Journal articles on the topic 'Transactional datasets'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Transactional datasets.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
AL Bouna, Bechara, Chris Clifton, and Qutaibah Malluhi. "Anonymizing transactional datasets." Journal of Computer Security 23, no. 1 (March 15, 2015): 89–106. http://dx.doi.org/10.3233/jcs-140517.
Full textPuri, Vartika, Parmeet Kaur, and Shelly Sachdeva. "ADT." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 83–105. http://dx.doi.org/10.4018/ijisp.2021070106.
Full textVu, Duc Thi, and Huy Duc Nguyen. "Mining High Utility Itemsets in Massive Transactional Datasets." Acta Cybernetica 20, no. 2 (2011): 331–46. http://dx.doi.org/10.14232/actacyb.20.2.2011.6.
Full textLiu, Xiangwen, Xia Feng, and Yuquan Zhu. "Transactional Data Anonymization for Privacy and Information Preservation via Disassociation and Local Suppression." Symmetry 14, no. 3 (February 25, 2022): 472. http://dx.doi.org/10.3390/sym14030472.
Full textTang, Huijun, Le Wang, Yangguang Liu, and Jiangbo Qian. "Discovering Approximate and Significant High-Utility Patterns from Transactional Datasets." Journal of Mathematics 2022 (November 16, 2022): 1–17. http://dx.doi.org/10.1155/2022/6975130.
Full textPuri, Vartika, Parmeet Kaur, and Shelly Sachdeva. "Effective Removal of Privacy Breaches in Disassociated Transactional Datasets." Arabian Journal for Science and Engineering 45, no. 4 (January 28, 2020): 3257–72. http://dx.doi.org/10.1007/s13369-020-04353-5.
Full textAl-Bana, Mohamed Reda, Marwa Salah Farhan, and Nermin Abdelhakim Othman. "An Efficient Spark-Based Hybrid Frequent Itemset Mining Algorithm for Big Data." Data 7, no. 1 (January 14, 2022): 11. http://dx.doi.org/10.3390/data7010011.
Full textR., Sujatha, and Dr S. Ravichandran. "MAX-MiBit-An Algorithm To Discover Maximal Frequent Itemsets From Large Transactional Datasets." International Journal of Research in Advent Technology 7, no. 4 (April 10, 2019): 326–29. http://dx.doi.org/10.32622/ijrat.742019122.
Full textYan, Hua, Keke Chen, Ling Liu, and Joonsoo Bae. "Determining the best K for clustering transactional datasets: A coverage density-based approach." Data & Knowledge Engineering 68, no. 1 (January 2009): 28–48. http://dx.doi.org/10.1016/j.datak.2008.08.005.
Full textKahanda, Indika, and Jennifer Neville. "Using Transactional Information to Predict Link Strength in Online Social Networks." Proceedings of the International AAAI Conference on Web and Social Media 3, no. 1 (March 19, 2009): 74–81. http://dx.doi.org/10.1609/icwsm.v3i1.13957.
Full textAlsukhni, Emad, Ahmed AlEroud, and Ahmad A. Saifan. "A Hybrid Pre-Post Constraint-Based Framework for Discovering Multi-Dimensional Association Rules Using Ontologies." International Journal of Information Technology and Web Engineering 14, no. 1 (January 2019): 112–31. http://dx.doi.org/10.4018/ijitwe.2019010106.
Full textYamaguchi, Takehiro, and Ayahiko Niimi. "Extraction of Community Transition Rules from Data Streams as Large Graph Sequence." Journal of Advanced Computational Intelligence and Intelligent Informatics 15, no. 8 (October 20, 2011): 1073–81. http://dx.doi.org/10.20965/jaciii.2011.p1073.
Full textChen, Liping, Weitao Ha, and Guojun Zhang. "Reliable Execution Based on CPN and Skyline Optimization for Web Service Composition." Scientific World Journal 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/729769.
Full textJoseph, Jismy, and Kesavaraj G. "Evaluation of Frequent Itemset Mining Algorithms-Apriori and FP Growth." International Journal of Engineering Technology and Management Sciences 4, no. 6 (September 28, 2020): 1–4. http://dx.doi.org/10.46647/ijetms.2020.v04i06.001.
Full textAnantharaman, Padmanathan, and H. V. Ramakrishan. "Data Mining Itemset of Big Data Using Pre-Processing Based on Mapreduce FrameWork with ETL Tools." APTIKOM Journal on Computer Science and Information Technologies 2, no. 2 (July 1, 2017): 57–62. http://dx.doi.org/10.11591/aptikom.j.csit.103.
Full textSrinivas, UMohan, Ch Anuradha, and Dr P. Sri Rama Chandra Murty. "Hash based Approach for Mining Frequent Item Sets from Transactional Databases." International Journal of Engineering & Technology 7, no. 3.34 (September 1, 2018): 309. http://dx.doi.org/10.14419/ijet.v7i3.34.19214.
Full textJasek, Pavel, Lenka Vrana, Lucie Sperkova, Zdenek Smutny, and Marek Kobulsky. "COMPARATIVE ANALYSIS OF SELECTED PROBABILISTIC CUSTOMER LIFETIME VALUE MODELS IN ONLINE SHOPPING." Journal of Business Economics and Management 20, no. 3 (April 5, 2019): 398–423. http://dx.doi.org/10.3846/jbem.2019.9597.
Full textGupta, Priyanka, and Vinaya Sawant. "A Parallel Apriori Algorithm and FP- Growth Based on SPARK." ITM Web of Conferences 40 (2021): 03046. http://dx.doi.org/10.1051/itmconf/20214003046.
Full textPrasad, K. Rajendra. "Optimized High-Utility Itemsets Mining for Effective Association Mining Paper." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 5 (October 1, 2017): 2911. http://dx.doi.org/10.11591/ijece.v7i5.pp2911-2918.
Full textKhattri, Vipin, and Sandeep Kumar Nayak. "Identification and Mitigation of Fraudulent Transaction using Deep Autoencoder." Journal of University of Shanghai for Science and Technology 23, no. 11 (November 28, 2021): 769–75. http://dx.doi.org/10.51201/jusst/21/11956.
Full textGayathiri, P., and B. Poorna. "Effective Gene Patterned Association Rule Hiding Algorithm for Privacy Preserving Data Mining on Transactional Database." Cybernetics and Information Technologies 17, no. 3 (September 1, 2017): 92–108. http://dx.doi.org/10.1515/cait-2017-0032.
Full textYousefinaghani, Samira, Rozita Dara, Zvonimir Poljak, Fei Song, and Shayan Sharif. "A framework for the risk prediction of avian influenza occurrence: An Indonesian case study." PLOS ONE 16, no. 1 (January 15, 2021): e0245116. http://dx.doi.org/10.1371/journal.pone.0245116.
Full textRehman, Saif Ur, Noha Alnazzawi, Jawad Ashraf, Javed Iqbal, and Shafiullah Khan. "Efficient Top-K Identical Frequent Itemsets Mining without Support Threshold Parameter from Transactional Datasets Produced by IoT-Based Smart Shopping Carts." Sensors 22, no. 20 (October 21, 2022): 8063. http://dx.doi.org/10.3390/s22208063.
Full textBawiskar, Saurav. "Smart Profitable Solutions with Recommendation Framework." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 4099–105. http://dx.doi.org/10.22214/ijraset.2022.44835.
Full textSanober, Sumaya, Izhar Alam, Sagar Pande, Farrukh Arslan, Kantilal Pitambar Rane, Bhupesh Kumar Singh, Aditya Khamparia, and Mohammad Shabaz. "An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication." Wireless Communications and Mobile Computing 2021 (August 7, 2021): 1–14. http://dx.doi.org/10.1155/2021/6079582.
Full textBansal, Neha, R. K. Singh, and Arun Sharma. "An Insight into State-of-the-Art Techniques for Big Data Classification." International Journal of Information System Modeling and Design 8, no. 3 (July 2017): 24–42. http://dx.doi.org/10.4018/ijismd.2017070102.
Full textAljojo, Nahla. "Examining Heterogeneity Structured on a Large Data Volume with Minimal Incompleteness." ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY 9, no. 2 (November 2, 2021): 30–37. http://dx.doi.org/10.14500/aro.10857.
Full textOprea, Simona-Vasilica, Adela Bâra, Florina Camelia Puican, and Ioan Cosmin Radu. "Anomaly Detection with Machine Learning Algorithms and Big Data in Electricity Consumption." Sustainability 13, no. 19 (October 2, 2021): 10963. http://dx.doi.org/10.3390/su131910963.
Full textMqadi, Nhlakanipho Michael, Nalindren Naicker, and Timothy Adeliyi. "Solving Misclassification of the Credit Card Imbalance Problem Using Near Miss." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–16. http://dx.doi.org/10.1155/2021/7194728.
Full textKim, Junghee, Haemin Jung, and Wooju Kim. "Sequential Pattern Mining Approach for Personalized Fraudulent Transaction Detection in Online Banking." Sustainability 14, no. 15 (August 8, 2022): 9791. http://dx.doi.org/10.3390/su14159791.
Full textLin, Tzu-Hsuan, and Jehn-Ruey Jiang. "Credit Card Fraud Detection with Autoencoder and Probabilistic Random Forest." Mathematics 9, no. 21 (October 22, 2021): 2683. http://dx.doi.org/10.3390/math9212683.
Full textDixit, Abhishek, Akhilesh Tiwari, and R. K. Gupta. "A Model for Trend Analysis in the Online Shopping Scenario Using Multilevel Hesitation Pattern Mining." Mathematical Problems in Engineering 2021 (July 30, 2021): 1–11. http://dx.doi.org/10.1155/2021/2828262.
Full textAndi, Hari Krishnan. "Construction of Business Intelligence Model for Information Technology Sector with Decision Support System." December 2021 3, no. 4 (March 14, 2022): 259–68. http://dx.doi.org/10.36548/jitdw.2021.4.002.
Full textSwami, Mrs M. M., Rushikesh Ghuge, Gurshan Singh, Harsh Tiwari, and Rohan Kalaskar. "Credit Card Fraud Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 2368–71. http://dx.doi.org/10.22214/ijraset.2022.47769.
Full textTHABTAH, FADI, and SUHEL HAMMOUD. "MR-ARM: A MAP-REDUCE ASSOCIATION RULE MINING FRAMEWORK." Parallel Processing Letters 23, no. 03 (September 2013): 1350012. http://dx.doi.org/10.1142/s0129626413500126.
Full textPadhi, Bharat Kumar, Sujata Chakravarty, Bighnaraj Naik, Radha Mohan Pattanayak, and Himansu Das. "RHSOFS: Feature Selection Using the Rock Hyrax Swarm Optimization Algorithm for Credit Card Fraud Detection System." Sensors 22, no. 23 (November 30, 2022): 9321. http://dx.doi.org/10.3390/s22239321.
Full textHewapathirana, Isuru. "Utilizing Prediction Intervals for Unsupervised Detection of Fraudulent Transactions: A Case Study." Asian Journal of Engineering and Applied Technology 11, no. 2 (October 28, 2022): 1–10. http://dx.doi.org/10.51983/ajeat-2022.11.2.3348.
Full textChen, Lei, and Yanbin Tu. "Enhancing Online Auction Transaction Likelihood." International Journal of E-Business Research 15, no. 2 (April 2019): 116–32. http://dx.doi.org/10.4018/ijebr.2019040107.
Full textHussain, Ibrar, and Muhammad Asif. "Detection of Anomalous Transactions in Mobile Payment Systems." International Journal of Data Analytics 1, no. 2 (July 2020): 58–66. http://dx.doi.org/10.4018/ijda.2020070105.
Full textMuhamed, Shatha Jassim. "Detection and Prevention WEB-Service for Fraudulent E-Transaction using APRIORI and SVM." Al-Mustansiriyah Journal of Science 33, no. 4 (December 30, 2022): 72–79. http://dx.doi.org/10.23851/mjs.v33i4.1242.
Full textHe, Yihong. "Machine Learning Methods for Credit Card Fraud Detection." Highlights in Science, Engineering and Technology 23 (December 3, 2022): 106–10. http://dx.doi.org/10.54097/hset.v23i.3204.
Full textBandyopadhyay, Samir Kuma. "Detection of Fraud Transactions Using Recurrent Neural Network during COVID-19." Journal of Advanced Research in Medical Science & Technology 07, no. 03 (October 7, 2020): 16–21. http://dx.doi.org/10.24321/2394.6539.202012.
Full textLeung, Charles, Tin Cheuk Leung, and Kwok Ping Tsang. "International Real Estate Review." International Real Estate Review 18, no. 4 (December 31, 2015): 473–501. http://dx.doi.org/10.53383/100210.
Full text., Soumya Shrivastava, and Punit Kumar Johari . "Convolutional Neural Network Approach for Mobile Banking Fraudulent Transaction to Detect Financial Frauds." International Journal of Engineering Technology and Management Sciences 6, no. 1 (January 28, 2022): 30–37. http://dx.doi.org/10.46647/ijetms.2022.v06i01.005.
Full textKhajuria, Rakshit, Anuj Sharma, Sunny Sharma, Ashok Sharma, Jyoti Narayan Baliya, and Parveen Singh. "Performance analysis of frequent pattern mining algorithm on different real-life dataset." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 3 (March 1, 2023): 1355. http://dx.doi.org/10.11591/ijeecs.v29.i3.pp1355-1363.
Full textZhang, Zhaohui, Lijun Yang, Ligong Chen, Qiuwen Liu, Ying Meng, Pengwei Wang, and Maozhen Li. "A generative adversarial network–based method for generating negative financial samples." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090705. http://dx.doi.org/10.1177/1550147720907053.
Full textLiu, Xiaolong, and Weidong Qu. "International Real Estate Review." International Real Estate Review 18, no. 1 (March 31, 2015): 113–29. http://dx.doi.org/10.53383/100195.
Full textAshfaq, Tehreem, Rabiya Khalid, Adamu Sani Yahaya, Sheraz Aslam, Ahmad Taher Azar, Safa Alsafari, and Ibrahim A. Hameed. "A Machine Learning and Blockchain Based Efficient Fraud Detection Mechanism." Sensors 22, no. 19 (September 21, 2022): 7162. http://dx.doi.org/10.3390/s22197162.
Full textZhang, Zhong-jie, Jian Huang, and Ying Wei. "FI-FG: Frequent Item Sets Mining from Datasets with High Number of Transactions by Granular Computing and Fuzzy Set Theory." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/623240.
Full textWidi Hastomo, Adhitio Satyo Bayangkari Karno, Sudjiran, Dodi Arif, and Eka Sally Moreta. "Exloratory Data Analysis Untuk Data Belanja Pelanggan dan Pendapatan Bisnis." Infotekmesin 13, no. 2 (July 30, 2022): 314–21. http://dx.doi.org/10.35970/infotekmesin.v13i2.1547.
Full text