subject

Consider the transactional database shown in the following table. Transaction ID Items Bought
T100 Milk, Bread, Salad, Fruit, Soup, Noodle
T200 Beef, Bread, Salad, Fruit, Soup, Noodle
T300 Milk, Rice, Fruit, Soup, Pork, Lamb
T400 Milk, Chicken, Fish, Fruit, Noodle
T500 Fish, Bread, Fruit, Shrimp, Soup
T600 Fruit, Noodle, Milk, Bread, Bean, Duck
Let minimum support be 50% and let minimum confidence be 30%.
(A) Find all frequent itemsets using the Apriori algorithm. Show how the Apriori algorithm
works in a step by step manner.
(B) List all the association rules found by the Apriori algorithm.
(C) Find all frequent itemsets using the FP-tree algorithm. Show the final FP-tree you
constructed. Note that the FP-tree algorithm has a pre-processing step, which sorts items in a
transaction based on the support values of the items. If two items have the same support value,
they must be sorted in alphabetical (lexicographical) order in the transaction.
(D) List all the association rules found by the FP-tree algorithm.
(E) In this example, indicate whether the association rules produced by the Apriori algorithm are
the same as those produced by the FP-tree algorithm.
(F) Compare the efficiency of the Apriori algorithm and the FP-tree algorithm using this
example. Indicate which algorithm is more efficient and explain why based on this example.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 05:30
Agood flowchart alludes to both the inputs and outputs you will need to receive and give to the user. true or false?
Answers: 3
question
Computers and Technology, 22.06.2019 16:00
You have inserted new slides based on a word outline. how do you format these new slides to match the powerpoint presentation formatting? a. select all slides in the presentation and click format on the home tab. b. select the new slides and click reset on the home tab. c. select all slides in the presentation and click reset on the home tab. d. select the new slides and click format on the home tab.
Answers: 3
question
Computers and Technology, 22.06.2019 22:00
Discuss the ways in which electronic information associated with payments is addressed in terms of security. include encryption, secure sockets layers, and secure electronic transactions in your discussion. are there any other ways that consumers and businesses can keep their payment information secure in an electronic commerce environment? do you feel that your information is safe when conducting electronic business? why or why not?
Answers: 1
question
Computers and Technology, 23.06.2019 11:30
Auser is given read permission to a file stored on an ntfs-formatted volume. the file is then copied to a folder on the same ntfs-formatted volume where the user has been given full control permission for that folder. when the user logs on to the computer holding the file and accesses its new location via a drive letter, what is the user's effective permission to the file? a. read b. full control c. no access d. modify e. none of the above
Answers: 1
You know the right answer?
Consider the transactional database shown in the following table. Transaction ID Items Bought
...
Questions
question
Mathematics, 12.03.2021 01:00
question
Mathematics, 12.03.2021 01:00
question
Mathematics, 12.03.2021 01:00
question
History, 12.03.2021 01:00
question
Mathematics, 12.03.2021 01:00
Questions on the website: 13722362