Results 71 to 80 of about 2,316 (204)

A novel transformer health state direct prediction method based on knowledge and data fusion‐driven model

open access: yesHigh Voltage, Volume 10, Issue 3, Page 710-725, June 2025.
Abstract Predicting the future health state of a transformer can offer early warning of latent defects and faults within the transformer, thereby facilitating the formulation of power outage maintenance plans and power dispatch strategies. However, existing prediction methods based on the structure of ‘splicing prediction and diagnosis method’ suffer ...
Peng Zhang   +5 more
wiley   +1 more source

PUC: parallel mining of high-utility itemsets with load balancing on spark

open access: yesJournal of Intelligent Systems, 2022
Distributed programming paradigms such as MapReduce and Spark have alleviated sequential bottleneck while mining of massive transaction databases. Of significant importance is mining High Utility Itemset (HUI) that incorporates the revenue of the items ...
Brahmavar Anup Bhat   +2 more
doaj   +1 more source

Data Mining of Infertility and Factors Influencing Its Development: A Finding From a Prospective Cohort Study of RaNCD in Iran

open access: yesHealth Science Reports, Volume 8, Issue 1, January 2025.
ABSTRACT Background and Aims Infertility, as defined by the World Health Organization, is the inability to conceive after 12 months of regular, unprotected intercourse. This study aimed to identify factors influencing infertility by applying data mining techniques, specifically rule‐mining methods, to analyze diverse patient data and uncover relevant ...
Hosna Heydarian   +3 more
wiley   +1 more source

High-utility Itemsets Mining Algorithm Based on Double Binary Particle Swarm Optimization [PDF]

open access: yesJisuanji gongcheng, 2018
High-utility itemset mining algorithm is an important part of association analysis.By improving the basic binary particle swarm optimization algorithm,a Double Binary Particle Swarm Optimization(DBPSO) algorithm is proposed.The minimum utility threshold ...
JIN Xiaole,LIU Xiabi,MA Xiao
doaj   +1 more source

A multi‐agent K‐means with case‐based reasoning for an automated quality assessment of software requirement specification

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper proposed an Automated Quality Assessment of SRS (AQA‐SRS) framework by integrating four popular methods which are; NLP, K‐means, MAS, and CBR to assess the quality of SRS documents. The NLP utilize for feature extraction, K‐means for features clustering, MAS for interactive assessment and feature selection decision, and CBR for managing the ...
Mohammed Ahmed Jubair   +6 more
wiley   +1 more source

An AI knowledge‐based system for police assistance in crime investigation

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract The fight against crime is often an arduous task overall when huge amounts of data have to be inspected, as is currently the case when it comes for example in the detection of criminal activity on the dark web. This work presents and describes an artificial intelligence (AI) based system that combines various tools to assist police or law ...
Carlos Fernandez‐Basso   +4 more
wiley   +1 more source

Research on Risk Identification of Coal Mine Ventilation Systems Based on HFACS and Apriori Algorithm

open access: yesAdvances in Civil Engineering, Volume 2025, Issue 1, 2025.
The coal industry has always been a typically high‐risk industry with frequent accidents and extremely adverse impacts. Cases of accidents in coal mine ventilation systems serve as a concentrated demonstration of accident hazards and hold significant value for identifying key risk factors that may induce disasters in coal mine ventilation systems. This
Mingjia Jing   +4 more
wiley   +1 more source

Using Multi-Conditional Minimum Thresholds in Temporal Fuzzy Utility Mining

open access: yesInternational Journal of Computational Intelligence Systems, 2019
In the field of fuzzy utility mining, the characteristics of transaction time have been a widely studied topic in data mining. However, using a single-conditional threshold for all items does not suffice to reflect the true properties of items.
Wei-Ming Huang   +3 more
doaj   +1 more source

Modified GUIDE (LM) algorithm for mining maximal high utility patterns from data streams [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2015
High utility pattern mining is an emerging research topic in the data mining field. Unlike frequent pattern mining, high utility pattern mining deals with non-binary databases, in which the information about purchased quantities of items is maintained ...
Chiranjeevi Manike, Hari Om
doaj   +1 more source

State of the Art in Privacy Preserving Data Mining [PDF]

open access: yes, 2008
Privacy is one of the most important properties an information system must satisfy. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when Data Mining techniques are used.
MASERA MARCELO, NAI FOVINO IGOR
core  

Home - About - Disclaimer - Privacy