{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:42:24Z","timestamp":1740156144373,"version":"3.37.3"},"reference-count":10,"publisher":"Wiley","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2012-0000478"],"award-info":[{"award-number":["2012-0000478"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>Discovering access patterns from web log data is a typical sequential pattern mining application, and a lot of access pattern mining algorithms have been proposed. In this paper, we propose an improved approach of Gap-BIDE algorithm to extract user access patterns from web log data. Compared with the previous Gap-BIDE algorithm, a process of getting a large event set is proposed in the provided algorithm; the proposed approach can find out the frequent events by discarding the infrequent events which do not occur continuously in an accessing time before generating candidate patterns. In the experiment, we compare the previous access pattern mining algorithm with the proposed one, which shows that our approach is very efficient in discovering access patterns in large database.<\/jats:p>","DOI":"10.1155\/2012\/593147","type":"journal-article","created":{"date-parts":[[2012,8,15]],"date-time":"2012-08-15T17:00:52Z","timestamp":1345050052000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["An Application of Improved Gap-BIDE Algorithm for Discovering Access Patterns"],"prefix":"10.1155","volume":"2012","author":[{"given":"Xiuming","family":"Yu","sequence":"first","affiliation":[{"name":"Database and Bioinformatics Laboratory, Chungbuk National University, Cheongju 361-763, Republic of Korea"}]},{"given":"Meijing","family":"Li","sequence":"additional","affiliation":[{"name":"Database and Bioinformatics Laboratory, Chungbuk National University, Cheongju 361-763, Republic of Korea"}]},{"given":"Taewook","family":"Kim","sequence":"additional","affiliation":[{"name":"Database and Bioinformatics Laboratory, Chungbuk National University, Cheongju 361-763, Republic of Korea"}]},{"given":"Seon-phil","family":"Jeong","sequence":"additional","affiliation":[{"name":"Division of Science and Technology, BNU-HKBU United International College, Zhuhai 519-085, China"}]},{"given":"Keun Ho","family":"Ryu","sequence":"additional","affiliation":[{"name":"Database and Bioinformatics Laboratory, Chungbuk National University, Cheongju 361-763, Republic of Korea"},{"name":"Division of Science and Technology, BNU-HKBU United International College, Zhuhai 519-085, China"},{"name":"Multimedia Systems Laboratory, School of Computer Science and Engineering, The University of Aizu, Aizu-Wakamatsu, Fukushima 965-8580, Japan"}]}],"member":"311","reference":[{"issue":"1","key":"1","volume":"3","year":"2011","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"1","key":"2","volume":"7","year":"2010","journal-title":"International Journal of Computer Science Issue"},{"issue":"7","key":"3","volume":"11","year":"2010","journal-title":"International Journal of Computer Applications (0975\u20138887)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1531817.1531825"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.9"},{"key":"8","first-page":"87","volume":"42","year":"2011","journal-title":"Genres on the Web"},{"issue":"11","key":"9","volume":"2","year":"2004","journal-title":"Journal of Business & Economics Research"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824798"},{"key":"17","first-page":"3","volume":"1057","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1043"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/593147.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/593147.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/593147.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T16:33:40Z","timestamp":1470155620000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/acisc\/2012\/593147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":10,"alternative-id":["593147","593147"],"URL":"https:\/\/doi.org\/10.1155\/2012\/593147","relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"type":"print","value":"1687-9724"},{"type":"electronic","value":"1687-9732"}],"subject":[],"published":{"date-parts":[[2012]]}}}