Results 61 to 70 of about 45,837 (241)

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Extraction of Safe Operation Rules and Identification of Vulnerable Nodes in Power Grids Based on Time‐Series Association Analysis

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
This paper presents a data‐driven framework for operational safety rule extraction and vulnerable node identification in power grids with high renewable penetration. The effectiveness of the proposed method is verified on the IEEE 39‐bus system for static security assessment. ABSTRACT High renewable energy penetration introduces significant uncertainty
Zhilin Huang   +6 more
wiley   +1 more source

An association rule-based approach for frequent item mining of multi-stage access data

open access: yesDiscover Computing
The processing of large-scale datasets is complex and requires high efficiency. The database needs to be scanned multiple times by traditional Apriori algorithms to generate candidate itemsets, resulting in significantly reduced efficiency, but also have
Silong Wu
doaj   +1 more source

From Prediction to Prevention: Using Text Mining and Explainable Machine Learning for Urban Bus Accident Analytics

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Urban bus accidents present major safety and operational challenges, particularly in densely populated metropolitan areas. This study develops a machine learning‐based analytical framework to identify, quantify, and interpret the factors associated with severe bus accidents.
Bowei Chen   +3 more
wiley   +1 more source

Mining frequent itemsets with convertible constraints [PDF]

open access: yesProceedings 17th International Conference on Data Engineering, 2002
Recent work has highlighted the importance of the constraint based mining paradigm in the context of frequent itemsets, associations, correlations, sequential patterns, and many other interesting patterns in large databases. The authors study constraints which cannot be handled with existing theory and techniques.
null Jian Pei   +2 more
openaire   +1 more source

Correlation Analysis of Influencing Factors of Autonomous Vehicle Accidents Based on Improved Apriori Algorithm

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The purpose of this study was to explore the risk factors for autonomous vehicle (AV) crashes and their interdependencies. A total of 659 AV crash data were collected between 2018 and July 2024 from AV crash reports published by the California Department of Motor Vehicles.
Tao Wang   +4 more
wiley   +1 more source

Efficiently mining maximal frequent itemsets

open access: yesProceedings 2001 IEEE International Conference on Data Mining, 2002
We present GenMax, a backtracking search based algorithm for mining maximal frequent itemsets. GenMax uses a number of optimizations to prune the search space. It uses a novel technique called progressive focusing to perform maximality checking, and diffset propagation to perform fast frequency computation.
K. Gouda, M.J. Zaki
openaire   +1 more source

Frequent-Itemset Mining Using Locality-Sensitive Hashing [PDF]

open access: yes, 2016
The Apriori algorithm is a classical algorithm for the frequent itemset mining problem. A significant bottleneck in Apriori is the number of I/O operation involved, and the number of candidates it generates. We investigate the role of LSH techniques to overcome these problems, without adding much computational overhead. We propose randomized variations
Bera, Debajyoti, Pratap, Rameshwar
openaire   +2 more sources

GPU-Accelerated Apriori Algorithm

open access: yesITM Web of Conferences, 2017
This paper propose a parallel Apriori algorithm based on GPU (GPUApriori) for frequent itemsets mining, and designs a storage structure using bit table (BIT) matrix to replace the traditional storage mode. In addition, parallel computing scheme on GPU is
Jiang Hao   +3 more
doaj   +1 more source

Taming the Triangle: On the Interplays Between Fairness, Interpretability, and Privacy in Machine Learning

open access: yesComputational Intelligence, Volume 41, Issue 4, August 2025.
ABSTRACT Machine learning techniques are increasingly used for high‐stakes decision‐making, such as college admissions, loan attribution, or recidivism prediction. Thus, it is crucial to ensure that the models learnt can be audited or understood by human users, do not create or reproduce discrimination or bias and do not leak sensitive information ...
Julien Ferry   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy