Results 41 to 50 of about 3,021 (185)
A Robust Technique for Closed Frequent and High Utility Itemsets Mining: Closed-FHUIM
Frequent itemset mining (FIM) and high utility itemset mining (HUIM) are popular data mining techniques used in various real-world applications such as retail-market, bio-medicine, and click-stream analysis.
Muhammad Waheed Ashraf +2 more
doaj +1 more source
Personalized and Explainable Aspect‐Based Recommendation Using Latent Opinion Groups
ABSTRACT The problem of explainable recommendation—supporting the recommendation of a product or service with an explanation of why the item is a good choice for the user—is attracting substantial research attention recently. Recommendations associated with an explanation of how the aspects of the chosen item may meet the needs and preferences of the ...
Maryam Mirzaei +2 more
wiley +1 more source
Vertical Fragmentation for Database Using FPClose Algorithm
Vertical fragmentation technique is used to enhance the performance of database system and reduce the number of access to irrelevant instances by splitting a table or relation into different fragments vertically.
Arwa S. Al-Shannaq, Sultan Almotairi
doaj +1 more source
Mining Top-K Frequent Itemsets Through Progressive Sampling
We study the use of sampling for efficiently mining the top-K frequent itemsets of cardinality at most w. To this purpose, we define an approximation to the top-K frequent itemsets to be a family of itemsets which includes (resp., excludes) all very ...
Andrea Pietracaprina +8 more
core +1 more source
Critical Review for One‐Class Classification: Recent Advances and Reality Behind Them
This review presents a new taxonomy to summarize one‐class classification (OCC) algorithms and their applications. The main argument is that OCC should not learn multiple classes. The paper highlights common violations of OCC involving multiple classes.
Toshitaka Hayashi +3 more
wiley +1 more source
Objective Behavior and motor manifestations are distinctive yet often overlooked features of epileptic seizures. Seizures can result in transient disruptions in motor control, often organized into specific behavioral sequences that can inform seizure types, onset zones, and outcomes.
Yuyan Shen +8 more
wiley +1 more source
Efficient Algorithms for Mining Erasable Closed Patterns From Product Datasets
Finding knowledge from large data sets to use in intelligent systems becomes more and more important in the Internet era. Pattern mining, classification, text mining, and opinion mining are the topical issues.
Bay Vo +3 more
doaj +1 more source
A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani +5 more
wiley +1 more source
Theoretical Properties of Closed Frequent Itemsets in Frequent Pattern Mining
Closed frequent itemsets (CFIs) play a crucial role in frequent pattern mining by providing a compact and complete representation of all frequent itemsets (FIs).
Huina Zhang +4 more
doaj +1 more source
Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees [PDF]
The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association Rules (AR's) are fundamental primitives in data mining and database applications. Exact algorithms for these problems exist and are widely used, but their running time is hindered
Riondato, Matteo, Upfal, Eli
core

