2018
DOI: 10.2139/ssrn.3170300
|View full text |Cite
|
Sign up to set email alerts
|

Improved Market Basket Analysis with Utility Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Association rule mining is the most extensively used (and promising) technique in the data mining field [14]. Since its introduction, it has created several opportunities to mine high-utility data [2]. It helps connect people with common interests [3] and provides new opportunities to improve public health and medicine; the prediction of post-liver transplantation survival is one example [4,5].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Association rule mining is the most extensively used (and promising) technique in the data mining field [14]. Since its introduction, it has created several opportunities to mine high-utility data [2]. It helps connect people with common interests [3] and provides new opportunities to improve public health and medicine; the prediction of post-liver transplantation survival is one example [4,5].…”
Section: Related Workmentioning
confidence: 99%
“…If the rule {l} ⇒ {m, n} was chosen as a sensitive rule, then the victim item would be (n) because it has lower support compared to (m), where α(n) = 5 and α(m) = 6. Therefore, (n) should be removed from a certain number of transactions; this number is δ, which can be computed using Equation (2). So, altering one transaction is enough to hide the rule {l} ⇒ {m, n} and this is due to the small size of the dataset in our example.…”
Section: Tracing Examplementioning
confidence: 99%
See 2 more Smart Citations
“…Security is also considered to be an important aspect in transactions done individually and frequent itemsets for databases that are horizontally partitioned. With the aim of providing security for the frequently utilized itemsets that is purchased finally for the transaction, this research work introduces a novel key security algorithm that employs RSA cryptographic technique in which the classifier optimizes the key values [8,9].…”
Section: Introductionmentioning
confidence: 99%