Results 41 to 50 of about 2,360,798 (281)
Class Association Rules Mining based Rough Set Method [PDF]
This paper investigates the mining of class association rules with rough set approach. In data mining, an association occurs between two set of elements when one element set happen together with another. A class association rule set (CARs) is a subset of
Slimani, Thabet
core
Finding Influential Users in Social Media Using Association Rule Learning
Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users and their behavior in order to identify influential users and predict user participation ...
Anton Borg +14 more
core +2 more sources
Secure Association Rule Sharing [PDF]
The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private.
Oliveira, Stanley R. M. +2 more
openaire +2 more sources
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski +9 more
wiley +1 more source
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman +8 more
wiley +1 more source
The unsafe behavior of workers is the main object of construction safety management, in which violations require increased attention due to their pernicious consequences.
Shengyu Guo, Chaohua Xiong, Peisong Gong
doaj +1 more source
Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core +1 more source
Intravitreal GD2‐Specific Chimeric Antigen Receptor T‐Cell Therapy for Refractory Retinoblastoma
ABSTRACT Effective treatments for advanced, treatment‐resistant retinoblastoma (RB) remain limited. GD2‐specific chimeric antigen receptor (CAR) T cells show potent antitumor activity with minimal toxicity but have not previously been evaluated in RB.
Subongkoch Subhadhirasakul +13 more
wiley +1 more source
Advanced Data Mining of SSD Quality Based on FP-Growth Data Analysis
Storage devices in the computer industry have gradually transformed from the hard disk drive (HDD) to the solid-state drive (SSD), of which the key component is error correction in not-and (NAND) flash memory. While NAND flash memory is under development,
Jieh-Ren Chang +3 more
doaj +1 more source
Outcomes of Live Virus Vaccination in Patients With Vascular Anomalies Being Treated With Sirolimus
ABSTRACT Background Live vaccination in patients with vascular anomalies (VA) receiving sirolimus remains controversial due to immunosuppressive effects and theoretical risks. Procedure This single‐center retrospective study included patients with VA less than 4 years old at the start of sirolimus therapy who were incompletely vaccinated.
Svatava Merkle +5 more
wiley +1 more source

