Results 41 to 50 of about 2,974 (185)

Vertical Fragmentation for Database Using FPClose Algorithm

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Vertical fragmentation technique is used to enhance the performance of database system and reduce the number of access to irrelevant instances by splitting a table or relation into different fragments vertically.
Arwa S. Al-Shannaq, Sultan Almotairi
doaj   +1 more source

Revisiting Numerical Pattern Mining with Formal Concept Analysis [PDF]

open access: yes, 2011
In this paper, we investigate the problem of mining numerical data in the framework of Formal Concept Analysis. The usual way is to use a scaling procedure --transforming numerical attributes into binary ones-- leading either to a loss of information or ...
Kaytoue, Mehdi   +2 more
core   +5 more sources

Mining Top-K Frequent Itemsets Through Progressive Sampling

open access: yes, 2010
We study the use of sampling for efficiently mining the top-K frequent itemsets of cardinality at most w. To this purpose, we define an approximation to the top-K frequent itemsets to be a family of itemsets which includes (resp., excludes) all very ...
Andrea Pietracaprina   +8 more
core   +1 more source

Behavior Decoding Delineates Seizure Microfeatures and Associated Sudden Death Risks in Mouse Models of Epilepsy

open access: yesAnnals of Neurology, Volume 99, Issue 1, Page 231-247, January 2026.
Objective Behavior and motor manifestations are distinctive yet often overlooked features of epileptic seizures. Seizures can result in transient disruptions in motor control, often organized into specific behavioral sequences that can inform seizure types, onset zones, and outcomes.
Yuyan Shen   +8 more
wiley   +1 more source

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Efficient Algorithms for Mining Erasable Closed Patterns From Product Datasets

open access: yesIEEE Access, 2017
Finding knowledge from large data sets to use in intelligent systems becomes more and more important in the Internet era. Pattern mining, classification, text mining, and opinion mining are the topical issues.
Bay Vo   +3 more
doaj   +1 more source

From Prediction to Prevention: Using Text Mining and Explainable Machine Learning for Urban Bus Accident Analytics

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Urban bus accidents present major safety and operational challenges, particularly in densely populated metropolitan areas. This study develops a machine learning‐based analytical framework to identify, quantify, and interpret the factors associated with severe bus accidents.
Bowei Chen   +3 more
wiley   +1 more source

Testing Interestingness Measures in Practice: A Large-Scale Analysis of Buying Patterns

open access: yes, 2016
Understanding customer buying patterns is of great interest to the retail industry and has shown to benefit a wide variety of goals ranging from managing stocks to implementing loyalty programs.
Amer-Yahia, Sihem   +3 more
core   +2 more sources

Correlation Analysis of Influencing Factors of Autonomous Vehicle Accidents Based on Improved Apriori Algorithm

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The purpose of this study was to explore the risk factors for autonomous vehicle (AV) crashes and their interdependencies. A total of 659 AV crash data were collected between 2018 and July 2024 from AV crash reports published by the California Department of Motor Vehicles.
Tao Wang   +4 more
wiley   +1 more source

Theoretical Properties of Closed Frequent Itemsets in Frequent Pattern Mining

open access: yesMathematics
Closed frequent itemsets (CFIs) play a crucial role in frequent pattern mining by providing a compact and complete representation of all frequent itemsets (FIs).
Huina Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy