Constraint-based high utility mobile trajectory pattern mining for security systems.
Aiguo LiRongrong FengPublished in: J. Intell. Fuzzy Syst. (2024)
Keyphrases
- pattern mining
- high utility
- security systems
- rule based systems
- frequent pattern mining
- topic in data mining
- mining algorithm
- security mechanisms
- candidate pruning
- sequential pattern mining
- sequential patterns
- itemsets
- frequent patterns
- interesting patterns
- pattern discovery
- frequent itemset mining
- graph mining
- data mining
- anti monotone
- data mining techniques
- itemset mining
- mining frequent
- data structure
- multi dimensional
- pattern growth
- databases