{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T16:34:25Z","timestamp":1774888465399,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T00:00:00Z","timestamp":1642118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T00:00:00Z","timestamp":1642118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10489-021-03134-3","type":"journal-article","created":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T17:10:57Z","timestamp":1642180257000},"page":"10604-10616","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Efficient evolutionary computation model of closed high-utility itemset mining"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"first","affiliation":[]},{"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Fourier-Viger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,14]]},"reference":[{"issue":"6","key":"3134_CR1","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/69.250074","volume":"5","author":"R Agrawal","year":"1993","unstructured":"Agrawal R, Imielinski T, Swami AN (1993) Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering 5(6):914\u2013925","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3134_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal R, Srikant R (1995) Mining sequential patterns. The international conference on data engineering, pp 3\u201314","DOI":"10.1109\/ICDE.1995.380415"},{"key":"3134_CR3","doi-asserted-by":"publisher","first-page":"106596","DOI":"10.1016\/j.knosys.2020.106596","volume":"212","author":"Y Baek","year":"2021","unstructured":"Baek Y, Yun U, Kim H, Kim J, Vo B, Truong T, Deng ZH (2021) Approximate high utility itemset mining in noisy environments. Knowledge-Based Systems 212:106596","journal-title":"Knowledge-Based Systems"},{"key":"3134_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.bdr.2016.07.001","volume":"6","author":"Y Chen","year":"2016","unstructured":"Chen Y, An A (2016) Approximate parallel high utility itemset mining. Big Data Research 6:26\u201342","journal-title":"Big Data Research"},{"issue":"1","key":"3134_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Communications of the ACM 51(1):107\u2013113","journal-title":"Communications of the ACM"},{"key":"3134_CR6","doi-asserted-by":"crossref","unstructured":"Djenouri Y, Lin JCW, N\u00f8rv\u00e5g K, Ramampiaro H (2019) Highly efficient pattern mining based on transaction decomposition. IEEE international conference on data engineering, pp 1646\u20131649","DOI":"10.1109\/ICDE.2019.00163"},{"key":"3134_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11704-016-6245-4","volume":"13","author":"TL Dam","year":"2019","unstructured":"Dam TL, Li K, Fournier-Viger P, Duong QH (2019) CLS-Miner: efficient and effective closed high-utility itemset mining. Frontiers of Computer Science 13:357\u2013381","journal-title":"Frontiers of Computer Science"},{"key":"3134_CR8","doi-asserted-by":"crossref","unstructured":"Fournier-Viger P, Wu CW, Zida S, Tseng VS (2014) FHM: Faster high-utility itemset mining using estimated utility co-occurrence pruning. International symposium on methodologies for intelligent systems, pp 83\u201392","DOI":"10.1007\/978-3-319-08326-1_9"},{"key":"3134_CR9","doi-asserted-by":"crossref","unstructured":"Fournier-Viger P, Lin JCW, Gomariz A, Gueniche T, Soltani A, Deng Z, Lam HT (2016) The SPMF open-source data mining library version 2. The european conference on machine learning and knowledge discovery in databases, pp 36\u201340","DOI":"10.1007\/978-3-319-46131-1_8"},{"key":"3134_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.patcog.2019.04.014","volume":"93","author":"P Fr\u00ebnti","year":"2019","unstructured":"Fr\u00ebnti P, Sieranoja S (2019) How much can k-means be improved by using better initialization and repeats? Pattern Recognition 93:95\u2013112","journal-title":"Pattern Recognition"},{"key":"3134_CR11","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ins.2019.03.050","volume":"489","author":"P Fournier-Viger","year":"2019","unstructured":"Fournier-Viger P, Li Z, Lin JCW, Kiran RU, Fujita H (2019) Efficient algorithms to identify periodic patterns in multiple sequences. Information Sciences 489:205\u2013226","journal-title":"Information Sciences"},{"key":"3134_CR12","doi-asserted-by":"crossref","unstructured":"Guha R, Ghosh M, Kapri S, Shaw S, Mutsuddi S, Bhateja V, Sarkar R (2019) Deluge based genetic algorithm for feature selection. Evolutionary intelligence, pp 1\u201311","DOI":"10.1007\/s12065-019-00218-5"},{"key":"3134_CR13","doi-asserted-by":"crossref","unstructured":"Gan W, Lin JCW, Chao HC, Fujita H, Yu PS (2019) Correlated utility-based pattern mining. Information Sciences 504:470\u2013486","DOI":"10.1016\/j.ins.2019.07.005"},{"key":"3134_CR14","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT Press, Cambridge"},{"issue":"1","key":"3134_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han J, Pei J, Yin Y, Mao R (2004) Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery 8(1):53\u201387","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"1","key":"3134_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TKDE.2006.10","volume":"18","author":"C Lucchese","year":"2006","unstructured":"Lucchese C, Orlando S, Perego R (2006) Fast and memory efficient mining of frequent closed itemsets. IEEE Transactions on Knowledge and Data Engineering 18(1):21\u201336","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3134_CR17","doi-asserted-by":"crossref","unstructured":"Li H, Wang Y, Zhang D, Zhang M, Chang EY (2008) PFP: parallel fp-growth for query recommendation. ACM conference on recommender systems, pp 107\u2013114","DOI":"10.1145\/1454008.1454027"},{"key":"3134_CR18","doi-asserted-by":"crossref","unstructured":"Liu Y, Liao W, Choudhary AN (2005) A two-phase algorithm for fast discovery of high utility itemsets. Pacific-asia conference on advances in knowledge discovery and data mining. pp 689\u2013695","DOI":"10.1007\/11430919_79"},{"issue":"6","key":"3134_CR19","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1016\/j.eswa.2010.12.082","volume":"38","author":"JCW Lin","year":"2011","unstructured":"Lin JCW, Hong T, Lu W (2011) An effective tree structure for mining high utility itemsets. Expert Systems with Applications 38(6):7419\u20137424","journal-title":"Expert Systems with Applications"},{"key":"3134_CR20","doi-asserted-by":"crossref","unstructured":"Liu M, Qu J (2012) Mining high utility itemsets without candidate generation. ACM international conference on information and knowledge management, pp 55\u201364","DOI":"10.1145\/2396761.2396773"},{"key":"3134_CR21","doi-asserted-by":"crossref","unstructured":"Liu J, Wang K, Fung BCM (2012) Direct discovery of high utility itemsets without candidate generation. IEEE international conference on data mining, pp 984\u2013989","DOI":"10.1109\/ICDM.2012.20"},{"key":"3134_CR22","doi-asserted-by":"crossref","unstructured":"Lin MY, Lee PY, Hsueh SC (2012) Apriori-based frequent itemset mining algorithms on MapReduce. The international conference on ubiquitous information management and communication, pp 1\u20138","DOI":"10.1145\/2184751.2184842"},{"key":"3134_CR23","doi-asserted-by":"crossref","unstructured":"Lin YC, Wu CW, Tseng VS (2015) Mining high utility itemsets in big data. Pacific-asia conference on knowledge discovery and data mining, pp 649\u2013661","DOI":"10.1007\/978-3-319-18032-8_51"},{"key":"3134_CR24","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.knosys.2015.12.019","volume":"96","author":"JCW Lin","year":"2016","unstructured":"Lin JCW, Gan W, Fournier-Viger P, Hong TP, Tseng VS (2016) Efficient algorithms for mining high-utility itemsets in uncertain databases. Knowledge-Based Systems 96:171\u2013187","journal-title":"Knowledge-Based Systems"},{"key":"3134_CR25","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.engappai.2018.10.010","volume":"77","author":"JCW Lin","year":"2019","unstructured":"Lin JCW, Yang L, Fournier-Viger P, Hong TP (2019) Mining of skyline patterns by considering both frequent and utility constraints. Engineering Applications of Artificial Intelligence 77:229\u2013238","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"7","key":"3134_CR26","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"JCW Lin","year":"2021","unstructured":"Lin JCW, Srivastava G, Zhang Y, Djenouri Y, Aloqaily M (2021) Privacy preserving multi-objective sanitization model in 6G IoT environments. IEEE Internet of Things Journal 8(7):5340\u20135349","journal-title":"IEEE Internet of Things Journal"},{"key":"3134_CR27","doi-asserted-by":"publisher","first-page":"107422","DOI":"10.1016\/j.asoc.2021.107422","volume":"108","author":"JCW Lin","year":"2021","unstructured":"Lin JCW, Djenouri Y, Srivastava G, Yun U, Fournier-Viger P (2021) A predictive GA-based model for closed high-utility itemset mining. Applied Soft Computing 108:107422","journal-title":"Applied Soft Computing"},{"key":"3134_CR28","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.inffus.2021.05.011","volume":"76","author":"JCW Lin","year":"2021","unstructured":"Lin JCW, Djenouri Y, Srivastava G (2021) Efficient closed high-utility pattern fusion model in large-scale databases. Information Fusion 76:122\u2013132","journal-title":"Information Fusion"},{"issue":"3","key":"3134_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3068335","volume":"42","author":"E Schubert","year":"2017","unstructured":"Schubert E, Sander J, Ester M, Kriegel HP, Wu X (2017) DBSCAN revisited, revisited: why and how you should (still) use DBSCAN. ACM Transactions on Database Systems 42(3):1\u201321","journal-title":"ACM Transactions on Database Systems"},{"key":"3134_CR30","doi-asserted-by":"crossref","unstructured":"Srivastava G, Lin JCW, Pirouz M, Li Y, Yun U (2020) A pre-large weighted-fusion system of sensed high-utility patterns. IEEE Sensors Journal","DOI":"10.1109\/JSEN.2020.2991045"},{"key":"3134_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.08.043","volume":"420","author":"Y Djenouri","year":"2017","unstructured":"Djenouri Y, Comuzzi M (2017) Combining Apriori heuristic and bio-inspired algorithms for solving the frequent itemsets mining problem. Information Sciences 420:1\u201315","journal-title":"Information Sciences"},{"issue":"8","key":"3134_CR32","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/TKDE.2012.59","volume":"25","author":"VS Tseng","year":"2013","unstructured":"Tseng VS, Shie B, Wu C, Yu PS (2013) Efficient algorithms for mining high utility itemsets from transactional databases. IEEE Transactions Knowledge and Data Engineering 25(8):1772\u20131786","journal-title":"IEEE Transactions Knowledge and Data Engineering"},{"issue":"3","key":"3134_CR33","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TKDE.2014.2345377","volume":"27","author":"VS Tseng","year":"2015","unstructured":"Tseng VS, Wu CW, Fournier-Viger P, Yu PS (2015) Efficient algorithms for mining the concise and lossless representation of high utility itemsets. IEEE Transactions on Knowledge and Data Engineering 27(3):726\u2013739","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3134_CR34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.ins.2020.12.004","volume":"553","author":"JMT Wu","year":"2021","unstructured":"Wu JMT, Srivastava G, Wei M, Yun U, Lin JCW (2021) Fuzzy high-utility pattern mining in parallel and distributed Hadoop framework. Information Sciences 553:31\u201348","journal-title":"Information Sciences"},{"key":"3134_CR35","doi-asserted-by":"crossref","unstructured":"Wu CW, Fournier-Viger P, Gu JY, Tseng VS (2015) Mining closed+ high utility itemsets without candidate generation. Conference on Technologies and Applications of Artificial Intelligence, pp 187\u2013194","DOI":"10.1109\/TAAI.2015.7407089"},{"key":"3134_CR36","doi-asserted-by":"crossref","unstructured":"Yao H, Hamilton HJ, Butz CJ (2004) A foundational approach to mining itemset utilities from databases. SIAM International Conference on Data Mining, pp 482\u2013486","DOI":"10.1137\/1.9781611972740.51"},{"key":"3134_CR37","first-page":"188","volume":"144","author":"U Yun","year":"2018","unstructured":"Yun U, Kim D, Yoon E, Fujita H (2018) Damped window based high average utility pattern mining over data streams. Information Sciences 144:188\u2013205","journal-title":"Information Sciences"},{"key":"3134_CR38","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.knosys.2017.03.016","volume":"124","author":"U Yun","year":"2017","unstructured":"Yun U, Ryang H, Lee G, Fujita H (2017) An efficient algorithm for mining high utility patterns from incremental databases with one database scan. Knowledge-Based Systems 124:188\u2013206","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"3134_CR39","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TKDE.2005.60","volume":"17","author":"MJ Zaki","year":"2005","unstructured":"Zaki MJ, Hsiao CJ (2005) Efficient algorithms for mining closed itemsets and their lattice structure. IEEE Transactions on Knowledge and Data Engineering 17(4):462\u2013478","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"3134_CR40","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s10115-016-0986-0","volume":"51","author":"S Zida","year":"2017","unstructured":"Zida S, Fournier-Viger P, Lin JCW, Wu CW, Tseng VS (2017) EFIM: a fast and memory efficient algorithm for high-utility itemset mining. Knowledge and Information Systems 51(2):595\u2013625","journal-title":"Knowledge and Information Systems"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03134-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-03134-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-03134-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T07:40:37Z","timestamp":1655710837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-03134-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,14]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3134"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-03134-3","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,14]]},"assertion":[{"value":"18 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}