Jongsu Han

Learn More
Mining frequent web access patterns from large data (web log) is one significant application of sequential pattern mining. Web access patterns are set of frequent sub sequences that are useful to know user behaviour in real time in order to make dynamic decisions. Techniques for extracting web access patterns from data available in two flavours: apriori(More)
Temporal databases added a new dimension to traditional transaction databases. This dimension is the life time of each item, i.e. exhibition period, starting from the partition when this item appears in the transaction database to the partition when this item no longer exists. Mining temporal association rules became very interesting topic in many(More)
The essential problem in many data mining applications is mining frequent item sets such as the discovery of association rules, patterns, and many other important discovery tasks. Fast and less memory utilization for solving the problems of frequent item sets are highly required in transactional databases. Methods for mining frequent item sets have been(More)
WTLS as a secure protocol of WAP makes TLS that is used in wireless Internet protocol for TCP security is appropriate to wireless environments [1][2]. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of four protocols, such as Handshake, ChangeCipherSpec, Alert, Application Data. In this paper we analyze properties of(More)
  • 1