Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A survey of sequential pattern mining
Discovering unexpected and useful patterns in databases is a fundamental data mining task.
In recent years, a trend in data mining has been to design algorithms for discovering …
In recent years, a trend in data mining has been to design algorithms for discovering …
A survey of itemset mining
Itemset mining is an important subfield of data mining, which consists of discovering
interesting and useful patterns in transaction databases. The traditional task of frequent …
interesting and useful patterns in transaction databases. The traditional task of frequent …
The SPMF open-source data mining library version 2
SPMF is an open-source data mining library, specialized in pattern mining, offering
implementations of more than 120 data mining algorithms. It has been used in more than …
implementations of more than 120 data mining algorithms. It has been used in more than …
dbscan: Fast density-based clustering with R
This article describes the implementation and use of the R package dbscan, which provides
complete and fast implementations of the popular density-based clustering algorithm …
complete and fast implementations of the popular density-based clustering algorithm …
[PDF][PDF] Effective community search for large attributed graphs
Given a graph G and a vertex q∈ G, the community search query returns a subgraph of G
that contains vertices related to q. Communities, which are prevalent in attributed graphs …
that contains vertices related to q. Communities, which are prevalent in attributed graphs …
Unsupervised data analytics in mining big building operational data for energy efficiency enhancement: A review
Building operations account for the largest proportion of energy use throughout the building
life cycle. The energy saving potential is considerable taking into account the existence of a …
life cycle. The energy saving potential is considerable taking into account the existence of a …
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
Emergence of crypto-ransomware has significantly changed the cyber threat landscape. A
crypto ransomware removes data custodian access by encrypting valuable data on victims' …
crypto ransomware removes data custodian access by encrypting valuable data on victims' …
[HTML][HTML] Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection
This paper introduces a new model to identify collective abnormal human behaviors from
large pedestrian data in smart cities. To accurately solve the problem, several algorithms …
large pedestrian data in smart cities. To accurately solve the problem, several algorithms …
EFIM: a fast and memory efficient algorithm for high-utility itemset mining
In recent years, high-utility itemset mining has emerged as an important data mining task.
However, it remains computationally expensive both in terms of runtime and memory …
However, it remains computationally expensive both in terms of runtime and memory …
The (black) art of runtime evaluation: Are we comparing algorithms or implementations?
Any paper proposing a new algorithm should come with an evaluation of efficiency and
scalability (particularly when we are designing methods for “big data”). However, there are …
scalability (particularly when we are designing methods for “big data”). However, there are …