An optimized FP-growth algorithm for discovery of association rules

M Shawkat, M Badawi, S El-ghamrawy… - The Journal of …, 2022 - Springer
Association rule mining (ARM) is a data mining technique to discover interesting
associations between datasets. The frequent pattern-growth (FP-growth) is an effective ARM …

High utility itemset mining with techniques for reducing overestimated utilities and pruning candidates

U Yun, H Ryang, KH Ryu - Expert Systems with Applications, 2014 - Elsevier
High utility itemset mining considers the importance of items such as profit and item
quantities in transactions. Recently, mining high utility itemsets has emerged as one of the …

Sliding window-based frequent pattern mining over data streams

SK Tanbeer, CF Ahmed, BS Jeong, YK Lee - Information sciences, 2009 - Elsevier
Finding frequent patterns in a continuous stream of transactions is critical for many
applications such as retail market data analysis, network monitoring, web usage mining, and …

Sliding window based weighted maximal frequent pattern mining over data streams

G Lee, U Yun, KH Ryu - Expert Systems with Applications, 2014 - Elsevier
As data have been accumulated more quickly in recent years, corresponding databases
have also become huger, and thus, general frequent pattern mining methods have been …

New approaches for mining regular high utility sequential patterns

SZ Ishita, CF Ahmed, CK Leung - Applied Intelligence, 2022 - Springer
Regular pattern mining has been emerged as one of the promising sub-domains of data
mining by discovering patterns with regular occurrences throughout a complete database. In …

Efficient frequent pattern mining based on linear prefix tree

G Pyun, U Yun, KH Ryu - Knowledge-Based Systems, 2014 - Elsevier
Outstanding frequent pattern mining guarantees both fast runtime and low memory usage
with respect to various data with different types and sizes. However, it is hard to improve the …

A unified data mining solution for authorship analysis in anonymous textual communications

F Iqbal, H Binsalleeh, BCM Fung, M Debbabi - Information Sciences, 2013 - Elsevier
The cyber world provides an anonymous environment for criminals to conduct malicious
activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often …

Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks

Z Qu, J Keeney, S Robitzsch, F Zaman… - China …, 2016 - ieeexplore.ieee.org
The rapid development of network technology and its evolution toward heterogeneous
networks has increased the demand to support automatic monitoring and the management …

Mining of high average-utility itemsets using novel list structure and pruning strategy

U Yun, D Kim - Future Generation Computer Systems, 2017 - Elsevier
A novel algorithm for efficiently mining high average-utility itemsets is presented in this
paper. The algorithm utilizes list structures, which compactly capture all information needed …

Incremental high utility pattern mining with static and dynamic databases

U Yun, H Ryang - Applied intelligence, 2015 - Springer
Pattern mining is a data mining technique used for discovering significant patterns and has
been applied to various applications such as disease analysis in medical databases and …