Results 21 to 30 of about 1,878,751 (279)

Mining Human Activity Patterns From Smart Home Big Data for Health Care Applications

open access: yesIEEE Access, 2017
Nowadays, there is an ever-increasing migration of people to urban areas. Health care service is one of the most challenging aspects that is greatly affected by the vast influx of people to city centers.
Abdulsalam Yassine   +2 more
doaj   +1 more source

Multi-step spectrum occupancy prediction method based on association rule mining

open access: yesDianzi Jishu Yingyong, 2020
Radio spectrum occupancy prediction is a key technology in cognitive radio research. In the traditional method, only single step size prediction can be performed, and the effect of multi-step size prediction is significantly reduced.
Jing Tong, Ding Wenrui, Liu Chunhui
doaj   +1 more source

Efficient and Robust Syslog Parsing for Network Devices in Datacenter Networks

open access: yesIEEE Access, 2020
Syslog parsing is of vital importance for the detection, diagnosis and prediction of network device failures in a datacenter. A common approach to syslog parsing is to extract templates from historical syslogs, after which syslogs are matched to these ...
Shenglin Zhang   +10 more
doaj   +1 more source

Mining Frequent Sequential Patterns [PDF]

open access: yesJournal of Big Data Research, 2021
In recent times, the urge to collect data and analyze it has grown. Time stamping a data set is an important part of the analysis and data mining as it can give information that is more useful. Different mining techniques have been designed for mining time-series data, sequential patterns for example seeks relationships between occurrences of ...
Rajae KRIBII, Youssef FAKIR
openaire   +1 more source

Sistem Rekomendasi Buku Perpustakaan Menggunakan Algoritma Frequent Pattern Growth

open access: yesTechno.Com, 2022
Perpustakaan memiliki pelayanan utama memfasilitasi peminjaman buku, untuk memudahkan anggota perpustakaan menemukan buku yang tepat, perpustakaan dapat dilengkapi dengan sistem pencarian buku.
Endang Retnoningsih   +1 more
doaj   +1 more source

Mining Frequent Synchronous Patterns based on Item Cover Similarity

open access: yesInternational Journal of Computational Intelligence Systems, 2018
In previous work we presented CoCoNAD (Continuous-time Closed Neuron Assembly Detection), a method to find significant synchronous patterns in parallel point processes with the goal to analyze parallel neural spike trains in neurobiology3,9.
Salatiel Ezennaya-Gomez   +1 more
doaj   +1 more source

Analisis Sistem Frequent Pattern Growth Untuk Penjualan Produk Herbal

open access: yesJRST: Jurnal Riset Sains dan Teknologi, 2023
Perkembangan teknologi memberikan dampak yang besar terhadap perkembangan dunia bisnis. Persaingan dalam dunia bisnis sangat ketat sehingga perlu melihat potensi transaksi penjualan produk dan memiliki strategi penjualan produk yang tepat.
Rezi Elsya Putra   +3 more
doaj   +1 more source

An Efficient Approach to Mining Maximal Contiguous Frequent Patterns from Large DNA Sequence Databases [PDF]

open access: yesGenomics & Informatics, 2012
Mining interesting patterns from DNA sequences is one of the most challenging tasks in bioinformatics and computational biology. Maximal contiguous frequent patterns are preferable for expressing the function and structure of DNA sequences and hence can ...
Md. Rezaul Karim   +3 more
doaj   +1 more source

On Aircraft Trajectory Type Recognition Based on Frequent Route Patterns [PDF]

open access: yesJisuanji kexue, 2021
With the development of global positioning and radar technology,more and more trajectory data can be collected.In particular,trajectories generated by aircrafts,ships,migratory birds are complicated and varied,and free from any constraints on the ground ...
SONG Jia-geng, ZHANG Fu-sang, JIN Bei-hong, DOU Zhu-mei
doaj   +1 more source

Mining Frequent Graph Patterns with Differential Privacy [PDF]

open access: yes, 2013
Discovering frequent graph patterns in a graph database offers valuable information in a variety of applications. However, if the graph dataset contains sensitive data of individuals such as mobile phone-call graphs and web-click graphs, releasing ...
Geweke J.   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy