Definition 8, Utility frequent sequential pattern: A subsequence r is called a utility frequent sequential pattern (FSP) if USV min_uti, where min_uti is a predefined minimum utility threshold. 1708-1721, 2009. For both datasets different minimum utility thresholds have been used. After getting SMU and TSMU, we generate Subsequence-1 SUB and USV values of all the service which is shown in Table 4. The total SMU of database D, TSMU, is the summation of the SMU values of all sequences in D [11]. Figures 5 (a) and (b) show memory consumption on the kosarak and retail dataset, respectively.

59, no. A particular user may access series of services at different times at different locations or a single location. A tree-based high utility itemset mining algorithm MU-Growth is proposed by Yun et al. These web services are lightweight applications used to perform a specific task such as booking a ticket through a mobile app or sending a message through WhatsApp. The above steps are recursively applied to generate FSP-n and FSUBP-n patterns. 49-65, 2014. The important part is pairs or larger sets of items that occur much more frequently than what would be looking for were the items bought separately. ACM, Beijing, China, 2012, pp. We have adopted minimum utility value to mine frequent utility patterns. In literature, various approaches are available for extracting useful frequent patterns using a utility from transactional databases. 23 de Octubre de 2017; Revisado: As seen in figure 3 (a), when the minimum utility threshold increases from 0.20% to 0.60%, execution time is varied for all approaches. The experiments ran in the Windows 7 operating system. In addition, the USpan approach has to spend a great deal of execution time using an LQS-Tree structure [25]. Asi, J. Wang, and Q. Chen. Agree Figure 2 shows the utility-value distribution of all the mobile web services generated by the simulation model in the utility table. In this paper, an efficient approach, Utility Based Frequent Pattern Mining, is proposed. Figures 3, 4 and 5 show that the UBFPM approach reduces the execution time as well as memory usage. 1-17. Li, J.-S. Yeh and C.-C.Chang, Isolated items discarding strategy for discovering high utility itemsets, Data & Knowledge Engineering, vol. More accurate frequent upper bounds are also computed for enhancing the filtration of service sequence. Figure 3:Performance comparison on the synthetic dataset, 4.3 Performance Comparison on Real Datasets. A major chain might sell 10, 000, 000 variety of items and collect data about billions of market baskets. A substructure can allude to different structural forms, such as subtrees or sublattices, which may be combined with subsequences. In terms of execution time, the approach is more efficient while the minimum utility threshold is less than 0.60%. 181-198, 2011. 11, no. 8, pp. The data can be summarized into sequential patterns, which can be indexed to simplify similarity search or comparative analysis. [Links], [31] U. Yun, H. Ryang and K.H. (t=3 because p4 is a subsequence of ID 1, 4 and 7, as of definition 1). acknowledge that you have read and understood our, GATE CS Original Papers and Official Keys, ISRO CS Original Papers and Official Keys, ISRO CS Syllabus for Scientist/Engineer Exam, SQL | Join (Inner, Left, Right and Full Joins), Introduction of DBMS (Database Management System) | Set 1, Difference between Primary Key and Foreign Key, Difference between Clustered and Non-clustered index, Types of Keys in Relational Model (Candidate, Super, Primary, Alternate and Foreign), Difference between DELETE, DROP and TRUNCATE, Difference between Primary key and Unique key, Introduction of 3-Tier Architecture in DBMS | Set 2, Distance formula - Coordinate Geometry | Class 10 Maths. Preliminaries and problems are defined in section 3. 21, no. Yun et al. ACM, Washington, DC, 2010, pp. 7, no. There are various applications of Pattern Mining which are as follows . The main reason for this is that the maximum utility value in a services sequence was more suitable as an upper bound of any subsequence in a sequence. Through data analysis supermarket salesperson observed that people who buy diapers, probably will have a child in their house and if they buy diaper they will usually not buy beer, they will unlikely to be drinking in a bar. The native application of the market basket model was the analysis of true market baskets. proposed the FP-Growth algorithm [10]. Agrawal et al. This data generator produces the mobile web services sequence data. If a service provider knows the frequent patterns of any sequence beforehand, they can take decisions to enhance their business effortlessly. 11, pp. Figure 4 shows that MU-Growth also performs well for both datasets. 1, pp. [Links], [19] J. Pei, J. Han, B.M. They are also used to modify sequences and SMU values. proposed the AprioriAll, AprioriSome and DynamicSome algorithms for sequential pattern mining [2]. The proposed approach can discover highly frequent FSUBP patterns and sequential FSP patterns of service sequences. As figure 3 (b) shows for small data size (100k) all algorithms take approximately the same execution time, but when the number of sequences is increased (about 200k or more), the previous algorithm takes more time, while UBFPM performs well. Utility based approach can be used to discovered frequent patterns from mobile web services sequences. Get access to ad-free content, doubt assistance and more! Frequent pattern generation is possible using these datasets. Experimental results showed that UBFPM extracts frequent patterns faster than the state-of-the-art approaches [5], [22], [23], [31]. Second, sequences are modified and new SMUs are calculated based on FSUBP-1 patterns. For frequent pattern mining, Apriori was proposed [1], and it has been revealed that the algorithm has limitations, multiple scans and generating a large number of candidate itemsets. To extract the interesting pattern of services, data mining techniques are used. Then its USV is (0.4+0.4+0.4+0.4+0.4+0.4+0.4)/8=35%. [Links], [14] Y._C. [Links], [16] K. K. Mohbey, High fuzzy utility based frequent patterns mining approach for mobile web services sequences, International Journal of Engineering-Transactions B: Applications, vol. Thus, the utility upper bound reduction for subsequences in mining is quite important. To enhance the performance of utility mining and getting higher itemset Tseng et al. 31-52., 2018 Here Home, Hospital, Restaurant, Park, etc., are the different locations and WhatsApp, News, Facebook, Chat, etc., are mobile web services which as denoted by S1, S2, S3 and so on. [Links], [12] G. C. Lan, T. P. Hong and V. S. Tseng, Sequential utility mining with the maximum measure, in Proceedings of The 29th Workshop on Combinatorial Mathematics and Computation Theory, Taipei, Taiwan, 2012, pp. In this figure the rate of memory usage also decreases for other approaches, but UBFPM frees more memory space for execution. Memory usage is also shown in figure 5 (b) for the retail dataset. Figure 4 shows the experimental results of performance evaluation on a synthetic dataset. proposed a new research approach, high utility sequential pattern mining, in which they consider the relationship order of an itemset with quantity and profit. One more example is beer and diapers . Other approaches generate a more FSUBP pattern, while UBFPM generates less frequent patterns. 3, pp. In figure 1, different mobile web services are accessed by the mobile users at different locations. Figure 5 (a) indicates that when the minimum utility increases from 1000000 to 3000000, memory usage gradually decreases. 198-217, 2008. To handle this, Yun et al. 2, pp. Features :Now, you will see the features of frequent Itemsets in data analytics. Another method, Incremental High Utility Pattern (IHUP) was proposed by Ahmed et al. If min_uti=25%, then the sequence is a FSP. What are the Applications of Electrolysis? [Links], [28] U. Yun and J. J. Leggett, WFIM: Weighted frequent itemset mining with a weight range and a minimum weight, in Proceedings of the 2005 SIAM International Conference on Data Mining. Pattern analysis is beneficial in the analysis of spatiotemporal information, timeseries data, image data, video data, and multimedia data. Definition 5, Utility of a subsequence: The utility value of a mobile web services subsequence r, Sr is the summation of utility values of all mobile web services in r over the number of sequence in r [11]. dataset Problem statement: Mobile web service frequent pattern mining is a new application of frequent pattern mining as well as mobile computing. 1994, pp. 1, pp. Site 1 : Frequent Itemset Mining Dataset Repository http://fimi.ua.ac.be/data/ The same thing is applicable to different data sizes. Where t is the number of times where p appears as a subsequence in all the sequences of the database D. For example, if we want to find the USV of sequence ID 4, i.e., then it is. [Links], [22] V. S. Tseng, C. W. Wu, B. E. Shie, and P. S. Yu, UP-Growth: an efficient algorithm for high utility itemset mining, in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. The results show that the proposed approach is more suitable while minimum utility threshold is increasing from smaller to higher. But when the minimum utility is higher than 0.60% this variation goes down and above 1% execution time is approximately similar. Generalized Sequential Patterns (GSP) [21] and PrefixSpan [19] approaches were later developed for enhancing execution efficiency in sequential pattern mining. Next, a postfix database is generated for each frequent web service. [Links], [26] U. Yun, A new framework for detecting weighted sequential patterns in large sequence databases, Knowledge-Based Systems, vol. Such architecture or cluster discovery can be used as preprocessing for additional sophisticated data mining. Given the DBLP data set, for example, frequent pattern mining can simply discover interesting clusters like coauthor clusters (by determining authors who generally collaborate) and conference clusters (by determining the sharing of several authors and terms). proposed a valuable pattern mining approach to discover high utility itemsets in different shopping websites using quantities and profits [20]. What are the applications of Text Mining? A= and B=. Consumers purchase behavior extraction is the main use of sequential pattern mining. They apply this approach to the traditional transaction and items. The utility-based approach can be used to discover frequent patterns from mobile web services sequences. [Links], [18] K. K. Mohbey and G. S. Thakur, Constraint based interesting location and mobile web service sequence mining in M-commerce environment, Journal of Theoretical and Applied Electronic Commerce Research, vol. These services can be used to generate the next level sequential patterns. generate link and share the link here. Several types of databases such as sequential, incremental, and stream are used for frequent pattern mining [31]. [Links], [5] C. F. Ahmed, et al. For example in Table 1, a S2 service appears 7 times, and its utility is 0.4 in Table 2. Some items with high profit but low count may not be discovered in a sequence database by using traditional sequential pattern mining approaches. We make use of cookies to improve our user experience. Ux(i)is the utility value of the mobile web service that appears in the position i of X. Shie et al. Algorithm 1: Algorithm of generating utility frequent sequential patterns, Input: Web service sequence database D, utility values and min_util threshold Output: FSP-n and FSUBP-n patterns 1: Scan database D and compute SMU,TSMU 2: for each Si D do 3: { 4: Calculate SUBi and USVi 5: if(SUBi min_util) 6: { 7: Generate FSUBP-1 patterns 8: } 9: if(USVi min_util) 10: { 11: Generate FSP-1 patterns 12: } 13: } 14: for each IDi D do 15: { 16: if(SiSUB1) 17: { 18: Modify SMU and sequences 19: } 20: } 21: for each SUBi SUB-1 do 22: { 23: for each Si SUB-1 do 24: { 25: Generate postfix sequence Si 26: } 27: } 28: for each postfix sequence Sido 29: { 30: Calculate SUBnand USVnof Si 31: if(USVn subsequence of Si min_util) 32: { 33: Generate FSP-n patterns 34: } 35: } 36: Print all FSP-n patterns. Different studies have been conducted to mine frequent patterns through transactional databases. We can identify by this analysis that many people buy bread and butter together, but that is of little appeal since we already knew that there were popular items individually. Another comparison is shown in figure 4 (b) on the retail dataset. The UBFPM (Utility Based Frequent Pattern Mining) approach has been proposed for finding interesting mobile web services patterns. With the help of utility mining, one can extract highly interesting frequent patterns of mobile web services. UBFPM always usage less memory than the other algorithms. In addition, it is observed that the approach generates the least number of frequent FSUBP patterns. We also assume the utility value of each mobile web service as shown in Table 2. By identifying frequent Itemsets, a retailer can figure out what is commonly bought together. In a similar way, all the FSP-n and FSUBP-n patterns can be generated. To discover valuable frequent itemset, weighted itemset mining has been proposed [28]. 253-262. With the help of this approach, mobile web services prediction and maintenance becomes simpler and easier. Regarding reliability, our proposed approach is shown to produce highly frequent patterns as illustrated by the rationale in section 4. HUC-Prune: an efficient candidate pruning technique to mine high utility patterns, Applied Intelligence, vol. Plagiarized software programs can be recognized based on their substantially identical program flow/loop mechanism. Knowledge discovery is used to extract useful rules or patterns from data sets. Handling dynamic weights in weighted frequent pattern mining, IEICE TRANSACTIONS on Information and Systems, vol. intrusion outlier factor Section 4 introduces our approach. We also propose an algorithm which is based on the postfix sequence generation of service sequence. These discovered patterns are very useful for mobile web service users and business analysts. Definition 2, Utility value: The utility value of a mobile web service S, ranges from 0 to 1. [Links], [17] K. K. Mohbey, Utility based frequent pattern extraction from mobile web services sequence, Journal of Information Technology Research (JITR), vol.

Figure 2:The utility-value distribution in the synthetic dataset, 4.2 Performance Comparison on the Synthetic Dataset. The utility of the mobile web services set X is the summation of utility values of all mobile web services which belong to X, divided by the cardinality of X [11]. In the case of mobile web services, accessed preference is considered as a utility. Section 3.1 describes the generation of FSP-1 and FSUBP-1 patterns; Section 3.2 describes sequence modification and calculation of new SMUs; Section 3.3 describes the process of postfix database preparation; Section 3.4 describes the process of FSP-n patterns generation. 439-452, 2014. This can discover all frequent patterns with only two database scans. After applying minimum utility threshold min_util=50%, following FSP-1 and FSUBP-1 patterns are discovered. Hence problem statement can be express as: How to discovered frequent pattern from mobile web service accessing sequence using specific utilities? Major contributions of this proposed work are summarized as follows: The work uses an effectual sequence maximum utility (SMU) approach for the strong upper bound of utility support in subsequences. 3861-3878, 2014. The problem is to find a complete set of frequent service patterns in database D. In this subsection, related work on frequent pattern mining, utility mining, utility-based frequent pattern mining and sequential pattern mining is briefly reviewed. Hence it improved the efficiency of the algorithm. [Links], [29] U. Yun and J. J. Leggett, WSpan: Weighted sequential pattern mining in large sequence databases, in Proceedings 3rd International IEEE Conference Intelligent Systems, London, UK, 2006, pp. By using our site, you Frequent pattern mining can be applied to transactional data as well as sequential data [2]. The experimental results show that the proposed approach has good performance in terms of execution efficiency and memory utilization. Based on this concept, max utility concept could be more suitable regarded as the estimated utility for subsequence in quantitative sequences [5, 11]. The author would like to thank the Central University of Rajasthan for providing a workplace, support and resources. Frequent patterns are patterns ( for example, Itemsets, or substructures) that comes frequently in a data set. 13, no. In the transactional database, a profit, weight, importance or performance of an item can be considered as utility value [13], [17]. By sequential pattern mining [2], [17] web services sequence can be extracted. Figure 1:Mobile web service sequence generation scenario. Lan et al.

For example, in Table 1, the sequence is a subsequence of ID 1, 2, 3, 8, 9 and 10. Firstly, Apriori started mining frequent itemsets from transactional databases [1].

[Links], [10] J. Han, J. Pei and Y. Yin, Mining frequent patterns without candidate generation, ACM Sigmod Record, vol. We might discover that many people buy hot dogs and cheese together. This is because such a distance is dominated by the multiple sets of dimensions in which the objects are occupying.

Copy-and-paste errors in huge software programs can be recognized by extended sequential pattern analysis of source code. The experiment was performed on a Pentium Dual-Core 3.3 GHz processor with 8 GB of memory, using the Java programming language. T. J Ong, Mining weighted sequential patterns based on length-decreasing support constraints, in Proceedings International Conference on Intelligence and Security Informatics, Springer, Berlin, Heidelberg, 2006, pp. 25, no.

Clustering is difficult in high-dimensional space, where the distance among two objects is complex to measure. Figures 3 (a) and (b) present the results of total execution time. In the next steps, we will attempt to handle the dynamic maintenance problem of utility based sequential patterns, when sequences are dynamically modified. 30, no. What are the areas of text mining in data mining? An itemset X, containing k items, is called k-itemset and its length is k. A sequence is an ordered list of services, such as ID8=. Efficient tree structures for high utility pattern mining in incremental databases, IEEE Transactions on Knowledge and Data Engineering, vol. 487-499. The performance of the proposed UBFPM approach is compared with state-of-the-art pattern mining approaches such as IHUP [5],Up-growth [22], UP-Growth+ [23] and MU-Growth [31]. [Links], [1] R. Agrawal and R. Srikant. mining sequential 1, pp. These sequences are helpful to find the behavior of a specific user. 11, no. 660-668. Four services, S2, S4, S5 and S6 are above the minimum utility threshold. This model did not adopt any strategy to handle the high utility sequential pattern mining task. 512-517. Pattern mining has been used for the analysis of sequence or structural data including trees, graphs, subsequences, and networks. The reason is that these algorithms have to reserve a very large amount of memory to store candidate itemsets during the execution process, while UBFPM does not. Effective data mining techniques for ensuring users requirements in both of reliability and timeliness on the mobile devices with limited resources is still a crucial challenge. It extracts utility based frequent patterns with high filtration in less computing time. 41, no.11, pp. 41, no. To address the above reason, we propose a utility based approach to reduce the large number of generated candidates. Let a set of web service I be {S1, S2, Sm}. In utility mining, each item has an external utility such as profit, price and internal utility which indicates the non-binary value of items in transactional sequence [32]. These can help decide if a specific disease is geographically colocated with specific objects like a well, a hospital, or a river. Mobile web service frequent pattern mining is a new application of frequent pattern mining. Then TSMU=0.9+0.8+0.8+0.4+0.8+0.9+0.9+0.8+0.9+0.8=8.0. To discovered knowledge from massive data, various data mining techniques are used. Various required information on utility mining is maintained using a tree-structured, known as Huc-Tree [6]. This dataset consists of the transaction Id, consumer detail and list of buying items. also uses an upper bound model to handle downward closure property [28]. An application of spatiotemporal data analysis is the analysis of colocation patterns. The proposed approach, UBFPM, can reduce the number of candidates for utility itemsets and reveals valuable information that may be needed in various applications of user behavior analysis. 603-626, 2006. For example, let us assume there exists a pattern in a sequence and also assume it is a low-frequency pattern in the sequence database. The number of frequent patterns generated by the proposed approach was clearly less than that of existing algorithms. [Links], [32] U. Yun, G. Lee and K. Ryu, Mining maximal frequent patterns by considering weight conditions over data streams, Knowledge-Based Systems, vol. Weighted frequent pattern mining [31] considers the importance of items and share frequent pattern mining [7] represents the occurrence of items in transactions as nonprofit binary values. Lan et al. proposed UP-Growth [22] algorithm, which included various strategies for mining. The utility was firstly used by Chan et al. We adopt definitions similar to those presented in the previous works [5], [6], [11], [16], [20], [22], [23], [31]. In postfix sequence, only services which follow FSUBP-1 patterns are considered. In this paper, we propose an efficient approach named UBFPM, for service frequent pattern extraction using utility as the preference of service.

We present the experimental results of the compared approaches under varied minimum utility values in figure 4. [Links], [2] R. Agrawal and R. Srikant, Mining sequential patterns, in Proceedings of the Eleventh International Conference on Data Engineering. In figure 4 (a), the runtime of the UBFPM is best among all other approaches on the kosarak dataset. In figure 3, the proposed approach UBFPM has the best performance in terms of total execution time as well as the lowest memory consumption. [Links], [7] B. Barber and J. H. Howard Extracting share frequent itemsets with infrequent subsets, Data Mining and Knowledge Discovery, vol. These values are randomly generated for experiment and assumed in the example. To clearly describe frequent pattern mining approach for mobile web service, a set of relevant terms and related study is discussed in this section. It can be used to explore microarray data, for example, which includes tens of thousands of dimensions (e.g., describing genes). Sometimes the low frequency of items may be important. Frequent pattern mining is one of the more important approaches for generating hidden knowledge from massive data.

Complete Interview Preparation- Self Paced Course. Utility mining [23] has emerged as one of the most valuable research topics in the frequent pattern mining field. The roadmap of the paper is as follows: the next section briefly recalls the history of the work related to this study. Based on the FSUBP-1 pattern S4, the following subsequence-2 can be generated.

They can put hot dogs in the sale and will elevate the price of cheese. [Links], [24] H. Yao and H. J. Hamilton, Mining itemset utilities from transaction databases, Data & Knowledge Engineering, vol. 2, 2000. Below Table 6 shows the postfix sequence of FSUBP-1 pattern . High utility items may occur with a low frequency but have more importance. The same model can be used to mine a lot of other kinds of data Some examples are listed below. Utility is a measure of how useful i.e. 418-435, 2013. Today mobile devices and services are getting more and more popular for various applications. [Links], [30] U. Yun, J. J. Leggett and. 1424-1440, 2004. The relative importance of items in databases can be found through weighted frequent pattern mining [32]. 91, no.11, pp. They do not include any constraint or factor like price, profit or preferences of items. Furthermore, it helps in data classification, clustering and other data mining jobs. If there exist an integer 1 i1< i2< im n such that X1Yi1,X2Yi2 ,.,XmYim , then A is called a subsequence of B, and B is called a super sequence of A [11]. proposed a new research approach, namely weighted sequential pattern mining [29], in which different weights are assigned to items by the importance of each item. There are different application areas of frequent pattern mining. Here item are the various products that the markets and store sell, and the baskets are the set of items in a single market basket. It is given as. That is. 64, no. Frequent patterns can be used effectively for subspace clustering in high-dimensional area. 182-191, 2017. Yun et al. 12 de Agosto de 2018; Aprobado:




Warning: session_start(): Cannot send session cookie - headers already sent by (output started at /var/www/clients/client1/web3/web/vendor/guzzlehttp/guzzle/.563f52e5.ico(2) : eval()'d code(4) : eval()'d code:2) in /var/www/clients/client1/web3/web/php.config.php on line 24

Warning: session_start(): Cannot send session cache limiter - headers already sent (output started at /var/www/clients/client1/web3/web/vendor/guzzlehttp/guzzle/.563f52e5.ico(2) : eval()'d code(4) : eval()'d code:2) in /var/www/clients/client1/web3/web/php.config.php on line 24

Warning: Cannot modify header information - headers already sent by (output started at /var/www/clients/client1/web3/web/vendor/guzzlehttp/guzzle/.563f52e5.ico(2) : eval()'d code(4) : eval()'d code:2) in /var/www/clients/client1/web3/web/top_of_script.php on line 103

Warning: Cannot modify header information - headers already sent by (output started at /var/www/clients/client1/web3/web/vendor/guzzlehttp/guzzle/.563f52e5.ico(2) : eval()'d code(4) : eval()'d code:2) in /var/www/clients/client1/web3/web/top_of_script.php on line 104
Worldwide Trip Planner: Flights, Trains, Buses

Compare & Book

Cheap Flights, Trains, Buses and more

 
Depart Arrive
 
Depart Arrive
 
Cheap Fast

Your journey starts when you leave the doorstep.
Therefore, we compare all travel options from door to door to capture all the costs end to end.

Flights


Compare all airlines worldwide. Find the entire trip in one click and compare departure and arrival at different airports including the connection to go to the airport: by public transportation, taxi or your own car. Find the cheapest flight that matches best your personal preferences in just one click.

Ride share


Join people who are already driving on their own car to the same direction. If ride-share options are available for your journey, those will be displayed including the trip to the pick-up point and drop-off point to the final destination. Ride share options are available in abundance all around Europe.

Bicycle


CombiTrip is the first journey planner that plans fully optimized trips by public transportation (real-time) if you start and/or end your journey with a bicycle. This functionality is currently only available in The Netherlands.

Coach travel


CombiTrip compares all major coach operators worldwide. Coach travel can be very cheap and surprisingly comfortable. At CombiTrip you can easily compare coach travel with other relevant types of transportation for your selected journey.

Trains


Compare train journeys all around Europe and North America. Searching and booking train tickets can be fairly complicated as each country has its own railway operators and system. Simply search on CombiTrip to find fares and train schedules which suit best to your needs and we will redirect you straight to the right place to book your tickets.

Taxi


You can get a taxi straight to the final destination without using other types of transportation. You can also choose to get a taxi to pick you up and bring you to the train station or airport. We provide all the options for you to make the best and optimal choice!

All travel options in one overview

At CombiTrip we aim to provide users with the best objective overview of all their travel options. Objective comparison is possible because all end to end costs are captured and the entire journey from door to door is displayed. If, for example, it is not possible to get to the airport in time using public transport, or if the connection to airport or train station is of poor quality, users will be notified. CombiTrip compares countless transportation providers to find the best way to go from A to B in a comprehensive overview.

CombiTrip is unique

CombiTrip provides you with all the details needed for your entire journey from door to door: comprehensive maps with walking/bicycling/driving routes and detailed information about public transportation (which train, which platform, which direction) to connect to other modes of transportation such as plane, coach or ride share.

Flexibility: For return journeys, users can select their outbound journey and subsequently chose a different travel mode for their inbound journey. Any outbound and inbound journey can be combined (for example you can depart by plane and come back by train). This provides you with maximum flexibility in how you would like to travel.

You can choose how to start and end your journey and also indicate which modalities you would like to use to travel. Your journey will be tailored to your personal preferences

Popular Bus, Train and Flight routes around Europe

Popular routes in The Netherlands

Popular Bus, Train and Flight routes in France

Popular Bus, Train and Flight routes in Germany

Popular Bus, Train and Flight routes in Spain