{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:10:02Z","timestamp":1746292202800,"version":"3.40.4"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091495"},{"type":"electronic","value":"9783319091501"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09150-1_54","type":"book-chapter","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T11:28:58Z","timestamp":1404300538000},"page":"734-746","source":"Crossref","is-referenced-by-count":1,"title":["A Sequential Data Preprocessing Tool for Data Mining"],"prefix":"10.1007","author":[{"given":"Zailani","family":"Abdullah","sequence":"first","affiliation":[]},{"given":"Tutut","family":"Herawan","sequence":"additional","affiliation":[]},{"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"given":"Mustafa Mat","family":"Deris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-981-4585-18-7_15","volume-title":"Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)","author":"Z. Abdullah","year":"2014","unstructured":"Abdullah, Z., Herawan, T., Deris, M.M.: Detecting Definite Least Association Rules in Medical Databases. In: Herawan, T., Deris, M.M., Abawajy, J. (eds.) Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013). LNEE, vol.\u00a0285, pp. 127\u2013134. Springer, Singapore (2014)"},{"key":"54_CR2","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-981-4585-18-7_19","volume-title":"Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)","author":"Z. Abdullah","year":"2014","unstructured":"Abdullah, Z., Herawan, T., Deris, M.M.: Mining Indirect Least Association Rule. In: Herawan, T., Deris, M.M., Abawajy, J. (eds.) Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013). LNEE, vol.\u00a0285, pp. 159\u2013166. Springer, Singapore (2014)"},{"key":"54_CR3","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-981-4585-18-7_16","volume-title":"Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013)","author":"Z. Abdullah","year":"2014","unstructured":"Abdullah, Z., Herawan, T., Deris, M.M.: Discovering Interesting Association Rules from Student Admission Dataset. In: Herawan, T., Deris, M.M., Abawajy, J. (eds.) Proceedings of the First International Conference on Advanced Data and Information Engineering (DaEng-2013). LNEE, vol.\u00a0285, pp. 135\u2013142. Springer, Singapore (2014)"},{"issue":"2","key":"54_CR4","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1504\/IJCEELL.2013.054288","volume":"23","author":"T. Herawan","year":"2013","unstructured":"Herawan, T., Vitasari, P., Abdullah, Z.: Mining critical least association rules of student suffering language and social anxieties. International Journal of Continuing Engineering Education and Life-Long Learning\u00a023(2), 128\u2013146 (2013)","journal-title":"International Journal of Continuing Engineering Education and Life-Long Learning"},{"issue":"1","key":"54_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJICA.2013.052350","volume":"5","author":"Z. Abdullah","year":"2013","unstructured":"Abdullah, Z., Herawan, T., Deris, M.M.: Tracing significant association rules using critical least association rules model. International Journal of Innovative Computing and Applications\u00a05(1), 3\u201317 (2013)","journal-title":"International Journal of Innovative Computing and Applications"},{"key":"54_CR6","series-title":"SCI","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-642-34300-1_18","volume-title":"Advanced Methods for Computational Collective Intelligence","author":"T. Herawan","year":"2013","unstructured":"Herawan, T., Noraziah, A., Abdullah, Z., Deris, M.M., Abawajy, J.H.: IPMA: Indirect patterns mining algorithm. In: Nguyen, N.T., Trawi\u0144ski, B., Katarzyniak, R., Jo, G.-S. (eds.) Adv. Methods for Comput. Collective Intelligence. SCI, vol.\u00a0457, pp. 187\u2013196. Springer, Heidelberg (2013)"},{"issue":"5","key":"54_CR7","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1080\/02533839.2012.679064","volume":"35","author":"Z. Abdullah","year":"2012","unstructured":"Abdullah, Z., Herawan, T., Deris, M.M.: Mining Highly-Correlated of Least Association Rules using Scalable Trie-based Algorithm. Journal of Chinese Institute of Engineers\u00a035(5), 547\u2013554 (2012)","journal-title":"Journal of Chinese Institute of Engineers"},{"issue":"2","key":"54_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.4018\/jkss.2012040102","volume":"3","author":"T. Herawan","year":"2012","unstructured":"Herawan, T., Vitasari, P., Abdullah, Z.: Mining interesting association rules on student suffering study anxieties using SLP-Growth algorithm. IGI-Global - International Journal of Knowledge and Systems Science\u00a03(2), 24\u201341 (2012)","journal-title":"IGI-Global - International Journal of Knowledge and Systems Science"},{"key":"54_CR9","unstructured":"Martinez-Maldonado, R., Yacef, K., Kay, J., Kharrufa, A., Al-Qaraghuli, A.: Analysing frequent sequential patterns of collaborative learning activity around an interactive tabletop. In: 4th International Conference on Educational Data Mining (EDM 2011), pp. 111\u2013120 (2011)"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns. In: Proceedings of the 11th International Conference on Data Engineering (ICDE), pp. 3\u201314. IEEE Computer Society (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"issue":"2","key":"54_CR11","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10844-006-0006-z","volume":"28","author":"J. Pei","year":"2007","unstructured":"Pei, J., Han, J., Wang, W.: Constraint-based Sequential Pattern Mining: the Pattern-Growth Methods. Journal of Intelligence and Information System\u00a028(2), 133\u2013160 (2007)","journal-title":"Journal of Intelligence and Information System"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Minos, G., Hill, M., Rastogi, R., Shim, K.: Mining sequential patterns with regular expression constraints. IEEE Transactions on Knowledge and Data Engineering\u00a014(3), 530\u2013552","DOI":"10.1109\/TKDE.2002.1000341"},{"key":"54_CR13","unstructured":"Kettner, J., Ebbers, M., O\u2019Brien, W., Ogden, B.: Introduction to the New Mainframe: z\/OS Basics. IBM Redbooks, NY (2011)"},{"issue":"2","key":"54_CR14","first-page":"63","volume":"6","author":"B.K. Bharadwaj","year":"2011","unstructured":"Bharadwaj, B.K., Pal, S.: Mining Educational Data to Analyze Students Performance. International Journal of Computer Science and Information Security (IJACSA)\u00a06(2), 63\u201369 (2011)","journal-title":"International Journal of Computer Science and Information Security (IJACSA)"},{"key":"54_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-73078-1_23","volume-title":"User Modeling 2007","author":"M. Cocea","year":"2007","unstructured":"Cocea, M., Weibelzahl, S.: Eliciting Motivation Knowledge from Log Files Towards Motivation Diagnosis for Adaptive Systems. In: Conati, C., McCoy, K., Paliouras, G. (eds.) UM 2007. LNCS (LNAI), vol.\u00a04511, pp. 197\u2013206. Springer, Heidelberg (2007)"},{"key":"54_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-540-24655-8_56","volume-title":"Advanced Web Technologies and Applications","author":"F. Masseglia","year":"2004","unstructured":"Masseglia, F., Tanasa, D., Trousse, B.: Web Usage Mining: Sequential Pattern Extraction with a Very Low Support. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol.\u00a03007, pp. 513\u2013522. Springer, Heidelberg (2004)"},{"issue":"1","key":"54_CR17","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.compedu.2007.05.016","volume":"51","author":"C. Romero","year":"2008","unstructured":"Romero, C., Ventura, S., Garc\u00eda, E.: Data mining in course management systems: Moodle case study and tutorial. Computers & Education\u00a051(1), 368\u2013384 (2008)","journal-title":"Computers & Education"},{"issue":"3","key":"54_CR18","first-page":"403","volume":"2","author":"A. Lile","year":"2011","unstructured":"Lile, A.: Analyzing E-Learning Systems Using Educational Data Mining Techniques. Mediterranean Journal of Social Sciences\u00a02(3), 403\u2013419 (2011)","journal-title":"Mediterranean Journal of Social Sciences"},{"key":"54_CR19","first-page":"970","volume":"26","author":"M.H.A. Wahab","year":"2008","unstructured":"Wahab, M.H.A., Mohd, M.N., Hanafi, H.F., Mohsin, M.F.M.: Data Pre-processing on Web Server Logs for Generalized. Proceedings of World Academic of Science, Engineering and Technology\u00a026, 970\u2013977 (2008)","journal-title":"Proceedings of World Academic of Science, Engineering and Technology"},{"key":"54_CR20","unstructured":"Castellano, G., Fanelli, A.M., Torsello, M.A.: Log Data Preparation for Mining Web Usage Patterns. In: IADIS International Conference Applied Computing, pp. 371\u2013378 (2007)"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"Salama, S.E., Marie, M.I., El-Fangary, L.M., Helmy, Y.K.: Web Server Logs for Preprocessing for Web Intrusion Detection. Computer and Information Science\u00a04(4), 123\u2013133 (2011); Canadian Center of Science and Education","DOI":"10.5539\/cis.v4n4p123"},{"key":"54_CR22","doi-asserted-by":"crossref","unstructured":"Li, Y., Feng, B., Mao, Q.: Research on Path Completion Technique in Web Usage Mining. In: IEEE International Symposium on Computer Science and Computational Technology, pp. 554\u2013559 (2008)","DOI":"10.1109\/ISCSCT.2008.151"},{"issue":"3","key":"54_CR23","first-page":"14","volume":"2","author":"P. Patil","year":"2012","unstructured":"Patil, P., Patil, U.: Preprocessing of web server log file for web mining. World Journal of Science and Technology\u00a02(3), 14\u201318 (2012)","journal-title":"World Journal of Science and Technology"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, G., Zhang, M.: The Algorithm of Data Preprocessing in Web Log Mining Based on Cloud Computing. In: Proc. of International Conference on Information Technology and Management Science, pp. 468\u2013474 (2012)","DOI":"10.1007\/978-3-642-34910-2_54"},{"issue":"2","key":"54_CR25","first-page":"154","volume":"15","author":"S. Valsamidis","year":"2012","unstructured":"Valsamidis, S., Kontogiannis, S., Kazanidis, I., Theodosiou, T., Karakos, A.: A Clustering Methodology of Web Log Data for Learning Management Systems. Educational Technology & Society\u00a015(2), 154\u2013167 (2012)","journal-title":"Educational Technology & Society"},{"issue":"3","key":"54_CR26","first-page":"334","volume":"2","author":"M. Marija Blagojevic","year":"2012","unstructured":"Marija Blagojevic, M., Micic, Z.: Contribution to the Creation Of DMX Queries in Mining Student Data. Int. J. Emerg. Sci.\u00a02(3), 334\u2013344 (2012)","journal-title":"Int. J. Emerg. Sci."},{"key":"54_CR27","unstructured":"Romero, C., Porras, A., Ventura, S., Hervas, C., Zafra, A.: Using Sequential Pattern Mining for Links Recommendation in Adaptive Hypermedia Educational Systems. In: International Conference Current Developments in Technology-Assisted Educations, pp. 1015\u20131020 (2006)"},{"key":"54_CR28","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Mortazavi-Asl, B., Chen, Q., Dayal, U., Hsu, M.-C.: FreeSpan: Frequent Pattern-Projected Sequential Pattern Mining. In: Proc. 2000 ACM SIGKDD Int\u2019l Conf. Knowledge Discovery in Databases (KDD 2000), pp. 355\u2013359 (2000)","DOI":"10.1145\/347090.347167"},{"key":"54_CR29","first-page":"3","volume-title":"Proceedings of the Fifth Int. Conference on Extending Database Technology","author":"R. Agrawal","year":"1996","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns: Generalizations and Performance Improvements. In: Proceedings of the Fifth Int. Conference on Extending Database Technology, pp. 3\u201317. Avignon, France (1996)"},{"key":"54_CR30","doi-asserted-by":"crossref","unstructured":"Pei, J., Han, J., Mortazavi-Asl, B., Zhu, H.: Mining Access Patterns Efficiently from Web Logs. In: Proceedings of the 4th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PADKK 2000), Current Issues and New Applications, pp. 396\u2013407 (2000)","DOI":"10.1007\/3-540-45571-X_47"},{"key":"54_CR31","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"40","author":"M. Zaki","year":"2001","unstructured":"Zaki, M.: SPADE: An Efficient Algorithm for Mining Frequent Sequences. Machine Learning\u00a040, 31\u201360 (2001)","journal-title":"Machine Learning"},{"issue":"10","key":"54_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2004.54","volume":"16","author":"J. Pei","year":"2004","unstructured":"Pei, J., Han, J., Mortazavi-Asl, W.J., Pinto, H., Chen, Q., Dayal, U., Hsu, M.-C.: Mining Sequential Patterns by Pattern-Growth: The PrefixSpan Approach. IEEE Transactions on Knowledge and Data Engineering\u00a016(10), 1\u201317 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"54_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-20149-3_18","volume-title":"Database Systems for Advanced Applications","author":"B.-E. Shie","year":"2011","unstructured":"Shie, B.-E., Hsiao, H.-F., Tseng, V.S., Yu, P.S.: Mining high utility mobile sequential patterns in mobile commerce environments. In: Yu, J.X., Kim, M.H., Unland, R. (eds.) DASFAA 2011, Part I. LNCS, vol.\u00a06587, pp. 224\u2013238. Springer, Heidelberg (2011)"},{"key":"54_CR34","doi-asserted-by":"crossref","unstructured":"Ahmed, C.F., Tanbeer, S.K., Jeong, B.S.: Mining High Utility Web Access Sequences in Dynamic Web Log Data. In: Proceeding of: 11th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel\/Distributed Computing, SNPD 2010, pp. 76\u201381 (2010)","DOI":"10.1109\/SNPD.2010.21"},{"key":"54_CR35","doi-asserted-by":"crossref","unstructured":"Yin, J., Zheng, Z., Cao, L.: USpan: An Efficient Algorithm for Mining High Utility Sequential Patterns. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 660\u2013668 (2012)","DOI":"10.1145\/2339530.2339636"},{"issue":"1","key":"54_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2013010101","volume":"9","author":"H. Kalia","year":"2013","unstructured":"Kalia, H., Dehuri, S., Ghosh, A.: A Survey on Fuzzy Association Rule Mining. International Journal of Data Warehousing and Mining\u00a09(1), 1\u201327 (2013)","journal-title":"International Journal of Data Warehousing and Mining"},{"issue":"2","key":"54_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2012040101","volume":"8","author":"R.V. Priya","year":"2012","unstructured":"Priya, R.V., Vadivel, A.: User Behaviour Pattern Mining from Weblog. International Journal of Data Warehousing and Mining\u00a08(2), 1\u201322 (2012)","journal-title":"International Journal of Data Warehousing and Mining"},{"issue":"1","key":"54_CR38","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1080\/15501320601069499","volume":"3","author":"D. Taniar","year":"2007","unstructured":"Taniar, D., Goh, J.: On Mining Movement Pattern from Mobile Users. International Journal of Distributed Sensor Networks\u00a03(1), 69\u201386 (2007)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"54_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-540-24768-5_58","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"O. Daly","year":"2004","unstructured":"Daly, O., Taniar, D.: Exception Rules Mining Based on Negative Association Rules. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03046, pp. 543\u2013552. Springer, Heidelberg (2004)"},{"issue":"2","key":"54_CR40","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/j.amc.2008.05.020","volume":"205","author":"D. Taniar","year":"2008","unstructured":"Taniar, D., Rahayu, W., Lee, V.C.S., Daly, O.: Exception rules in association rule mining. Applied Mathematics and Computation\u00a0205(2), 735\u2013750 (2008)","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"54_CR41","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1504\/IJBIDM.2007.012945","volume":"2","author":"M.Z. Ashrafi","year":"2007","unstructured":"Ashrafi, M.Z., Taniar, D., Smith, K.A.: Redundant association rules reduction techniques. International Journal of Business Intelligence and Data Mining\u00a02(1), 29\u201363 (2007)","journal-title":"International Journal of Business Intelligence and Data Mining"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09150-1_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:56:49Z","timestamp":1746291409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09150-1_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091495","9783319091501"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09150-1_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}