Conf. DAtabase Systems for Advanced Applications (DASFAA ’11), vol. 6587/2011, pp. 224-238, 2011 [4]. M.Y. Eltabakh, M. Ouzzani, M.A. Khalil, W.G. Aref, and A.K. Elmagarmid, “Incremental Mining for Frequent Patterns in Evolving Time Series Databases,” Technical Report CSD TR#08-02, Purdue Univ., 2008. 9 [5]. J.H. Chang, “Mining Weighted Sequential Patterns in a Sequence Database with a Time-Interval Weight,” Knowledge-Based Systems, vol. 24, no. 1, pp. 1-9, 2011. [6]. C.F. Ahmed, S.K. Tanbeer, B.-S. Jeong, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12,pp. 1708-1721, Dec. 2009. BIOGRAPHIES Mrs.V.Suganthi received her B.E. in CSE from Jayaram college of Engineering and Technology, Bharathidasan university and her M.Tech in IT from Sathyabama University. She has got one year of Industry Experience. She is currently working as an Associate Professor in the department of Information Technology, IFET College of Engineering, Villupuram, India. She has published one International Journal. Her areas of interests includes Computer Networks, Programming Paradigms, Network Security. Ms.J.Kalai vani received her B.E in CSE from VRS College of Engineering and Technology, Villupuram and M.Tech in CSE from Manonmaniam Sundaranar University. She is currently working as an Assistant Professor in the Department of Information Technology, IFET College of Engineering, Villupuram, India. She has published a book on Computer Graphics. She has published three papers in international journals. Her area of interests includes Computer Networks, Cryptography and Network Security, Computer Graphics.