Results 21 to 30 of about 2,316 (204)

LUIM: New Low-Utility Itemset Mining Framework

open access: yesIEEE Access, 2019
High-utility itemset mining (HUIM), which is the detection of high-utility itemsets (HUIs) in a transactional database, provides the decision maker with greater flexibility to exploit item utilities, such as quantity and profits, to extract remarkable ...
Naji Alhusaini   +5 more
doaj   +1 more source

A General Method for mining high-Utility itemsets with correlated measures

open access: yesJournal of Information and Telecommunication, 2021
Discovering high-utility itemsets from a transaction database is one of the important tasks in High-Utility Itemset Mining (HUIM). The discovered high-utility itemsets (HUIs) must meet a user-defined given minimum utility threshold.
Nguyen Manh Hung, Tung NT, Bay Vo
doaj   +1 more source

A Parallel High-Utility Itemset Mining Algorithm Based on Hadoop

open access: yesComplex System Modeling and Simulation, 2023
High-utility itemset mining (HUIM) can consider not only the profit factor but also the profitable factor, which is an essential task in data mining. However, most HUIM algorithms are mainly developed on a single machine, which is inefficient for big ...
Zaihe Cheng   +3 more
doaj   +1 more source

Using Tree Structure to Mine High Temporal Fuzzy Utility Itemsets

open access: yesIEEE Access, 2020
Data mining is a critical technology for extracting valuable knowledge from databases. It has been used in many fields, like retail, finance, biology, etc.
Tzung-Pei Hong   +5 more
doaj   +1 more source

An Efficient Method for Mining Closed Potential High-Utility Itemsets

open access: yesIEEE Access, 2020
High-utility itemset mining (HUIM) has become a key phase of the pattern mining process, which has wide applications, related to both quantities and profits of items. Many algorithms have been proposed to mine high-utility itemsets (HUIs).
Bay Vo   +5 more
doaj   +1 more source

A log mining approach for process monitoring in SCADA [PDF]

open access: yes, 2012
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when
Bolzoni, Damiano   +2 more
core   +4 more sources

Data sanitization in association rule mining based on impact factor [PDF]

open access: yesJournal of Artificial Intelligence and Data Mining, 2015
Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns.
A. Telikani, A. Shahbahrami, R. Tavoli
doaj   +1 more source

MINING OF HIGH-UTILITY ITEMSETS WITH NEGATIVE UTILITY

open access: yesJOURNAL OF TECHNOLOGY & INNOVATION, 2020
The goal of the high-utility itemset mining task is to discover combinations of items that yield high profits from transactional databases. HUIM is a useful tool for retail stores to analyze customer behaviors. However, in the real world, items are found with both positive and negative utility values.
Tung N.T   +3 more
openaire   +1 more source

Flexible constrained sampling with guarantees for pattern mining [PDF]

open access: yes, 2017
Pattern sampling has been proposed as a potential solution to the infamous pattern explosion. Instead of enumerating all patterns that satisfy the constraints, individual patterns are sampled proportional to a given quality measure.
A Giacometti   +15 more
core   +3 more sources

Privacy Preservation by Disassociation [PDF]

open access: yes, 2012
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniquesa) protect the privacy of users either by altering the set of quasi-identifiers of the ...
Liagouris, John   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy