{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:54:46Z","timestamp":1776106486515,"version":"3.50.1"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["2021R1A2C1009388"],"award-info":[{"award-number":["2021R1A2C1009388"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.engappai.2026.114511","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T17:11:57Z","timestamp":1773767517000},"page":"114511","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Damped window based high occupancy pattern mining with one scanning of data streams"],"prefix":"10.1016","volume":"174","author":[{"given":"Myungha","family":"Cho","sequence":"first","affiliation":[]},{"given":"Hanju","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyeonmo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Taewoong","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Chanhee","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Heonho","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9246-4587","authenticated-orcid":false,"given":"Bay","family":"Vo","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Unil","family":"Yun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2026.114511_bib1","series-title":"Proceedings of the 20th International Conference on Very Large Data Bases","first-page":"487","article-title":"Fast algorithms for mining association rules","author":"Agrawal","year":"1994"},{"key":"10.1016\/j.engappai.2026.114511_bib2","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.ins.2021.07.061","article-title":"Identification of adverse disease agents and risk analysis using frequent pattern mining","volume":"576","author":"Ahmed","year":"2021","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.engappai.2026.114511_bib3","first-page":"36","article-title":"Occupancy based pattern mining: current status and future directions","volume":"11","author":"Adhikari","year":"2020","journal-title":"International Journal of Next-Generation Computing"},{"key":"10.1016\/j.engappai.2026.114511_bib4","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106596","article-title":"Approximate high utility itemset mining in noisy environments","volume":"212","author":"Baek","year":"2021","journal-title":"Knowl. Base Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib5","doi-asserted-by":"crossref","first-page":"31289","DOI":"10.1109\/ACCESS.2022.3160457","article-title":"Educational data mining: a bibliometric analysis of an emerging field","volume":"10","author":"Baek","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.engappai.2026.114511_bib6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.4018\/IJAL.2021010102","article-title":"Efficient implementations for UWEP incremental frequent itemset mining algorithm","volume":"11","author":"Bicer","year":"2021","journal-title":"Int. J. Appl. Logist."},{"key":"10.1016\/j.engappai.2026.114511_bib7","doi-asserted-by":"crossref","first-page":"56318","DOI":"10.1109\/ACCESS.2021.3070132","article-title":"A sliding window-based approach for mining frequent weighted patterns over data streams","volume":"9","author":"Bui","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib8","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2020.103735","article-title":"Erasable pattern mining based on tree structures with damped window over data streams","volume":"94","author":"Baek","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"10.1016\/j.engappai.2026.114511_bib9","doi-asserted-by":"crossref","first-page":"16:1","DOI":"10.1145\/3430767","article-title":"RHUPS: mining recent high utility patterns with sliding Window\u2013based arrival time control over data streams","volume":"12","author":"Baek","year":"2021","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.engappai.2026.114511_bib10","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1016\/j.ins.2020.10.001","article-title":"Discovering high utility-occupancy patterns from uncertain data","volume":"546","author":"Chen","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.engappai.2026.114511_bib11","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.eswa.2018.07.051","article-title":"Emerging topic detection in Twitter stream based on high utility pattern mining","volume":"115","author":"Choi","year":"2019","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"10.1016\/j.engappai.2026.114511_bib12","first-page":"841","article-title":"A survey of incremental high-utility pattern mining based on storage structure","volume":"41","author":"Cheng","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib13","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117086","article-title":"Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud","volume":"201","author":"Chen","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2026.114511_bib14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ins.2022.01.028","article-title":"MWFP-outlier: maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams","volume":"591","author":"Cai","year":"2022","journal-title":"Inf. Sci."},{"key":"10.1016\/j.engappai.2026.114511_bib15","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.future.2019.07.039","article-title":"Mining high occupancy itemsets","volume":"102","author":"Deng","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib16","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.1007\/s13369-021-06075-8","article-title":"High occupancy itemset mining with consideration of transaction occupancy","volume":"47","author":"Datta","year":"2022","journal-title":"Arabian J. Sci. Eng."},{"key":"10.1016\/j.engappai.2026.114511_bib17","first-page":"6917","article-title":"TSPIN: mining top-k stable periodic patterns","volume":"52","author":"Fournier-Viger","year":"2022","journal-title":"Artif. Intell."},{"key":"10.1016\/j.engappai.2026.114511_bib18","doi-asserted-by":"crossref","first-page":"3271","DOI":"10.1007\/s12652-021-03231-8","article-title":"High utility fuzzy product mining (HUFPM) using investigation of HUWAS approach","volume":"13","author":"Ganesan","year":"2022","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"3","key":"10.1016\/j.engappai.2026.114511_bib19","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1109\/TCYB.2019.2896267","article-title":"HUOPM: high-utility occupancy pattern mining","volume":"50","author":"Gan","year":"2020","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"10.1016\/j.engappai.2026.114511_bib20","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1109\/TKDE.2019.2942594","article-title":"A survey of utility-oriented pattern mining","volume":"33","author":"Gan","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.engappai.2026.114511_bib21","doi-asserted-by":"crossref","first-page":"70556","DOI":"10.1109\/ACCESS.2021.3078513","article-title":"Monitoring real-time personal locomotion behaviors over smart indoor-outdoor environments via body-worn sensors","volume":"9","author":"Gochoo","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib22","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.future.2020.01.034","article-title":"Efficient algorithms for mining clickstream patterns using pseudo-IDLists","volume":"107","author":"Huynh","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"10.1016\/j.engappai.2026.114511_bib23","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1109\/TPDS.2013.283","article-title":"Wireless spectrum occupancy prediction based on partial periodic pattern mining","volume":"25","author":"Huang","year":"2014","journal-title":"IEEE Trans. Parallel Distr. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib24","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2018.05.085","article-title":"Mining of productive periodic-frequent patterns for IoT data analytics","volume":"88","author":"Ismail","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib25","series-title":"Proceedings of the 35th Annual ACM Symposium on Applied Computing","first-page":"490","article-title":"SOHUPDS: a single-pass one-phase algorithm for mining high utility patterns over a data stream","author":"Jaysawal","year":"2020"},{"key":"10.1016\/j.engappai.2026.114511_bib26","doi-asserted-by":"crossref","DOI":"10.1016\/j.isatra.2022.05.003","article-title":"Mining high occupancy patterns to analyze incremental data in intelligent systems","author":"Kim","year":"2022","journal-title":"ISA (Instrum. Soc. Am.) Trans."},{"issue":"3","key":"10.1016\/j.engappai.2026.114511_bib27","first-page":"4361","article-title":"Finding spectrum occupancy pattern using CBFPP mining technique","volume":"39","author":"Karthik","year":"2020","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"1","key":"10.1016\/j.engappai.2026.114511_bib28","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10489-016-0890-z","article-title":"Efficient algorithm for mining high average-utility itemsets in incremental transaction databases","volume":"47","author":"Kim","year":"2017","journal-title":"Appl. Intell."},{"key":"10.1016\/j.engappai.2026.114511_bib29","doi-asserted-by":"crossref","first-page":"124833","DOI":"10.1109\/ACCESS.2020.3007485","article-title":"PrefixSpan based pattern mining using time sliding weight from streaming data","volume":"8","author":"Kang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib30","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106653","article-title":"Damped sliding based utility oriented pattern mining over stream data","volume":"213","author":"Kim","year":"2021","journal-title":"Knowl. Base Syst."},{"issue":"10","key":"10.1016\/j.engappai.2026.114511_bib31","doi-asserted-by":"crossref","first-page":"5741","DOI":"10.1002\/int.22528","article-title":"Average utility driven data analytics on damped windows for intelligent systems with data streams","volume":"36","author":"Kim","year":"2021","journal-title":"Int. J. Intell. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib32","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110478","article-title":"Pre-large based high utility pattern mining for transaction insertions in incremental database","volume":"268","author":"Kim","year":"2023","journal-title":"Knowl. Base Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.116435","article-title":"Frequent pattern mining from multivariate time series data","volume":"194","author":"Karaca","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"10.1016\/j.engappai.2026.114511_bib34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-018-9849-y","article-title":"An effective scheme for top-k frequent itemset mining under differential privacy conditions","volume":"63","author":"Liang","year":"2020","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.engappai.2026.114511_bib35","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1016\/j.isatra.2019.04.026","article-title":"Timely daily activity recognition from headmost sensor events","volume":"94","author":"Liu","year":"2019","journal-title":"ISA (Instrum. Soc. Am.) Trans."},{"key":"10.1016\/j.engappai.2026.114511_bib36","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.116220","article-title":"Efficient strategies for incremental mining of frequent closed itemsets over data streams","volume":"191","author":"Liu","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"10.1016\/j.engappai.2026.114511_bib37","doi-asserted-by":"crossref","first-page":"4806","DOI":"10.1007\/s10489-020-02080-w","article-title":"Linguistic frequent pattern mining using a compressed structure","volume":"51","author":"Lin","year":"2021","journal-title":"Appl. Intell."},{"issue":"6","key":"10.1016\/j.engappai.2026.114511_bib38","doi-asserted-by":"crossref","first-page":"2509","DOI":"10.1007\/s10115-023-01831-8","article-title":"FCHM-stream: fast closed high utility itemsets mining over data streams","volume":"65","author":"Li","year":"2023","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib39","doi-asserted-by":"crossref","first-page":"50958","DOI":"10.1109\/ACCESS.2020.2979289","article-title":"Efficient approach for damped window-based high utility pattern mining with list structure","volume":"8","author":"Nam","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib40","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115741","article-title":"Efficient algorithms for mining closed high utility itemsets in dynamic profit databases","volume":"186","author":"Nguyen","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2026.114511_bib41","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.knosys.2019.03.022","article-title":"Mining high-utility itemsets in dynamic profit databases","volume":"175","author":"Nguyen","year":"2019","journal-title":"Knowl. Base Syst."},{"issue":"2","key":"10.1016\/j.engappai.2026.114511_bib42","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1080\/01969722.2019.1705549","article-title":"Mining maximal high utility itemsets on dynamic profit databases","volume":"51","author":"Nguyen","year":"2020","journal-title":"Cybern. Syst."},{"issue":"9","key":"10.1016\/j.engappai.2026.114511_bib43","doi-asserted-by":"crossref","first-page":"5477","DOI":"10.1002\/int.22799","article-title":"Occupancy\u2010based utility pattern mining in dynamic environments of intelligent systems","volume":"37","author":"Ryu","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib44","doi-asserted-by":"crossref","first-page":"44638","DOI":"10.1109\/ACCESS.2022.3164067","article-title":"Matching network of ontologiens: a random walk and frequent itemsets approach","volume":"10","author":"Santos","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib45","first-page":"354","article-title":"OCEAN: fast discovery of high utility occupancy itemsets","volume":"vol. 9651","author":"Shen","year":"2016"},{"key":"10.1016\/j.engappai.2026.114511_bib46","doi-asserted-by":"crossref","first-page":"55726","DOI":"10.1109\/ACCESS.2021.3071777","article-title":"Incremental association rule mining with a fast incremental updating frequent pattern growth algorithm","volume":"9","author":"Thurachon","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114511_bib47","series-title":"Proceedings of the 21st ACM International Conference on Information and Knowledge Management","first-page":"75","article-title":"Incorporating occupancy into frequent pattern mining for high quality pattern recommendation","author":"Tang","year":"2012"},{"issue":"7","key":"10.1016\/j.engappai.2026.114511_bib48","doi-asserted-by":"crossref","first-page":"7136","DOI":"10.1007\/s10489-021-02505-0","article-title":"Mining interesting sequences with low average cost and high average utility","volume":"52","author":"Truong","year":"2022","journal-title":"Appl. Intell."},{"issue":"6","key":"10.1016\/j.engappai.2026.114511_bib49","doi-asserted-by":"crossref","first-page":"6106","DOI":"10.1007\/s10489-021-02520-1","article-title":"Frequent high minimum average utility sequence mining with constraints in dynamic databases using efficient pruning strategies","volume":"52","author":"Truong","year":"2022","journal-title":"Appl. Intell."},{"key":"10.1016\/j.engappai.2026.114511_bib50","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.future.2018.12.029","article-title":"Efficient approach for incremental high utility pattern mining with indexed list structure","volume":"95","author":"Yun","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.engappai.2026.114511_bib51","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ins.2019.04.050","article-title":"Advanced approach of sliding window based erasable pattern mining with list structure of industrial fields","volume":"494","author":"Yun","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.engappai.2026.114511_bib52","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.knosys.2017.12.029","article-title":"Damped window based high average utility pattern mining over data streams","volume":"144","author":"Yun","year":"2018","journal-title":"Knowl. Base Syst."},{"issue":"24","key":"10.1016\/j.engappai.2026.114511_bib53","doi-asserted-by":"crossref","first-page":"17333","DOI":"10.1109\/JIOT.2021.3080284","article-title":"Prelarge-based utility-oriented data analytics for transaction modifications in internet of things","volume":"8","author":"Yun","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.engappai.2026.114511_bib54","doi-asserted-by":"crossref","first-page":"14:1","DOI":"10.1145\/2753765","article-title":"Occupancy-based frequent pattern mining","volume":"10","author":"Zhang","year":"2015","journal-title":"ACM Trans. Knowl. Discov. Data"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095219762600792X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S095219762600792X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:29:48Z","timestamp":1776101388000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S095219762600792X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":54,"alternative-id":["S095219762600792X"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114511","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Damped window based high occupancy pattern mining with one scanning of data streams","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114511","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114511"}}