Search Results - (( java implementation path algorithm ) OR ( using (sequences OR sequence) mining algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- mining algorithm »
- path algorithm »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
Get full text
Thesis -
2
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
Get full text
Get full text
Thesis -
3
-
4
Data mining of protein sequences with amino acid position-based feature encoding technique
Published 2014“…In this paper, an amino acid position-based feature encoding technique is proposed to represent a protein sequence using a fixed length numeric feature vector. …”
Get full text
Get full text
Article -
5
Analyzing DNA Sequences Using Clustering Algorithm
Published 2009Get full text
Get full text
Get full text
Thesis -
6
A comparative analysis of software engineering approaches for sequence analysis
Published 2013“…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
Get full text
Get full text
Book -
7
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
Published 2008“…Sequential pattern mining is a new branch of data mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Conference or Workshop Item -
8
Sequential pattern mining using personalized minimum support threshold with minimum items
Published 2011“…The P_minsup is generated for each k-sequence by analyzing the overall support pattern distribution of the click stream data; while the min_i value gives the user the flexibility to gain control on the number of patterns to be generated on the next k-sequence by using the top min_i items. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…The goals of this study are to propose a suitable technique for preprocessing web log data of Sultanah Bahiyah Library online databases that can reduce the file size and to analyze the user's access pattern of the online databases using web usage mining. In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
Get full text
Get full text
Get full text
Proceeding -
12
Evaluation and optimization of frequent association rule based classification
Published 2014“…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
Get full text
Get full text
Get full text
Article -
13
Sequential pattern mining on library transaction data
Published 2010“…Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. …”
Get full text
Get full text
Conference or Workshop Item -
14
Effective mining on large databases for intrusion detection
Published 2014“…Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. …”
Get full text
Get full text
Conference or Workshop Item -
15
A bioinformatics approach to analyse a fatty acid and retinol binding protein secreted by ancylostoma caninum: an approach tow ards hookworms vaccine discovery / Normalisa Mohd Sap...
Published 2009“…Recently, vaccine development has taken advantage of the genome sequence of pathogenic bacteria and parasites. With the advent of whole-genome sequencing and advances in bioinformatics, this approach can now mine the sequences for potential surface targets using various algorithms, characterize these gene targets and choose primers for cloning, all before one enters the laboratory. …”
Get full text
Get full text
Thesis -
16
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
17
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
18
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis
