Search Results - (( java implication _ algorithm ) OR ( using sequence ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
    Get full text
    Thesis
  2. 2

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…Future research includes exploring the use of separator Database in PrefixSpan with pseudoprojection to improve mining generalized sequential patterns, particularly in handling mining constrained sequential patterns.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Sequential pattern mining using PrefixSpan with pseudoprojection and separator database by Saputra, D., Rambli, D.R.A., Foong, Oi Mean

    Published 2008
    “…Future research includes exploring the use of Separator Database in PrefixSpan with pseudoprojection to improve mining constrained sequential patterns. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…The goals of this study are to propose a suitable technique for preprocessing web log data of Sultanah Bahiyah Library online databases that can reduce the file size and to analyze the user's access pattern of the online databases using web usage mining. In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  6. 6
  7. 7

    Data Mining for Building Neural Protein Sequence Classification Systems with Improved Performance by Wang, Dianhui, Lee, Nung Kion, Dillon, Tharam S.

    Published 2003
    “…These feature patterns were originally extracted by sequence alignment algorithms, which measure similarity between an unseen protein sequence and identified protein sequences. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  8. 8

    A comparative analysis of software engineering approaches for sequence analysis by Ahmad, M., Jung, L.T., Zaman, N.

    Published 2013
    “…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
    Get full text
    Get full text
    Book
  9. 9

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Evaluation and optimization of frequent association rule based classification by Izwan Nizal Mohd Shaharanee, Jastini Jamil

    Published 2014
    “…Deriving useful and interesting rules from a data mining system is an essential and important task. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Data mining of protein sequences with amino acid position-based feature encoding technique by Iqbal, M.J., Faye, I., Md Said, A., Samir, B.B.

    Published 2014
    “…In this paper, an amino acid position-based feature encoding technique is proposed to represent a protein sequence using a fixed length numeric feature vector. …”
    Get full text
    Get full text
    Article
  13. 13

    Sequential pattern mining on library transaction data by Sitanggang, Imas Sukaesih, Husin, Nor Azura, Agustina, Anita, Mahmoodian, Naghmeh

    Published 2010
    “…Application of data mining techniques in library data results interesting and useful patterns that can be used to improve services in university libraries. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Effective mining on large databases for intrusion detection by Adinehnia, Reza, Udzir, Nur Izura, Affendey, Lilly Suriani, Ishak, Iskandar, Mohd Hanapi, Zurina

    Published 2014
    “…Results show that higher detection rate is achieved when using apriori algorithm on the proposed dataset. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Sequential pattern mining using personalized minimum support threshold with minimum items by Alias, Suraya, Razali, Mohd Norhisham, Tan, Soo Fun, Sainin, Mohd Shamrie

    Published 2011
    “…This approach is then applied in the SPADE Algorithm using vector array as an extension from the previous method of using relational database and pre-defined threshold.The result from this experiment demonstrates that P_minsup with the complement of min_i value approach is applicable in assisting the process of determining the suitable threshold value to be used in detecting users' frequent k-sequential topics in navigating the World Wide Web (WWW).…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…In SWAC technique active user's access transaction pattern is matched with user access transaction pattern discovered from user access history based on mining techniques. A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
    Get full text
    Get full text
    Article
  18. 18

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…Both the data structures and the algorithms used will be presented according to the sequence of the methodology stages carried out in this research work. …”
    Get full text
    Get full text
    Article
  19. 19

    Time series data intelligent clustering algorithm for landslide displacement prediction by Han, Liu, Shang, Tao, Shu, Jisen, Khan Chowdhury, Ahmed Jalal

    Published 2018
    “…Clustering calculation of time series data set is carried out by using hierarchical clustering algorithm according to bending path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article