{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:10:05Z","timestamp":1750029005869,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_5","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"45-54","source":"Crossref","is-referenced-by-count":0,"title":["TKAR: Efficient Mining of Top-k Association Rules on Real\u2014Life Datasets"],"prefix":"10.1007","author":[{"given":"O.","family":"Gireesha","sequence":"first","affiliation":[]},{"given":"O.","family":"Obulesu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"L. Bin, Q. Huayong, S. Yizhen, Realization and application of customer attrition early warning model in security company. TELKOMNIKA Indonesian J. Electr. Eng. 10(5), 10(5), 1106\u20131110 (2012)","key":"5_CR1","DOI":"10.11591\/telkomnika.v10i5.1270"},{"doi-asserted-by":"crossref","unstructured":"L. Zhou, H. Wang, W. Wang, Parallel implementation of classification algorithms based on cloud computing environment. TELKOMNIKA Indonesian J. Electr. Eng. 10(5), 10(5), 1087\u20131092 (2012)","key":"5_CR2","DOI":"10.11591\/telkomnika.v10i5.1353"},{"doi-asserted-by":"crossref","unstructured":"A. Ali, M. Elfaki, D. Norhayati, Using Na\u00efve Bayes and bayesian network for prediction of potential problematic cases in tuberculosis. Int. J. Inf. Commun. Technol. (IJ-ICT), 1(2),1(2), 63\u201371 (2012)","key":"5_CR3","DOI":"10.11591\/ij-ict.v1i2.1424"},{"doi-asserted-by":"crossref","unstructured":"R. Agrawal, T. Imielinski, A. Swami, Mining association rules between sets of items in large databases, in Proceedings of the ACM SIGMOD International Conference on Management of data, vol. 22, no. 2, (ACM, New York, 1993), pp. 207\u2013216","key":"5_CR4","DOI":"10.1145\/170035.170072"},{"unstructured":"R. Agrawal, R. Srikant, Fast algorithms for mining Association Rules in large databases, in Proceedings of the 20th International Conference on Very Large Data Bases (Morgan Kaufmann Publishers Inc.,\u00a0San Francisco, 1994), pp. 487\u2013499","key":"5_CR5"},{"unstructured":"D. Jain, S. Gautam, Implementation of apriori algorithm in health care sector: a survey. Int. J. Comput. Sci. Commun. Eng. Nov 2013","key":"5_CR6"},{"unstructured":"S. Panwar, Analytical study of frequent Itemset and Utility Mining Approaches. Int. J. Eng. Appl. Technol. 180\u2013187, July 2015. ISSN: 2321-8134","key":"5_CR7"},{"issue":"6","key":"5_CR8","first-page":"1052","volume":"16","author":"YL Cheung","year":"2004","unstructured":"Y.L. Cheung, A.W. Fu, Mining frequent itemsets without support threshold: with and without item constraints. IEEE TKDE J. 16(6), 1052\u20131069 (2004)","journal-title":"IEEE TKDE J."},{"issue":"19","key":"5_CR9","doi-asserted-by":"crossref","first-page":"6648","DOI":"10.1016\/j.eswa.2015.04.048","volume":"42","author":"T Le","year":"2015","unstructured":"T. Le, B. Vo, Bay: An N-list-based algorithm for mining frequent closed patterns. Expert Syst. Appl. 42(19), 6648\u20136657 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"5_CR10","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.eswa.2014.07.045","volume":"42","author":"Q Huynh-Thi-Le","year":"2015","unstructured":"Q. Huynh-Thi-Le, T. Le, B. Vo, H. Le, H. Bac, An efficient and effective algorithm for mining top-rank-k frequent patterns. Expert Syst. Appl. 42(1), 156\u2013164 (2015)","journal-title":"Expert Syst. Appl."},{"key":"5_CR11","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1016\/j.eswa.2013.08.075","volume":"41","author":"ZH Deng","year":"2014","unstructured":"Z.H. Deng, Fast mining top-rank-k frequent patterns by using node-lists. Expert Syst. Appl. 41, 1763\u20131768 (2014)","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"M. Zihayat, A. An, Mining top-k high utility patterns over data streams. Inf. Sci. (2014)","key":"5_CR12","DOI":"10.1016\/j.ins.2014.01.045"},{"key":"5_CR13","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1007\/s00778-007-0078-6","volume":"17","author":"K Chuang","year":"2008","unstructured":"K. Chuang, J. Huang, M. Chen, Mining Top-K frequent patterns in the presence of the memory constraint. VLDB J. 17, 1321\u20131344 (2008)","journal-title":"VLDB J."},{"issue":"4","key":"5_CR14","first-page":"438","volume":"7","author":"P Tzvetkov","year":"2005","unstructured":"P. Tzvetkov, X. Yan, J. Han, TSP: Mining top-k closed sequential itemsets. KAIS J. 7(4), 438\u2013457 (2005)","journal-title":"KAIS J."},{"unstructured":"J. Wang, J. Han, Y. Lu, P. Tzvetkov, TFP: an efficient algorithm for mining Top-k frequent closed Itemsets. IEEE TKDE J. 17(5), 652\u2013664 (2005)","key":"5_CR15"},{"issue":"2","key":"5_CR16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/380995.381002","volume":"2","author":"J Han","year":"2000","unstructured":"J. Han, J. Pei, Mining frequent patterns by pattern-growth: methodology and implications. ACM SIGKDD Explor. Newsl. 2(2), 14\u201320 (2000)","journal-title":"ACM SIGKDD Explor. Newsl."},{"unstructured":"J. Pei, J. Han, H. Lu, S. Nishio, S. Tang, D. Yang, H-mine: Hyper-Structure mining of frequent Itemsets in large databases, in ICDM, pp. 441\u2013448 (2001)","key":"5_CR17"},{"doi-asserted-by":"crossref","unstructured":"C.W. Wu, B.E. Shie, P. Yu, V.S. Tseng, Mining top-K high utility itemsets, in KDD, pp. 78\u201386 (2012)","key":"5_CR18","DOI":"10.1145\/2339530.2339546"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:50:49Z","timestamp":1750027849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}