<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMES</journal-id>
<journal-id journal-id-type="nlm-ta">CMES</journal-id>
<journal-id journal-id-type="publisher-id">CMES</journal-id>
<journal-title-group>
<journal-title>Computer Modeling in Engineering &#x0026; Sciences</journal-title>
</journal-title-group>
<issn pub-type="epub">1526-1506</issn>
<issn pub-type="ppub">1526-1492</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">27463</article-id>
<article-id pub-id-type="doi">10.32604/cmes.2023.027463</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>High Utility Periodic Frequent Pattern Mining in Multiple Sequences</article-title>
<alt-title alt-title-type="left-running-head">High Utility Periodic Frequent Pattern Mining in Multiple Sequences</alt-title>
<alt-title alt-title-type="right-running-head">High Utility Periodic Frequent Pattern Mining in Multiple Sequences</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Chen</surname><given-names>Chien-Ming</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Zhang</surname><given-names>Zhenzhou</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Wu</surname><given-names>Jimmy Ming-Tai</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-4" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Lakshmanna</surname><given-names>Kuruva</given-names></name><xref ref-type="aff" rid="aff-2">2</xref><email>lakshman.kuruva@vit.ac.in</email></contrib>
<aff id="aff-1"><label>1</label><institution>College of Computer Science and Engineering, Shandong University of Science and Technology</institution>, <addr-line>Qingdao, 266590</addr-line>, <country>China</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Information Technology</institution>, <addr-line>Vellore Institute of Technology</addr-line>, <country>Vellore, 632014, India</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Kuruva Lakshmanna. Email: <email>lakshman.kuruva@vit.ac.in</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic"><year>2023</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>21</day><month>4</month><year>2023</year>
</pub-date>
<volume>137</volume>
<issue>1</issue>
<fpage>733</fpage>
<lpage>759</lpage>
<history>
<date date-type="received"><day>31</day><month>10</month><year>2022</year></date>
<date date-type="accepted"><day>03</day><month>1</month><year>2023</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Chen et al.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Chen et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMES_27463.pdf"></self-uri>
<abstract>
<p>Periodic pattern mining has become a popular research subject in recent years; this approach involves the discovery of frequently recurring patterns in a transaction sequence. However, previous algorithms for periodic pattern mining have ignored the utility (profit, value) of patterns. Additionally, these algorithms only identify periodic patterns in a single sequence. However, identifying patterns of high utility that are common to a set of sequences is more valuable. In several fields, identifying high-utility periodic frequent patterns in multiple sequences is important. In this study, an efficient algorithm called MHUPFPS was proposed to identify such patterns. To address existing problems, three new measures are defined: the utility, high support, and high-utility period sequence ratios. Further, a new upper bound, <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi></mml:math></inline-formula>, and two new pruning properties were proposed. MHUPFPS uses a newly defined HUPFPS-list structure to significantly accelerate the reduction of the search space and improve the overall performance of the algorithm. Furthermore, the proposed algorithm is evaluated using several datasets. The experimental results indicate that the algorithm is accurate and effective in filtering several non-high-utility periodic frequent patterns.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Decision making</kwd>
<kwd>frequent periodic pattern</kwd>
<kwd>multi-sequence database</kwd>
<kwd>sequential rules</kwd>
<kwd>utility mining</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>With the continuous development of information technology, the modern internet of things (IoT) generates a large amount of complex data that cannot be efficiently acquired, stored, managed, and analyzed using traditional data management techniques. Data mining involves extracting potentially valuable information from large and disorganized data [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>]; it uses a practical application perspective to extract meaningful information from large amounts of data to make decisions and set solutions [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. Data mining combines different fields by employing other approaches, such as machine learning and statistics, to find and design algorithms for meaningful mining patterns [<xref ref-type="bibr" rid="ref-4">4</xref>&#x2013;<xref ref-type="bibr" rid="ref-6">6</xref>]. Data mining classifies large amounts of data to identify patterns of interest [<xref ref-type="bibr" rid="ref-3">3</xref>,<xref ref-type="bibr" rid="ref-4">4</xref>]. To date, data mining has been applied to various areas, such as the IoT [<xref ref-type="bibr" rid="ref-7">7</xref>,<xref ref-type="bibr" rid="ref-8">8</xref>], machine learning [<xref ref-type="bibr" rid="ref-9">9</xref>&#x2013;<xref ref-type="bibr" rid="ref-11">11</xref>], optimization [<xref ref-type="bibr" rid="ref-12">12</xref>,<xref ref-type="bibr" rid="ref-13">13</xref>], smart cities [<xref ref-type="bibr" rid="ref-14">14</xref>&#x2013;<xref ref-type="bibr" rid="ref-16">16</xref>], and wireless sensors networks [<xref ref-type="bibr" rid="ref-17">17</xref>,<xref ref-type="bibr" rid="ref-18">18</xref>], etc.</p>
<p>Frequent pattern mining (FPM) is an essential branch of data mining research aimed at mining frequently occurring patterns [<xref ref-type="bibr" rid="ref-4">4</xref>,<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-19">19</xref>]. For example, FPM has been used to find frequent customer purchases in transaction databases. With the development of FPM in various fields, several algorithms have been proposed for different types of applications, such as malware detection [<xref ref-type="bibr" rid="ref-20">20</xref>], machine learning [<xref ref-type="bibr" rid="ref-21">21</xref>], image classification [<xref ref-type="bibr" rid="ref-22">22</xref>], and activity detection [<xref ref-type="bibr" rid="ref-23">23</xref>]. These algorithms use different measures to identify meaningful patterns to meet the needs of the relevant field [<xref ref-type="bibr" rid="ref-4">4</xref>]. FPM algorithms can be used to determine the correlation between items or transactions in a database. However, they do not consider the order of precedence between transactions [<xref ref-type="bibr" rid="ref-24">24</xref>]. More specifically, FPM algorithms can identify a set of products that customers frequently buy periodically; however, identifying the order of each purchase is impossible. The sequence of events must be considered in practical applications, such as biomedicine [<xref ref-type="bibr" rid="ref-25">25</xref>], electronic information learning [<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-27">27</xref>], text analysis [<xref ref-type="bibr" rid="ref-28">28</xref>], website hit comments, and various other fields. For example, in online shopping applications, several customers make the same or different purchases at regular intervals. Analyzing sequential behavior over time can help merchants and e-commerce platforms to develop sales plans and improve sales strategies.</p>
<p>To solve the constraints of FPM, several researchers consider the temporal order between transactions (events) and offer the concept of sequential pattern mining (SPM). SPM mines frequent subsequences in a sequence of transactions. Unlike FPM, SPM considers the sequence of events or transactions [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-26">26</xref>,<xref ref-type="bibr" rid="ref-28">28</xref>&#x2013;<xref ref-type="bibr" rid="ref-30">30</xref>]. Although SPM algorithms can find frequently occurring patterns in a set of transaction sequences, they cannot be used to find patterns that repeat in a sequence over time, which could be useful. For example, analyzing products that numerous users repeatedly buy every few days or weeks from an online shopping database helps e-commerce platforms develop sales strategies. Research on periodic pattern mining has been conducted to find periodically occurring patterns in sequence databases [<xref ref-type="bibr" rid="ref-31">31</xref>&#x2013;<xref ref-type="bibr" rid="ref-37">37</xref>]. The task of periodic pattern mining is to find the events or number of events between two occurrences of a pattern in a sequence of transactions that do not exceed a user-defined maximum periodicity threshold. For example, if a customer goes to the gym once a week, and if the maximum period threshold is set to one week, the user goes to the gym at least once a week. Various algorithms have already been proposed for periodic pattern mining [<xref ref-type="bibr" rid="ref-36">36</xref>,<xref ref-type="bibr" rid="ref-38">38</xref>&#x2013;<xref ref-type="bibr" rid="ref-42">42</xref>],</p>
<p>Existing algorithms for periodic pattern mining focus on patterns occurring periodically in a sequence (one sequence corresponds to one customer). However, this is no longer sufficient to meet real needs. For example, there might be a need to determine the behavior of multiple customers who repeatedly purchase together. Recently, an algorithm called MPFPS was proposed [<xref ref-type="bibr" rid="ref-43">43</xref>] to find periodically frequent patterns in multiple sequences. More significantly, it extends finding periodic patterns in a single sequence to finding periodic patterns that are common to a group of sequences. MPFPS defines a new measure called the periodic standard deviation to guarantee a more stable period for patterns to appear in a sequence. However, MPFPS considers patterns that only appear once in a transaction and does not consider the internal utility (e.g., number of purchases) or external utility (e.g., value, importance) of a pattern. In practical applications, considering the importance and number of patterns based on user preferences is more helpful in discovering which patterns are of higher value in a user&#x2019;s periodic purchase behavior and mining significant patterns. For example, specific DNA molecules appear regularly in gene sequences [<xref ref-type="bibr" rid="ref-6">6</xref>,<xref ref-type="bibr" rid="ref-33">33</xref>]. However, each DNA molecule carries information of varying importance that directly affects the expression of certain external traits. Hence, the identification of DNA molecules that appear periodically plays an important role. Consequently, designing a new algorithm for mining high-utility periodic frequent patterns (HUPFPS) in multiple sequences is essential.</p>
<p>In this study, we proposed a new algorithm called MHUPFPS to mine HUPFPS in multiple sequences. In contrast to existing algorithms for periodic pattern mining, MHUPFPS considers the value (utility, profit) of patterns in a sequence database to mine patterns that are both periodic and of high value in practical applications. A new measure called the utility ratio is defined to evaluate the percentage of the utility of patterns in a sequence to identify patterns with a high utility percentage. Additionally, traditional algorithms for periodic pattern mining use a fixed number of supports to define the pattern frequency. This is obviously unpractical. In this study, sequence lengths in different databases had different characteristics. Furthermore, MHUPFPS uses a support rate to ensure the fair and effective mining of higher-utility patterns in sequences of different lengths. Moreover, to reduce the search space when MHUPFPS is performed, a new pruning strategy was designed. The key contributions of this study are as follows:
<list list-type="simple">
<list-item><label>1.</label><p>To guarantee the frequency of periodic patterns in each sequence, we defined a new measure: the support ratio. Further, we proposed a high-utility periodic sequence ratio, which defined the high-utility periodic frequent patterns in multiple sequences.</p></list-item>
<list-item><label>2.</label><p>A pruning strategy was proposed to prune the search space. A MHUPFPS was proposed based on this pruning strategy. The proposed algorithm uses the HUPFPS-list structure to avoid scanning the database repeatedly.</p></list-item>
<list-item><label>3.</label><p>Experimental results show that MHUPFPS is correct and efficient in filtering several non-high utility periodic frequent patterns.</p></list-item>
</list></p>
<p>The remainder of this paper is organized as follows. <xref ref-type="sec" rid="s2">Section 2</xref> reviews previous studies related to data mining, and <xref ref-type="sec" rid="s3">Section 3</xref> presents the necessary definitions. <xref ref-type="sec" rid="s4">Section 4</xref> describes the proposed algorithm MHUPFPS and <xref ref-type="sec" rid="s5">Section 5</xref> presents the experimental results. Finally, <xref ref-type="sec" rid="s6">Section 6</xref> concludes the paper.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<sec id="s2_1">
<label>2.1</label>
<title>Sequential Pattern Mining</title>
<p>To date, SPM has been a popular research direction that aims to mine frequent subsequences with at least a threshold minimum number of occurrences in a sequence [<xref ref-type="bibr" rid="ref-4">4</xref>,<xref ref-type="bibr" rid="ref-44">44</xref>]. The first algorithm used for sequential pattern mining was AprioriAll. The AprioriAll algorithm [<xref ref-type="bibr" rid="ref-29">29</xref>] is based on the Apriori algorithm: the mining process was the same. The difference between the two algorithms is that the AprioriAll algorithm considers the order of the last two elements of the pattern when generating the candidate patterns. An algorithm called GSP [<xref ref-type="bibr" rid="ref-44">44</xref>] has also been proposed, which is an extension of the AprioriAll algorithm. The algorithm introduces time constraints, sliding time windows, and classification hierarchy techniques to effectively reduce the number of candidate sequences that need to be scanned. Han et al. [<xref ref-type="bibr" rid="ref-45">45</xref>] proposed the concept of database prefix projection to reduce the cost of scanning the database when mining larger patterns. They then incorporated this concept into the newly proposed freespan algorithm. They further developed the PrefixSpan algorithm [<xref ref-type="bibr" rid="ref-46">46</xref>], which is an improved algorithm based on the freespan algorithm. The PrefixSpan algorithm only introduces the project suffix with the same prefix to obtain the project database. As the PrefixSpan algorithm can significantly reduce the search space and does not generate candidate sequences, the memory consumption of the PrefixSpan algorithm is reduced and relatively stable.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Utility-Based Pattern Mining</title>
<p>In recent years, high utility pattern mining (HUPM) has become popular in the field of data-mining. HUPM considers that each item in a transaction may have multiple purchase quantities, and each item has equal weight [<xref ref-type="bibr" rid="ref-47">47</xref>&#x2013;<xref ref-type="bibr" rid="ref-52">52</xref>]. The purpose of HUPM is to find high utility patterns in a transaction database, such as a customer who buys several items in a transaction. HUPM is an important branch of data mining [<xref ref-type="bibr" rid="ref-50">50</xref>,<xref ref-type="bibr" rid="ref-53">53</xref>&#x2013;<xref ref-type="bibr" rid="ref-55">55</xref>]. If the utility of a pattern is not less than a user-defined minimum utility threshold, it is considered to be a high-utility pattern (HUP). Several HUPM algorithms have been proposed, such as IHUP [<xref ref-type="bibr" rid="ref-50">50</xref>], UP-growth [<xref ref-type="bibr" rid="ref-54">54</xref>], UPgrowth&#x002B; [<xref ref-type="bibr" rid="ref-55">55</xref>], HUI-Miner [<xref ref-type="bibr" rid="ref-53">53</xref>], d2HUP [<xref ref-type="bibr" rid="ref-48">48</xref>], FHM [<xref ref-type="bibr" rid="ref-56">56</xref>], HUP-Miner [<xref ref-type="bibr" rid="ref-57">57</xref>], and EFIM [<xref ref-type="bibr" rid="ref-58">58</xref>]. The purpose of HUPM is to discover high utility item sets in transaction databases. HUPM is not only used in market basket analysis but also in website clickstream analysis and biomedical applications. Chan et al. [<xref ref-type="bibr" rid="ref-59">59</xref>] proposed a framework for mining the top-k closed utility patterns by combining positive and negative utilities to find the top-k HUP. Yao et al. [<xref ref-type="bibr" rid="ref-60">60</xref>] considered the problem of internal utility (number of purchases) and external utility (profit per unit) of a transaction to mine HUPs. Liu et al. [<xref ref-type="bibr" rid="ref-61">61</xref>] used the closure property under transaction weighting to discover HUPs and proposed a transaction-weighted utility (TWU) model. Liu et al. [<xref ref-type="bibr" rid="ref-53">53</xref>] also proposed an algorithm called HUI-miner, which uses a new utility list structure to calculate the internal and residual utility of the supported transaction patterns based on the utility list structure. As the challenges of HUPM have been further studied, HUPM algorithms have started to consider the order and utility of transactions, and countless high-utility sequential pattern mining algorithms have been proposed, such as USpan [<xref ref-type="bibr" rid="ref-62">62</xref>], ProUM [<xref ref-type="bibr" rid="ref-63">63</xref>], and HUSP-ULL [<xref ref-type="bibr" rid="ref-64">64</xref>].</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Periodic Pattern Mining</title>
<p>The FPM has been extended from finding periodic patterns in a single sequence to finding those that are common in multiple sequences. In a sequence, a pattern that appears frequently and has two consecutive appearances with a period interval of less than the maximum period threshold is said to be periodic. The PFPM task was defined in a transaction-sequence database by Tanbeer et al. [<xref ref-type="bibr" rid="ref-31">31</xref>]. Several variants of periodic mining patterns in a single sequence have been proposed based on their approach [<xref ref-type="bibr" rid="ref-33">33</xref>&#x2013;<xref ref-type="bibr" rid="ref-38">38</xref>]. For example, an algorithm called MTKPP was used to mine the top-k frequently occurring patterns in a single sequence [<xref ref-type="bibr" rid="ref-32">32</xref>&#x2013;<xref ref-type="bibr" rid="ref-34">34</xref>]. Periodic patterns continue to be studied in depth, and some approaches consider the utility (profit) of the periodic patterns. For example, an algorithm called PHM was proposed to find items that are frequently purchased and highly profitable, locating patterns that occur periodically in a single sequence and are of high utility [<xref ref-type="bibr" rid="ref-38">38</xref>]. Additionally, an algorithm called PHUSPM was designed to mine high-utility periodic patterns in multiple-symbol sequences [<xref ref-type="bibr" rid="ref-36">36</xref>]. The PHUSPM algorithm considers a set of sequences as one sequence and mines periodic patterns using the same periodicity measure as for a single sequence. Recently, Philippe et al. proposed two new algorithms for periodic pattern mining in multiple sequences: MPFPS [<xref ref-type="bibr" rid="ref-43">43</xref>] and MRCPPS [<xref ref-type="bibr" rid="ref-65">65</xref>]. These algorithms proposed a new measure called the periodic standard deviation, which was used to evaluate the periodicity of the patterns in the sequence. For MPFPS [<xref ref-type="bibr" rid="ref-43">43</xref>], another new measure was proposed to define a common periodic pattern in multiple sequences: the sequence periodicity ratio (SPR). The MRCPPS algorithm identifies strongly correlated periodic patterns using the bond correlation measure, and defines a new pattern called rare correlated periodic patterns. Recently, the SPP-Growth [<xref ref-type="bibr" rid="ref-66">66</xref>] algorithm was proposed to determine stable periodic patterns in transaction databases with timestamps.</p>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>Problems of Existing Research</title>
<p>Most existing research on periodic patterns does not mine PFPS common to a set of sequences. To the best of our knowledge, MPFPS and MRCPPS are the only recently proposed algorithms that mine PFPS in multiple sequences. However, these algorithms assume that each item has the same weight or value and only appears once in a transaction; this obviously has limitations for practical applications. In contrast, current algorithms for PFPS use a measure called support to define the frequency of patterns; however, this measure does not apply to data with different characteristics.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Definition and Problem Statement</title>
<p>In this section, we first present the definitions of periodic and utility patterns in a single sequence [<xref ref-type="bibr" rid="ref-67">67</xref>]. Then, we consider the corresponding definitions for multiple sequences [<xref ref-type="bibr" rid="ref-43">43</xref>]. The terms pattern and itemset are used alternately in the following descriptions.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Definitions for a Single Sequence</title>
<p><bold>Definition 3.1. </bold>Assume that there is a set of items (symbols) <italic>I</italic> in a sequence database <italic>D</italic>. An itemset <italic>X</italic><inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> is a subset of <italic>I</italic>, i.e., <italic>X</italic><inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <italic>I</italic>. An itemset <italic>X</italic> with <italic>k</italic> distinct items {<italic>i</italic><sub>1</sub>, <italic>i</italic><sub>2</sub>,<inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <italic>i</italic><inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi></mml:mi><mml:mi>k</mml:mi></mml:msub></mml:math></inline-formula>} is called a <italic>k</italic>-itemset. A sequence <italic>S</italic> is an ordered list of itemsets <italic>S</italic> &#x003D; {<italic>T</italic><sub>1</sub>, <italic>T</italic><inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:msub><mml:mi></mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <italic>T</italic><inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>}, where <italic>T</italic><inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">v</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <italic>I</italic> (1 <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>v</italic> <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>j</italic>), and <italic>T</italic><inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">v</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> represents a transaction in the sequence, where <italic>v</italic> is a unique transaction identifier in that sequence. A sequence database <italic>D</italic> is an ordered set containing <italic>n</italic> sequences, i.e., <italic>D</italic> &#x003D; {<inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>,<inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mi>S</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:math></inline-formula>}. Sequence <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> (1 <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>i</italic> <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>n</italic>) is defined as the <italic>i</italic>-th sequence in <italic>D</italic>, where <italic>i</italic> is a unique sequence identifier. The itemset <italic>X</italic> appears in a sequence <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>S</mml:mi><mml:mi>a</mml:mi></mml:msub></mml:math></inline-formula> &#x003D; {<italic>T</italic><sub>1</sub>, <italic>T</italic><inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mi></mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>,</mml:mo><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <italic>T</italic><inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">k</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>}, i.e., <italic>X</italic> <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msub><mml:mi>S</mml:mi><mml:mi>a</mml:mi></mml:msub></mml:math></inline-formula>, where <italic>X</italic> is <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mi>T</mml:mi><mml:mi>d</mml:mi></mml:msub></mml:math></inline-formula> (1 <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>d</italic> <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>k</mml:mi></mml:math></inline-formula>). This itemset appears in the transaction <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 1. </bold>Consider a set of different items <italic>I</italic> &#x003D; {<italic>a</italic>, <italic>b</italic>, <italic>c</italic>, <italic>d</italic>, <italic>e</italic>}, which represent different types of items sold in a supermarket. As shown in <xref ref-type="table" rid="table-1">Table 1</xref>, sequence <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> contains five transactions. The first transaction (<italic>a</italic>:6, <italic>b</italic>:8) indicates that the first transaction in sequence <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> contains two itemsets {<inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>a</mml:mi></mml:math></inline-formula>} and {<inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mi>b</mml:mi></mml:math></inline-formula>}. The number of occurrences of {<inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mi>a</mml:mi></mml:math></inline-formula>} in the transaction is six and that of {<inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>b</mml:mi></mml:math></inline-formula>} is eight. {<italic>a</italic>} is called a <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mn>1</mml:mn></mml:math></inline-formula>-itemset because it contains only one item, <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>a</mml:mi></mml:math></inline-formula>.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>An example sequence</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<tbody>
<tr>
<td><italic>S</italic><sub>0</sub></td>
<td>(<italic>a</italic>:6, <italic>b</italic>:8), (<italic>a</italic>:4, <italic>c</italic>:9, <italic>e</italic>:10), (<italic>a</italic>:8, <italic>b</italic>:11, <italic>c</italic>:7, <italic>d</italic>:4), (<italic>a</italic>:5, <italic>b</italic>:3, <italic>c</italic>:12), (<italic>b</italic>:4, <italic>d</italic>:3)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Definition 3.2. </bold>Consider an itemset <italic>X</italic> in <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>. The ordered list of transactions in <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> containing <italic>X</italic> is defined as <italic>TR</italic>(<italic>X</italic>, <italic>S</italic>) &#x003D; <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>,<inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>. Let <italic>T</italic><inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="italic">z</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> and <italic>T</italic><inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">g</mml:mtext></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mtext mathvariant="italic">z</mml:mtext></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> (1 <inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> z <inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> k-1) be two consecutive occurrences in <inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>. The formula for calculating the period of two consecutive occurrences of a transaction containing <italic>X</italic> is <inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi></mml:math></inline-formula>(<inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>z</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula>) &#x003D; <italic>g</italic>(<italic>z</italic>&#x002B;1) &#x2212; <italic>g</italic>(<italic>z</italic>). The period of <italic>X</italic> in <inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is <italic>pr</italic>(<italic>X</italic>, <inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo></mml:math></inline-formula> {<inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>,<inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>}, where <inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> &#x2212; <inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> &#x2212; <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>g</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>,<inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:math></inline-formula> &#x003D; <italic>g</italic>(<italic>k</italic>&#x002B;1) &#x2212; <italic>g</italic>(<italic>k</italic>). <italic>g</italic>(<italic>k</italic>) is the unique identifier of the transaction; when <italic>X</italic> appears, <italic>g</italic>(0) &#x003D; 0 and <italic>g</italic>(<italic>k</italic>&#x002B;1) &#x003D; |<italic>S</italic><inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula>. |<italic>S</italic><inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula>; the latter denotes the length of <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 2. </bold>In the sequence <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> shown in <xref ref-type="table" rid="table-1">Table 1</xref>, the itemset {<italic>a</italic>} appears in the transactions <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:msub><mml:mi>T</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:msub><mml:mi>T</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:msub><mml:mi>T</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>; thus, <italic>TR</italic>({<italic>a</italic>}, <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; {<inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:msub><mml:mi>T</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:msub><mml:mi>T</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:msub><mml:mi>T</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>}. The period {<italic>a</italic>} in <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> is denoted by <italic>pr</italic>({<italic>a</italic>}, <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; {1, 1, 1, 1, 1}.</p>

<p><bold>Definition 3.3. </bold>In a sequence <italic>S</italic>, an itemset <italic>X</italic> may appear in multiple transactions, and the number of transactions in a sequence <italic>S</italic> containing <italic>X</italic> is defined as <italic>sup</italic>(<italic>X</italic>, <italic>S</italic>) &#x003D; |<italic>TR</italic>(<italic>X</italic>, <italic>S</italic>)|.</p>
<p><bold>Example 3. </bold>In the sequence <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> shown in <xref ref-type="table" rid="table-1">Table 1</xref>, the itemset {<italic>a</italic>, <italic>c</italic>} appears in <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:msub><mml:mrow><mml:mtext mathvariant="italic">T</mml:mtext></mml:mrow><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:msub><mml:mrow><mml:mtext mathvariant="italic">T</mml:mtext></mml:mrow><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:msub><mml:mrow><mml:mtext mathvariant="italic">T</mml:mtext></mml:mrow><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>; therefore, the number of occurrences of {<italic>a</italic>, <italic>c</italic>} supported for <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> is represented as <italic>sup</italic>({<italic>a</italic>, <italic>c</italic>}, <italic>S</italic><sub>0</sub>) &#x003D; 3.</p>

<p><bold>Definition 3.4. </bold>Each item <italic>i</italic> has a unit profit, denoted as <italic>pl</italic>(<italic>i</italic>), which represents its importance. The unit profit for each item uses a dedicated profit list: profit &#x003D; {<italic>pl</italic>(<italic>i</italic><sub>1</sub>), <italic>pl</italic>(<italic>i</italic><sub>2</sub>), <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <italic>pl</italic>(<italic>i</italic><inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">m</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>)}. The profit of item <italic>i</italic><inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> in <italic>T</italic><inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">q</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> in a sequence <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:msub><mml:mi>S</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:math></inline-formula> is defined as <italic>u</italic>(<italic>i</italic><inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>T</italic><inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">q</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>S</italic><inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>) &#x003D; <italic>q</italic>(<italic>i</italic><inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>T</italic><inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">q</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>S</italic><inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>) <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> <italic>pl</italic>(<italic>i</italic><inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>), where <italic>q</italic>(<italic>i</italic><inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>T</italic><inline-formula id="ieqn-103"><mml:math id="mml-ieqn-103"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">q</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>, <italic>S</italic><inline-formula id="ieqn-104"><mml:math id="mml-ieqn-104"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>) is the number of itemsets <italic>i</italic><inline-formula id="ieqn-105"><mml:math id="mml-ieqn-105"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">j</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> in <italic>T</italic><inline-formula id="ieqn-106"><mml:math id="mml-ieqn-106"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">q</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> in <italic>S</italic><inline-formula id="ieqn-107"><mml:math id="mml-ieqn-107"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">n</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 4. </bold>In <xref ref-type="table" rid="table-2">Table 2</xref>, the unit profits of the itemsets {<italic>a</italic>}, {<italic>b</italic>}, {<italic>c</italic>}, {<italic>d</italic>}, {<italic>e</italic>} are {<italic>pl</italic>(<italic>a</italic>): 76, <italic>pl</italic>(<italic>b</italic>): 65, <italic>pl</italic>(<italic>c</italic>): 35, <italic>pl</italic>(<italic>d</italic>): 41, <italic>pl</italic>(<italic>e</italic>): 118}, respectively. For <inline-formula id="ieqn-108"><mml:math id="mml-ieqn-108"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-109"><mml:math id="mml-ieqn-109"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> considered in <xref ref-type="table" rid="table-3">Table 3</xref>, {<italic>b</italic>} in <italic>T</italic><sub>4</sub> in <italic>S</italic><sub>1</sub> and {<italic>b</italic>, <italic>d</italic>} in <italic>T</italic><sub>2</sub> in <italic>S</italic><sub>2</sub> have <italic>u</italic>({<italic>b</italic>}, <italic>T</italic><sub>4</sub>, <italic>S</italic><sub>1</sub>) &#x003D; 65 <inline-formula id="ieqn-110"><mml:math id="mml-ieqn-110"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 5 &#x003D; 325 and <italic>u</italic>({<italic>b</italic>, <italic>d</italic>}, <italic>T</italic><sub>2</sub>, <italic>S</italic><sub>2</sub>) &#x003D; 65 <inline-formula id="ieqn-111"><mml:math id="mml-ieqn-111"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 8 &#x002B; 41 <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 3 &#x003D; 643, respectively.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Profit table for the example sequence</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Item</th>
<th>Profit</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>a</italic></td>
<td>76</td>
</tr>
<tr>
<td><italic>b</italic></td>
<td>65</td>
</tr>
<tr>
<td><italic>c</italic></td>
<td>35</td>
</tr>
<tr>
<td><italic>d</italic></td>
<td>41</td>
</tr>
<tr>
<td><italic>e</italic></td>
<td>118</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>An example sequence</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Sid</th>
<th>Sequence</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>S</italic><sub>1</sub></td>
<td><inline-formula id="ieqn-113"><mml:math id="mml-ieqn-113"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula>(<italic>a</italic>:6, <italic>b</italic>:10, <italic>c</italic>:10), (<italic>b</italic>:8, <italic>c</italic>:8, <italic>d</italic>:13), (<italic>a</italic>:5, <italic>b</italic>:6), (<italic>a</italic>:8, <italic>b</italic>:5, <italic>e</italic>:8), (<italic>a</italic>:4, <italic>b</italic>:7, <italic>c</italic>:6, <italic>d</italic>:10)<inline-formula id="ieqn-114"><mml:math id="mml-ieqn-114"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula></td>
</tr>
<tr>
<td><italic>S</italic><sub>2</sub></td>
<td><inline-formula id="ieqn-115"><mml:math id="mml-ieqn-115"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula>(<italic>d</italic>:14), (<italic>a</italic>:5, <italic>b</italic>:8, <italic>c</italic>:3, <italic>d</italic>:3), (<italic>a</italic>:6, <italic>c</italic>:15, <italic>d</italic>:8), (<italic>a</italic>:9, <italic>b</italic>:9, <italic>d</italic>:15), (<italic>a</italic>:10, <italic>b</italic>:6, <italic>c</italic>:14, <italic>e</italic>:13))<inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula></td>
</tr>
<tr>
<td><italic>S</italic><sub>3</sub></td>
<td><inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula>(<italic>b</italic>:7, <italic>d</italic>:10), (<italic>a</italic>:8, <italic>d</italic>:4), (<italic>a</italic>:5, <italic>c</italic>:15, <italic>d</italic>:12), (<italic>b</italic>:3, <italic>d</italic>:12, <italic>e</italic>:3), (<italic>a</italic>:9, <italic>b</italic>:11, <italic>d</italic>:12)<inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula></td>
</tr>
<tr>
<td><italic>S</italic><sub>4</sub></td>
<td><inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula>(<italic>a</italic>:6, <italic>c</italic>:12, <italic>d</italic>:14), (<italic>a</italic>:6, <italic>b</italic>:2, <italic>d</italic>:8), (<italic>a</italic>:9, <italic>c</italic>:6, <italic>d</italic>:6), (<italic>b</italic>:2, <italic>d</italic>:9), (<italic>b</italic>:5, <italic>d</italic>:8, <italic>e</italic>:6)<inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Definition 3.5. </bold>The total utility of a transaction <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula> in <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is defined as <italic>tu</italic>(<inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula>) &#x003D; <inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow></mml:msubsup><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow><mml:mi>j</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, where <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:msub><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula> is the <italic>j</italic>-th item in <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 5. </bold>The total utility of <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> in the sequence <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> in <xref ref-type="table" rid="table-3">Table 3</xref> is <italic>tu</italic>(<inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; <italic>u</italic>(<italic>a</italic>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>u</italic>(<italic>b</italic>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>u</italic>(<italic>c</italic>, <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 76 <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 6 &#x002B; 65 <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 10 &#x002B; 35 <inline-formula id="ieqn-136"><mml:math id="mml-ieqn-136"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 10 &#x003D; 1456.</p>
<p><bold>Definition 3.6. </bold>The total utility of <italic>X</italic> in <italic>S</italic> is defined as <inline-formula id="ieqn-137"><mml:math id="mml-ieqn-137"><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-138"><mml:math id="mml-ieqn-138"><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>s</mml:mi><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow></mml:msubsup><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> where <italic>X</italic> <inline-formula id="ieqn-139"><mml:math id="mml-ieqn-139"><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mo>&#x2227;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>S</mml:mi></mml:math></inline-formula>.</p>
<p><bold>Example 6. </bold>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, the total utility of {<italic>a</italic>, <italic>b</italic>} in <inline-formula id="ieqn-140"><mml:math id="mml-ieqn-140"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> is <italic>u</italic>({<italic>a</italic>, <italic>b</italic>}, <inline-formula id="ieqn-141"><mml:math id="mml-ieqn-141"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; <italic>u</italic>({<italic>a</italic>, <italic>b</italic>}, <inline-formula id="ieqn-142"><mml:math id="mml-ieqn-142"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-143"><mml:math id="mml-ieqn-143"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x002B; <italic>u</italic>({<italic>a</italic>, <italic>b</italic>}, <inline-formula id="ieqn-144"><mml:math id="mml-ieqn-144"><mml:msub><mml:mi>T</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>u</italic>({<italic>a</italic>, <italic>b</italic>}, <inline-formula id="ieqn-145"><mml:math id="mml-ieqn-145"><mml:msub><mml:mi>T</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-146"><mml:math id="mml-ieqn-146"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x002B; <italic>u</italic>({<italic>a</italic>, <italic>b</italic>}, <italic>T</italic><sub>5</sub>, <italic>S</italic><sub>1</sub>) &#x003D; 76 <inline-formula id="ieqn-147"><mml:math id="mml-ieqn-147"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 6 &#x002B; 65 <inline-formula id="ieqn-148"><mml:math id="mml-ieqn-148"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 10 &#x002B; 76 <inline-formula id="ieqn-149"><mml:math id="mml-ieqn-149"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 5 &#x002B; 65 <inline-formula id="ieqn-150"><mml:math id="mml-ieqn-150"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 6 &#x002B; 76 <inline-formula id="ieqn-151"><mml:math id="mml-ieqn-151"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 8 &#x002B; 65 <inline-formula id="ieqn-152"><mml:math id="mml-ieqn-152"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 5 &#x002B; 76 <inline-formula id="ieqn-153"><mml:math id="mml-ieqn-153"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 4 &#x002B; 65 <inline-formula id="ieqn-154"><mml:math id="mml-ieqn-154"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 7 &#x003D; 3568.</p>

<p><bold>Definition 3.7. </bold>In a sequence database <italic>D</italic>, the total utility of <inline-formula id="ieqn-155"><mml:math id="mml-ieqn-155"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is defined as <italic>su</italic> (<inline-formula id="ieqn-156"><mml:math id="mml-ieqn-156"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>) &#x003D; <inline-formula id="ieqn-157"><mml:math id="mml-ieqn-157"><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:mrow></mml:msubsup><mml:mi>t</mml:mi><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for <inline-formula id="ieqn-158"><mml:math id="mml-ieqn-158"><mml:msub><mml:mi>T</mml:mi><mml:mi>q</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 7. </bold>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, the total utility of <italic>S</italic><sub>2</sub> is <italic>su</italic>(<italic>S</italic><sub>2</sub>) &#x003D; <italic>tu</italic>(<italic>T</italic><sub>1</sub>, <italic>S</italic><sub>2</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>2</sub>, <italic>S</italic><sub>2</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>3</sub>, <italic>S</italic><sub>2</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>4</sub>, <italic>S</italic><sub>2</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>5</sub>, <italic>S</italic><sub>2</sub>) &#x003D; 574 &#x002B; 1128 &#x002B; 1309 &#x002B; 1884 &#x002B; 3174 &#x003D; 8069.</p>

<p><bold>Definition 3.8. </bold>If a sequence <inline-formula id="ieqn-159"><mml:math id="mml-ieqn-159"><mml:msub><mml:mi>S</mml:mi><mml:mi>B</mml:mi></mml:msub></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-160"><mml:math id="mml-ieqn-160"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-161"><mml:math id="mml-ieqn-161"><mml:msub><mml:mi>T</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-162"><mml:math id="mml-ieqn-162"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-163"><mml:math id="mml-ieqn-163"><mml:msub><mml:mi>T</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:math></inline-formula><inline-formula id="ieqn-164"><mml:math id="mml-ieqn-164"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula> contains another sequence <inline-formula id="ieqn-165"><mml:math id="mml-ieqn-165"><mml:msub><mml:mi>S</mml:mi><mml:mi>A</mml:mi></mml:msub></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-166"><mml:math id="mml-ieqn-166"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula><inline-formula id="ieqn-167"><mml:math id="mml-ieqn-167"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-168"><mml:math id="mml-ieqn-168"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-169"><mml:math id="mml-ieqn-169"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-170"><mml:math id="mml-ieqn-170"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula>, then it must satisfy the existence of integers 1 <inline-formula id="ieqn-171"><mml:math id="mml-ieqn-171"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-172"><mml:math id="mml-ieqn-172"><mml:msub><mml:mi>k</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-173"><mml:math id="mml-ieqn-173"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-174"><mml:math id="mml-ieqn-174"><mml:msub><mml:mi>k</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-175"><mml:math id="mml-ieqn-175"><mml:mo>&#x2264;</mml:mo><mml:mo>&#x2026;</mml:mo><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-176"><mml:math id="mml-ieqn-176"><mml:msub><mml:mi>k</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-177"><mml:math id="mml-ieqn-177"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-178"><mml:math id="mml-ieqn-178"><mml:mi>l</mml:mi></mml:math></inline-formula> such that <inline-formula id="ieqn-179"><mml:math id="mml-ieqn-179"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-180"><mml:math id="mml-ieqn-180"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-181"><mml:math id="mml-ieqn-181"><mml:msub><mml:mi>T</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-182"><mml:math id="mml-ieqn-182"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-183"><mml:math id="mml-ieqn-183"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-184"><mml:math id="mml-ieqn-184"><mml:msub><mml:mi>T</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-185"><mml:math id="mml-ieqn-185"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-186"><mml:math id="mml-ieqn-186"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-187"><mml:math id="mml-ieqn-187"><mml:msub><mml:mi>T</mml:mi><mml:mi>l</mml:mi></mml:msub></mml:math></inline-formula> is defined as <inline-formula id="ieqn-188"><mml:math id="mml-ieqn-188"><mml:msub><mml:mi>S</mml:mi><mml:mi>A</mml:mi></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-189"><mml:math id="mml-ieqn-189"><mml:mo>&#x2286;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-190"><mml:math id="mml-ieqn-190"><mml:msub><mml:mi>S</mml:mi><mml:mi>B</mml:mi></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Example 8. </bold>The sequence <inline-formula id="ieqn-191"><mml:math id="mml-ieqn-191"><mml:msub><mml:mi>S</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula> in <xref ref-type="table" rid="table-1">Table 1</xref> contains <inline-formula id="ieqn-192"><mml:math id="mml-ieqn-192"><mml:mo fence="false" stretchy="false">&#x27E8;</mml:mo></mml:math></inline-formula>(<italic>a</italic>: 6, <italic>b</italic>: 8), (<italic>a</italic>: 4, <italic>c</italic>: 9), (<italic>a</italic>: 8, <italic>d</italic>: 4)<inline-formula id="ieqn-193"><mml:math id="mml-ieqn-193"><mml:mo fence="false" stretchy="false">&#x27E9;</mml:mo></mml:math></inline-formula>.</p>

<p><bold>Definition 3.9. </bold>In a sequence database <italic>D</italic>, the standard deviation of the period of the itemset <italic>X</italic> in the sequence <italic>S</italic> is denoted by <italic>stanDev</italic> (<italic>X</italic>, <italic>S</italic>).</p>
<p><bold>Example 9. </bold>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, the period of the itemset {<italic>a</italic>} in sequence <italic>S</italic><sub>1</sub> is <italic>pr</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; {1, 2, 1, 1, 0}. The average period is <italic>avgPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; (1 &#x002B; 2 &#x002B; 1 &#x002B; 1 &#x002B; 0)/5 &#x003D; 1. The standard deviation of the period is <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><inline-formula id="ieqn-194"><mml:math id="mml-ieqn-194"><mml:msub><mml:mi></mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-195"><mml:math id="mml-ieqn-195"><mml:msqrt><mml:mo stretchy="false">[</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>2</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>5</mml:mn></mml:msqrt></mml:math></inline-formula> &#x003D; 0.63.</p>

</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Definitions for Multiple Sequences</title>
<p>In the following paragraphs, we described how to combine the utility and periodicity of patterns and apply them to multiple sequences. In addition to the definitions presented in previous works, we defined three measures: utility ratio (Definition 3.10), support ratio (Definition 3.11), and high-utility periodic sequence ratio (Definition 3.14). The utility ratio defines the utility percentage of a pattern in a sequence. The support ratio guarantees the frequency of the periodic patterns in sequences of different lengths. The high-utility periodic sequence ratio is used to discover frequent patterns of high-utility periods in multiple sequences.</p>
<p><bold>Definition 3.10. </bold>Let the total utility of an itemset <italic>X</italic> in a sequence <italic>S</italic> be <inline-formula id="ieqn-196"><mml:math id="mml-ieqn-196"><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and the total utility of <italic>S</italic> be <inline-formula id="ieqn-197"><mml:math id="mml-ieqn-197"><mml:mi>s</mml:mi><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. Then, the utility ratio is <inline-formula id="ieqn-198"><mml:math id="mml-ieqn-198"><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> &#x003D; <inline-formula id="ieqn-199"><mml:math id="mml-ieqn-199"><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>/<inline-formula id="ieqn-200"><mml:math id="mml-ieqn-200"><mml:mi>s</mml:mi><mml:mi>u</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. Given a user-defined threshold <italic>minHuRa</italic>, namely, the minimum high-utility ratio, if <inline-formula id="ieqn-201"><mml:math id="mml-ieqn-201"><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-202"><mml:math id="mml-ieqn-202"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-203"><mml:math id="mml-ieqn-203"><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>H</mml:mi><mml:mi>u</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi></mml:math></inline-formula> for an itemset <italic>X</italic>, then <italic>X</italic> is defined as a high-utility itemset in the sequence <italic>S</italic>.</p>
<p><bold>Example 10. </bold><xref ref-type="table" rid="table-3">Table 3</xref> outlines an example with <inline-formula id="ieqn-204"><mml:math id="mml-ieqn-204"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> and <italic>minHuRa</italic> &#x003D; 0.25. The utility of an itemset {<italic>a</italic>} in <inline-formula id="ieqn-205"><mml:math id="mml-ieqn-205"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula> is <italic>u</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; <italic>tu</italic>(<italic>T</italic><sub>1</sub>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>3</sub>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>4</sub>, <italic>S</italic><sub>1</sub>) &#x002B; <italic>tu</italic>(<italic>T</italic><sub>5</sub>, <italic>S</italic><sub>1</sub>) &#x003D; 456 &#x002B; 380 &#x002B; 608 &#x002B; 304 &#x003D; 1748. The total utility of <italic>S</italic><sub>1</sub> is <italic>su</italic>(<italic>S</italic><sub>1</sub>) &#x003D; 6815, and that of the itemset {<italic>a</italic>} in sequence <italic>S</italic><sub>1</sub> is <italic>utiRa</italic>({<italic>a</italic>}, <inline-formula id="ieqn-206"><mml:math id="mml-ieqn-206"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 1748/6815 &#x003D; 0.256. Because 0.256 <inline-formula id="ieqn-207"><mml:math id="mml-ieqn-207"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>, the itemset {<italic>a</italic>} is a high-utility itemset in sequence <inline-formula id="ieqn-208"><mml:math id="mml-ieqn-208"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>.</p>

<p><bold>Definition 3.11. </bold>The support ratio of an itemset <italic>X</italic> in a sequence <italic>S</italic> is defined as <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) &#x003D; <italic>sup</italic>({<italic>X</italic>}, <italic>S</italic>)/|<italic>S</italic>|, where |<italic>S</italic>| is the total number of transactions in <italic>S</italic>. Given the minimum support ratio threshold, <inline-formula id="ieqn-209"><mml:math id="mml-ieqn-209"><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>S</mml:mi><mml:mi>u</mml:mi><mml:mi>q</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi></mml:math></inline-formula>, if <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-210"><mml:math id="mml-ieqn-210"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, then <italic>X</italic> in <italic>S</italic> has a high support ratio.</p>
<p><bold>Example 11. </bold>The user-defined threshold is set to be <italic>minSupRa</italic> &#x003D; 0.6. In <xref ref-type="table" rid="table-3">Table 3</xref>, the itemset {<italic>a</italic>} appears in <italic>T</italic><sub>1</sub>, <italic>T</italic><sub>3</sub>, <italic>T</italic><sub>4</sub>, and <italic>T</italic><sub>5</sub> in <italic>S</italic><sub>1</sub>. The support for the itemset <italic>X</italic> in <italic>S</italic><sub>1</sub> is <italic>sup</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; 4. The support ratio of {<italic>a</italic>} in <italic>S</italic><sub>1</sub> is <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; <italic>sup</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>)/|<italic>S</italic><inline-formula id="ieqn-211"><mml:math id="mml-ieqn-211"><mml:msub><mml:mi></mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula> &#x003D; 0.8. Because 0.8 <inline-formula id="ieqn-212"><mml:math id="mml-ieqn-212"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>X</italic> in <italic>S</italic><sub>1</sub> has a high-support ratio pattern.</p>

<p><bold>Definition 3.12. </bold>Let there be four user-defined thresholds, <italic>minSupRa</italic>, <italic>maxPr</italic>, <italic>maxStd</italic>, and <italic>minHuRa</italic>. If an itemset <italic>X</italic> in a sequence <italic>S</italic> satisfies <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-213"><mml:math id="mml-ieqn-213"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-214"><mml:math id="mml-ieqn-214"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, <italic>stanDev</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-215"><mml:math id="mml-ieqn-215"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic>, and <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-216"><mml:math id="mml-ieqn-216"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>, then <italic>X</italic> in <italic>S</italic> is a high-utility periodic frequent pattern.</p>
<p><bold>Example 12. </bold>Let <italic>minSupRa</italic> &#x003D; 0.6, <italic>maxPr</italic> &#x003D; 3, <italic>maxStd</italic> &#x003D; 1, and <italic>minHuRa</italic> &#x003D; 0.2. Considering <inline-formula id="ieqn-217"><mml:math id="mml-ieqn-217"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula> in <xref ref-type="table" rid="table-3">Table 3</xref>, the itemset {<italic>a</italic>, <italic>d</italic>} appears in <inline-formula id="ieqn-218"><mml:math id="mml-ieqn-218"><mml:msub><mml:mi>T</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-219"><mml:math id="mml-ieqn-219"><mml:msub><mml:mi>T</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-220"><mml:math id="mml-ieqn-220"><mml:msub><mml:mi>T</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>. Thus, <italic>supRa</italic>({<italic>a</italic>, <italic>d</italic>}, <inline-formula id="ieqn-221"><mml:math id="mml-ieqn-221"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 0.6 <inline-formula id="ieqn-222"><mml:math id="mml-ieqn-222"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>stanDev</italic>({<italic>a</italic>, <italic>d</italic>}, <inline-formula id="ieqn-223"><mml:math id="mml-ieqn-223"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 0.433 <inline-formula id="ieqn-224"><mml:math id="mml-ieqn-224"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic>, <italic>utiRa</italic>({<italic>a</italic>, <italic>d</italic>}, <inline-formula id="ieqn-225"><mml:math id="mml-ieqn-225"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 0.32 <inline-formula id="ieqn-226"><mml:math id="mml-ieqn-226"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>, and <italic>maxPer</italic>{2, 1, 1, 1} &#x003D; 2 <inline-formula id="ieqn-227"><mml:math id="mml-ieqn-227"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>; thus, the itemset {<italic>a</italic>, <italic>d</italic>} is a high-utility periodic frequent pattern in <inline-formula id="ieqn-228"><mml:math id="mml-ieqn-228"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>.</p>

<p><bold>Definition 3.13. </bold>In a sequence database <italic>D</italic>, the set of sequences for which an itemset <italic>X</italic> satisfies <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-229"><mml:math id="mml-ieqn-229"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>stanDev</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-230"><mml:math id="mml-ieqn-230"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic>, <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-231"><mml:math id="mml-ieqn-231"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, and <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-232"><mml:math id="mml-ieqn-232"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> is defined as <italic>huPrSeq</italic>(<italic>X</italic>, <italic>D</italic>) &#x003D; {<italic>S</italic>|<italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-233"><mml:math id="mml-ieqn-233"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-234"><mml:math id="mml-ieqn-234"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-235"><mml:math id="mml-ieqn-235"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-236"><mml:math id="mml-ieqn-236"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>stanDev</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-237"><mml:math id="mml-ieqn-237"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic> <inline-formula id="ieqn-238"><mml:math id="mml-ieqn-238"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-239"><mml:math id="mml-ieqn-239"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-240"><mml:math id="mml-ieqn-240"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-241"><mml:math id="mml-ieqn-241"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>}.</p>
<p><bold>Example 13. </bold>In <xref ref-type="table" rid="table-3">Table 3</xref>, the itemset {<italic>d</italic>} satisfies <italic>supRa</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-242"><mml:math id="mml-ieqn-242"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-243"><mml:math id="mml-ieqn-243"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, <italic>stanDev</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-244"><mml:math id="mml-ieqn-244"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic>, and <italic>utiRa</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-245"><mml:math id="mml-ieqn-245"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> in <inline-formula id="ieqn-246"><mml:math id="mml-ieqn-246"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-247"><mml:math id="mml-ieqn-247"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-248"><mml:math id="mml-ieqn-248"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>. Thus, the <italic>huPrSeq</italic> of {<italic>d</italic>} is <italic>huPrSeq</italic>({<italic>d</italic>}) &#x003D; {<inline-formula id="ieqn-249"><mml:math id="mml-ieqn-249"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-250"><mml:math id="mml-ieqn-250"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-251"><mml:math id="mml-ieqn-251"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>}.</p>

<p><bold>Definition 3.14. </bold>In a sequence database <italic>D</italic>, the number of sequences in the set <italic>huPrSeq</italic>(<italic>X</italic>) is |<italic>huPrSeq</italic>(<italic>X</italic>)| and the high utility periodic sequence ratio of <italic>X</italic> in <italic>D</italic> is <italic>huSeqRa</italic>(<italic>X</italic>) &#x003D; |<italic>huPrSeq</italic>(<italic>X</italic>)|/|<italic>D</italic>|, where |<italic>D</italic>| is the number of sequences in <italic>D</italic>. Given a user-defined threshold <italic>minSeqRa</italic>, if <italic>huSeqRa</italic>(<italic>X</italic>) <inline-formula id="ieqn-252"><mml:math id="mml-ieqn-252"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic>, then <italic>X</italic> is a high utility periodic frequent pattern in <italic>D</italic>.</p>
<p><bold>Example 14. </bold>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, let <italic>minSupRa</italic> &#x003D; 0.6, <italic>maxPr</italic> &#x003D; 3, <italic>stanDev</italic> &#x003D; 1, and <italic>minHuRa</italic> &#x003D; 0.2. The pattern {<italic>a</italic>, <italic>d</italic>} in <inline-formula id="ieqn-253"><mml:math id="mml-ieqn-253"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-254"><mml:math id="mml-ieqn-254"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-255"><mml:math id="mml-ieqn-255"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula> is a high utility periodic frequent pattern, and the sequence set is <italic>huPrSeq</italic>(<italic>X</italic>) &#x003D; {<inline-formula id="ieqn-256"><mml:math id="mml-ieqn-256"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-257"><mml:math id="mml-ieqn-257"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-258"><mml:math id="mml-ieqn-258"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>}. Thus, the high-utility periodic sequence ratio of {<italic>a</italic>, <italic>d</italic>} is <italic>huSeqRa</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; |<italic>huPrSeq</italic>(<italic>X</italic>)|/|<italic>D</italic>| &#x003D; 3/4 &#x003D; 0.75 <inline-formula id="ieqn-259"><mml:math id="mml-ieqn-259"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic>; hence, <italic>X</italic> is a high utility periodic frequent pattern in <italic>D</italic>.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Proposed Algorithm: MHUPFPS</title>
<p>In this section, we first described a new pruning strategy for pruning a search space. Then, we proposed a compact data structure, HUPFPS-list, to store the transactions, sequence information, and utility values of a pattern. Finally, we present the proposed MHUPFPS algorithm.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Pruning Strategy</title>
<p>To identify high utility periodic frequent patterns in a set of sequences, a method of pruning the search space is required. Thus, in this study, periodicity and utility are combined and an upper bound, <italic>upSeqRa</italic>, was proposed for the measure <italic>huSeqRa</italic> and two new pruning properties that were used to prune the vast search space. Note that <inline-formula id="ieqn-260"><mml:math id="mml-ieqn-260"><mml:mi>u</mml:mi><mml:mi>p</mml:mi><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi></mml:math></inline-formula> is defined by Definition 3.14.</p>
<p><bold>Definition 4.1. </bold>Given three user-defined thresholds <italic>minHuRa</italic>, <italic>maxPr</italic>, and <italic>minSupRa</italic>, we say that a pattern <italic>X</italic> is a high-utility periodic frequent candidate pattern in a sequence <italic>S</italic> if <italic>X</italic> in <italic>S</italic> satisfies <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-261"><mml:math id="mml-ieqn-261"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-262"><mml:math id="mml-ieqn-262"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, and <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-263"><mml:math id="mml-ieqn-263"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>.</p>
<p><bold>Example 15. </bold>Let <italic>minSupRa</italic> &#x003D; 0.6, <italic>maxPr</italic> &#x003D; 3, and <italic>minHuRa</italic> &#x003D; 0.2. According to the sequence database in <xref ref-type="table" rid="table-3">Table 3</xref>, pattern {<italic>a</italic>} satisfies the conditions <italic>supRa</italic>({<italic>a</italic>}, <inline-formula id="ieqn-264"><mml:math id="mml-ieqn-264"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 0.8 <inline-formula id="ieqn-265"><mml:math id="mml-ieqn-265"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>({<italic>a</italic>}, <inline-formula id="ieqn-266"><mml:math id="mml-ieqn-266"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 2 <inline-formula id="ieqn-267"><mml:math id="mml-ieqn-267"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, and <italic>utiRa</italic>({<italic>a</italic>}, <inline-formula id="ieqn-268"><mml:math id="mml-ieqn-268"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>) &#x003D; 0.25 <inline-formula id="ieqn-269"><mml:math id="mml-ieqn-269"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>. Thus, {<italic>a</italic>} is a high-utility periodic frequent candidate itemset in <inline-formula id="ieqn-270"><mml:math id="mml-ieqn-270"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>.</p>

<p><bold>Definition 4.2. </bold>In a sequence database <italic>D</italic>, a set of sequences for which a pattern <italic>X</italic> satisfies <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-271"><mml:math id="mml-ieqn-271"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-272"><mml:math id="mml-ieqn-272"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, and <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-273"><mml:math id="mml-ieqn-273"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> is defined as <italic>huCand</italic>(<italic>X</italic>, <italic>D</italic>) &#x003D; {<italic>S</italic>|<italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-274"><mml:math id="mml-ieqn-274"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-275"><mml:math id="mml-ieqn-275"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-276"><mml:math id="mml-ieqn-276"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-277"><mml:math id="mml-ieqn-277"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-278"><mml:math id="mml-ieqn-278"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-279"><mml:math id="mml-ieqn-279"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-280"><mml:math id="mml-ieqn-280"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>}.</p>
<p><bold>Example 16. </bold>As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, the pattern {<italic>d</italic>} satisfies the conditions <italic>supRa</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-281"><mml:math id="mml-ieqn-281"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-282"><mml:math id="mml-ieqn-282"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, and <italic>utiRa</italic>({<italic>d</italic>}, <italic>S</italic>) <inline-formula id="ieqn-283"><mml:math id="mml-ieqn-283"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> in <inline-formula id="ieqn-284"><mml:math id="mml-ieqn-284"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-285"><mml:math id="mml-ieqn-285"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-286"><mml:math id="mml-ieqn-286"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>; thus, {<italic>d</italic>} is called a high-utility periodic frequent candidate pattern in <inline-formula id="ieqn-287"><mml:math id="mml-ieqn-287"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-288"><mml:math id="mml-ieqn-288"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-289"><mml:math id="mml-ieqn-289"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula> and is defined as <italic>huCand</italic>(<italic>X</italic>) &#x003D; {<inline-formula id="ieqn-290"><mml:math id="mml-ieqn-290"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-291"><mml:math id="mml-ieqn-291"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-292"><mml:math id="mml-ieqn-292"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>}.</p>

<p><bold>Definition 4.3. </bold>In a sequence database <italic>D</italic>, the number of sequences in the set <italic>huCand</italic>(<italic>X</italic>) is |<italic>huCand</italic>(<italic>X</italic>)|. The <italic>upSeqRa</italic> of <italic>X</italic> in <italic>D</italic> is <italic>upSeqRa</italic>(<italic>X</italic>) &#x003D; |<italic>huCand</italic>(<italic>X</italic>)|/|<italic>D</italic>|, where |<italic>D</italic>| denotes the number of sequences in <italic>D</italic>.</p>
<p><bold>Example 17. </bold>Let <italic>minSupRa</italic> &#x003D; 0.6, <italic>maxPr</italic> &#x003D; 3, and <italic>minHuRa</italic> &#x003D; 0.2. As shown in <xref ref-type="table" rid="table-3">Table 3</xref>, {<italic>a</italic>, <italic>d</italic>} is a high utility period frequent candidate pattern in <inline-formula id="ieqn-293"><mml:math id="mml-ieqn-293"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-294"><mml:math id="mml-ieqn-294"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-295"><mml:math id="mml-ieqn-295"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>. Thus, the set of candidate sequences <italic>huCand</italic>(<italic>X</italic>) in which the high-utility period frequent candidate pattern is satisfied is <italic>huCand</italic>(<italic>X</italic>) &#x003D; {<inline-formula id="ieqn-296"><mml:math id="mml-ieqn-296"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-297"><mml:math id="mml-ieqn-297"><mml:msub><mml:mi>S</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-298"><mml:math id="mml-ieqn-298"><mml:msub><mml:mi>S</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:math></inline-formula>}. Thus, <italic>upSeqRa</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; |<italic>huCand</italic>({<italic>a</italic>, <italic>d</italic>})|/|<italic>D</italic>| &#x003D; 3/4 &#x003D; 0.75.</p>
<p><bold>Theorem 4.1. </bold>For a pattern <italic>X</italic>, <italic>upSeqRa</italic>(<italic>X</italic>) is not less than <italic>huSeqRa</italic>(<italic>X</italic>), i.e., <italic>upSeqRa</italic>(<italic>X</italic>) <inline-formula id="ieqn-299"><mml:math id="mml-ieqn-299"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>huSeqRa</italic>(<italic>X</italic>).</p>
<p><bold>&#x2003;&#x2003;Proof.</bold> For an itemset <italic>X</italic>:</p>
<p><italic>huSeqRa</italic>(<italic>X</italic>) &#x003D; |<italic>huPrSeq</italic>(<italic>X</italic>)|/|<italic>D</italic>|</p>
<p>&#x003D; |{<italic>S</italic>|<italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-300"><mml:math id="mml-ieqn-300"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-301"><mml:math id="mml-ieqn-301"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-302"><mml:math id="mml-ieqn-302"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-303"><mml:math id="mml-ieqn-303"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>stanDev</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-304"><mml:math id="mml-ieqn-304"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic> <inline-formula id="ieqn-305"><mml:math id="mml-ieqn-305"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-306"><mml:math id="mml-ieqn-306"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-307"><mml:math id="mml-ieqn-307"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>T</italic> <inline-formula id="ieqn-308"><mml:math id="mml-ieqn-308"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-309"><mml:math id="mml-ieqn-309"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-310"><mml:math id="mml-ieqn-310"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>}|/|<italic>D</italic>|</p>
<p><inline-formula id="ieqn-311"><mml:math id="mml-ieqn-311"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> |{<italic>S</italic>|<italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-312"><mml:math id="mml-ieqn-312"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-313"><mml:math id="mml-ieqn-313"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-314"><mml:math id="mml-ieqn-314"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-315"><mml:math id="mml-ieqn-315"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-316"><mml:math id="mml-ieqn-316"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-317"><mml:math id="mml-ieqn-317"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>T</italic> <inline-formula id="ieqn-318"><mml:math id="mml-ieqn-318"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-319"><mml:math id="mml-ieqn-319"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-320"><mml:math id="mml-ieqn-320"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>}|/|<italic>D</italic>|</p>
<p>&#x003D; |<italic>huCand</italic>(<italic>X</italic>)|/|<italic>D</italic>|</p>
<p>&#x003D; <italic>upSeqRa</italic>(<italic>X</italic>)</p>
<p><bold>Theorem 4.2. </bold>For two itemsets <italic>X</italic> <inline-formula id="ieqn-321"><mml:math id="mml-ieqn-321"><mml:mo>&#x2282;</mml:mo></mml:math></inline-formula> <italic>XY</italic>, <italic>upSeqRa</italic>(<italic>XY</italic>) <inline-formula id="ieqn-322"><mml:math id="mml-ieqn-322"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>upSeqRa</italic>(<italic>X</italic>).</p>
<p><bold>&#x2003;&#x2003;Proof.</bold> For any sequence <italic>S</italic> in a sequence database <italic>D</italic>, if an itemset <italic>X</italic> is a subset of another itemset <italic>XY</italic>:</p>
<p><italic>upSeqRa(X)</italic> &#x003D; <italic>huCand</italic>({<italic>X</italic>}, <italic>S</italic>)/|<italic>D</italic>|</p>
<p>&#x003D; |{<italic>S</italic>|<italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-323"><mml:math id="mml-ieqn-323"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-324"><mml:math id="mml-ieqn-324"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-325"><mml:math id="mml-ieqn-325"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-326"><mml:math id="mml-ieqn-326"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) <inline-formula id="ieqn-327"><mml:math id="mml-ieqn-327"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-328"><mml:math id="mml-ieqn-328"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>T</italic> <inline-formula id="ieqn-329"><mml:math id="mml-ieqn-329"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-330"><mml:math id="mml-ieqn-330"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-331"><mml:math id="mml-ieqn-331"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>)|/|<italic>D</italic>|</p>
<p><inline-formula id="ieqn-332"><mml:math id="mml-ieqn-332"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> |{<italic>S</italic>|<italic>maxPr</italic>(<italic>XY</italic>, <italic>S</italic>) <inline-formula id="ieqn-333"><mml:math id="mml-ieqn-333"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic> <inline-formula id="ieqn-334"><mml:math id="mml-ieqn-334"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>supRa</italic>(<italic>XY</italic>, <italic>S</italic>) <inline-formula id="ieqn-335"><mml:math id="mml-ieqn-335"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic> <inline-formula id="ieqn-336"><mml:math id="mml-ieqn-336"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>utiRa</italic>(<italic>XY</italic>, <italic>S</italic>) <inline-formula id="ieqn-337"><mml:math id="mml-ieqn-337"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic> <inline-formula id="ieqn-338"><mml:math id="mml-ieqn-338"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>T</italic> <inline-formula id="ieqn-339"><mml:math id="mml-ieqn-339"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-340"><mml:math id="mml-ieqn-340"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <italic>S</italic> <inline-formula id="ieqn-341"><mml:math id="mml-ieqn-341"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <italic>D</italic>)|/|<italic>D</italic>|</p>
<p>&#x003D; |<italic>huCand</italic>(<italic>XY</italic>)|/|<italic>D</italic>|</p>
<p>&#x003D; <italic>upSeqRa</italic>(<italic>XY</italic>)</p>
<p>Hence, if <italic>X</italic> is such that <italic>upSeqRa</italic>(<italic>X</italic>) <inline-formula id="ieqn-342"><mml:math id="mml-ieqn-342"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic>, then both <italic>X</italic> and its superset can be pruned without further exploration.</p>
<p><bold>Theorem 4.3. </bold>In a sequence database <italic>D</italic>, if <italic>upSeqRa</italic>(<italic>X</italic>) <inline-formula id="ieqn-343"><mml:math id="mml-ieqn-343"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic> for any itemset <italic>X</italic>, then the superset <italic>X</italic><inline-formula id="ieqn-344"><mml:math id="mml-ieqn-344"><mml:msup><mml:mi></mml:mi><mml:mrow><mml:msup><mml:mi></mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msup></mml:math></inline-formula> of <italic>X</italic> is not a HUPFPS.</p>
<p><bold>&#x2003;&#x2003;Proof.</bold> We have <italic>upSeqRa</italic>(<italic>X</italic>) &#x003C; <italic>minSeqRa</italic> <inline-formula id="ieqn-345"><mml:math id="mml-ieqn-345"><mml:mo stretchy="false">&#x21D2;</mml:mo></mml:math></inline-formula> <italic>upSeqRa</italic>(<italic>X</italic><inline-formula id="ieqn-346"><mml:math id="mml-ieqn-346"><mml:msup><mml:mi></mml:mi><mml:mrow><mml:msup><mml:mi></mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msup></mml:math></inline-formula>) &#x003C; <italic>minSeqRa</italic>.</p>
<p>Hence, <italic>X</italic> is not a HUPFPS, because <italic>X</italic> <inline-formula id="ieqn-347"><mml:math id="mml-ieqn-347"><mml:mo>&#x2282;</mml:mo></mml:math></inline-formula> <italic>X</italic><inline-formula id="ieqn-348"><mml:math id="mml-ieqn-348"><mml:msup><mml:mi></mml:mi><mml:mrow><mml:msup><mml:mi></mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msup></mml:math></inline-formula> <inline-formula id="ieqn-349"><mml:math id="mml-ieqn-349"><mml:mo stretchy="false">&#x21D2;</mml:mo></mml:math></inline-formula> <italic>upSeqRa</italic>(<italic>X</italic><inline-formula id="ieqn-350"><mml:math id="mml-ieqn-350"><mml:msup><mml:mi></mml:mi><mml:mrow><mml:msup><mml:mi></mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msup><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-351"><mml:math id="mml-ieqn-351"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>upSeqRa</italic>(<italic>X</italic>)</p>
<p><inline-formula id="ieqn-352"><mml:math id="mml-ieqn-352"><mml:mo stretchy="false">&#x21D2;</mml:mo></mml:math></inline-formula> <italic>upSeqRa</italic>(<italic>X</italic><inline-formula id="ieqn-353"><mml:math id="mml-ieqn-353"><mml:msup><mml:mi></mml:mi><mml:mrow><mml:msup><mml:mi></mml:mi><mml:mo>&#x2032;</mml:mo></mml:msup></mml:mrow></mml:msup></mml:math></inline-formula>) &#x003C; <italic>minSeqRa</italic>.</p>
<p>Thus, any superset of <italic>X</italic> is not a HUPFPS.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>The HUPFPS-List Data Structure</title>
<p>To avoid repeated scanning of a database and to improve the performance of MHUPFPS, we proposed a data structure called the HUPFPS-list, which contains four fields. MHUPFPS only scans a database once to generate a HUPFPS-list for each pattern that appears in the sequence database. MHUPFPS combines the HUPFPS-list of different patterns to generate a HUPFPS-list of extended patterns.</p>
<p><bold>Definition 4.4. </bold>The HUPFPS-list of a pattern <italic>X</italic> is denoted <inline-formula id="ieqn-354"><mml:math id="mml-ieqn-354"><mml:mi>P</mml:mi><mml:mi>x</mml:mi></mml:math></inline-formula> and contains four fields. The <inline-formula id="ieqn-355"><mml:math id="mml-ieqn-355"><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>s</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> field is defined as <inline-formula id="ieqn-356"><mml:math id="mml-ieqn-356"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>s</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> &#x003D; <italic>X</italic>. The <inline-formula id="ieqn-357"><mml:math id="mml-ieqn-357"><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> field is defined as <inline-formula id="ieqn-358"><mml:math id="mml-ieqn-358"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> &#x003D; {<inline-formula id="ieqn-359"><mml:math id="mml-ieqn-359"><mml:msub><mml:mi>S</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-360"><mml:math id="mml-ieqn-360"><mml:msub><mml:mi>S</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-361"><mml:math id="mml-ieqn-361"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-362"><mml:math id="mml-ieqn-362"><mml:msub><mml:mi>S</mml:mi><mml:mi>w</mml:mi></mml:msub></mml:math></inline-formula>}, where <inline-formula id="ieqn-363"><mml:math id="mml-ieqn-363"><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>(1 <inline-formula id="ieqn-364"><mml:math id="mml-ieqn-364"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-365"><mml:math id="mml-ieqn-365"><mml:mi>i</mml:mi></mml:math></inline-formula> <inline-formula id="ieqn-366"><mml:math id="mml-ieqn-366"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-367"><mml:math id="mml-ieqn-367"><mml:mi>w</mml:mi></mml:math></inline-formula>) represents the equivalence number at which <italic>X</italic> appears. The <inline-formula id="ieqn-368"><mml:math id="mml-ieqn-368"><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> field represents a list of stored transaction numbers <inline-formula id="ieqn-369"><mml:math id="mml-ieqn-369"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> &#x003D; {<inline-formula id="ieqn-370"><mml:math id="mml-ieqn-370"><mml:msub><mml:mi>Z</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-371"><mml:math id="mml-ieqn-371"><mml:msub><mml:mi>Z</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-372"><mml:math id="mml-ieqn-372"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-373"><mml:math id="mml-ieqn-373"><mml:msub><mml:mi>Z</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>}(1 <inline-formula id="ieqn-374"><mml:math id="mml-ieqn-374"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>i</italic> <inline-formula id="ieqn-375"><mml:math id="mml-ieqn-375"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-376"><mml:math id="mml-ieqn-376"><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>w</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula>) where <italic>Z</italic><inline-formula id="ieqn-377"><mml:math id="mml-ieqn-377"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mrow><mml:mtext mathvariant="italic">i</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:math></inline-formula> &#x003D; {<italic>Z</italic>|<italic>X</italic> <inline-formula id="ieqn-378"><mml:math id="mml-ieqn-378"><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo>&#x2227;</mml:mo><mml:msub><mml:mi>T</mml:mi><mml:mi>z</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>}. The <inline-formula id="ieqn-379"><mml:math id="mml-ieqn-379"><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> field is defined as <inline-formula id="ieqn-380"><mml:math id="mml-ieqn-380"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>u</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:math></inline-formula> &#x003D; {<inline-formula id="ieqn-381"><mml:math id="mml-ieqn-381"><mml:msub><mml:mi>p</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-382"><mml:math id="mml-ieqn-382"><mml:msub><mml:mi>p</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-383"><mml:math id="mml-ieqn-383"><mml:mo>&#x2026;</mml:mo></mml:math></inline-formula>, <inline-formula id="ieqn-384"><mml:math id="mml-ieqn-384"><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>}, where <inline-formula id="ieqn-385"><mml:math id="mml-ieqn-385"><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is the utility of <italic>X</italic> for a particular transaction in the sequence and is defined as <inline-formula id="ieqn-386"><mml:math id="mml-ieqn-386"><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> &#x003D; {<italic>p</italic>|(<italic>X</italic>, <inline-formula id="ieqn-387"><mml:math id="mml-ieqn-387"><mml:msub><mml:mi>p</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>) <inline-formula id="ieqn-388"><mml:math id="mml-ieqn-388"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-389"><mml:math id="mml-ieqn-389"><mml:msub><mml:mi>T</mml:mi><mml:mi>z</mml:mi></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-390"><mml:math id="mml-ieqn-390"><mml:mo>&#x2227;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-391"><mml:math id="mml-ieqn-391"><mml:msub><mml:mi>T</mml:mi><mml:mi>z</mml:mi></mml:msub></mml:math></inline-formula> <inline-formula id="ieqn-392"><mml:math id="mml-ieqn-392"><mml:mo>&#x2208;</mml:mo></mml:math></inline-formula> <inline-formula id="ieqn-393"><mml:math id="mml-ieqn-393"><mml:msub><mml:mi>S</mml:mi><mml:mi>w</mml:mi></mml:msub></mml:math></inline-formula>}.</p>
<p><bold>Example 18. </bold><xref ref-type="table" rid="table-4">Tables 4</xref> and <xref ref-type="table" rid="table-5">5</xref> represent the HUPFPS-lists of patterns {<italic>a</italic>} and {<italic>d</italic>}, respectively. <xref ref-type="table" rid="table-6">Table 6</xref> shows the HUPFPS-list of pattern {<italic>a</italic>, <italic>d</italic>}, which is constructed by combining the HUPFPS-lists of patterns {<italic>a</italic>} and {<italic>d</italic>}.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>HUPFPS-list of pattern {<italic>a</italic>}</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th><italic>i-set</italic></th>
<th>{<italic>a</italic>}</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>sid-list</italic></td>
<td>{1, 2, 3, 4}</td>
</tr>
<tr>
<td><italic>tran-list</italic></td>
<td>[{1, 3, 4, 5}, {2, 3, 4, 5}, {2, 3, 5}, {1, 2, 3}]</td>
</tr>
<tr>
<td><italic>uti-list</italic></td>
<td>[({456}, {380}, {608}, {304}), ({380}, {456}, {684}, {760}), ({608}, {380}, ({684}),</td>
</tr>
<tr>
<td></td>
<td>[({456}, {456}, {684}]</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>HUPFPS-list of pattern {<italic>d</italic>}</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th><italic>i-set</italic></th>
<th>{<italic>d</italic>}</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>sid-list</italic></td>
<td>{1, 2, 3, 4}</td>
</tr>
<tr>
<td><italic>tran-list</italic></td>
<td>[{2, 5}, {1, 2, 3, 4}, {1, 2, 3, 4, 5}, {1, 2, 3, 4, 5}]</td>
</tr>
<tr>
<td><italic>uti-list</italic></td>
<td>[({533}, {410}), ({574}, {123}, {328}, {615}), ({410}, {164}, {492}, {492}, {492}),</td>
</tr>
<tr>
<td></td>
<td>({574}, {328}, {246}, {369}, {328})]</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>HUPFPS-list of pattern {<italic>a</italic>, <italic>d</italic>}</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th><italic>i-set</italic></th>
<th>{<italic>a</italic>, <italic>d</italic>}}</th>
</tr>
</thead>
<tbody>
<tr>
<td><italic>usid-list</italic></td>
<td>{1, 2, 3, 4}</td>
</tr>
<tr>
<td><italic>tran-list</italic></td>
<td>[{5}, {2, 3, 4}, {2, 3, 5}, {1, 2, 3}]</td>
</tr>
<tr>
<td><italic>pro-list</italic></td>
<td>[({714}), ({503}, {784}, {1299}), ({772}, {872}, {1176}), ({1030}, {784}, {930})]</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><bold>Definition 4.5. </bold>The itemsets <italic>Px.i-set</italic> and <italic>Py.i-set</italic> with the same prefix are extended to <italic>Pxy</italic>, which is defined as <italic>Pxy</italic> &#x003D; <italic>Px</italic> <inline-formula id="ieqn-394"><mml:math id="mml-ieqn-394"><mml:mo>&#x222A;</mml:mo></mml:math></inline-formula> <italic>Py</italic> (the prefix of a single itemset is an empty itemset).</p>
<p><bold>Example 19. </bold>The proposed algorithm uses an intersection procedure to combine the HUPFPS-lists of the itemsets {<italic>a</italic>} and {<italic>d</italic>}, in <xref ref-type="table" rid="table-4">Tables 4</xref> and <xref ref-type="table" rid="table-5">5</xref>, respectively, to construct the HUPFPS-list of the itemset {<italic>a</italic>, <italic>d</italic>}, as shown in <xref ref-type="table" rid="table-6">Table 6</xref>.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Proposed MHUPFPS Algorithm</title>
<p>Based on the HUPFPS-list and pruning strategy, we designed an algorithm called MHUPFPS. MHUPFPS (Algorithm 1) inputs a multisequence sequence database and five user-defined thresholds: <italic>minSupRa</italic>, <italic>maxPr</italic>, <italic>maxStd</italic>, <italic>minHuRa</italic>, and <italic>minSeqRa</italic>. Finally, a set of high utility periodic frequent patterns is output.</p>
<p>In the proposed design, MHUPFPS first scans the database to calculate <italic>supRa</italic>(<italic>X</italic>, <italic>S</italic>), <italic>maxPr</italic>(<italic>X</italic>, <italic>S</italic>), <italic>stanDev</italic>(<italic>X</italic>, <italic>S</italic>), and <italic>utiRa</italic>(<italic>X</italic>, <italic>S</italic>) for each individual itemset. Then, it iterates over every itemset, calculates whether it satisfies the high-utility periodic frequent pattern in each sequence, and stores the sequence that satisfies the condition in the set <italic>huPrSeq</italic>(<italic>X</italic>). After it scans all sequences, the set <italic>huPrSeq</italic> for this pattern is used to calculate the high utility periodic sequence ratio <italic>huSeqRa</italic>(<italic>X</italic>). If the value of <italic>huSeqRa</italic>(<italic>X</italic>) is not less than the threshold <italic>minSeqRa</italic>, the output pattern <italic>X</italic> is a HUPFPS.</p>
<p>&#x2003;</p>
<fig id="fig-54">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-54.tif"/>
</fig>
<p>Additionally, MHUPFPS prunes the search space using the upper bound <italic>upSeqRa</italic>(<italic>X</italic>) of <italic>huSeqRa</italic>(<italic>X</italic>). It stores the HUPFPS-list of the pattern whose <italic>upSeqRa</italic>(<italic>X</italic>) is not less than <italic>minSeqRa</italic> in the set <inline-formula id="ieqn-410"><mml:math id="mml-ieqn-410"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula>. The UHPFPS-list of patterns in the set <inline-formula id="ieqn-411"><mml:math id="mml-ieqn-411"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula> is stored in ascending order of <italic>upSeqRa</italic>(<italic>X</italic>). Finally, MHUPFPS performs a depth-first search, recursively searching for larger patterns by calling the <italic>Search</italic> procedure (Algorithm 2) with a set of parameters and the set <inline-formula id="ieqn-412"><mml:math id="mml-ieqn-412"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula>.</p>
<p>The Search procedure (Algorithm 2) takes a HUPFPS-list of patterns and set of user-defined thresholds as input and outputs the high-utility periodic expansion pattern. First, the algorithm iteratively loops over the set <inline-formula id="ieqn-413"><mml:math id="mml-ieqn-413"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula> and sequentially takes the HUPFPS-list of <italic>Px.i</italic> and <italic>Py.i</italic> from the set <inline-formula id="ieqn-414"><mml:math id="mml-ieqn-414"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula>. The HUPFPS list of patterns <italic>Px.i</italic> and <italic>Py.i</italic> is extended into <italic>Pxy</italic> using the <italic>intersection</italic> procedure (Algorithm 3). Then, the set <italic>huCand</italic>(<italic>Pxy.i</italic>) of sequences of the itemset <italic>Pxy.i</italic> is calculated. Finally, the algorithm calculates <italic>upSeqRa</italic>(<italic>Pxy.i</italic>) to prune the search space if <italic>upSeqRa</italic>(<italic>Pxy.i</italic>) is not less than <italic>minSeqRa</italic>; <inline-formula id="ieqn-415"><mml:math id="mml-ieqn-415"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mi>y</mml:mi></mml:math></inline-formula> is added to the set <inline-formula id="ieqn-416"><mml:math id="mml-ieqn-416"><mml:mi>E</mml:mi><mml:mi>x</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>O</mml:mi><mml:mi>f</mml:mi><mml:mi>P</mml:mi><mml:mi>x</mml:mi></mml:math></inline-formula>, which stores the HUPFPS-list of all extended patterns of <inline-formula id="ieqn-417"><mml:math id="mml-ieqn-417"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>i</mml:mi></mml:math></inline-formula> for the next iteration. Next, the value of <italic>huSeqRa</italic>(<italic>Pxy.i</italic>) is calculated, and if <italic>huSeqRa</italic>(<italic>Pxy.i</italic>) is not less than <italic>minSeqRa</italic>, the output <italic>Pxy.i</italic> is a HUPFPS. Subsequently, the search procedure recursively calls the HUPFPS-list (<inline-formula id="ieqn-418"><mml:math id="mml-ieqn-418"><mml:mi>E</mml:mi><mml:mi>x</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>O</mml:mi><mml:mi>f</mml:mi><mml:mi>P</mml:mi><mml:mi>x</mml:mi></mml:math></inline-formula>) of the extended patterns of <inline-formula id="ieqn-419"><mml:math id="mml-ieqn-419"><mml:mi>P</mml:mi><mml:mi>x</mml:mi><mml:mo>.</mml:mo><mml:mi>i</mml:mi></mml:math></inline-formula> to explore larger patterns.</p>
<p>&#x2003;&#x2003;</p>
<fig id="fig-55">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-55.tif"/>
</fig>
<fig id="fig-56">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-56.tif"/>
</fig>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Concrete Example</title>
<p>In this example, the user-defined thresholds were set to <italic>minSupRa</italic> &#x003D; 0.6, <italic>maxPr</italic> &#x003D; 3, <italic>maxStd</italic> &#x003D; 1.0, <italic>minHuRa</italic> &#x003D; 0.2, and <italic>minSeqRa</italic> &#x003D; 0.6. According to the example sequence database in <xref ref-type="table" rid="table-4">Tables 4</xref> and <xref ref-type="table" rid="table-5">5</xref>, MHUPFPS scans the database once, then uses the HUPFPS-list to calculate <italic>pr</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; {1, 2, 1, 1, 0}, <italic>pr</italic>({<italic>a</italic>}, <italic>S</italic><sub>2</sub>) &#x003D; {2, 1, 1, 1, 0}, <italic>pr</italic>({<italic>a</italic>}, <italic>S</italic><sub>3</sub>) &#x003D; {2, 1, 2, 0}, <italic>pr</italic>({<italic>a</italic>}, <italic>S</italic><sub>4</sub>) &#x003D; {1, 1, 1, 2}, <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; 0.8, <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>2</sub>) &#x003D; 0.8, <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>3</sub>) &#x003D; 0.6, <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>4</sub>) &#x003D; 0.6, <italic>maxPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; 2, <italic>maxPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>2</sub>) &#x003D; 2, <italic>maxPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>3</sub>) &#x003D; 2, <italic>maxPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>4</sub>) &#x003D; 2, <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; 0.63, <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><sub>2</sub>) &#x003D; 0.63, <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><sub>3</sub>) &#x003D; 0.82, and <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><sub>4</sub>) &#x003D; 0.43, based on the HUPFPS-list of {<italic>a</italic>}. Consider the itemset {<italic>a</italic>}; because <italic>supRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) <inline-formula id="ieqn-432"><mml:math id="mml-ieqn-432"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSupRa</italic>, <italic>maxPr</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) <inline-formula id="ieqn-433"><mml:math id="mml-ieqn-433"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxPr</italic>, <italic>stanDev</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) &#x003D; 0.63 <inline-formula id="ieqn-434"><mml:math id="mml-ieqn-434"><mml:mo>&#x2264;</mml:mo></mml:math></inline-formula> <italic>maxStd</italic>, and <italic>utiRa</italic>({<italic>a</italic>}, <italic>S</italic><sub>1</sub>) <inline-formula id="ieqn-435"><mml:math id="mml-ieqn-435"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minHuRa</italic>, the pattern {<italic>a</italic>} is a high-utility periodic frequent pattern in <italic>S</italic><sub>1</sub>. Similarly, the set <italic>huPrSeq</italic>(<italic>a</italic>) &#x003D; {<italic>S</italic><sub>1</sub>, <italic>S</italic><sub>2</sub>, <italic>S</italic><sub>3</sub>, <italic>S</italic><sub>4</sub>} can be calculated, and <inline-formula id="ieqn-436"><mml:math id="mml-ieqn-436"><mml:mi>h</mml:mi><mml:mi>u</mml:mi><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mi>R</mml:mi><mml:mi>a</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>h</mml:mi><mml:mi>u</mml:mi><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>a</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mi>D</mml:mi><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic>; thus, pattern {<italic>a</italic>} is output as a high-utility periodic frequent pattern in a multiple sequence database. MHUPFPS computes patterns {<italic>a</italic>} and {<italic>d</italic>} in the same manner as HUPFPS. It adds the HUPFPS-list of the patterns to the set <inline-formula id="ieqn-437"><mml:math id="mml-ieqn-437"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula> to generate a larger HUPFPS. The HUPFPS-list of patterns in <inline-formula id="ieqn-438"><mml:math id="mml-ieqn-438"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula> is sorted in ascending order of <italic>upSeqRa</italic> values.</p>
<p>According to the HUPFPS-list of pattern {<italic>a</italic>} in <xref ref-type="table" rid="table-4">Table 4</xref>, the <italic>sid-list</italic> of {<italic>a</italic>} is {1, 2, 3, 4}; the <italic>tran-list</italic> is ({1, 3, 4, 5}, {2, 3, 4, 5}, {2, 3, 5}, {1, 2, 3}); and the <italic>uti-list</italic> is ([{456}, {380}, {608}, {304}], [{380}, {456}, {684}, {760}], [{608}, {380}, {684}], [{456}, {456}, {684}]). From the HUPFPS-list of pattern {<italic>d</italic>}, the <italic>sid-list</italic> is {1, 2, 3, 4}; the <italic>tid-list</italic> is ({2, 5}, {1, 2, 3, 4}, {1, 2, 3, 4, 5}, {1, 2, 3, 4, 5}); and the <italic>uti-list</italic> is ([{533}, {410}], [{574}, {123}, {328}, {615}], [{410}, {164}, {492},{492},{492}], [{574}, {328}, {246}, {369}, {328}]). MHUPFPS uses the intersection procedure, which combines the HUPFPS lists of patterns {<italic>a</italic>} and {<italic>d</italic>} to generate a HUPFPS list of the pattern {<italic>a</italic>, <italic>d</italic>}. MHUPFPS further calculates the parameter values using the field information in the HUPFPS-list of {<italic>a</italic>, <italic>d</italic>} and then obtains the set <italic>huCand</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; {<italic>S</italic><sub>2</sub>, <italic>S</italic><sub>3</sub>, <italic>S</italic><sub>4</sub>} and calculates <italic>upSeqRa</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; 0.75 <inline-formula id="ieqn-439"><mml:math id="mml-ieqn-439"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> <italic>minSeqRa</italic> based on the set <italic>huCand</italic>({<italic>a</italic>, <italic>d</italic>}). Thus, the pattern {<italic>a</italic>, <italic>d</italic>} and its superset may be a HUPFPS. The algorithm adds the HUPFPS list of {<italic>a</italic>, <italic>d</italic>} to the set <inline-formula id="ieqn-440"><mml:math id="mml-ieqn-440"><mml:mi>b</mml:mi><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>H</mml:mi><mml:mi>U</mml:mi><mml:mi>P</mml:mi><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>S</mml:mi></mml:math></inline-formula>. Finally, <italic>huSeqRa</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; 0.75 is calculated by obtaining the sequence set <italic>huPrSeq</italic>({<italic>a</italic>, <italic>d</italic>}) &#x003D; {2, 3, 4}; thus, the algorithm output {<italic>a</italic>, <italic>d</italic>} is a HUPFPS. MHUPFPS recursively calls the pattern explorer to explore larger extensions of the patterns.</p>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Experiments</title>
<sec id="s5_1">
<label>5.1</label>
<title>Experimental Setup and Datasets</title>
<p>We conducted experiments on three real datasets (FIFA, Bike, and Leviathan) and a synthetic dataset. The three real datasets were all obtained from the data mining library on the SPMF website, and the synthetic dataset was synthesized by the data generation code provided on the SPMF website [<xref ref-type="bibr" rid="ref-68">68</xref>]. The details of these datasets are provided below:
<list list-type="bullet">
<list-item>
<p>The <italic>T23l67kd15k</italic> dataset was generated by a Matalab program written by Ashwin Balani that is available on the SPMF website. This dataset contains a total of 15,000 sequences of 68 items; each sequence contains an average of 23 transactions and each transaction contains an average of three items. This dataset is a dense dataset.</p></list-item>
<list-item>
<p>The <italic>FIFA</italic> dataset contains a total of 20,450 sequences of 2,990 types of items; each sequence contains an average of 34.74 transactions.</p></list-item>
<list-item>
<p>The <italic>Bike</italic> dataset contains a total of 21,078 sequences of 67 types of items; each sequence contains an average of 7.27 transactions.</p></list-item>
<list-item>
<p>The <italic>Leviathan</italic> dataset contains 5,834 sequences of 9,025 types of items; each sequence contains an average of 33.8 transactions.</p></list-item>
</list></p>
<p>To the best of our knowledge, previous studies have only found periodic patterns that occur together in multiple sequences, whereas the proposed MHUPFPS finds common high-utility periodic frequent patterns in multiple sequences. This means that comparing MHUPFPS with existing approaches is not suitable. Therefore, MHUPFPS was considered to be the baseline. MHUPFPS was implemented in Java on a Windows 11 computer with an Intel(R) Core(TM) i5-1135g7 2.42 ghz CPU and 24 GB of running memory.</p>
<p>In the following, |<italic>D</italic>|,|<italic>I</italic><inline-formula id="ieqn-441"><mml:math id="mml-ieqn-441"><mml:msub><mml:mi></mml:mi><mml:mi>d</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula>,|<italic>T</italic><inline-formula id="ieqn-442"><mml:math id="mml-ieqn-442"><mml:msub><mml:mi></mml:mi><mml:mi>c</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula>, and |<italic>S</italic><inline-formula id="ieqn-443"><mml:math id="mml-ieqn-443"><mml:msub><mml:mi></mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>v</mml:mi><mml:mi>g</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow></mml:math></inline-formula> represent the sequence number, distinct item, item count per transaction, and average number of transactions per sequence, respectively. In experiments, the aforementioned datasets with different characteristics were used to comprehensively evaluate the performance of the MHUPFPS algorithm in terms of the running time, number of patterns, and running memory.</p>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Parameter Analysis</title>
<p>MHUPFPS contains five user-defined parameters: <italic>minSeqRa</italic>, <italic>minSupRa</italic>, <italic>maxStd</italic>, <italic>maxPr</italic>, and <italic>minHuRa</italic>. <italic>maxStd</italic> is used to keep the pattern period stable, <italic>maxPr</italic> is used to limit the maximum period of the pattern, <italic>minSupRa</italic> is used to guarantee the HUPFPS support ratio in each sequence, and <italic>minHuRa</italic> is used to determine whether a pattern is of high utility in a sequence. In experiments, the baseline algorithm was designed with loose settings for each parameter value with the aim of mining more high-frequency periodic patterns. For the baseline algorithm, we set <italic>maxPr</italic> &#x003D; 20, <italic>minSupRa</italic> &#x003D; 0.1, <italic>maxStd</italic> &#x003D; 10, <italic>minHuRa</italic> &#x003D; 0.01, and <italic>minSeqRa</italic> &#x003D; 0.</p>
<p>In our experiments, we compared the baseline algorithm with MHUPFPS for different parameter sets of <italic>minSeqRa</italic>, <italic>minSupRa</italic>, <italic>maxStd</italic>, <italic>maxPr</italic>, and <italic>minHuRa</italic> to evaluate the influence of different parameters and parameter values on the performance of the algorithm. The results showed that when <italic>maxStd</italic> <inline-formula id="ieqn-444"><mml:math id="mml-ieqn-444"><mml:mo>&#x2265;</mml:mo></mml:math></inline-formula> 10, the parameter values have almost no influence on the number of patterns, time, or memory required. Thus, we set <italic>maxStd</italic> to a fixed value of 10. We also evaluated the influence of <italic>minSupRa</italic> on the performance of MHUPFPS; MHUPFPS(<italic>x</italic>, <italic>y</italic>, <italic>z</italic>) is defined as MHUPFPS when <italic>minSeqRa</italic> &#x003D; <italic>x</italic>, <italic>minHuRa</italic> &#x003D; <italic>y</italic>, and <italic>maxPr</italic> &#x003D; <italic>z</italic>. We evaluated the influence of <italic>minHuRa</italic> on the performance of MHUPFPS; MHUPFPS(<italic>x</italic>, <italic>y</italic>, <italic>z</italic>) is defined as MHUPFPS when <italic>minSeqRa</italic> &#x003D; <italic>x</italic>, <italic>minSupRa</italic> &#x003D; <italic>y</italic>, and <italic>maxPr</italic> &#x003D; <italic>z</italic>. When evaluating the influence of <italic>maxStd</italic> on the performance of the algorithm, <italic>maxStd</italic> was used as the independent variable. To control this variable, the algorithm used <italic>minSupRa</italic> as a fixed value of <italic>minSupRa</italic> &#x003D; 0.1 when the influence of <italic>minSupRa</italic> on the algorithm was not considered. MHUPFPS(<italic>x</italic>, <italic>y</italic>, <italic>z</italic>) is defined as MHUPFPS when <italic>minSeqRa</italic> &#x003D; <italic>x</italic>, <italic>minHuRa</italic> &#x003D; <italic>y</italic>, and <italic>maxPr</italic> &#x003D; <italic>z</italic>. Finally, when the influence of <italic>maxPr</italic> on the performance of the algorithm was evaluated, <italic>minSupRa</italic> was used as the independent variable, and MHUPFPS(<italic>x</italic>, <italic>y</italic>, <italic>z</italic>) is defined as MHUPFPS when <italic>minSeqRa</italic> &#x003D; <italic>x</italic>, <italic>minHuRa</italic> &#x003D; <italic>y</italic>, and <italic>maxPr</italic> &#x003D; <italic>z</italic>.</p>
<p>We investigated the effect of the parameters <italic>minSeqRa</italic>, <italic>minSupRa</italic>, <italic>maxStd</italic>, <italic>maxPr</italic>, and <italic>minHuRa</italic> on the algorithm. To investigate the influence of <italic>minSupRa</italic> and <italic>minHuRa</italic> on the algorithm, these parameters were sequentially increased from small initial values; this considered the distribution of data in different datasets and length of the sequences. The results of the experiments show that, for both the synthetic and real datasets, the performance of the algorithm was not significantly impacted when the values of <italic>minSupRa</italic> and <italic>minHuRa</italic> were set to be greater than 0.5. However, the performance was slightly impacted for some of the real datasets. Thus, the values of <italic>minSupRa</italic> and <italic>minHuRa</italic> were set to be in the intervals [0.01,0.5] and [0.1,1], respectively. Because the data in the dataset were unevenly dispersed and relatively sparse, <italic>minSeqRa</italic> was set to be 0.001 and 0.0001, respectively. The results indicated that these parameters had little influence on the performance of the algorithm when the value of <italic>maxStd</italic> was above 10. Thus, to better evaluate the parameter <italic>maxStd</italic>, its value was set to be in the interval [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-10">10</xref>]. Finally, the algorithm was tested with different values of <italic>maxPr</italic>. The smaller the value of <italic>maxPr</italic>, the more stringent the filtering of patterns, i.e., a smaller number of patterns were filtered out for larger <italic>maxPr</italic> values. When the value of <italic>maxPr</italic> exceeded the sequence length, it had almost no effect on the performance of the algorithm. Thus, the value of <italic>maxPr</italic> was set to be in the interval [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-20">20</xref>] in experiments.</p>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Influence Analysis of minSeqRa and minSupRa</title>
<p>In the experiments, we evaluated the performance of the algorithm while varying the value of <italic>minSupRa</italic>. As the datasets have different characteristics, different values were used for different datasets; for FIFA, T23l67kd15k, and Leviathan, <italic>minSupRa</italic> was in the interval [0.01,0.5], while for Bike, <italic>minSupRa</italic> was in the interval [0.1,1].</p>
<p><xref ref-type="fig" rid="fig-1">Fig. 1</xref> shows the effect of different <italic>minSupRa</italic> values on the runtime of the proposed MHUPFPS. The runtime for the proposed algorithm for FIFA, Leviathan, Bike, and T23l67kd15k were 35<inline-formula id="ieqn-445"><mml:math id="mml-ieqn-445"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, 50<inline-formula id="ieqn-446"><mml:math id="mml-ieqn-446"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, 15<inline-formula id="ieqn-447"><mml:math id="mml-ieqn-447"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, and 18<inline-formula id="ieqn-448"><mml:math id="mml-ieqn-448"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula> shorter than that for the baseline algorithm, respectively. The difference between datasets is due to FIFA and Leviathan containing more items; thus, the algorithm generates more itemsets, resulting in a more extensive search space. While the synthetic dataset T23l67kd15k contained fewer items, it contained more items per transaction, generating more candidate patterns and requiring more search space to save them.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>MHUPFPS runtime for various <italic>minSupRa</italic> and <italic>maxStd</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-1.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>, the number of patterns identified decreases significantly as <italic>minSupRa</italic> increases. For example, when <italic>minSeqRa</italic> &#x003D; 0, <italic>minHuRa</italic> &#x003D; 0.01, <italic>maxStd</italic> &#x003D; 10, and <italic>maxPr</italic> &#x003D; 20, and the value of <italic>minSupRa</italic> increases from 0.01 to 0.3, the number of patterns found decreases from 2,297 to 45. For the Bike dataset, when <italic>minSeqRa</italic> &#x003D; 0.0001, <italic>minHuRa</italic> &#x003D; 0.1, <italic>maxStd</italic> &#x003D; 10, and <italic>maxPr</italic> &#x003D; 20, the number of patterns found decreases from 66 to 15 as <italic>minSupRa</italic> increases from 0.01 to 0.6. This is because almost all HUPFPS in the Bike dataset are concentrated in a sequence and occur at a high frequency. The value of <italic>minSupRa</italic> strictly filtered the number of identified patterns when executing MHUPFPS on the synthetic dataset and three real datasets considered in this study. Hence, the results highlight the critical importance of the parameter <italic>minSupRa</italic> in reducing the search space.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Number of patterns identified for various <italic>minSupRa</italic> and <italic>minSeqRa</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-2.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows that memory usage decreased as <italic>minSupRa</italic> increased. For example, for the synthetic dataset T23l67kd15k, the memory occupied by the algorithm reduced from 562 to 325 MB as the value of <italic>minSupRa</italic> increased from 0.01 to 0.25. In the three real datasets, memory usage decreased as <italic>minSupRa</italic> increased; this shows that <italic>minSupRa</italic> has strict support for patterns in the sequence, resulting in a reduced number of candidate patterns stored in the memory. Thus, the memory consumption of the algorithm can be reduced by limiting the value of <italic>minSupRa</italic>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Memory usage for different parameter values for different datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-3.tif"/>
</fig>
</sec>
<sec id="s5_4">
<label>5.4</label>
<title>Influence Analysis of minSeqRa and minHuRa</title>
<p><xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows the effect of different <italic>minHuRa</italic> values on the runtime of the proposed MHUPFPS. The runtime remains almost constant as <italic>minHuRa</italic> increases. For example, the results on the synthetic dataset when <italic>minSeqRa</italic> &#x003D; 0.001, <italic>minSupRa</italic> &#x003D; 0.1, <italic>maxStd</italic> &#x003D; 10, and <italic>maxPr</italic> &#x003D; 10, and on the real datasets when <italic>minSeqRa</italic> &#x003D; 0.0001, <italic>minSupRa</italic> &#x003D; 0.1, and <italic>maxStd</italic> &#x003D; 10 are all represented by almost horizontal lines. This means that the parameter <italic>minHuRa</italic> has little influence on the runtime of MHUPFPS. <xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows that for <italic>minSeqRa</italic> &#x003D; 0.001 or <italic>minSeqRa</italic> &#x003D; 0.0001, the runtime was 20<inline-formula id="ieqn-449"><mml:math id="mml-ieqn-449"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula> less than that of the baseline algorithm. This suggests that the search space of MHUPFPS can be reduced by changing the value of <italic>minSeqRa</italic>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>MHUPFPS runtime for various <italic>minHuRa</italic> and <italic>minSeqRa</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-4.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>, the number of patterns mined by the algorithm varies for different values of <italic>minHuRa</italic>. This variation is considerable compared with that of the baseline algorithm. For example, for the FIFA dataset, when <italic>minHuRa</italic> increased from 0.01 to 0.5, the number of patterns mined by the baseline algorithm decreased from 1,329 to 49. When <italic>minSeqRa</italic> &#x003D; 0.001, <italic>minSupRa</italic> &#x003D; 0.1, <italic>maxStd</italic> &#x003D; 10, and <italic>maxPr</italic> &#x003D; 10, and <italic>minHuRa</italic> increased from 0.01 to 0.5, the number of mined patterns decreased from 122 to 1. Additionally, <italic>minSeqRa</italic> significantly influenced the number of HUPFPS. For example, for the Leviathan dataset, when <italic>minHuRa</italic> &#x003D; 0.01 and <italic>minSeqRa</italic> increased from 0 to 0.001, the number of mined patterns decreased from 802 to 66. In conclusion, most of the patterns in the sequence are non-high utility frequent periodic patterns, hence the proposed MHUPFPS can prune various non-high utility frequent periodic patterns.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Number of patterns identified for various <italic>minHuRa</italic> and <italic>minSeqRa</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-5.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> illustrates the influence of <italic>minSeqRa</italic> and <italic>minHuRa</italic> on memory consumption. This figure shows that, for all datasets, the results are all represented by almost horizontal lines as the value of <italic>minHuRa</italic> increases; this indicates that the value of <italic>minHuRa</italic> has nearly no influence on the memory usage of MHUPFPS. When <italic>minHuRa</italic> was fixed, the memory consumption decreased as <italic>minSeqRa</italic> increased. For example, for the FIFA dataset, when <italic>minHuRa</italic> &#x003D; 0.15 and <italic>minSeqRa</italic> increased from 0 to 0.001, the memory usage decreased from 1,265 to 856 MB; this demonstrates that the value of <italic>minSeqRa</italic> can reduce the number of patterns that are saved in the memory.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Memory usage for different parameter values for different datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-6.tif"/>
</fig>
</sec>
<sec id="s5_5">
<label>5.5</label>
<title>Influence Analysis of minSeqRa and maxStd</title>
<p>We evaluated the combined influence of <italic>minSeqRa</italic> and <italic>maxStd</italic> on the algorithm by varying their values. We fixed <italic>minHuRa</italic> &#x003D; 0.1, <italic>minSupRa</italic> &#x003D; 0.1, and <italic>maxPr</italic> &#x003D; 10. <xref ref-type="fig" rid="fig-7">Fig. 7</xref> shows the runtime of MHUPFPS for different values of <italic>minSeqRa</italic> and <italic>maxStd</italic>; the runtime was 15<inline-formula id="ieqn-450"><mml:math id="mml-ieqn-450"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, 18<inline-formula id="ieqn-451"><mml:math id="mml-ieqn-451"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, 12<inline-formula id="ieqn-452"><mml:math id="mml-ieqn-452"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, and 16<inline-formula id="ieqn-453"><mml:math id="mml-ieqn-453"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula> faster than that of the baseline algorithm for mining all HUPFPS in the FIFA, Leviathan, Bike, and synthetic datasets, respectively. The items in the Leviathan dataset are more diverse and the synthetic dataset contains more transactions per transaction; this can lead to a larger search space. Most of the patterns in the Leviathan and T23I67KD15K datasets are non-high-utility periodic frequent patterns, which require considerably more memory space to be saved. MHUPFPS prunes several non-high-utility periodic frequent patterns, resulting in improved performance.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>MHUPFPS runtime for various <italic>minSeqRa</italic> and <italic>maxStd</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-7.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>, the number of HUPFPS increased as <italic>maxStd</italic> increased. As <italic>maxStd</italic> increased, the number of patterns mined by the baseline algorithm was much larger than that in the non-baseline algorithm. For example, for the FIFA dataset, the number of patterns mined by the baseline algorithm decreased from 1,329 to 869 as <italic>maxStd</italic> decreased from ten to three. When <italic>minSeqRa</italic> &#x003D; 0.001 and <italic>maxStd</italic> decreased from ten to three, the number of patterns mined by the non-baseline algorithm reduced from 58 to 19. <xref ref-type="fig" rid="fig-8">Fig. 8</xref> also shows that for a constant <italic>minSeqRa</italic>, the number of mined patterns decreased as <italic>maxStd</italic> increased.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Number of patterns identified for various <italic>minSeqRa</italic> and <italic>maxStd</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-8.tif"/>
</fig>
<p>The influence of <italic>minSeqRa</italic> and <italic>maxStd</italic> on memory consumption is shown in <xref ref-type="fig" rid="fig-9">Fig. 9</xref>; as <italic>maxStd</italic> increased, the memory usage increased. This is because when <italic>maxStd</italic> increases, MHUPFPS requires more space to save the HUPFPS-list of patterns. For example, for the FIFA dataset, the memory consumption of MHUPFPS(0.001, 0.1, 10) increased from 678 to 868 MB as <italic>maxStd</italic> increased from three to ten (<xref ref-type="fig" rid="fig-9">Fig. 9</xref>). Our results indicate that changing the value of <italic>maxStd</italic> can control the number of patterns that are saved in the memory.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Memory usage for different parameter values for different datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-9.tif"/>
</fig>
</sec>
<sec id="s5_6">
<label>5.6</label>
<title>Influence Analysis of maxPr</title>
<p><xref ref-type="fig" rid="fig-10">Fig. 10</xref> shows the time variation of MHUPFPS for different values of <italic>maxPr</italic>. <xref ref-type="fig" rid="fig-11">Figs. 11</xref> and <xref ref-type="fig" rid="fig-12">12</xref> compare the changes in the number of HUPFPS and memory consumption when <italic>maxPr</italic> is varied. The four datasets had different sequence lengths; the longest was 99 and the shortest was eight. The value of <italic>maxPr</italic> was fixed at five, ten, and 20. As shown in <xref ref-type="fig" rid="fig-10">Fig. 10</xref>, decreasing the value of <italic>maxPr</italic> can significantly reduce the runtime of MHUPFPS. For example, for the FIFA dataset, the runtime was reduced by 12<inline-formula id="ieqn-454"><mml:math id="mml-ieqn-454"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula> when <italic>minSeqRa</italic> increased from 0 to 0.0001, and by 20<inline-formula id="ieqn-455"><mml:math id="mml-ieqn-455"><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula> when <italic>minSeqRa</italic> increased from 0. 0001 to 0.001. The runtime also reduced for the other datasets. Because <italic>maxPr</italic> limits the period of the pattern, the algorithm strictly filters out patterns with a period lower than <italic>maxPr</italic>.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>MHUPFPS runtime for various <italic>maxPr</italic> and <italic>minSupRa</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-10.tif"/>
</fig><fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>Number of patterns identified for various <italic>maxPr</italic> and <italic>minSupRa</italic> values</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-11.tif"/>
</fig><fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>Memory usage for different parameter values for different datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_27463-fig-12.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-11">Fig. 11</xref> shows that decreasing the value of <italic>maxPr</italic> can significantly reduce the number of patterns. For example, for the synthetic dataset, the number of mined patterns was 86 for <italic>minSupRa</italic> &#x003D; 0.1 and <italic>maxPr</italic> &#x003D; 20, which reduced to 54 for <italic>minSupRa</italic> &#x003D; 0.1 and <italic>maxPr</italic> &#x003D; 10. When <italic>minSupRa</italic> &#x003D; 0.1 and <italic>maxPr</italic> &#x003D; 5, the number of mined patterns reduced to 22. This is reasonable because <italic>maxPr</italic> enforces a very strict limit on the period of the patterns; hence, the algorithm requires that every period of every pattern is less than <italic>maxPr</italic>. Therefore, several patterns were filtered out.</p>
<p>As shown in <xref ref-type="fig" rid="fig-12">Fig. 12</xref>, as <italic>maxPr</italic> decreased, the memory usage significantly decreased for all datasets. This is reasonable because the algorithm has a stricter limit on the period of the patterns as <italic>maxPr</italic> decreases. Thus, MHUPFPS requires less space and reduces the number of patterns in the HUPFPS-list. For example, for the Leviathan dataset, the memory usage decreased from 3,948 to 783 MB as <italic>maxStd</italic> reduced from 20 to ten for <italic>supSupRa</italic> &#x003D; 0.15. The memory usage decreased to 155 MB as <italic>maxStd</italic> decreased from ten to five for <italic>supSupRa</italic> &#x003D; 0.15. This is because when <italic>maxPr</italic> decreases, the algorithm has a stricter limit on the period of patterns, meaning that MHUPFPS requires less memory to store the HUPFPS-list. Our results show that the number of patterns that are saved in the memory can be reduced by decreasing <italic>maxPr</italic>.</p>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion</title>
<p>Previous studies have only considered one factor, either periodicity or utility, and have yet to identify valuable patterns in multiple sequences. In this study, we combined the utility and periodicity and mined common high utility period frequent patterns in a set of sequences. The proposed MHUPFPS algorithm is based on a new data structure, HUPFPS-list, and a novel pruning strategy that is used to reduce the search space. The experimental results show that MHUPFPS is efficient and can filter out non-high-utility period frequent patterns. In the future, we plan to further optimize the proposed algorithm in terms of runtime and memory usage. In addition, we aim to locate other meaningful patterns.</p>
</sec>
</body>
<back>
<sec><title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest regarding this study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>1.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Schweizer</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Zehnder</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Wache</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Witschel</surname>, <given-names>H. F.</given-names></string-name>, <string-name><surname>Zanatta</surname>, <given-names>D.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2015</year>). <article-title>Using consumer behavior data to reduce energy consumption in smart homes: Applying machine learning to save energy without lowering comfort of inhabitants</article-title>. <conf-name>Proceeding of the IEEE 14th International Conference on Machine Learning and Applications (ICMLA)</conf-name>, <publisher-loc>Florida, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-2"><label>2.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>Y.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2022</year>). <article-title>Training effective deep reinforcement learning agents for real-time life-cycle production optimization</article-title>. <source>Journal of Petroleum Science and Engineering</source><italic>,</italic> <volume>208</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>109766</fpage>. <pub-id pub-id-type="doi">10.1016/j.petrol.2021.109766</pub-id></mixed-citation></ref>
<ref id="ref-3"><label>3.</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Aggarwal</surname>, <given-names>C. C.</given-names></string-name>, <string-name><surname>Bhuiyan</surname>, <given-names>M. A.</given-names></string-name>, <string-name><surname>Hasan</surname>, <given-names>M. A.</given-names></string-name></person-group> (<year>2014</year>). <chapter-title>Frequent pattern mining algorithms: A survey</chapter-title>. In: <source>Frequent pattern mining</source>, pp. <fpage>19</fpage>&#x2013;<lpage>64</lpage>. <publisher-loc>Switzerland</publisher-loc>: <publisher-name>Springer</publisher-name>.</mixed-citation></ref>
<ref id="ref-4"><label>4.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Vo</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Chi</surname>, <given-names>T. T.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>J.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2017</year>). <article-title>A survey of itemset mining</article-title>. <source>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery</source><italic>,</italic> <volume>7</volume><italic>(</italic><issue>4</issue><italic>),</italic> <fpage>e1207</fpage>. <pub-id pub-id-type="doi">10.1002/widm.1207</pub-id></mixed-citation></ref>
<ref id="ref-5"><label>5.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Berlingerio</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Pinelli</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Calabrese</surname>, <given-names>F.</given-names></string-name></person-group> (<year>2013</year>). <article-title>Abacus: Frequent pattern mining-based community discovery in multidimensional networks</article-title>. <source>Data Mining and Knowledge Discovery</source><italic>,</italic> <volume>27</volume><italic>(</italic><issue>3</issue><italic>),</italic> <fpage>294</fpage>&#x2013;<lpage>320</lpage>. <pub-id pub-id-type="doi">10.1007/s10618-013-0331-0</pub-id></mixed-citation></ref>
<ref id="ref-6"><label>6.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Halder</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Samiullah</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>Y. K.</given-names></string-name></person-group> (<year>2017</year>). <article-title>Supergraph based periodic pattern mining in dynamic social networks</article-title>. <source>Expert Systems with Applications</source><italic>,</italic> <volume>72</volume><italic>(</italic><issue>11</issue><italic>),</italic> <fpage>430</fpage>&#x2013;<lpage>442</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2016.10.033</pub-id></mixed-citation></ref>
<ref id="ref-7"><label>7.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname>, <given-names>M. A.</given-names></string-name>, <string-name><surname>Ullah</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Alsharif</surname>, <given-names>M. H.</given-names></string-name>, <string-name><surname>Alghtani</surname>, <given-names>A. H.</given-names></string-name>, <string-name><surname>Aly</surname>, <given-names>A. A.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2022</year>). <article-title>An efficient certificate-based aggregate signature scheme for internet of drones</article-title>. <source>Security and Communication Networks</source><italic>,</italic> <volume>2022</volume><italic>,</italic> <fpage>1</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1155/2022/9718580</pub-id></mixed-citation></ref>
<ref id="ref-8"><label>8.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mei</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Xiong</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>Y. C.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C. M.</given-names></string-name></person-group> (<year>2022</year>). <article-title>Blockchain-enabled privacy-preserving authentication mechanism for transportation CPS with cloud-edge computing</article-title>. <source>IEEE Transactions on Engineering Management</source><italic>,</italic> <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1109/TEM.2022.3159311</pub-id></mixed-citation></ref>
<ref id="ref-9"><label>9.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pan</surname>, <given-names>J. S.</given-names></string-name>, <string-name><surname>Hu</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Sn&#x00E1;&#x0161;el</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Chu</surname>, <given-names>S. C.</given-names></string-name></person-group> (<year>2022</year>). <article-title>A survey on binary metaheuristic algorithms and their engineering applications</article-title>. <source>Artificial Intelligence Review</source><italic>,</italic> <volume>13</volume><italic>(</italic><issue>6</issue><italic>),</italic> <fpage>1</fpage>&#x2013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1007/s10462-022-10328-9</pub-id>; <pub-id pub-id-type="pmid">36466763</pub-id></mixed-citation></ref>
<ref id="ref-10"><label>10.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Bhatia</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Hooda</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Namasudra</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Taniar</surname>, <given-names>D.</given-names></string-name></person-group> (<year>2022</year>). <article-title>Analyzing and classifying MRI images using robust mathematical modeling</article-title>. <source>Multimedia Tools and Applications</source><italic>,</italic> <volume>81</volume><italic>(</italic><issue>26</issue><italic>),</italic> <fpage>37519</fpage>&#x2013;<lpage>37540</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-022-13505-8</pub-id></mixed-citation></ref>
<ref id="ref-11"><label>11.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Malviya</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Namasudra</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Tiwary</surname>, <given-names>U. S.</given-names></string-name></person-group> (<year>2022</year>). <article-title>Experience replay-based deep reinforcement learning for dialogue management optimisation</article-title>. <source>Transactions on Asian and Low-Resource Language Information Processing</source>. <pub-id pub-id-type="doi">10.1145/3539223</pub-id></mixed-citation></ref>
<ref id="ref-12"><label>12.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pan</surname>, <given-names>J. S.</given-names></string-name>, <string-name><surname>Lv</surname>, <given-names>J. X.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>L. J.</given-names></string-name>, <string-name><surname>Weng</surname>, <given-names>S. W.</given-names></string-name>, <string-name><surname>Chu</surname>, <given-names>S. C.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2022</year>). <article-title>Golden eagle optimizer with double learning strategies for 3D path planning of uav in power inspection</article-title>. <source>Mathematics and Computers in Simulation</source><italic>,</italic> <volume>193</volume><italic>(</italic><issue>10</issue><italic>),</italic> <fpage>509</fpage>&#x2013;<lpage>532</lpage>. <pub-id pub-id-type="doi">10.1016/j.matcom.2021.10.032</pub-id></mixed-citation></ref>
<ref id="ref-13"><label>13.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Song</surname>, <given-names>P. C.</given-names></string-name>, <string-name><surname>Chu</surname>, <given-names>S. C.</given-names></string-name>, <string-name><surname>Pan</surname>, <given-names>J. S.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>H.</given-names></string-name></person-group> (<year>2022</year>). <article-title>Simplified phasmatodea population evolution algorithm for optimization</article-title>. <source>Complex &#x0026; Intelligent Systems</source><italic>,</italic> <volume>8</volume><italic>(</italic><issue>4</issue><italic>),</italic> <fpage>2749</fpage>&#x2013;<lpage>2767</lpage>. <pub-id pub-id-type="doi">10.1007/s40747-021-00402-0</pub-id></mixed-citation></ref>
<ref id="ref-14"><label>14.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname>, <given-names>T. Y.</given-names></string-name>, <string-name><surname>Kong</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>Y. C.</given-names></string-name>, <string-name><surname>Kumari</surname>, <given-names>S.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2022</year>). <article-title>Toward smart home authentication using puf and edge-computing paradigm</article-title>. <source>Sensors</source><italic>,</italic> <volume>22</volume><italic>(</italic><issue>23</issue><italic>),</italic> <fpage>9174</fpage>. <pub-id pub-id-type="doi">10.3390/s22239174</pub-id>; <pub-id pub-id-type="pmid">36501875</pub-id></mixed-citation></ref>
<ref id="ref-15"><label>15.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhao</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Zhu</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Jaing</surname>, <given-names>B.</given-names></string-name></person-group> (<year>2022</year>). <article-title>Cooperative energy dispatch of smart building cluster based on smart contracts</article-title>. <source>International Journal of Electrical Power &#x0026; Energy Systems</source><italic>,</italic> <volume>138</volume><italic>(</italic><issue>6</issue><italic>),</italic> <fpage>107896</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2021.107896</pub-id></mixed-citation></ref>
<ref id="ref-16"><label>16.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname>, <given-names>M. A.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Mohsan</surname>, <given-names>S. A. H.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>W. U.</given-names></string-name>, <string-name><surname>Nasralla</surname>, <given-names>M. M.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2022</year>). <article-title>Swarm of UAVs for network management in 6G: A technical review</article-title>. <source>IEEE Transactions on Network and Service Management</source><italic>,</italic> <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TNSM.2022.3213370</pub-id></mixed-citation></ref>
<ref id="ref-17"><label>17.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Kumari</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C. M.</given-names></string-name></person-group> (<year>2023</year>). <article-title>PSAP-WSN: A provably secure authentication protocol for 5G-based wireless sensor networks</article-title>. <source>Computer Modeling in Engineering &#x0026; Sciences</source><italic>,</italic> <volume>135</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>711</fpage>&#x2013;<lpage>732</lpage>. <pub-id pub-id-type="doi">10.32604/cmes.2022.022667</pub-id></mixed-citation></ref>
<ref id="ref-18"><label>18.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wu</surname>, <given-names>T. Y.</given-names></string-name>, <string-name><surname>Meng</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Kumari</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Pirouz</surname>, <given-names>M.</given-names></string-name></person-group> (<year>2023</year>). <article-title>Amassing the security: An enhanced authentication and key agreementprotocol for remote surgery in healthcare environment</article-title>. <source>Computer Modeling in Engineering &#x0026; Sciences</source><italic>,</italic> <volume>134</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>317</fpage>&#x2013;<lpage>341</lpage>. <pub-id pub-id-type="doi">10.32604/cmes.2022.019595</pub-id></mixed-citation></ref>
<ref id="ref-19"><label>19.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Han</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Cheng</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Xin</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Yan</surname>, <given-names>X.</given-names></string-name></person-group> (<year>2007</year>). <article-title>Frequent pattern mining: Current status and future directions</article-title>. <source>Data Mining and Knowledge Discovery</source><italic>,</italic> <volume>15</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>55</fpage>&#x2013;<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1007/s10618-006-0059-1</pub-id></mixed-citation></ref>
<ref id="ref-20"><label>20.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Duan</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Fu</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Luo</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Shi</surname>, <given-names>J.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2015</year>). <article-title>Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs</article-title>. <conf-name>Proceedings of the IEEE International Conference on Communications</conf-name>, <publisher-loc>London, UK</publisher-loc>.</mixed-citation></ref>
<ref id="ref-21"><label>21.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Mwamikazi</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Moghrabi</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Baudouin</surname>, <given-names>R.</given-names></string-name></person-group> (<year>2014</year>). <article-title>A dynamic questionnaire to further reduce questions in learning style assessment</article-title>. <conf-name>Proceedings of the IFIP International Conference on Artificial Intelligence Applications and Innovations</conf-name>, <conf-loc>Rhodes, Greece</conf-loc>.</mixed-citation></ref>
<ref id="ref-22"><label>22.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fernando</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Fromont</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Tuytelaars</surname>, <given-names>T.</given-names></string-name></person-group> (<year>2012</year>). <article-title>Effective use of frequent itemset mining for image classification</article-title>. <conf-name>Proceedings of the European Conference on Computer Vision</conf-name>, <publisher-loc>Florence, Italy</publisher-loc>.</mixed-citation></ref>
<ref id="ref-23"><label>23.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Pei</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Han</surname>, <given-names>J.</given-names></string-name></person-group> (<year>2011</year>). <article-title>Mining frequent trajectory patterns for activity monitoring using radio frequency tag arrays</article-title>. <source>IEEE Transactions on Parallel and Distributed Systems</source><italic>,</italic> <volume>23</volume><italic>(</italic><issue>11</issue><italic>),</italic> <fpage>2138</fpage>&#x2013;<lpage>2149</lpage>. <pub-id pub-id-type="doi">10.1109/TPDS.2011.307</pub-id></mixed-citation></ref>
<ref id="ref-24"><label>24.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Agrawal</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Srikant</surname>, <given-names>R.</given-names></string-name></person-group> (<year>1994</year>). <article-title>Fast algorithms for mining association rules</article-title>. <conf-name>Proceedings of the International Conference on Very Large Databases</conf-name>, vol. 1215. <publisher-loc>Santiago, Chile</publisher-loc>.</mixed-citation></ref>
<ref id="ref-25"><label>25.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Han</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>C.</given-names></string-name></person-group> (<year>2007</year>). <article-title>Frequent closed sequence mining without candidate maintenance</article-title>. <source>IEEE Transactions on Knowledge and Data Engineering</source><italic>,</italic> <volume>19</volume><italic>(</italic><issue>8</issue><italic>),</italic> <fpage>1042</fpage>&#x2013;<lpage>1056</lpage>. <pub-id pub-id-type="doi">10.1109/TKDE.2007.1043</pub-id></mixed-citation></ref>
<ref id="ref-26"><label>26.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Nkambou</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Nguifo</surname>, <given-names>E. M.</given-names></string-name></person-group> (<year>2008</year>). <article-title>A knowledge discovery framework for learning task models from user interactions in intelligent tutoring systems</article-title>. <conf-name>Proceedings of the Mexican International Conference on Artificial Intelligence</conf-name>, <publisher-loc>M&#x00E9;xico</publisher-loc>.</mixed-citation></ref>
<ref id="ref-27"><label>27.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Ziebarth</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Chounta</surname>, <given-names>I. A.</given-names></string-name>, <string-name><surname>Hoppe</surname>, <given-names>H. U.</given-names></string-name></person-group> (<year>2015</year>). <article-title>Resource access patterns in exam preparation activities</article-title>. <conf-name>Proceedings of the European Conference on Technology Enhanced Learning</conf-name>, <publisher-loc>Toledo, Spain</publisher-loc>.</mixed-citation></ref>
<ref id="ref-28"><label>28.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Pokou</surname>, <given-names>Y. J. M.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Moghrabi</surname>, <given-names>C.</given-names></string-name></person-group> (<year>2016</year>). <article-title>Authorship attribution using small sets of frequent part-of-speech skip-grams</article-title>. <conf-name>Proceedings of the Twenty-Ninth International Flairs Conference</conf-name>, <publisher-loc>Florida, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-29"><label>29.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Agrawal</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Srikant</surname>, <given-names>R.</given-names></string-name></person-group> (<year>1995</year>). <article-title>Mining sequential patterns</article-title>. <conf-name>Proceedings of the Eleventh International Conference on Data Engineering</conf-name>, <publisher-loc>Taipei, Taiwan</publisher-loc>.</mixed-citation></ref>
<ref id="ref-30"><label>30.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fan</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Ye</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>L.</given-names></string-name></person-group> (<year>2016</year>). <article-title>Malicious sequential pattern mining for automatic malware detection</article-title>. <source>Expert Systems with Applications</source><italic>,</italic> <volume>52</volume><italic>,</italic> <fpage>16</fpage>&#x2013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2016.01.002</pub-id></mixed-citation></ref>
<ref id="ref-31"><label>31.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Tanbeer</surname>, <given-names>S. K.</given-names></string-name>, <string-name><surname>Ahmed</surname>, <given-names>C. F.</given-names></string-name>, <string-name><surname>Jeong</surname>, <given-names>B. S.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>Y. K.</given-names></string-name></person-group> (<year>2009</year>). <article-title>Discovering periodic-frequent patterns in transactional databases</article-title>. <conf-name>Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining</conf-name>, <publisher-loc>Bangkok, Thailand</publisher-loc>.</mixed-citation></ref>
<ref id="ref-32"><label>32.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Amphawan</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Lenca</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Surarerks</surname>, <given-names>A.</given-names></string-name></person-group> (<year>2009</year>). <article-title>Mining top-k periodic-frequent pattern from transactional databases without support threshold</article-title>. <conf-name>Proceedings of the International Conference on Advances in Information Technology</conf-name>, <publisher-loc>Bangkok, Thailand</publisher-loc>.</mixed-citation></ref>
<ref id="ref-33"><label>33.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Surana</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name>, <string-name><surname>Reddy</surname>, <given-names>P. K.</given-names></string-name></person-group> (<year>2011</year>). <article-title>An efficient approach to mine periodic-frequent patterns in transactional databases</article-title>. <conf-name>Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining</conf-name>, <publisher-loc>Shenzhen, China</publisher-loc>.</mixed-citation></ref>
<ref id="ref-34"><label>34.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Rashid</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Karim</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Jeong</surname>, <given-names>B. S.</given-names></string-name>, <string-name><surname>Choi</surname>, <given-names>H. J.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2012</year>). <article-title>Efficient mining regularly frequent patterns in transactional databases</article-title>. <conf-name>Proceedings of the International Conference on Database Systems for Advanced Applications</conf-name>, <publisher-name>Busan, South Korea</publisher-name>.</mixed-citation></ref>
<ref id="ref-35"><label>35.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name>, <string-name><surname>Kitsuregawa</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Reddy</surname>, <given-names>P. K.</given-names></string-name></person-group> (<year>2016</year>). <article-title>Efficient discovery of periodic-frequent patterns in very large databases</article-title>. <source>Journal of Systems and Software</source><italic>,</italic> <volume>112</volume><italic>(</italic><issue>3</issue><italic>),</italic> <fpage>110</fpage>&#x2013;<lpage>121</lpage>. <pub-id pub-id-type="doi">10.1016/j.jss.2015.10.035</pub-id></mixed-citation></ref>
<ref id="ref-36"><label>36.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dinh</surname>, <given-names>D. T.</given-names></string-name>, <string-name><surname>Le</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Huynh</surname>, <given-names>V. N.</given-names></string-name></person-group> (<year>2018</year>). <article-title>An efficient algorithm for mining periodic high-utility sequential patterns</article-title>. <source>Applied Intelligence</source><italic>,</italic> <volume>48</volume><italic>(</italic><issue>12</issue><italic>),</italic> <fpage>4694</fpage>&#x2013;<lpage>4714</lpage>. <pub-id pub-id-type="doi">10.1007/s10489-018-1227-x</pub-id></mixed-citation></ref>
<ref id="ref-37"><label>37.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name>, <string-name><surname>Fujita</surname>, <given-names>H.</given-names></string-name></person-group> (<year>2018</year>). <article-title>Discovering periodic patterns common to multiple sequences</article-title>. <conf-name>Proceedings of the International Conference on Big Data Analytics and Knowledge Discovery</conf-name>, <publisher-loc>Regensburg, Germany</publisher-loc>.</mixed-citation></ref>
<ref id="ref-38"><label>38.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Duong</surname>, <given-names>Q. H.</given-names></string-name>, <string-name><surname>Dam</surname>, <given-names>T. L.</given-names></string-name></person-group> (<year>2016</year>). <article-title>PHM: Mining periodic high-utility itemsets</article-title>. <conf-name>Proceedings of the Industrial Conference on Data Mining</conf-name>, <publisher-loc>New York, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-39"><label>39.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Dinh</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Huynh</surname>, <given-names>V. N.</given-names></string-name>, <string-name><surname>Le</surname>, <given-names>B.</given-names></string-name></person-group> (<year>2017</year>). <article-title>Mining periodic high utility sequential patterns</article-title>. <conf-name>Proceedings of the Asian Conference on Intelligent Information and Database Systems</conf-name>, <publisher-loc>Kanazawa, Japan</publisher-loc>.</mixed-citation></ref>
<ref id="ref-40"><label>40.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Hong</surname>, <given-names>T. P.</given-names></string-name>, <string-name><surname>Chao</surname>, <given-names>H. C.</given-names></string-name></person-group> (<year>2017</year>). <article-title>FDHUP: Fast algorithm for mining discriminative high utility patterns</article-title>. <source>Knowledge and Information Systems</source><italic>,</italic> <volume>51</volume><italic>(</italic><issue>3</issue><italic>),</italic> <fpage>873</fpage>&#x2013;<lpage>909</lpage>. <pub-id pub-id-type="doi">10.1007/s10115-016-0991-3</pub-id></mixed-citation></ref>
<ref id="ref-41"><label>41.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Du</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Philip</surname>, <given-names>S. Y.</given-names></string-name></person-group> (<year>2021</year>). <article-title>TKUS: Mining top-<italic>k</italic> high utility sequential patterns</article-title>. <source>Information Sciences</source><italic>,</italic> <volume>570</volume><italic>(</italic><issue>4</issue><italic>),</italic> <fpage>342</fpage>&#x2013;<lpage>359</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2021.04.035</pub-id></mixed-citation></ref>
<ref id="ref-42"><label>42.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chen</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>C. M.</given-names></string-name></person-group> (<year>2022</year>). <article-title>OHUQI: Mining on-shelf high-utility quantitative itemsets</article-title>. <source>The Journal of Supercomputing</source><italic>,</italic> <volume>78</volume><italic>(</italic><issue>6</issue><italic>),</italic> <fpage>8321</fpage>&#x2013;<lpage>8345</lpage>. <pub-id pub-id-type="doi">10.1007/s11227-021-04218-0</pub-id></mixed-citation></ref>
<ref id="ref-43"><label>43.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name>, <string-name><surname>Fujita</surname>, <given-names>H.</given-names></string-name></person-group> (<year>2019</year>). <article-title>Efficient algorithms to identify periodic patterns in multiple sequences</article-title>. <source>Information Sciences</source><italic>,</italic> <volume>489</volume><italic>(</italic><issue>9</issue><italic>),</italic> <fpage>205</fpage>&#x2013;<lpage>226</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2019.03.050</pub-id></mixed-citation></ref>
<ref id="ref-44"><label>44.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Srikant</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Agrawal</surname>, <given-names>R.</given-names></string-name></person-group> (<year>1996</year>). <article-title>Mining sequential patterns: Generalizations and performance improvements</article-title>. <conf-name>Proceedings of the International Conference on Extending Database Technology</conf-name>, <publisher-loc>Avignon, France</publisher-loc>.</mixed-citation></ref>
<ref id="ref-45"><label>45.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Han</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Pei</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Mortazavi-Asl</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Dayal</surname>, <given-names>U.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2000</year>). <article-title>Freespan: Frequent pattern-projected sequential pattern mining</article-title>. <conf-name>Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>, <publisher-loc>Boston, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-46"><label>46.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Han</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Pei</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Mortazavi-Asl</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Pinto</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>Q.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2001</year>). <article-title>Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth</article-title>. <conf-name>Proceedings of the 17th International Conference on Data Engineering</conf-name>, <publisher-loc>Athens, Greece</publisher-loc>.</mixed-citation></ref>
<ref id="ref-47"><label>47.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Tang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Luo</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>M.</given-names></string-name></person-group> (<year>2012</year>). <article-title>Incorporating occupancy into frequent pattern mining for high quality pattern recommendation</article-title>. <conf-name>Proceedings of the 21st ACM International Conference on Information and Knowledge Management</conf-name>, <publisher-loc>Hawaii, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-48"><label>48.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Fung</surname>, <given-names>B. C.</given-names></string-name></person-group> (<year>2012</year>). <article-title>Direct discovery of high utility itemsets without candidate generation</article-title>. <conf-name>Proceedings of the IEEE 12th International Conference on Data Mining</conf-name>, <publisher-loc>Brussels, Belgium</publisher-loc>.</mixed-citation></ref>
<ref id="ref-49"><label>49.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Chao</surname>, <given-names>H. C.</given-names></string-name>, <string-name><surname>Tseng</surname>, <given-names>V. S.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2019</year>). <article-title>A survey of utility-oriented pattern mining</article-title>. <source>IEEE Transactions on Knowledge and Data Engineering</source><italic>,</italic> <volume>33</volume><italic>(</italic><issue>4</issue><italic>),</italic> <fpage>1306</fpage>&#x2013;<lpage>1327</lpage>. <pub-id pub-id-type="doi">10.1109/TKDE.2019.2942594</pub-id></mixed-citation></ref>
<ref id="ref-50"><label>50.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ahmed</surname>, <given-names>C. F.</given-names></string-name>, <string-name><surname>Tanbeer</surname>, <given-names>S. K.</given-names></string-name>, <string-name><surname>Jeong</surname>, <given-names>B. S.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>Y. K.</given-names></string-name></person-group> (<year>2009</year>). <article-title>Efficient tree structures for high utility pattern mining in incremental databases</article-title>. <source>IEEE Transactions on Knowledge and Data Engineering</source><italic>,</italic> <volume>21</volume><italic>(</italic><issue>12</issue><italic>),</italic> <fpage>1708</fpage>&#x2013;<lpage>1721</lpage>. <pub-id pub-id-type="doi">10.1109/TKDE.2009.46</pub-id></mixed-citation></ref>
<ref id="ref-51"><label>51.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Han</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Pei</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Yin</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Mao</surname>, <given-names>R.</given-names></string-name></person-group> (<year>2004</year>). <article-title>Mining frequent patterns without candidate generation: A frequent-pattern tree approach</article-title>. <source>Data Mining and Knowledge Discovery</source><italic>,</italic> <volume>8</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>53</fpage>&#x2013;<lpage>87</lpage>. <pub-id pub-id-type="doi">10.1023/B:DAMI.0000005258.31418.83</pub-id></mixed-citation></ref>
<ref id="ref-52"><label>52.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zihayat</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Davoudi</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>An</surname>, <given-names>A.</given-names></string-name></person-group> (<year>2017</year>). <article-title>Mining significant high utility gene regulation sequential patterns</article-title>. <source>BMC Systems Biology</source><italic>,</italic> <volume>11</volume><italic>(</italic><issue>6</issue><italic>),</italic> <fpage>1</fpage>&#x2013;<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1186/s12918-017-0475-4</pub-id>; <pub-id pub-id-type="pmid">29297335</pub-id></mixed-citation></ref>
<ref id="ref-53"><label>53.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Qu</surname>, <given-names>J.</given-names></string-name></person-group> (<year>2012</year>). <article-title>Mining high utility itemsets without candidate generation</article-title>. <conf-name>Proceedings of the 21st ACM International Conference on Information and Knowledge Management</conf-name>, <publisher-loc>Hawaii, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-54"><label>54.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Hong</surname>, <given-names>T. P.</given-names></string-name>, <string-name><surname>Tseng</surname>, <given-names>V. S.</given-names></string-name></person-group> (<year>2016</year>). <article-title>Efficient algorithms for mining high-utility itemsets in uncertain databases</article-title>. <source>Knowledge-Based Systems</source><italic>,</italic> <volume>96</volume><italic>(</italic><issue>5</issue><italic>),</italic> <fpage>171</fpage>&#x2013;<lpage>187</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2015.12.019</pub-id></mixed-citation></ref>
<ref id="ref-55"><label>55.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tseng</surname>, <given-names>V. S.</given-names></string-name>, <string-name><surname>Shie</surname>, <given-names>B. E.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>C. W.</given-names></string-name>, <string-name><surname>Philip</surname>, <given-names>S. Y.</given-names></string-name></person-group> (<year>2012</year>). <article-title>Efficient algorithms for mining high utility itemsets from transactional databases</article-title>. <source>IEEE Transactions on Knowledge and Data Engineering</source><italic>,</italic> <volume>25</volume><italic>(</italic><issue>8</issue><italic>),</italic> <fpage>1772</fpage>&#x2013;<lpage>1786</lpage>. <pub-id pub-id-type="doi">10.1109/TKDE.2012.59</pub-id></mixed-citation></ref>
<ref id="ref-56"><label>56.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>C. W.</given-names></string-name>, <string-name><surname>Zida</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Tseng</surname>, <given-names>V. S.</given-names></string-name></person-group> (<year>2014</year>). <article-title>FHM: Faster high-utility itemset mining using estimated utility co-occurrence pruning</article-title>. <conf-name>Proceedings of the International Symposium on Methodologies for Intelligent Systems</conf-name>, <publisher-loc>Roskilde, Denmark</publisher-loc>.</mixed-citation></ref>
<ref id="ref-57"><label>57.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Krishnamoorthy</surname>, <given-names>S.</given-names></string-name></person-group> (<year>2015</year>). <article-title>Pruning strategies for mining high utility itemsets</article-title>. <source>Expert Systems with Applications</source><italic>,</italic> <volume>42</volume><italic>(</italic><issue>5</issue><italic>),</italic> <fpage>2371</fpage>&#x2013;<lpage>2381</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2014.11.001</pub-id></mixed-citation></ref>
<ref id="ref-58"><label>58.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zida</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>C. W.</given-names></string-name>, <string-name><surname>Tseng</surname>, <given-names>V. S.</given-names></string-name></person-group> (<year>2017</year>). <article-title>EFIM: A fast and memory efficient algorithm for high-utility itemset mining</article-title>. <source>Knowledge and Information Systems</source><italic>,</italic> <volume>51</volume><italic>(</italic><issue>2</issue><italic>),</italic> <fpage>595</fpage>&#x2013;<lpage>625</lpage>. <pub-id pub-id-type="doi">10.1007/s10115-016-0986-0</pub-id></mixed-citation></ref>
<ref id="ref-59"><label>59.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chan</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Shen</surname>, <given-names>Y. D.</given-names></string-name></person-group> (<year>2003</year>). <article-title>Mining high utility itemsets</article-title>. <conf-name>Proceeding of the IEEE International Conference on Data Mining</conf-name>, <publisher-loc>Florida, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-60"><label>60.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Yao</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Hamilton</surname>, <given-names>H. J.</given-names></string-name>, <string-name><surname>Butz</surname>, <given-names>C. J.</given-names></string-name></person-group> (<year>2004</year>). <article-title>A foundational approach to mining itemset utilities from databases</article-title>. <conf-name>Proceedings of the 2004 SIAM International Conference on Data Mining</conf-name>, <publisher-loc>Florida, USA</publisher-loc>.</mixed-citation></ref>
<ref id="ref-61"><label>61.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Liao</surname>, <given-names>W. K.</given-names></string-name>, <string-name><surname>Choudhary</surname>, <given-names>A.</given-names></string-name></person-group> (<year>2005</year>). <article-title>A two-phase algorithm for fast discovery of high utility itemsets</article-title>. <conf-name>Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining</conf-name>, <publisher-loc>Hanoi, Vietnam</publisher-loc>.</mixed-citation></ref>
<ref id="ref-62"><label>62.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Le</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Dinh</surname>, <given-names>D. T.</given-names></string-name>, <string-name><surname>Huynh</surname>, <given-names>V. N.</given-names></string-name>, <string-name><surname>Nguyen</surname>, <given-names>Q. M.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name></person-group> (<year>2018</year>). <article-title>An efficient algorithm for hiding high utility sequential patterns</article-title>. <source>International Journal of Approximate Reasoning</source><italic>,</italic> <volume>95</volume><italic>(</italic><issue>5</issue><italic>),</italic> <fpage>77</fpage>&#x2013;<lpage>92</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijar.2018.01.005</pub-id></mixed-citation></ref>
<ref id="ref-63"><label>63.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Chao</surname>, <given-names>H. C.</given-names></string-name>, <string-name><surname>Fujita</surname>, <given-names>H.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2019</year>). <article-title>ProUM: High utility sequential pattern mining</article-title>. <conf-name>Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC)</conf-name>, <publisher-loc>Bari, Italy</publisher-loc>.</mixed-citation></ref>
<ref id="ref-64"><label>64.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gan</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Chao</surname>, <given-names>H. C.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2020</year>). <article-title>Fast utility mining on sequence data</article-title>. <source>IEEE Transactions on Cybernetics</source><italic>,</italic> <volume>51</volume><italic>(</italic><issue>2</issue><italic>),</italic> <fpage>487</fpage>&#x2013;<lpage>500</lpage>. <pub-id pub-id-type="doi">10.1109/TCYB.2020.2970176</pub-id>; <pub-id pub-id-type="pmid">32142464</pub-id></mixed-citation></ref>
<ref id="ref-65"><label>65.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name></person-group> (<year>2020</year>). <article-title>Discovering rare correlated periodic patterns in multiple sequences</article-title>. <source>Data &#x0026; Knowledge Engineering</source><italic>,</italic> <volume>126</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>101733</fpage>. <pub-id pub-id-type="doi">10.1016/j.datak.2019.101733</pub-id></mixed-citation></ref>
<ref id="ref-66"><label>66.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>J. C. W.</given-names></string-name>, <string-name><surname>Kiran</surname>, <given-names>R. U.</given-names></string-name></person-group> (<year>2019</year>). <article-title>Discovering stable periodic-frequent patterns in transactional data</article-title>. <conf-name>Proceedings of the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems</conf-name>, <publisher-loc>Kitakyushu, Japan</publisher-loc>.</mixed-citation></ref>
<ref id="ref-67"><label>67.</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>C. W.</given-names></string-name>, <string-name><surname>Duong</surname>, <given-names>Q. H.</given-names></string-name>, <string-name><surname>Dam</surname>, <given-names>T. L.</given-names></string-name>, <string-name><surname>&#x0160;ev&#x010D;&#x00ED;k</surname>, <given-names>L.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2017</year>). <article-title>PFPM: Discovering periodic frequent patterns with novel periodicity measures</article-title>. <conf-name>Proceedings of the 2nd Czech-China Scientific Conference 2016</conf-name>, <publisher-loc>Ostrava, Czech Republic</publisher-loc>.</mixed-citation></ref>
<ref id="ref-68"><label>68.</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fournier-Viger</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Gomariz</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Gueniche</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Soltani</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>C. W.</given-names></string-name> <etal>et al.</etal></person-group> (<year>2014</year>). <article-title>SPMF: A Java open-source pattern mining library</article-title>. <source>The Journal of Machine Learning Research</source><italic>,</italic> <volume>15</volume><italic>(</italic><issue>1</issue><italic>),</italic> <fpage>3389</fpage>&#x2013;<lpage>3393</lpage>.</mixed-citation></ref>
</ref-list>
</back>
</article>