Results 51 to 60 of about 9,424 (197)

Rekomendasi Paket Produk Guna Meningkatkan Penjualan Dengan Metode FP-Growth

open access: yesKhazanah Informatika, 2018
Perilaku konsumen dalam membeli suatu produk memang sangat beragam. Ada pembeli yang gemar membeli produk yang telah dipaket, tetapi ada juga pembeli yang membeli produk yang mendapat diskon, dan masih banyak lagi.
Asrul Abdullah
doaj   +1 more source

Global Copper Deposit Dataset: A New Open‐Source Database for Advanced Data Analysis and Exploration Targeting

open access: yesGeoscience Data Journal, Volume 13, Issue 1, January 2026.
We build a new, open‐source global copper deposit dataset (GCDD), facilitating AI‐driven data analysis for exploration targeting and improving our understanding of copper mineralizing systems and their mappable expressions. The GCDD hosts information about 1483 copper deposits worldwide, capturing key deposit attributes such as location, genetic type ...
Bin Wang   +2 more
wiley   +1 more source

Frequent Itemset Mining and Multi-Layer Network-Based Analysis of RDF Databases

open access: yesMathematics, 2021
Triplestores or resource description framework (RDF) stores are purpose-built databases used to organise, store and share data with context. Knowledge extraction from a large amount of interconnected data requires effective tools and methods to address ...
Gergely Honti, János Abonyi
doaj   +1 more source

Mining Frequent Itemsets Using Genetic Algorithm

open access: yes, 2010
In general frequent itemsets are generated from large data sets by applying association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental, Border algorithm etc., which take too much computer time to compute all the frequent ...
Biswas, Sushanta   +3 more
core   +2 more sources

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Extraction of Safe Operation Rules and Identification of Vulnerable Nodes in Power Grids Based on Time‐Series Association Analysis

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
This paper presents a data‐driven framework for operational safety rule extraction and vulnerable node identification in power grids with high renewable penetration. The effectiveness of the proposed method is verified on the IEEE 39‐bus system for static security assessment. ABSTRACT High renewable energy penetration introduces significant uncertainty
Zhilin Huang   +6 more
wiley   +1 more source

Privacy Preserving Utility Mining: A Survey

open access: yes, 2018
In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and ...
Chao, Han-Chieh   +4 more
core   +1 more source

From Prediction to Prevention: Using Text Mining and Explainable Machine Learning for Urban Bus Accident Analytics

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Urban bus accidents present major safety and operational challenges, particularly in densely populated metropolitan areas. This study develops a machine learning‐based analytical framework to identify, quantify, and interpret the factors associated with severe bus accidents.
Bowei Chen   +3 more
wiley   +1 more source

IMPLEMENTASI ALGORITMA APRIORI UNTUK MENEMUKAN FREQUENT ITEMSET DALAM KERANJANG BELANJA

open access: yesMajalah Ilmiah Teknologi Elektro, 2016
Algoritma apriori menggunakan pendekatan iteratif dimana k-itemset digunakan untuk mengeksplorasi (k+1)-itemset. Calon (k+1)-itemset yang mengandung frekuensi subset yang jarang muncul atau dibawah threshold akan dipangkas dan tidak dipakai menentukan ...
Adie Wahyudi Oktavia Gama   +2 more
doaj  

Frequent Itemset Mining and Association Rules [PDF]

open access: yes, 2006
With the advent of mass storage devices, databases have become larger and larger. Point-of-sale data, patient medical data, scientific data, and credit card transactions are just a few sources of the ever-increasing amounts of data. These large datasets provide a rich source of useful information.
Imberman S., Tansel A.U.
openaire   +3 more sources

Home - About - Disclaimer - Privacy