{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:07:27Z","timestamp":1775912847849,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2019,12,31]]},"abstract":"<jats:p>High-utility itemset mining is a popular data mining problem that considers utility factors, such as quantity and unit profit of items besides frequency measure from the transactional database. It helps to find the most valuable and profitable products\/items that are difficult to track by using only the frequent itemsets. An item might have a high-profit value which is rare in the transactional database and has a tremendous importance. While there are many existing algorithms to find high-utility itemsets (HUIs) that generate comparatively large candidate sets, our main focus is on significantly reducing the computation time with the introduction of new pruning strategies. The designed pruning strategies help to reduce the visitation of unnecessary nodes in the search space, which reduces the time required by the algorithm. In this article, two new stricter upper bounds are designed to reduce the computation time by refraining from visiting unnecessary nodes of an itemset. Thus, the search space of the potential HUIs can be greatly reduced, and the mining procedure of the execution time can be improved. The proposed strategies can also significantly minimize the transaction database generated on each node. Experimental results showed that the designed algorithm with two pruning strategies outperform the state-of-the-art algorithms for mining the required HUIs in terms of runtime and number of revised candidates. The memory usage of the designed algorithm also outperforms the state-of-the-art approach. Moreover, a multi-thread concept is also discussed to further handle the problem of big datasets.<\/jats:p>","DOI":"10.1145\/3363571","type":"journal-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T21:41:21Z","timestamp":1573594881000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":90,"title":["High-Utility Itemset Mining with Effective Pruning Strategies"],"prefix":"10.1145","volume":"13","author":[{"given":"Jimmy Ming-Tai","family":"Wu","sequence":"first","affiliation":[{"name":"Shandong University of Science and Technology, Shandong, China"}]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Western Norway University of Applied Sciences, Bergen, Norway"}]},{"given":"Ashish","family":"Tamrakar","sequence":"additional","affiliation":[{"name":"University of Nevada, Las Vegas, NV"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"International Conference on Very Large Data Bases","volume":"1215","author":"Agrawal Rakesh","year":"1994"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_76"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.46"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.46"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022419032620"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250893"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.553155"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2009.05.066"},{"key":"e_1_2_1_9_1","volume-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 554--561","author":"Erwin Alva"},{"key":"e_1_2_1_10_1","volume-title":"The International Conference on Computer and Information Technology. 71--76","author":"Erwin Alva"},{"key":"e_1_2_1_11_1","first-page":"54","article-title":"A survey of sequential pattern mining","volume":"1","author":"Fournier-Viger Philippe","year":"2017","journal-title":"Data Science and Pattern Recognition"},{"key":"e_1_2_1_12_1","volume-title":"Tseng","author":"Fournier-Viger Philippe","year":"2014"},{"key":"e_1_2_1_13_1","unstructured":"Bart Goethals. 2012. Frequent itemset mining dataset repository. Retrieved from http:\/\/fimi.ua.ac.be\/data.  Bart Goethals. 2012. Frequent itemset mining dataset repository. Retrieved from http:\/\/fimi.ua.ac.be\/data."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1216"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1242"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1242"},{"key":"e_1_2_1_17_1","volume-title":"Philippe Fournier-Viger, Han-Chieh Chao, and Philip S. Yu.","author":"Gan Wensheng","year":"2019"},{"key":"e_1_2_1_18_1","volume-title":"Philippe Fournier-Viger, Han-Chieh Chao, and Philip S. Yu.","author":"Gan Wensheng","year":"2019"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_2_1_20_1","first-page":"126","article-title":"Generalizing concept-drift patterns for fuzzy association rules","volume":"3","author":"Hong Tzung-Pei","year":"2018","journal-title":"Journal of Network Intelligence"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.001"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0492-y"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.107"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11540007_67"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11540007_67"},{"key":"e_1_2_1_26_1","volume-title":"Isolated items discarding strategy for discovering high utility itemsets. Data 8 Knowledge Engineering 64, 1","author":"Li Yu-Chiang","year":"2008"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.082"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-0896-1"},{"key":"e_1_2_1_29_1","volume-title":"C","author":"Chun-Wei Lin Jerry","year":"2019"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2018.10.010"},{"key":"e_1_2_1_31_1","volume-title":"The International Conference on Data Mining. IEEE, 984--989","author":"Liu Junqiang"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396773"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_79"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.03.001"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0989-x"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-160811"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0483-z"},{"key":"e_1_2_1_38_1","volume-title":"International Conference on Database Systems for Advanced Applications. Springer, 224--238","author":"Shie Bai-En"},{"key":"e_1_2_1_39_1","volume-title":"ACM Symposium on Applied Computing. ACM, 1622--1626","author":"Shie Bai-En"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijdwm.2014010101"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.59"},{"key":"e_1_2_1_42_1","volume-title":"ACM International Conference on Knowledge Discovery and Data Mining. ACM, 253--262","author":"Tseng Vincent S."},{"key":"e_1_2_1_43_1","volume-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 253--262","author":"Tseng Vincent S."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.065"},{"key":"e_1_2_1_45_1","volume-title":"The International Conference on Knowledge Discovery and Data Mining. ACM, 78--86","author":"Wu Cheng Wei"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.027"},{"key":"e_1_2_1_47_1","volume-title":"Hamilton","author":"Yao Hong","year":"2006"},{"key":"e_1_2_1_48_1","volume-title":"Butz","author":"Yao Hong","year":"2004"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74553-2_26"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.12.029"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.10.011"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2682782"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.03.016"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.11.038"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2595588.2595598"},{"key":"e_1_2_1_56_1","volume-title":"Cheng-Wei Wu, and Vincent S. Tseng.","author":"Zida Souleymane","year":"2015"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12918-017-0475-4"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3363571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3363571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:26Z","timestamp":1750203866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3363571"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12,31]]}},"alternative-id":["10.1145\/3363571"],"URL":"https:\/\/doi.org\/10.1145\/3363571","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2017-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}