Results 51 to 60 of about 10,877 (201)

A Design‐Driven Machine Learning Approach for Invariant Mining in a Smart Grid

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
An ICS is vulnerable to cyber‐attacks arising from within its communication network or directly from the SCADA and devices such as PLCs. The study reported here presents a scenario‐specific invariant mining approach to detect anomalies in plant behaviour.
Danish Hudani   +5 more
wiley   +1 more source

Damped weighted erasable itemset mining with time sensitive dynamic environments

open access: yesJournal of Big Data
Erasable itemset mining discovers itemsets in product databases with benefits no greater than a designated threshold value. By considering weight constraints and the recency of products in erasable itemset mining, the practitioners can manage the plants ...
Hanju Kim   +5 more
doaj   +1 more source

Analisis Pola Pembelian Produk Kecantikan Menggunakan Algoritma Apriori

open access: yesJurnal Teknologi Informatika & Komputer, 2023
Penerapan Data Mining dapat di gunakan untuk semua bidang, diantaranya bidang bisnis, bidang pendidikan, telekomunikasi dan sebagainya. Dalam bidang bisnis misalnya hasil implementasi data mining dapat membantu para pebisnis dalam  membuat kebijakan ...
Ismasari Nawangsih, Pupung Purnamasari
doaj   +1 more source

Mining Top-K Frequent Itemsets Through Progressive Sampling

open access: yes, 2010
We study the use of sampling for efficiently mining the top-K frequent itemsets of cardinality at most w. To this purpose, we define an approximation to the top-K frequent itemsets to be a family of itemsets which includes (resp., excludes) all very ...
Andrea Pietracaprina   +8 more
core   +1 more source

Extraction of Safe Operation Rules and Identification of Vulnerable Nodes in Power Grids Based on Time‐Series Association Analysis

open access: yesIET Generation, Transmission &Distribution, Volume 20, Issue 1, January/December 2026.
This paper presents a data‐driven framework for operational safety rule extraction and vulnerable node identification in power grids with high renewable penetration. The effectiveness of the proposed method is verified on the IEEE 39‐bus system for static security assessment. ABSTRACT High renewable energy penetration introduces significant uncertainty
Zhilin Huang   +6 more
wiley   +1 more source

From Prediction to Prevention: Using Text Mining and Explainable Machine Learning for Urban Bus Accident Analytics

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Urban bus accidents present major safety and operational challenges, particularly in densely populated metropolitan areas. This study develops a machine learning‐based analytical framework to identify, quantify, and interpret the factors associated with severe bus accidents.
Bowei Chen   +3 more
wiley   +1 more source

Mining Frequent Itemsets Using Genetic Algorithm

open access: yes, 2010
In general frequent itemsets are generated from large data sets by applying association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental, Border algorithm etc., which take too much computer time to compute all the frequent ...
Biswas, Sushanta   +3 more
core   +2 more sources

Correlation Analysis of Influencing Factors of Autonomous Vehicle Accidents Based on Improved Apriori Algorithm

open access: yesJournal of Advanced Transportation, Volume 2026, Issue 1, 2026.
The purpose of this study was to explore the risk factors for autonomous vehicle (AV) crashes and their interdependencies. A total of 659 AV crash data were collected between 2018 and July 2024 from AV crash reports published by the California Department of Motor Vehicles.
Tao Wang   +4 more
wiley   +1 more source

Frequent regular itemset mining [PDF]

open access: yesProceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010
Concise representations of frequent itemsets sacrifice readability and direct interpretability by a data analyst of the concise patterns extracted. In this paper, we introduce an extension of itemsets, called regular, with an immediate semantics and interpretability, and a conciseness comparable to closed itemsets. Regular itemsets allow for specifying
openaire   +3 more sources

Mining Frequent Itemsets in a Stream [PDF]

open access: yesSeventh IEEE International Conference on Data Mining (ICDM 2007), 2007
We study the problem of finding frequent itemsets in a continuous stream of transactions. The current frequency of an itemset in a stream is defined as its maximal frequency over all possible windows in the stream from any point in the past until the current state that satisfy a minimal length constraint.
Calders, Toon   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy