Apriori algorithm makes use of prior knowledge of subset

Assignment Help Basic Computer Science
Reference no: EM13975888

1.The Apriori algorithm makes use of prior knowledge of subset support properties: 

a. Prove that all nonempty subsets of frequent itemsets must also be frequent? 

b. Prove that the support of any nonempty subset s' of itemset s must be at least as great as the support of s? 

2.  Most frequent pattern mining algorithms consider only distinct items in a transaction. However, multiple occurrences of an item in the same shopping basket, such as 4 cakes and 3 jugs of milk, can be important in transactional data analysis. How can one mine frequent itemsets efficiently considering multiple occurrences of items? Propose modification to the well-known algorithms, such as Apriori and FP-growth to adapt to such situation? 

3.  We wish to use the Flajolet Martin algorithm (Section 4.4) to count the number of distinct elements in a stream. Assume that there are 10 possible elements {1, 2, ..., 10} that could appear in the stream but only 4 of them have actually appeared. To make our estimate of the count of distinct elements, we hash each element to a 4-bit binary number. Element X is hashed to {(3X + 7) modulo 11}. For example element 8 hashes to 3*8+7 = 31 modulo 11 = 9 which maps into the 4-bits (1001). A set of 4 of the elements 1 through 10 could give an estimate that is exact (if the estimate is 4) or too high or too low. Figure out under Page 2 of 2 

what circumstances a set of the following 4 elements give the exact correct estimate: 

a. (2,6,8,10) 

b. (1,3,9,10) 

c. (3,7,8,10) 

d. (1,6,7,10) 

e. (4,5,6,7) 

f. (2,5,7,10) 

g. (4,5,6,10) 

h. (1,3,6,8) 

i. (1,2,3,9) 

 

4.  A bipartite graph has nodes ai and bi for i = 0, 1,..., 5. There is an edge between ai and bi if i-j is divisible by 2 or 3. For example, a0 is connected to b0, b2, b3, and b4. Also, a3 is connected to b0, b1, b3, and b5. Another way to understand this graph is to realize that ai is connected to bj unless j = i+i or j = i-1, where arithmetic is modulo 6. Say a complete bipartite subgraph is maximal if no nodes can be added to it and the "complete" property be maintained. Which of the following instances of K2,2 is NOT maximal? 

a. {a2, a5, b2, b5} 

b. {a0, a3, b0, b3} 

c. {a1, a3, b3, b5} 

d. {a2, a3, b0, b5} 

Reference no: EM13975888

Questions Cloud

Explain the results in terms of time value of money. : Create a chart summarizing the details of the investment for both Bob and Lisa. Explain the results in terms of time value of money.
Determine how the reaction looks like : A α-particle hits a silicon nucleus,29Si and a nuclear reaction occurs. One proton is emitted. Determine how the reaction looks like. Will need step-by-step solution to this question, many thanks. Will be rewarded asap.
Prepare ahistogram for the data on high temperatures : Prepare a data spreadsheet with three columns: Date, High Temperature, and Low Temperature. List the past 60 days for which data is available. Prepare ahistogram for the data on high temperatures and comment on the shape of the distribution as ob..
What distance from the object should the lens be placed : You need to use a 21-cm-focal-length lens to produce an inverted image one third the height of an object. At what distance from the object should the lens be placed? Express your answer to two significant figures and include the appropriate units.
Apriori algorithm makes use of prior knowledge of subset : 1.The Apriori algorithm makes use of prior knowledge of subset support properties:  a. Prove that all nonempty subsets of frequent itemsets must also be frequent?  b. Prove that the support of any nonempty subset s' of itemset s must be at least as g..
Compute the mean and median : The file MobileLoyaltycontains spending on products ($) during a three-month period by a sample of 15 customers receiving incentives through a mobile loyalty program. Compute the mean and median. Compute the variance, standard deviation, range, and..
Write a class name circle : Circle Class. Write a class name Circle, with the class declaration in a file called Circle.h and the implementation in a file called Circle.cpp. The class will have two data members, a double that holds the radius of the circle and a double called p..
Using a loop, multiple all of the numbers between 3 and 10. : Using a loop, multiple all of the numbers between 3 and 10.
Which attack exploits the session initiation : Which  attack exploits the session initiation between the Transport Control Program (TCP) client and server in a network?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the process of forward chaining

Explain the process of forward chaining

  Bob''s encryption company

Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q

  Compare the benefits of the virtualization computing tech

Compare the benefits of the virtualization computing technology with past successful or unsuccessful telecommunications technologies you have in place. With four references.

  Provide specific mitigation strategies

Provide specific mitigation strategies for any issues that could detract from the project

  Determining the placement of the fsmo roles

Explain the steps for determining the placement of the FSMO roles for the Acme Widget Technical School. How are these roles determined, implemented, maintained, and monitored

  Knowledge about the programming language c

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (contains a pointer to next segment descriptor). Initially, there is only one se..

  Common features of internet search engines

If you had this citation for an article. Paul, D. L. (1999). Assessing technological barriers to telemedicine: Technology-management implications. IEEE Transactions on Engineering Management, 46(3) 279-289. What would you search to see if the libra..

  A water tank has six taps on the bottom

A water tank has six taps on the bottom. If all of the faucet is opened, the tank is fully charged it will run out within 8 hours. How many hours are required to spend tankage when only 4 pieces faucet is opened?

  Ieee 754-floating point representation

Express the final answer in single precision IEEE 754-floating point representation - In single precision IEEE 754-floating point numbers, perform the subsequent operations.

  What happens to all of the old computers

What happens to all of the old computers and electronic devices. Have you ever thrown away a computer or electronic device? How did you dispose of it.

  Prove by induction of recurrence relation has solution

Describe why Kim's recurrence relation is correct. Prove by induction that Kim's recurrence relation has solution: M(k) = 3^(k - 1).

  Problem releated to relationship-inheritance

Grading: For each programming assignment, you are graded by explaining and demoing your code to a TA. You must demo your program BEFORE the next assignment is due, and if you fail to do so, you will automatically lose 50 points! Your job is to con..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd