期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A Fast Algorithm for Mining Sequential Patterns from Large Databases
1
作者 陈宁 陈安 +1 位作者 周龙骧 刘鲁 《Journal of Computer Science & Technology》 SCIE EI CSCD 2001年第4期359-370,共12页
Mining sequential patterns from large databases has been recognized by many researchers as an attractive task of data mining and knowledge dis- covery. Previous algorithms scan the databases for many times, which is ... Mining sequential patterns from large databases has been recognized by many researchers as an attractive task of data mining and knowledge dis- covery. Previous algorithms scan the databases for many times, which is often unendurable due to the very large amount of databases. In this paper, the authors introduce an effective algorithm for mining sequential patterns from large databases. In the algorithm, the original database is not used at all for counting the support of sequences after the first pass. Rather, a tidlist structure generated in the Previous pass is employed for the purpose based on set intersection operations, avoiding the multiple scans of the databases. 展开更多
关键词 data mining knowledge discovery sequential pattern set opera-tion
原文传递
Analyzing Sequential Patterns in Retail Databases
2
作者 Unil Yun 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第2期287-296,共10页
Finding correlated sequential patterns in large sequence databases is one of the essential tasks in data mining since a huge number of sequential patterns are usually mined, but it is hard to find sequential patterns ... Finding correlated sequential patterns in large sequence databases is one of the essential tasks in data mining since a huge number of sequential patterns are usually mined, but it is hard to find sequential patterns with the correlation. According to the requirement of real applications, the needed data analysis should be different. In previous mining approaches, after mining the sequential patterns, sequential patterns with the weak affinity are found even with a high minimum support. In this paper, a new framework is suggested for mining weighted support affinity patterns in which an objective measure, sequential ws-confidence is developed to detect correlated sequential patterns with weighted support affinity patterns. To efficiently prune the weak affinity patterns, it is proved that ws-confidence measure satisfies the anti-monotone and cross weighted support properties which can be applied to eliminate sequential patterns with dissimilar weighted support levels. Based on the framework, a weighted support affinity pattern mining algorithm (WSMiner) is suggested. The performance study shows that WSMiner is efficient and scalable for mining weighted support affinity patterns. 展开更多
关键词 data mining sequential pattern mining sequential ws-confidence weighted support affinity
原文传递
A Fast Interactive Sequential Pattern Mining Algorithm 被引量:1
3
作者 LU Jie-Ping LIU Yue-bo +2 位作者 NI wei-wei LIU Tong-ming SUN Zhi-hui 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期31-36,共6页
In order to reduce the computational and spatial complexity in rerunning algorithm of sequential patterns query, this paper proposes sequential patterns based and projection database based algorithm for fast interacti... In order to reduce the computational and spatial complexity in rerunning algorithm of sequential patterns query, this paper proposes sequential patterns based and projection database based algorithm for fast interactive sequential patterns mining algorithm (FISP), in which the number of frequent items of the projection databases constructed by the correct mining which based on the previously mined sequences has been reduced. Furthermore, the algorithm's iterative running times are reduced greatly by using global-threshold. The results of experiments testify that FISP outperforms PrefixSpan in interactive mining 展开更多
关键词 data mining sequential patterns interactive mining projection database
下载PDF
Sequential Pattern Technology for Visual Fire Detection 被引量:2
4
作者 Yu-Chiang Li Wei-Cheng Wu 《Journal of Electronic Science and Technology》 CAS 2012年第3期276-280,共5页
Visual fire detection technologies can detect fire and alarm warnings earlier than conventional fire detectors. This study proposes an effective visual fire detection method that combines the statistical fire color mo... Visual fire detection technologies can detect fire and alarm warnings earlier than conventional fire detectors. This study proposes an effective visual fire detection method that combines the statistical fire color model and sequential pattern mining technology to detect fire in an image. Furthermore, the proposed method also supports real-time fire detection by integrating adaptive background subtraction technologies. Experimental results show that the proposed method can effectively detect fire in test images and videos. The detection accuracy of the proposed hybrid method is better than that of Celik's method. 展开更多
关键词 sequential pattern statistical colormodel visual fire detection.
下载PDF
Mapping frequent spatio-temporal wind profile patterns using multi-dimensional sequential pattern mining
5
作者 Norhakim Yusof Raul Zurita-Milla 《International Journal of Digital Earth》 SCIE EI 2017年第3期238-256,共19页
Holistic understanding of wind behaviour over space,time and height is essential for harvesting wind energy application.This study presents a novel approach for mapping frequent wind profile patterns using multidimen... Holistic understanding of wind behaviour over space,time and height is essential for harvesting wind energy application.This study presents a novel approach for mapping frequent wind profile patterns using multidimensional sequential pattern mining(MDSPM).This study is illustrated with a time series of 24 years of European Centre for Medium-Range Weather Forecasts European Reanalysis-Interim gridded(0.125°×0.125°)wind data for the Netherlands every 6 h and at six height levels.The wind data were first transformed into two spatio-temporal sequence databases(for speed and direction,respectively).Then,the Linear time Closed Itemset Miner Sequence algorithm was used to extract the multidimensional sequential patterns,which were then visualized using a 3D wind rose,a circular histogram and a geographical map.These patterns were further analysed to determine their wind shear coefficients and turbulence intensities as well as their spatial overlap with current areas with wind turbines.Our analysis identified four frequent wind profile patterns.One of them highly suitable to harvest wind energy at a height of 128 m and 68.97%of the geographical area covered by this pattern already contains wind turbines.This study shows that the proposed approach is capable of efficiently extracting meaningful patterns from complex spatio-temporal datasets. 展开更多
关键词 Spatio-temporal data mining multi-dimensional sequential pattern mining wind shear coefficient turbulence intensity wind energy
原文传递
From Sequential Pattern Mining to Structured Pattern Mining: A Pattern-Growth Approach 被引量:18
6
作者 Jia-WeiHan JianPei Xi-FengYan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第3期257-279,共23页
Sequential pattern mining is an important data mining problem with broadapplications. However, it is also a challenging problem since the mining may have to generate orexamine a combinatorially explosive number of int... Sequential pattern mining is an important data mining problem with broadapplications. However, it is also a challenging problem since the mining may have to generate orexamine a combinatorially explosive number of intermediate subsequences. Recent studies havedeveloped two major classes of sequential pattern mining methods: (1) a candidategeneration-and-test approach, represented by (ⅰ) GSP, a horizontal format-based sequential patternmining method, and (ⅱ) SPADE, a vertical format-based method; and (2) a pattern-growth method,represented by PrefixSpan and its further extensions, such as gSpan for mining structured patterns.In this study, we perform a systematic introduction and presentation of the pattern-growthmethodology and study its principles and extensions. We first introduce two interestingpattern-growth algorithms, FreeSpan and PrefixSpan, for efficient sequential pattern mining. Then weintroduce gSpan for mining structured patterns using the same methodology. Their relativeperformance in large databases is presented and analyzed. Several extensions of these methods arealso discussed in the paper, including mining multi-level, multi-dimensional patterns and miningconstraint-based patterns. 展开更多
关键词 data mining sequential pattern mining structured pattern mining SCALABILITY performance analysis
原文传递
Finding frequent trajectories by clustering and sequential pattern mining 被引量:4
7
作者 Arthur A.Shaw N.P.Gopalan 《Journal of Traffic and Transportation Engineering(English Edition)》 2014年第6期393-403,共11页
Data mining is a powerful emerging technology that helps to extract hidden information from a huge volume of historical data. This paper is concerned with finding the frequent trajectories of moving objects in spatio-... Data mining is a powerful emerging technology that helps to extract hidden information from a huge volume of historical data. This paper is concerned with finding the frequent trajectories of moving objects in spatio-temporal data by a novel method adopting the concepts of clustering and sequential pattern mining. The algorithms used logically split the trajectory span area into clusters and then apply the k-means algorithm over this clusters until the squared error minimizes. The new method applies the threshold to obtain active clusters and arranges them in descending order based on number of trajectories passing through. From these active clusters, inter cluster patterns are found by a sequential pattern mining technique. The process is repeated until all the active clusters are linked. The clusters thus linked in sequence are the frequent trajectories. A set of experiments conducted using real datasets shows that the proposed method is relatively five times better than the existing ones. A comparison is made with the results of other algorithms and their variation is analyzed by statistical methods. Further, tests of significance are conducted with ANOVA to find the efficient threshold value for the optimum plot of frequent trajectories. The results are analyzed and found to be superior than the existing ones. This approach may be of relevance in finding alternate paths in busy networks ( congestion control), finding the frequent paths of migratory birds, or even to predict the next level of pattern characteristics in case of time series data with minor alterations and finding the frequent path of balls in certain games. 展开更多
关键词 data mining frequent trajectory CLUSTERING sequential pattern mining statistical method
原文传递
Video-based pedestrian grouping model considering longspan space in a big hall
8
作者 Rongyong Zhao Yan Wang +3 位作者 Ping Jia Cuiling Li Daheng Dong Yunlong Ma 《Journal of Management Science and Engineering》 CSCD 2023年第3期398-412,共15页
Pedestrian group detection is a challenging but significant issue in pedestrian flow control and public safety management.To address the issue that most conventional pedestrian grouping models(PGMs)can only identify a... Pedestrian group detection is a challenging but significant issue in pedestrian flow control and public safety management.To address the issue that most conventional pedestrian grouping models(PGMs)can only identify a pedestrian group at a limited distance of less than 2 m,this study extended the pedestrian distance constraint of conventional PGMs with a reconstruction of the normal group detection criterion and development of a novelgroup detection criterion suitable for long-span space.To measure the movement behaviorsimilarity with normal distance,five necessary constraints:velocity difference,moving direction offset,distance limitation,distance fluctuation,and group-keeping duration were studied quantitatively to form the criterion to detect normal groups.Meanwhile,a long-span group detection criterion was proposed with extended distance and direction con-sistency constraints.Therefore,this study proposed an improved PGM that considers long-span spaces(PGMLS).In the PGMLS workflow,the MMTrack algorithm was used to obtainpedestrian trajectories.A difference measurement method based on sequential pattern analysis(SPA)was adopted to analyze the velocity similarity of pedestrians.To validate the proposed grouping model,experiments based on pedestrian movement videos in the exit hall of the Shanghai Hongqiao International Airport were conducted.The results indicate that the proposed model can detect both normal and widely separated pedestrian groups,with a long span range of 2-12 m. 展开更多
关键词 Pedestrian grouping Long-span space Video tracking algorithm sequential pattern analysis Safety management
原文传递
Exploiting Pre-Trained Network Embeddings for Recommendations in Social Networks 被引量:6
9
作者 Lei Guo Yu-Fei Wen Xin-Hua Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第4期682-696,共15页
Recommender systems as one of the most efficient information filtering techniques have been widely studied in recent years. However, traditional recommender systems only utilize user-item rating matrix for recommendat... Recommender systems as one of the most efficient information filtering techniques have been widely studied in recent years. However, traditional recommender systems only utilize user-item rating matrix for recommendations, and the social connections and item sequential patterns are ignored. But in our real life, we always turn to our friends for recommendations, and often select the items that have similar sequential patterns. In order to overcome these challenges, many studies have taken social connections and sequential information into account to enhance recommender systems. Although these existing studies have achieved good results, most of them regard social influence and sequential information as regularization terms, and the deep structure hidden in social networks and rating patterns has not been fully explored. On the other hand, neural network based embedding methods have shown their power in many recommendation tasks with their ability to extract high-level representations from raw data. Motivated by the above observations, we take the advantage of network embedding techniques and propose an embedding-based recommendation method, which is composed of the embedding model and the collaborative filtering model. Specifically, to exploit the deep structure hidden in social networks and rating patterns, a neural network based embedding model is first pre-trained, where the external user and item representations are extracted. Then, we incorporate these extracted factors into a collaborative filtering model by fusing them with latent factors linearly, where our method not only can leverage the external information to enhance recommendation, but also can exploit the advantage of collaborative filtering techniques. Experimental results on two real-world datasets demonstrate the effectiveness of our proposed method and the importance of these external extracted factors. 展开更多
关键词 social recommendation network embedding matrix factorization item sequential pattern
原文传递
A multi-step attack-correlation method with privacy protection 被引量:1
10
作者 ZHANG Yongtang LUO Xianlu LUO Haibo 《Journal of Communications and Information Networks》 2016年第4期133-142,共10页
In the era of global Internet security threats,there is an urgent need for different organizations to cooperate and jointly fight against cyber attacks.We present an algorithm that combines a privacy-preserving techni... In the era of global Internet security threats,there is an urgent need for different organizations to cooperate and jointly fight against cyber attacks.We present an algorithm that combines a privacy-preserving technique and a multi-step attack-correlation method to better balance the privacy and availability of alarm data.This algorithm is used to construct multi-step attack scenarios by discovering sequential attack-behavior patterns.It analyzes the time-sequential characteristics of attack behaviors and implements a support-evaluation method.Optimized candidate attack-sequence generation is applied to solve the problem of pre-defined association-rule complexity,as well as expert-knowledge dependency.An enhanced k-anonymity method is applied to this algorithm to preserve privacy.Experimental results indicate that the algorithm has better performance and accuracy for multi-step attack correlation than other methods,and reaches a good balance between efficiency and privacy. 展开更多
关键词 network security multi-step attack intrusion detection sequential pattern privacy protection data mining
原文传递
Customer Activity Sequence Classification for Debt Prevention in Social Security
11
作者 张淮风 Yanchang Zhao +2 位作者 操龙兵 张成奇 Hans Bohlscheid 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第6期1000-1009,共10页
From a data mining perspective, sequence classification is to build a classifier using frequent sequential patterns. However, mining for a complete set of sequential patterns on a large dataset can be extremely time-c... From a data mining perspective, sequence classification is to build a classifier using frequent sequential patterns. However, mining for a complete set of sequential patterns on a large dataset can be extremely time-consuming and the large number of patterns discovered also makes the pattern selection and classifier building very time-consuming. The fact is that, in sequence classification, it is much more important to discover discriminative patterns than a complete pattern set. In this paper, we propose a novel hierarchical algorithm to build sequential classifiers using discriminative sequential patterns. Firstly, we mine for the sequential patterns which axe the most strongly correlated to each target class. In this step, an aggressive strategy is employed to select a small set of sequential patterns. Secondly, pattern pruning and serial coverage test are done on the mined patterns. The patterns that pass the serial test are used to build the sub-classifier at the first level of the final classifier. And thirdly, the training samples that cannot be covered are fed back to the sequential pattern mining stage with updated parameters. This process continues until predefined interestingness measure thresholds are reached, or all samples axe covered. The patterns generated in each loop form the sub-classifier at each level of the final classifier. Within this framework, the searching space can be reduced dramatically while a good classification performance is achieved. The proposed algorithm is tested in a real-world business application for debt prevention in social security area. The novel sequence classification algorithm shows the effectiveness and efficiency for predicting debt occurrences based on customer activity sequence data. 展开更多
关键词 sequential pattern mining sequence classification coverage test interestingness measure
原文传递
An enhanced cascading failure model integrating data mining technique
12
作者 Qiming Sun Libao Shi +2 位作者 Yixin Ni Dajun Si Jizhong Zhu 《Protection and Control of Modern Power Systems》 2017年第1期19-28,共10页
An enhanced cascading failure model integrating data mining technique is proposed in this paper.In order to better simulate the process of cascading failure propagation and further analyze the relationship between fai... An enhanced cascading failure model integrating data mining technique is proposed in this paper.In order to better simulate the process of cascading failure propagation and further analyze the relationship between failure chains,in view of a basic framework of cascading failure described in this paper,some significant improvements in emerging prevention and control measures,the subsequent failure search strategy as well as the statistical analysis for the failure chains are made elaborately.Especially,a sequential pattern mining model is employed to find out the association pertinent to the obtained failure chains.In addition,a cluster analysis model is applied to evaluate the relationship between the intermediate data and the consequence of obtained failure chain,which can provide the prediction in potential propagation path of cascading failure to reduce the risk of catastrophic events.Finally,the case studies are conducted on the IEEE 10-machine-39-bus test system as benchmark to demonstrate the validity and effectiveness of the proposed enhanced cascading failure model.Some preliminary concluding remarks and comments are drawn. 展开更多
关键词 Cascading failure Emerging prevention and control measures Subsequent search strategy sequential pattern mining Cluster analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部