Skip to main content

and
  1. No Access

    Article

    TKU-BChOA: an accurate meta-heuristic method to mine Top-k high utility itemsets

    High utility itemset mining is an essential new task in data mining, which is obtained from the extension of frequent itemset mining problems. The difference between these two groups is that in high utility it...

    Amir Hossein Mofid, Negin Daneshpour, Zeinab Torabi in The Journal of Supercomputing (2024)

  2. No Access

    Article

    Extracting Urgent Questions from MOOC Discussions: A BERT-Based Multi-output Classification Approach

    Online discussion forums are widely used by students to ask and answer questions related to their learning topics. However, not all questions posted by students receive timely and appropriate feedback from ins...

    Mujtaba Sultani, Negin Daneshpour in Arabian Journal for Science and Engineering (2024)

  3. No Access

    Article

    MMC: efficient and effective closed high-utility itemset mining

    Analyzing many high-utility itemsets using HUIM methods is challenging and time-consuming. To solve this issue, Closed High-Utility Itemsets (CHUI), a condensed and lossless representation of high-utility item...

    Amir Hossein Mofid, Negin Daneshpour, Zeinab Torabi in The Journal of Supercomputing (2024)

  4. No Access

    Article

    An outlier detection method based on the hidden Markov model and copula for wireless sensor networks

    Some of the collected data by wireless sensor networks (WSNs) often digress from the normal pattern of the set and are called the ‘outliers’ or ‘anomalies’. These outlier data are usually derived from an error...

    Sina Dogmechi, Zeinab Torabi, Negin Daneshpour in Wireless Networks (2022)

  5. No Access

    Article

    A New Searchable Encryption Scheme with Integrity Preservation Property

    Searchable encryption schemes allow documents’ owners to store their encrypted documents on servers, search for the desired keyword and then download only the desired encrypted file and then decrypt. Storing f...

    Mohammad Zamani, Masoumeh Safkhani, Negin Daneshpour in Wireless Personal Communications (2021)