Dissertations / Theses on the topic 'Utility Mining'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Utility Mining.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Jagannath, Sandhya. "Utility Guided Pattern Mining." NCSU, 2003. http://www.lib.ncsu.edu/theses/available/etd-11262003-131929/.
Full textCheng, Hong. "Mining high-utility plans from plan databases /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20CHENG.
Full textCasas, Roma Jordi. "Privacy-preserving and data utility in graph mining." Doctoral thesis, Universitat Autònoma de Barcelona, 2014. http://hdl.handle.net/10803/285566.
Full textPena, Isis. "Utility-based data mining: An anthropometric case study." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27723.
Full textSobolewska, Katarzyna-Ewa. "Web links utility assessment using data mining techniques." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2936.
Full textFlory, Long Mrs. "A WEB PERSONALIZATION ARTIFACT FOR UTILITY-SENSITIVE REVIEW ANALYSIS." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3739.
Full textGuo, Shumin. "Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services." Wright State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=wright1400162914.
Full textAkaner, Mesut. "Application Of Iso 9000 And Ohsas 18000 To A Mining Company." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/3/1054980/index.pdf.
Full textCorain, Elisabetta. "Ottimizzazione Percorsi Logistica, modello analitico a supporto delle simulazioni degli impatti di modifica della dislocazione degli impianti." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textAsenjo, Juan C. "Data Masking, Encryption, and their Effect on Classification Performance: Trade-offs Between Data Security and Utility." NSUWorks, 2017. http://nsuworks.nova.edu/gscis_etd/1010.
Full text山本, 俊行, та Toshiyuki YAMAMOTO. "非補償型意思決定方略を表現するためのデータマイニング手法の適用に関する分析". 土木学会, 2004. http://hdl.handle.net/2237/8619.
Full textDalmas, Benjamin. "Nouvelles approches pour la détection de relations utiles dans les processus : application aux parcours de santé." Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC005/document.
Full textLindén, Johannes. "Huvudtitel: Understand and Utilise Unformatted Text Documents by Natural Language Processing algorithms." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31043.
Full textCocos, Ioana Alice. "Sélection d'un mélange réactif utilisé dans les biobarrières perméables pour le traitement des eaux souterraines contaminées par le drainage minier acide." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0021/MQ57400.pdf.
Full textCavalcante, Ronaldo Fonseca. "Estudo do potencial de utiliza??o do res?duo da extra??o de esmeraldas na fabrica??o de cer?mica de revestimento." Universidade Federal do Rio Grande do Norte, 2010. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15603.
Full textPortal, Cleber. "Estratégias para minimizar a evasão e potencializar a permanência em EAD a partir de sistema que utiliza mineração de dados educacionais e learning analytics." Universidade do Vale do Rio dos Sinos, 2016. http://www.repositorio.jesuita.org.br/handle/UNISINOS/5409.
Full textKnight, Adriene Jean. "Nutritional Assessment of Individuals who Utilize Services Available Through the Wood County Committee on Aging." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245692500.
Full textChen, Wei-Ren, and 陳威任. "Mining Utility Association Rules." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/04865121871313091524.
Full textLee, Cho-Han, and 李卓翰. "Mining High Average-Utility Itemsets." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/72034151214338040216.
Full textYang, Chian-Yi, and 楊千儀. "Mining High Utility Quantitative Association Rules." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/2jdtaf.
Full textChao, Yu-Te, and 趙育德. "Utility Mining with Individual Item Thresholds." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/62271243300077912737.
Full textYang, Zong-Hua, and 楊宗樺. "Mining High Utility Sequential Pattern Efficiently." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/01681418871281553038.
Full textCHIANG, PING-HUNG, and 蔣秉翃. "Fuzzy Utility Mining with Weighted Items." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/zxb2qh.
Full textChen, Yu-cheng, and 陳又誠. "Preference Utility Mining of Web Navigation Patterns." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/99199642082272023733.
Full textHong, Wei-Ting, and 洪偉庭. "Mining Closed High Utility Mobile Sequential Pattern." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/47761071218440012325.
Full textCHEN, YU-KUN, and 陳煜堃. "Mining Top-k High Utility Itemsets Algorithm." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5v6754.
Full textBabu, Korra Sathya. "Utility-Based Privacy Preserving Data Publishing." Thesis, 2013. http://ethesis.nitrkl.ac.in/5487/1/Korra_Sathya_Babu.pdf.
Full textChang, Chi-Yuan, and 張啟原. "Mining High Utility Sequential Patterns with Duration Constraints." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/hy2wa2.
Full textYu-FengLin and 林鈺峰. "A Study on Utility-based Episode Mining Methodologies." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/41064495904756106505.
Full textChia-HuaLi and 李佳樺. "Efficient Algorithms for Mining High Utility Quantitative Itemsets." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/29631913307950761303.
Full textWeng, Jing-Meei, and 翁靜美. "Mining High Utility Itemset in a Data Stream." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/25289927639754206683.
Full textChen, Bo-Yan, and 陳柏諺. "Tree-based Maintenance Approaches for Average-Utility Mining." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/57543037540584559677.
Full textHuang, Hsin Yun, and 黃心韻. "Efficient Mining of High Utility Itemsets on Data Streams." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/59391128905363655245.
Full textHuang, Hsin-Cheng, and 黃新程. "A Study on Quantitative and Fuzzy Sequential Utility Mining." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/50123119658451062597.
Full textCHENG, CHUN-YU, and 鄭俊裕. "Mining Continuous Temporal High Utility Itemset from Transaction Database." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/43585385502910330592.
Full textGu, Jia-Yuan, and 顧家源. "An Efficient Approach for Mining High Utility Sequential Patterns." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/93847171288928637569.
Full textLin, Wan-Chi, and 林宛琦. "Mining Top-K High Utility Itemsets over Data Streams." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/70566059819707001026.
Full text陳高彥. "Mining Multiple-Level High Utility Patterns in Transaction Databases." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ezx8r9.
Full textJain, Sachin kumar, and Ankit Tandon. "Balancing between data utility and privacy preservation in data mining." Thesis, 2010. http://ethesis.nitrkl.ac.in/1651/1/Thesis_dspace.pdf.
Full textWU, CHIH-FANG, and 吳致芳. "Mining High Utility Frequent Purchase Behavior Patterns in Mobile Commerce." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/00324715534685762178.
Full textLai, Yu-Ching, and 賴郁菁. "An Efficient Approach for Mining High Utility Quantitative Association Rules." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/7366n3.
Full textGuo, Jhou Sing, and 周興國. "Mining High Utility Sequential Patterns in the Data Stream Environments." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/bbmt45.
Full textSONG, CHENG-YU, and 宋承祐. "Evaluating Privacy and Utility in Privacy-Preserving Association Rule Mining." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33zrck.
Full textWang, Jun-Zhe, and 王濬哲. "A Study on Efficient Mining of High Utility Sequential Patterns." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/gsm5at.
Full textBai-EnShie and 謝百恩. "Mining High Utility Patterns from Transactional Databases under Different Environments." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/43807287303585669186.
Full textTu, Tzer-Fu, and 凃哲夫. "Efficient Mining of High Utility Itemsets using Maximal Itemset Property." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/54022918834886326158.
Full textKang, Shu-Wei, and 康書偉. "An Efficient Algorithm for Mining Top-K High Utility Itemsets." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/92656080728847180259.
Full textGomes, José Francisco Cagigal da Silva. "An optimization-based wrapper approach for utility-based data mining." Master's thesis, 2019. https://hdl.handle.net/10216/122198.
Full textCheng-PingLai and 賴政坪. "A Study on Temporal and Utility-based Database Mining Techniques." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/75611753494061772436.
Full textWong, Jia-Wei, and 翁嘉蔚. "A Study on Improving Efficiency of Privacy-Preserving Utility Mining." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/59566913084585643545.
Full text