Author:
Sathyavani D.,Sharmila D.
Publisher
Springer Science and Business Media LLC
Reference19 articles.
1. Adnan M, Reda A (2011) A bounded and adapted memory-based approach and adaptive memory-based approach to mine frequent patterns from very large databases. IEEE Trans Syst Man Cybern 41(1):154–172
2. Anitha P, Kaarthick B (2019) Oppositional based Laplacian grey wolf optimization algorithm with SVM for data mining in intrusion detection system. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01606-6
3. Chu CJ, Tseng VS, Liang T (2008) An efficient algorithm for mining temporal high utility itemsets from data streams. J Syst Softw 81(7):1105–1117
4. Gan W, Lin JCW, Fournier-Viger P, Chao HC, Hong TP, Fujita H (2018) A survey of incremental high-utility itemset mining. Wiley Interdiscip Rev Data Min Knowl Discov 8(2) http://fimi.ua.ac.be/data/mushroom.dat
5. Joshi M, Patel M (2014) A survey on high utility itemset mining using transaction databases. IJCSIT International Journal of Computer Science and Information Technologies, ISSN, 0975-9646
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献