Apriori algorithm makes use of prior knowledge of subset

Assignment Help Basic Computer Science
Reference no: EM13975888

1.The Apriori algorithm makes use of prior knowledge of subset support properties: 

a. Prove that all nonempty subsets of frequent itemsets must also be frequent? 

b. Prove that the support of any nonempty subset s' of itemset s must be at least as great as the support of s? 

2.  Most frequent pattern mining algorithms consider only distinct items in a transaction. However, multiple occurrences of an item in the same shopping basket, such as 4 cakes and 3 jugs of milk, can be important in transactional data analysis. How can one mine frequent itemsets efficiently considering multiple occurrences of items? Propose modification to the well-known algorithms, such as Apriori and FP-growth to adapt to such situation? 

3.  We wish to use the Flajolet Martin algorithm (Section 4.4) to count the number of distinct elements in a stream. Assume that there are 10 possible elements {1, 2, ..., 10} that could appear in the stream but only 4 of them have actually appeared. To make our estimate of the count of distinct elements, we hash each element to a 4-bit binary number. Element X is hashed to {(3X + 7) modulo 11}. For example element 8 hashes to 3*8+7 = 31 modulo 11 = 9 which maps into the 4-bits (1001). A set of 4 of the elements 1 through 10 could give an estimate that is exact (if the estimate is 4) or too high or too low. Figure out under Page 2 of 2 

what circumstances a set of the following 4 elements give the exact correct estimate: 

a. (2,6,8,10) 

b. (1,3,9,10) 

c. (3,7,8,10) 

d. (1,6,7,10) 

e. (4,5,6,7) 

f. (2,5,7,10) 

g. (4,5,6,10) 

h. (1,3,6,8) 

i. (1,2,3,9) 

 

4.  A bipartite graph has nodes ai and bi for i = 0, 1,..., 5. There is an edge between ai and bi if i-j is divisible by 2 or 3. For example, a0 is connected to b0, b2, b3, and b4. Also, a3 is connected to b0, b1, b3, and b5. Another way to understand this graph is to realize that ai is connected to bj unless j = i+i or j = i-1, where arithmetic is modulo 6. Say a complete bipartite subgraph is maximal if no nodes can be added to it and the "complete" property be maintained. Which of the following instances of K2,2 is NOT maximal? 

a. {a2, a5, b2, b5} 

b. {a0, a3, b0, b3} 

c. {a1, a3, b3, b5} 

d. {a2, a3, b0, b5} 

Reference no: EM13975888

Questions Cloud

Explain the results in terms of time value of money. : Create a chart summarizing the details of the investment for both Bob and Lisa. Explain the results in terms of time value of money.
Determine how the reaction looks like : A α-particle hits a silicon nucleus,29Si and a nuclear reaction occurs. One proton is emitted. Determine how the reaction looks like. Will need step-by-step solution to this question, many thanks. Will be rewarded asap.
Prepare ahistogram for the data on high temperatures : Prepare a data spreadsheet with three columns: Date, High Temperature, and Low Temperature. List the past 60 days for which data is available. Prepare ahistogram for the data on high temperatures and comment on the shape of the distribution as ob..
What distance from the object should the lens be placed : You need to use a 21-cm-focal-length lens to produce an inverted image one third the height of an object. At what distance from the object should the lens be placed? Express your answer to two significant figures and include the appropriate units.
Apriori algorithm makes use of prior knowledge of subset : 1.The Apriori algorithm makes use of prior knowledge of subset support properties:  a. Prove that all nonempty subsets of frequent itemsets must also be frequent?  b. Prove that the support of any nonempty subset s' of itemset s must be at least as g..
Compute the mean and median : The file MobileLoyaltycontains spending on products ($) during a three-month period by a sample of 15 customers receiving incentives through a mobile loyalty program. Compute the mean and median. Compute the variance, standard deviation, range, and..
Write a class name circle : Circle Class. Write a class name Circle, with the class declaration in a file called Circle.h and the implementation in a file called Circle.cpp. The class will have two data members, a double that holds the radius of the circle and a double called p..
Using a loop, multiple all of the numbers between 3 and 10. : Using a loop, multiple all of the numbers between 3 and 10.
Which attack exploits the session initiation : Which  attack exploits the session initiation between the Transport Control Program (TCP) client and server in a network?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd