Search Results - (( java implementation path algorithm ) OR ( using (sequences OR sequence) mining algorithm ))

Refine Results
  1. 1

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
    Get full text
    Thesis
  2. 2

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Data mining of protein sequences with amino acid position-based feature encoding technique by Iqbal, M.J., Faye, I., Md Said, A., Samir, B.B.

    Published 2014
    “…In this paper, an amino acid position-based feature encoding technique is proposed to represent a protein sequence using a fixed length numeric feature vector. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A comparative analysis of software engineering approaches for sequence analysis by Ahmad, M., Jung, L.T., Zaman, N.

    Published 2013
    “…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
    Get full text
    Get full text
    Book
  7. 7

    Sequential pattern mining using PrefixSpan with pseudoprojection and separator database by Saputra, D., Rambli, D.R.A., Foong, Oi Mean

    Published 2008
    “…Sequential pattern mining is a new branch of data mining science that solves inter-transaction pattern mining problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…The P_minsup is generated for each k-sequence by analyzing the overall support pattern distribution of the click stream data; while the min_i value gives the user the flexibility to gain control on the number of patterns to be generated on the next k-sequence by using the top min_i items. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…The goals of this study are to propose a suitable technique for preprocessing web log data of Sultanah Bahiyah Library online databases that can reduce the file size and to analyze the user's access pattern of the online databases using web usage mining. In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Sequential pattern mining on library transaction data by Sitanggang, Imas Sukaesih, Husin, Nor Azura, Agustina, Anita, Mahmoodian, Naghmeh

    Published 2010
    “…Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A bioinformatics approach to analyse a fatty acid and retinol binding protein secreted by ancylostoma caninum: an approach tow ards hookworms vaccine discovery / Normalisa Mohd Sap... by Mohd Sapian, Normalisa

    Published 2009
    “…Recently, vaccine development has taken advantage of the genome sequence of pathogenic bacteria and parasites. With the advent of whole-genome sequencing and advances in bioinformatics, this approach can now mine the sequences for potential surface targets using various algorithms, characterize these gene targets and choose primers for cloning, all before one enters the laboratory. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
    Get full text
    Get full text
    Thesis