Results 31 to 40 of about 1,878,751 (279)

A User Identification Algorithm Based on User Behavior Analysis in Social Networks

open access: yesIEEE Access, 2019
The precision of the conventional user identification algorithm is not satisfactory because it ignores the role of user-generated data in identity matching.
Kaikai Deng   +5 more
doaj   +1 more source

Efficient Analysis of Pattern and Association Rule Mining Approaches

open access: yes, 2014
The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules.
Lazzez, Amor, Slimani, Thabet
core   +1 more source

Theoretical Properties of Closed Frequent Itemsets in Frequent Pattern Mining

open access: yesMathematics
Closed frequent itemsets (CFIs) play a crucial role in frequent pattern mining by providing a compact and complete representation of all frequent itemsets (FIs).
Huina Zhang   +4 more
doaj   +1 more source

User Identification across Asynchronous Mobility Trajectories

open access: yesSensors, 2019
With the popularity of location-based services and applications, a large amount of mobility data has been generated. Identification through mobile trajectory information, especially asynchronous trajectory data has raised great concerns in social ...
Mengjun Qi   +3 more
doaj   +1 more source

Reductions for Frequency-Based Data Mining Problems

open access: yes, 2017
Studying the computational complexity of problems is one of the - if not the - fundamental questions in computer science. Yet, surprisingly little is known about the computational complexity of many central problems in data mining. In this paper we study
Miettinen, Pauli, Neumann, Stefan
core   +1 more source

Frequent-pattern discovering algorithm for large-scale corpus

open access: yesTongxin xuebao, 2007
A memory-based frequent-pattern discovering algorithm for large-scale corpus was presented.First,the origi-nal corpus was partitioned into several parts using appropriate dividing policy.Then each partition was processed inde-pendently to produce a ...
GONG Cai-chun1   +4 more
doaj   +2 more sources

Extracting Frequent Sequential Patterns of Forest Landscape Dynamics in Fenhe River Basin, Northern China, from Landsat Time Series to Evaluate Landscape Stability

open access: yesRemote Sensing, 2021
The forest landscape pattern evolution can reveal the intensity and mode of action of human–land relationships at different times and in different spaces, providing scientific support for regional ecological security, human settlement health, and ...
Yue Zhang   +4 more
doaj   +1 more source

DESQ: Frequent Sequence Mining with Subsequence Constraints [PDF]

open access: yes, 2016
Frequent sequence mining methods often make use of constraints to control which subsequences should be mined. A variety of such subsequence constraints has been studied in the literature, including length, gap, span, regular-expression, and hierarchy ...
Beedkar, Kaustubh, Gemulla, Rainer
core   +1 more source

Frequent Patterns Mining in DNA Sequence

open access: yesIEEE Access, 2019
As a common biological sequence, DNA sequences contain important information. The discovery of frequent patterns in DNA sequences can help to study the evolution, function and variation of genes.
Na Deng   +3 more
doaj   +1 more source

Route Recommendation Method Based on Frequent Trajectory Sequence Pattern Mining

open access: yesTaiyuan Ligong Daxue xuebao, 2022
Travel route recommendation is one of the important research contents in the field of intelligent transportation. Traditional route recommendation methods often recommend routes on the basis of a single factor such as the shortest route or the shortest ...
Zongtao DUAN   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy