[1] |
Zhang Yuan-long.Data backup analysis based on cloud platform [J].Electronic World,2018(15):101.(in Chinese)
|
[2] |
Han Jia-wei,Pei Jian,Yin Yi-wen,et al. Mining frequent patterns without candidate generation:A frequent-pattern tree approach[J].Data Mining & Knowledge Discovery,2004,8(1):53-87.
|
[3] |
Agarwal R, Aggarwal C,Prasad V. A tree projection algorithm for generation of frequent item sets[J]. Journal of Parallel and Distributed Computing,2001,61(3):350-371.
|
[4] |
Bhandari A, Gupta A,Das D. Improvised Apriori algorithm using frequent pattern tree for real time applications in data mining[J].
|
|
Procedia Computer Science,2015,46:644-651.
|
[5] |
Rathee S,Kaul M,Kashyap A.R-Apriori:An efficient Apriori based algorithm on Spark[C]∥
|
|
Proc of the 8th Ph.D.Workshop in Information and Knowledge Management,2015:27-34.
|
[6] |
Fan Wei-bei,He Jing,Guo Meng-jiao,et al.Privacy preserving classification on local differential privacy in data centers[J].Journal of Parallel and Distributed Computing,2020,135:70-82.
|
[7] |
Deng G, Hu S, Yuan H,et al.Research on core data protection based on cloud computing[M]∥
|
|
Advances in Intelligent Systems and Computing. Cham:Springer International Publishing, 2019:1167-1174.
|
[8] |
Fan Kai,Liu Ting-ting,Zhang Kuan,et al.A secure and efficient outsourced computation on data sharing scheme for privacy computing[J].Journal of Parallel and Distributed Computing,2020,135:169-176.
|
[9] |
Gupta V, Kaur B P,Jangra S. An efficient method for fault tolerance in cloud environment using encryption and classification[J].
|
|
Soft Computing,2019,23(24):13591-13602.
|
[10] |
Hu B T,Ju X M.A FP-tree based algorithm for mining knowledge point association[C]∥Proc of
|
|
the 6th International Conference on Information Engineering for Mechanics and Materials,2016:34-41.
|
[11] |
Li Min, Li Chun-ping. Analysis and comparison of frequent pattern mining algorithms [J].Journal of Computer Applications,2005,25(Z1):166-171.(in Chinese)
|
[12] |
Mirhosseini M,Nezamabadi-pour H.BICA:A binary imperialist competitive algorithm and its application in CBIR systems[J].International Journal of Machine Learning and Cybernetics,2018,9(12):2043-2057.
|
|
附中文参考文献:
|
[1] |
张元龙.基于云平台的数据备份分析[J].电子世界,2018(15):101.
|
[11] |
李敏,李春平.频繁模式挖掘算法分析和比较[J].计算机应用,2005,25(Z1):166-171.
|