Results 51 to 60 of about 338,799 (197)

Effective Personalized Web Mining by Utilizing the Most Utilized Data

open access: yesInternational Journal of Database Management Systems, 2011
Looking into the growth of information in the web it is a very tedious process of getting the exact information the user is looking for. Many search engines generate user profile related data listing. This paper involves one such process where the rating is given to the link that the user is clicking on. Rather than avoiding the uninterested links both
Grace, L. K. Joshila   +2 more
openaire   +2 more sources

Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice

open access: yesCybernetics and Information Technologies, 2022
Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for data ...
Vy Huynh Trieu   +4 more
doaj   +1 more source

Clustering Scatter Plots Using Data Depth Measures. [PDF]

open access: yes, 2011
Clustering is rapidly becoming a powerful data mining technique, and has been broadly applied to many domains such as bioinformatics and text mining. However, the existing methods can only deal with a data matrix of scalars. In this paper, we introduce a
Borneman, James   +5 more
core  

On Generation of Firewall Log Status Reporter (SRr) Using Perl

open access: yes, 2009
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioinformatics.
Cohly, Hari   +2 more
core   +3 more sources

Environmental sustainability in the mining sector: evidence from Catalan companies [PDF]

open access: yes, 2014
This paper examines the adoption of environmental practices in small and medium sized companies inthe surface mining industry in Catalonia (Spain). To fulfill this aim, a survey of 41 items concernint environmental management systems and environmentally ...
Freijo Álvarez, Modesto   +2 more
core   +3 more sources

Efficient High Utility Negative Sequential Patterns Mining in Smart Campus

open access: yesIEEE Access, 2018
High utility sequential patterns (HUSP) mining has been playing more and more important role in many applications, such as data analysis and smart campus.
Tiantian Xu, Tongxuan Li, Xiangjun Dong
doaj   +1 more source

MalStone: Towards A Benchmark for Analytics on Large Data Clouds [PDF]

open access: yes, 2010
Developing data mining algorithms that are suitable for cloud computing platforms is currently an active area of research, as is developing cloud computing platforms appropriate for data mining. Currently, the most common benchmark for cloud computing is
Bennett, Collin   +4 more
core  

Mining High Utility Itemsets with Regular Occurrence

open access: yesJournal of ICT Research and Applications, 2016
High utility itemset mining (HUIM) plays an important role in the data mining community and in a wide range of applications. For example, in retail business it is used for finding sets of sold products that give high profit, low cost, etc. These itemsets
Komate Amphawan   +3 more
doaj   +1 more source

Smart Grid for the Smart City [PDF]

open access: yes, 2017
Modern cities are embracing cutting-edge technologies to improve the services they offer to the citizens from traffic control to the reduction of greenhouse gases and energy provisioning.
Bonetto, Riccardo, Rossi, Michele
core   +1 more source

A survey on utilization of data mining approaches for dermatological (skin) diseases prediction [PDF]

open access: yes, 2011
Due to recent technology advances, large volumes of medical data is obtained. These data contain valuable information. Therefore data mining techniques can be used to extract useful patterns.
Adibi, N   +4 more
core  

Home - About - Disclaimer - Privacy