Results 51 to 60 of about 2,346 (201)

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Developing and Validating an Instrument for Assessing Secondary Students' Self‐Efficacy for Online Reading

open access: yesReading Research Quarterly, Volume 61, Issue 2, April/May/June 2026.
This study introduces and validates the Self‐Efficacy for Online Reading Questionnaire (SEORQ), a process‐grounded instrument designed to measure secondary students' efficacy in executing the core demands of online reading. The model conceptualizes online reading self‐efficacy as a multidimensional construct encompassing five interrelated processes ...
SeongYeup Kim   +2 more
wiley   +1 more source

Efficient Analysis of Pattern and Association Rule Mining Approaches

open access: yes, 2014
The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules.
Lazzez, Amor, Slimani, Thabet
core   +1 more source

Personalized and Explainable Aspect‐Based Recommendation Using Latent Opinion Groups

open access: yesComputational Intelligence, Volume 42, Issue 2, April 2026.
ABSTRACT The problem of explainable recommendation—supporting the recommendation of a product or service with an explanation of why the item is a good choice for the user—is attracting substantial research attention recently. Recommendations associated with an explanation of how the aspects of the chosen item may meet the needs and preferences of the ...
Maryam Mirzaei   +2 more
wiley   +1 more source

Incrementally Updating the Discovered High Average-Utility Patterns With the Pre-Large Concept

open access: yesIEEE Access, 2020
High average-utility itemset mining (HAUIM) is an extension of high-utility itemset mining (HUIM), which provides a reliable measure to reveal utility patterns by considering the length of the mined pattern.
Jimmy Ming-Tai Wu   +3 more
doaj   +1 more source

Improving the quality of the personalized electronic program guide [PDF]

open access: yes, 2003
As Digital TV subscribers are offered more and more channels, it is becoming increasingly difficult for them to locate the right programme information at the right time.
McDonald, Kieran   +4 more
core   +1 more source

Critical Review for One‐Class Classification: Recent Advances and Reality Behind Them

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review presents a new taxonomy to summarize one‐class classification (OCC) algorithms and their applications. The main argument is that OCC should not learn multiple classes. The paper highlights common violations of OCC involving multiple classes.
Toshitaka Hayashi   +3 more
wiley   +1 more source

A Multi-Core Approach to Efficiently Mining High-Utility Itemsets in Dynamic Profit Databases

open access: yesIEEE Access, 2020
Analyzing customer transactions to discover high-utility itemsets is a popular task, which consists of finding the sets of items that are purchased together and yield a high profit.
Bay Vo   +4 more
doaj   +1 more source

Global Copper Deposit Dataset: A New Open‐Source Database for Advanced Data Analysis and Exploration Targeting

open access: yesGeoscience Data Journal, Volume 13, Issue 1, January 2026.
We build a new, open‐source global copper deposit dataset (GCDD), facilitating AI‐driven data analysis for exploration targeting and improving our understanding of copper mineralizing systems and their mappable expressions. The GCDD hosts information about 1483 copper deposits worldwide, capturing key deposit attributes such as location, genetic type ...
Bin Wang   +2 more
wiley   +1 more source

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy