Results 41 to 50 of about 2,277 (164)

Unveiling Success Drivers in Gaming: A Machine Learning Study Across Steam, Twitch, and Metacritic

open access: yesInternational Journal of Computer Games Technology, Volume 2025, Issue 1, 2025.
This study employs machine learning to assess the relative impact of major platforms—Steam, Twitch, and Metacritic—on video game revenue. Through an integrated analysis of three comprehensive datasets comprising commercially successful titles on Steam, key predictors of financial performance were identified.
Jiesi Ma, Michael J. Katchabaw
wiley   +1 more source

Enhancing Interpretability: A Hierarchical Belief Rule‐Based (HBRB) Method for Assessing Multimodal Social Media Credibility

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
User and artificial intelligence generated contents, coupled with the multimodal nature of information, have made the identification of false news an arduous task. While models can assist users in improving their cognitive abilities, commonly used black‐box models lack transparency, posing a significant challenge for interpretability.
Peng Wu   +4 more
wiley   +1 more source

Psychosocial factors associated with physical activity in people with dementia: A pilot cross‐sectional study

open access: yesAGING MEDICINE, Volume 7, Issue 5, Page 543-552, October 2024.
Factors significantly associated with physical activity outcomes in people with dementia in the final regression models. The figure highlights that psychosocial factors are associated with different constructs related to physical activity. Only the presence of intrapersonal barriers to physical activity was associated with both total physical activity ...
Nicolas Farina   +5 more
wiley   +1 more source

Mining High Utility Itemsets with Regular Occurrence

open access: yesJournal of ICT Research and Applications, 2016
High utility itemset mining (HUIM) plays an important role in the data mining community and in a wide range of applications. For example, in retail business it is used for finding sets of sold products that give high profit, low cost, etc. These itemsets can help improve marketing strategies, make promotions/ advertisements, etc.
Amphawan, Komate   +3 more
openaire   +4 more sources

Electric vehicle load forecasting based on convolutional networks with attention mechanism and federated learning method

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 13, Page 2313-2324, July 2024.
This paper proposes an electric vehicle (EV) load diagnosis algorithm considering data privacy. The validity of the algorithm in this paper is verified by using the real collected EV load data. Abstract Accurate forecasting of electric vehicle (EV) load is essential for grid stability and energy management. EV load forecasting is influenced by multiple
Ruien Bian   +3 more
wiley   +1 more source

A Framework for High-Accuracy Privacy-Preserving Mining

open access: yes, 2004
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently.
Agrawal, Shipra, Haritsa, Jayant R.
core   +3 more sources

Mining high utility sequential patterns [PDF]

open access: yes, 2015
University of Technology Sydney. Faculty of Engineering and Information Technology.Sequential pattern mining refers to the identification of frequent subsequences in sequence databases as patterns.
Yin, J
core  

A Hybrid Recommendation System Based on Association Rules [PDF]

open access: yes, 2013
Recommendation systems are widely used in e-commerce applications. Theengine of a current recommendation system recommends items to a particular user based on user preferences and previous high ratings.
Alsalama, Ahmed
core   +1 more source

State of the Art in Privacy Preserving Data Mining [PDF]

open access: yes, 2008
Privacy is one of the most important properties an information system must satisfy. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when Data Mining techniques are used.
MASERA MARCELO, NAI FOVINO IGOR
core  

RESEARCH ISSUES CONCERNING ALGORITHMS USED FOR OPTIMIZING THE DATA MINING PROCESS [PDF]

open access: yes
In this paper, we depict some of the most widely used data mining algorithms that have an overwhelming utility and influence in the research community. A data mining algorithm can be regarded as a tool that creates a data mining model.
Alexandru Pîrjan, Ion Lungu
core  

Home - About - Disclaimer - Privacy