Results 41 to 50 of about 3,021 (185)

A Robust Technique for Closed Frequent and High Utility Itemsets Mining: Closed-FHUIM

open access: yesIEEE Access
Frequent itemset mining (FIM) and high utility itemset mining (HUIM) are popular data mining techniques used in various real-world applications such as retail-market, bio-medicine, and click-stream analysis.
Muhammad Waheed Ashraf   +2 more
doaj   +1 more source

Personalized and Explainable Aspect‐Based Recommendation Using Latent Opinion Groups

open access: yesComputational Intelligence, Volume 42, Issue 2, April 2026.
ABSTRACT The problem of explainable recommendation—supporting the recommendation of a product or service with an explanation of why the item is a good choice for the user—is attracting substantial research attention recently. Recommendations associated with an explanation of how the aspects of the chosen item may meet the needs and preferences of the ...
Maryam Mirzaei   +2 more
wiley   +1 more source

Vertical Fragmentation for Database Using FPClose Algorithm

open access: yesJournal of Information Security and Cybercrimes Research, 2019
Vertical fragmentation technique is used to enhance the performance of database system and reduce the number of access to irrelevant instances by splitting a table or relation into different fragments vertically.
Arwa S. Al-Shannaq, Sultan Almotairi
doaj   +1 more source

Mining Top-K Frequent Itemsets Through Progressive Sampling

open access: yes, 2010
We study the use of sampling for efficiently mining the top-K frequent itemsets of cardinality at most w. To this purpose, we define an approximation to the top-K frequent itemsets to be a family of itemsets which includes (resp., excludes) all very ...
Andrea Pietracaprina   +8 more
core   +1 more source

Critical Review for One‐Class Classification: Recent Advances and Reality Behind Them

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review presents a new taxonomy to summarize one‐class classification (OCC) algorithms and their applications. The main argument is that OCC should not learn multiple classes. The paper highlights common violations of OCC involving multiple classes.
Toshitaka Hayashi   +3 more
wiley   +1 more source

Behavior Decoding Delineates Seizure Microfeatures and Associated Sudden Death Risks in Mouse Models of Epilepsy

open access: yesAnnals of Neurology, Volume 99, Issue 1, Page 231-247, January 2026.
Objective Behavior and motor manifestations are distinctive yet often overlooked features of epileptic seizures. Seizures can result in transient disruptions in motor control, often organized into specific behavioral sequences that can inform seizure types, onset zones, and outcomes.
Yuyan Shen   +8 more
wiley   +1 more source

Efficient Algorithms for Mining Erasable Closed Patterns From Product Datasets

open access: yesIEEE Access, 2017
Finding knowledge from large data sets to use in intelligent systems becomes more and more important in the Internet era. Pattern mining, classification, text mining, and opinion mining are the topical issues.
Bay Vo   +3 more
doaj   +1 more source

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Theoretical Properties of Closed Frequent Itemsets in Frequent Pattern Mining

open access: yesMathematics
Closed frequent itemsets (CFIs) play a crucial role in frequent pattern mining by providing a compact and complete representation of all frequent itemsets (FIs).
Huina Zhang   +4 more
doaj   +1 more source

Efficient Discovery of Association Rules and Frequent Itemsets through Sampling with Tight Performance Guarantees [PDF]

open access: yes, 2013
The tasks of extracting (top-$K$) Frequent Itemsets (FI's) and Association Rules (AR's) are fundamental primitives in data mining and database applications. Exact algorithms for these problems exist and are widely used, but their running time is hindered
Riondato, Matteo, Upfal, Eli
core  

Home - About - Disclaimer - Privacy