![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
TKU-BChOA: an accurate meta-heuristic method to mine Top-k high utility itemsets
High utility itemset mining is an essential new task in data mining, which is obtained from the extension of frequent itemset mining problems. The difference between these two groups is that in high utility it...
-
Article
Extracting Urgent Questions from MOOC Discussions: A BERT-Based Multi-output Classification Approach
Online discussion forums are widely used by students to ask and answer questions related to their learning topics. However, not all questions posted by students receive timely and appropriate feedback from ins...
-
Article
MMC: efficient and effective closed high-utility itemset mining
Analyzing many high-utility itemsets using HUIM methods is challenging and time-consuming. To solve this issue, Closed High-Utility Itemsets (CHUI), a condensed and lossless representation of high-utility item...
-
Article
An outlier detection method based on the hidden Markov model and copula for wireless sensor networks
Some of the collected data by wireless sensor networks (WSNs) often digress from the normal pattern of the set and are called the ‘outliers’ or ‘anomalies’. These outlier data are usually derived from an error...
-
Article
A New Searchable Encryption Scheme with Integrity Preservation Property
Searchable encryption schemes allow documents’ owners to store their encrypted documents on servers, search for the desired keyword and then download only the desired encrypted file and then decrypt. Storing f...