Association rule mining method based on weighted frequent pattern tree in mobile computing environment

2013 ◽  
Vol 6 (2) ◽  
pp. 193 ◽  
Author(s):  
Jiang hui Cai ◽  
Xu jun Zhao ◽  
Ya lin Xun
2013 ◽  
Vol 13 (3) ◽  
pp. 334-342 ◽  
Author(s):  
Jiang-Hui Cai ◽  
Xu-Jun Zhao ◽  
Shi-Wei Sun ◽  
Ji-Fu Zhang ◽  
Hai-Feng Yang

2021 ◽  
Vol 7 (2) ◽  
pp. 128
Author(s):  
Siriporn Sawangarreerak ◽  
Putthiporn Thanathamathee

Identifying fraudulent financial statements is important in open innovation to help users analyze financial statements and make investment decisions. It also helps users be aware of the occurrence of fraud in financial statements by considering the associated pattern. This study aimed to find associated fraud patterns in financial ratios from financial statements on the Stock Exchange of Thailand using discretization of the financial ratios and frequent pattern growth (FP-Growth) association rule mining to find associated patterns. We found nine associated patterns in financial ratios related to fraudulent financial statements. This study is different from others that have analyzed the occurrence of fraud by using mathematics for each financial item. Moreover, this study discovered six financial items related to fraud: (1) gross profit, (2) primary business income, (3) ratio of primary business income to total assets, (4) ratio of capitals and reserves to total debt, (5) ratio of long-term debt to total capital and reserves, and (6) ratio of accounts receivable to primary business income. The three other financial items that were different from other studies to be focused on were (1) ratio of gross profit to primary business profit, (2) ratio of long-term debt to total assets, and (3) total assets.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 19
Author(s):  
T. Nusrat Jabeen ◽  
M. Chidambaram ◽  
G. Suseendran

Security and privacy has emerged to be a serious concern in which the business professional don’t desire to share their classified transaction data. In the earlier work, secured sharing of transaction databases are carried out. The performance of those methods is enhanced further by bringing in Security and Privacy aware Large Database Association Rule Mining (SPLD-ARM) framework. Now the Improved Secured Association Rule Mining (ISARM) is introduced for the horizontal and vertical segmentation of huge database. Then k-Anonymization methods referred to as suppression and generalization based Anonymization method is employed for privacy guarantee. At last, Diffie-Hellman encryption algorithm is presented in order to safeguard the sensitive information and for the storage service provider to work on encrypted information. The Diffie-Hellman algorithm is utilized for increasing the quality of the system on the overall by the generation of the secured keys and thus the actual data is protected more efficiently. Realization of the newly introduced technique is conducted in the java simulation environment that reveals that the newly introduced technique accomplishes privacy in addition to security.


2010 ◽  
Vol 39 ◽  
pp. 449-454
Author(s):  
Jiang Hui Cai ◽  
Wen Jun Meng ◽  
Zhi Mei Chen

Data mining is a broad term used to describe various methods for discovering patterns in data. A kind of pattern often considered is association rules, probabilistic rules stating that objects satisfying description A also satisfy description B with certain support and confidence. In this study, we first make use of the first-order predicate logic to represent knowledge derived from celestial spectra data. Next, we propose a concept of constrained frequent pattern trees (CFP) along with an algorithm used to construct CFPs, aiming to improve the efficiency and pertinence of association rule mining. The running results show that it is feasible and valuable to apply this method to mining the association rule and the improved algorithm can decrease related computation quantity in large scale and improve the efficiency of the algorithm. Finally, the simulation results of knowledge acquisition for fault diagnosis also show the validity of CFP algorithm.


Sign in / Sign up

Export Citation Format

Share Document