Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 813983, 10 pages
http://dx.doi.org/10.1155/2014/813983
Research Article

Effect of Temporal Relationships in Associative Rule Mining for Web Log Data

Faculty of Computer Sciences and Information Technology, Universiti Putra Malaysia (UPM), 43400 Serdang, Selangor, Malaysia

Received 14 August 2013; Accepted 30 October 2013; Published 23 January 2014

Academic Editors: J. H. Sossa and B. Sun

Copyright © 2014 Nazli Mohd Khairudin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [7 citations]

The following is the list of published articles that have cited the current article.

  • Hiren Kumar Deva Sarma, and Swapnil Mishra, “Mining Time Series Data with Apriori Tid Algorithm,” 2016 International Conference on Information Technology (ICIT), pp. 160–164, . View at Publisher · View at Google Scholar
  • Hongping Wang, Xi Lu, Xiaoge Zhang, Qing Wang, and Yong Deng, “A Bio-Inspired Method for the Constrained Shortest Path Problem,” The Scientific World Journal, vol. 2014, pp. 1–11, 2014. View at Publisher · View at Google Scholar
  • Luis I. Lopera Gonzalez, and Oliver Amft, “Mining hierarchical relations in building management variables,” Pervasive and Mobile Computing, 2015. View at Publisher · View at Google Scholar
  • Hwankuk Kim, Jongin Lim, and Kyungho Lee, “A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • S. Sadesh, and R. C. Suganthe, “Effective Filtering of Query Results on Updated User Behavioral Profiles in Web Mining,” The Scientific World Journal, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Xikun Ma, Jingjie Yu, and Peng Wang, “An effective network security log mining algorithm based on fuzzy clustering,” Applied Mathematics and Information Sciences, vol. 10, no. 1, pp. 307–315, 2016. View at Publisher · View at Google Scholar
  • Ling Wang, Jianyao Meng, Peipei Xu, and Kaixiang Peng, “Mining Temporal Association Rules with Frequent Itemsets Tree,” Applied Soft Computing, 2017. View at Publisher · View at Google Scholar