E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.
|
|
- Marshall Kennedy
- 8 years ago
- Views:
Transcription
1 University of Fribourg, Switzerland Department of Computer Science Information Systems Research Group Seminar Online CRM, 2005 Prof. Dr. Andreas Meier E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management Paper by: Beat Raess Ruelle des Macons 9 CH-1700 Fribourg beat.raess@gmx.net
2 Contents 1 Introduction 2 2 CRM and Web Mining Customer Relationship Management (CRM) Perspectives of CRM Adding the E to CRM Web Mining Web Content Mining Web Structure Mining Web Usage Mining Web Usage Mining in E-CRM Objectives Application Fields of Web Usage Mining The Web Usage Mining Process Data Cleaning User and Session Identification Data Integration Pattern Discovery and Analysis Conclusion 16 1
3 1 Introduction Customer Relationship Management (CRM) is a business strategy oriented on the needs of customers (cf. [Wikipedia 2005]). As a management and organisation form, it is mainly concerned with improving customer orientation and satisfaction in order to assure the acquisition of new and the retention of existing customers of an enterprise (cf. [Schoegel 2002, p. 33]). Online or Electronic Customer Relationship Management (E-CRM) adds the electronic component of modern information and communication technologies (e.g. the internet) to CRM. E-CRM depends on detailled information concerning the customer s characteristics, needs, interests and behaviour. In the case of e-commerce, the problem consists in extracting the relevant information from a huge amount of data. As a consequence, appropriate techniques such as Data or Web Mining are a useful mean to achieve the desired results. Data mining 1 deals with the automated search of patterns inherent in large amounts of data. The aim is to retrieve new information based on existing data by applying methodes from statistics and pattern recognition (cf. [Wikipedia 2005c]). The term Web Mining then refers to the application of such data mining techniques to extract information from the internet (cf. [Wikipedia 2005b]). Web Mining can be classified into three different categories. Web Content Mining and Web Structure Mining analyse the content and structure of web pages, whereas Web Usage Mining studies the behaviour of online surfers. Based on research papers of the involved domains, the objective of this paper is to present, how Web Usage Mining can provide the necessary information needed for Electronic Customer Relationship Management. Section 2 introduces the relevant terms and notions concerning CRM, E-CRM and Web Mining in general. Afterwards, section 3 concentrates on Web Usage Mining and how it is used in E-CRM. This includes an overview over the objectives and application fields, as well as an explanation of the process of Web Usage Mining in E-CRM. 1 also referred to as Knowledge-Discovery in Databases (KDD) 2
4 2 CRM and Web Mining The aim of this section is to provide the background concerning Customer Relationship Management and Web Mining. In addition to the definition of these terms, their fundamental concepts are briefly explained. 2.1 Customer Relationship Management (CRM) The relation of a customer to an enterprise can be classified into the four phases of the Buying Cycle 2 (cf. [Kincaid 2002, p. 45]): In the consider phase, the customer becomes aware of a specific need and explores possible solutions. He then evaluates and chooses the optimal alternative and places an order in the purchase phase. The obtained product is then installed and utilized in the use phase, and in the repurchase phase he eventually decides to retire or upgrade it. Figure 1 shows this Buying Cycle and the associated marketing and E-CRM tasks involved. Figure 1: Buying Cycle [Schoegel 2002, p.69] Customer Relationship Management now is the strategic use of information, processes, technology and people to manage the customer s relationship with [a] company (marketing, sales, services, and support) accross the whole customer life cycle [Kincaid 2002, p.41]. The objective of CRM is to assure a company s ability to build up and maintain a long-lasting, profitable relation to customers in order to fully benefit from their economical potential. In particular, the acquisition of new clients as well as the retention of existing ones needs to be ensured (cf. [Schoegel 2002, p. 33]). 2 a similar concept is the Customer Life Cycle 3
5 2.1.1 Perspectives of CRM Based on the above definition, CRM can now be analysed according to [Schoegel 2002, p ] from three different perspectives: a strategic, a process oriented and a technological point of view. The strategic perspective focuses on the active management of the customer relationship. The aim is to build up and maintain the economic potential of the individual customers, based on the fact, that a customer only is profitable for an enterprise after some years, due to more frequent and increased purchases, reduced support and operating costs. Instead of only aquiering new clients, CRM therefore tries to establish a long-lasting relation to valuable customers by for example offering new products (crossselling) and services to existing clients. From the process perspective, the goal is to implement the above mentioned strategy. Independent of the communication or distribution channel involved, a customer should obtain the necessary services by the company during the whole Customer Life Cycle. CRM should convince the customer that he will benefit from establishing a long-lasting relation to the company. The perspective of the information technology consists in the automatisation of all customer management processes. CRM systems should support and integrate operative processes at the front-office, offer possibilities for the collaboration between all involved parties as well as provide analytical tools to retrieve the relevant data. The aim is to build up an integrated system in order to acquire and exploit the full economical potential of a customer. Using such a system adds the E to CRM Adding the E to CRM Electronic Customer Relationship Management (E-CRM) incorporates modern information and communication technologies into traditional CRM. The potential of E-CRM is to provide a system, which allows the integration of all involved parties and aspects of CRM. The vision of E-CRM is to offer means to collect and analyse data from various internal and external sources in order to extract information concerning valuable customers and how a company should interact with them (cf. [Schoegel 2002, p. 44]). Nevertheless, as the cited author states, IT is only an instrument to achieve this vision, but does not provide a CRM-Solution by itself. To illustrate the 4
6 activities of E-CRM systematically, he proposes in [Schoegel 2002, p ] a model consisting of an identification, selection and interaction phase (compare Figure 2). Figure 2: Phase Model [Schoegel 2002, p. 46] The identification phase tries to first gather all relevant data concerning customers, markets and basic conditions, and to structure this data afterwards to identify specific customer groups. In the case of e-commerce, an approach is to use Data or Web Mining methods (see section 3) to extract the necessary information and to classify customers into groups. Having these customer groups, the selection phase then aims at choosing the valuable customer segments. The objective is to adapt or adjust the relation to these groups according to their specific needs and their value for the enterprise. The next phase, the interaction, now wants to establish a profitable relation to these customers. This interaction is based on the information obtained in the two previous stages. 2.2 Web Mining With the still increasing importance of the internet, the amount of information and data available is constantly growing. Associated with this fact are among others the following problems (cf. [Kosala 2000, p. 1]): finding the relevant information, creating new knowledge out of the information available, personalization of information and learning about consumers or individual users. To solve these information overload problems, Web Mining techniques can be used. The term Web Mining describes the use of data mining techniques to automatically discover and extract information from Web documents 5
7 and services [Kosala 2000, p. 2]. It is an interdisciplinary domain integrating research from database, information retrieval, artificial intelligence, machine learning and natural language processing. According to [Kosala 2000, p. 2], Web Mining can be decomposed in the subtasks of resource finding (retrieve intended Web documents and data), information selection and pre-processing (automatically selecting specific information), generalization (discover patterns) and analysis (validation, interpretation of the mined patterns). Based on which part of the Web is mined, Kosala further suggests to decompose Web Mining into three different categories (cf. [Kosala 2000, p. 3-4]). Web Content Mining searches useful information from Web contents, data or documents, Web Structure Mining wants to discover a model of the link structures of the web, and Web Usage Mining analyses secondary data generated by the user s interaction and behaviour. These categories (see Figure 3) are briefly introduced in the following paragraphs, a more detailled overview can be found in [Kosala 2000, p. 3-10]. Figure 3: Web Mining Categories [Kosala 2000, p. 5] Web Content Mining The web contains several types of data like text, images, hyperlinks, audio or video. In order to find these information, people nowadays often browse or search the internet based on keywords. But using search tools, as for example Google, often leads to a great number of irrelevant search results. Web Content Mining therefore tries to find new means to retrieve relevant data from the internet. From an information retrieval view, the research aims at improving the finding itself or the filtering of the information. This is basically done by applying text mining techniques, because most of the 6
8 web content is unstructured text data. From an database research view, the focus is on finding models to capture web data. The goal here is to obtain new means to perform more sophisticated queries, which lead to better search results Web Structure Mining The internet basically is a set of linked web pages. Web Structure Mining is interested in the structure of these links to finally be able to improve retrieval performance, to categorize web pages, find out similarities or relationships between pages or to determine authority or overview sites for specific subjects. To accomplish this, the internet often is modelled as a graph so that appropriate algorithms can be applied afterwards. An introduction to this research area can be found in the paper [Fuernkranz 2002] Web Usage Mining While the above mentioned categories rely on primary web data, Web Usage Mining studies secondary data generated by the interaction of the user with a website. This secondary data includes for example web server logs, proxy or browser logs, cookies, user queries, bookmark data, sessions, transactions or mouse clicks and scrolls. The idea here is to make sense of the data generated by the Web surfer s sessions or behaviors [Kosala 2000, p. 4]. A first approach is to map web usage data into common relational database tables and then to apply corresponding data mining techniques. Another approach uses the raw data, like log files and cookies, directly. The objective of both is to pre-process and clean the data to be able to find patterns within it afterwards. The main applications for Web Usage Mining are to find out user profiles or models and to learn navigation patterns. The gained information then can be used for different tasks like adaptive web interfaces (personalized), improving the effectiveness of web sites or systems, site modification, business intelligence and usage characterization. 7
9 3 Web Usage Mining in E-CRM Customer Realtionship Management (CRM) tries to build up and maintain a long-lasting, profitable relation to a customer accross the whole customer life cycle in order to fully benefit from a client s economical potential. Electronic Customer Relationship Management (E-CRM) integrates modern information and communication technologies into traditional CRM as a means to support this process. To achieve the objectives of E-CRM, detailled information concerning the customer s characteristics, needs, interests and behaviour are required. In the case of e-commerce, a possible approach to obtain this information is to apply techniques of Web Usage Mining. This section first provides an overview over the objectives and general application fields of Web Usage Mining. Afterwards, the process of Web Usage Mining, consisting of the data selection and cleaning, user and session identification, data integration and pattern discovery and analysis, is outlined. Where not stated otherwise, the information concerning this section is based on the research papers of Hajo Hippner (cf. [Hippner 2002]) and Michael Ceyp (cf. [Ceyp 2002]). 3.1 Objectives In the phase model of E-CRM (compare Figure 2), the identification stage serves to first gather all relevant data concerning customers, markets and basic conditions, and to structure this data afterwards to identify specific customer groups. The resulting information then is used as a basis for the decisions in the selection and interaction phase, where valuable customer segments are selected for establishing a profitable relation to these groups of customers. In the case of e-commerce, such as for example in online shops, a customer first is only an anonymous visitor of the corresponding web site. It is therefore necessary to obtain the relevant information about these customers. During the interaction of the user with the web pages or applications, a considerable amount of data is generated (see Figure 4). This includes for example server log files, where each page request or error is recorded, cookies, which store information of a user s session, or data from online forms, where the user himself enters information. 8
10 Figure 4: Datasources in E-Commerce [Hippner 2002, p. 98] The problem now consists in extracting the relevant information out of this huge amount of data. As simple web page and logfile statistics often are inadequate, an alternative approach is to use techniques from Web Usage Mining to identify and analyse patterns in the collected secondary web data. 3.2 Application Fields of Web Usage Mining One of the main applications of Web Usage Mining is to provide information about online customers concerning their characteristics, needs, interests and behaviour. In the context of E-CRM, the purpose is to e.g. identify specific customer groups according to criterias like buying behaviour. This can serve as a basis for further activities, such as proposing cross- or up-selling opportunities. Another possibility is to use the obtained mining results directly to optimize a company s internet portal. Having information about the clients preferred way of browsing allows to place product information or advertisement at the corresponding important pages. Also personalization can be achieved by Web Usage Mining. This includes for example customized marketing campaigns for certain groups of customers. Likewise, the content of the web page can be displayed dynamically for each customer according to the group he belongs to. For example, the layout of the page can be adjusted or information concerning certain products can be displayed. Web Mining can also have an impact on the strategical planning of an enterprise. Based on the mining result, marketing activities can for example be addressed to a certain segment of customers only. Other possibilities include strategic alliances with other websites or online advertisement on certain sites. 9
11 Table 1 lists the above mentioned and further application fields of Web Usage Mining according to [Hippner 2002, p. 101]. Documentation: Information: Buying Behaviour: Optimization: Personalization: Strategical Planning: - documentation of online customer behaviour - web statistics - enhance datawarehouse with interaction data - how are my clients? - market / customer segmentation - classification of customers - customer potential analysis - analyse the buying behaviour of customers - shopping cart analysis - selling patterns, recognize trends - determine cross- / up-selling potential - configure internet portal - success control of the internet presence - optimized placement of advertisement - target group specific marketing campaigns - individual interaction with online customers - personalized page content - personalized products, services - planning of marketing campaigns - strategical alliances Table 1: Application Fields of Web Usage Mining (cf. [Hippner 2002, p. 101]) 3.3 The Web Usage Mining Process The fundamental difference between Data and Web Mining is the format of the raw data used. In the case of Data Mining, this data is stored in the tables of a relational database, whereas the data source for Web Usage Mining consists of server log files, cookies or data from online forms. A first approach is to map this web usage data into common relational database tables, whereas another approach uses the raw data directly. The objective of both is to pre-process and clean the raw data, apply corresponding data mining techniques and try to find patterns afterwards. The process of Web Usage Mining then can be decomposed into five different stages (see Figure 5). The first stage is the data cleaning, which 10
12 Figure 5: Web Usage Mining Process [Hippner 2002, p. 91] serves to extract the web page requests out of other data contained in the server log files. Based on the clean log, the user and session identification stage then tries to identify individual user s and their session s. Having this session data discovered allows to integrate other data, like user or customer data, afterwards. Pattern discovery is then applied to the integrated data and the analysis tries to find interesting patterns, which may contain useful information Data Cleaning Prior to the actual data cleaning, it needs to be determined, which type of raw data is going to be analysed. The most common data source here are the access and error logfiles of webservers or application servers. Such a server records all user activity by default and writes them into a text file. In the case of webservers, two common formats for the log files are used: the Common Logfile Format (CLF) and the Expanded Common Logfile Format (ECLF). They contain among others information concerning the IP adress of the request (host), the date and time or the kind of request, depending on how the webserver is configured. Table 2 lists the entries of a default Apache webserver logfile. The data cleaning then consists primarely in the identification of web page requests. The problem with webserver logfiles is, that they log each file request from a client. This includes web pages, images or stylesheets, as seen in the example of Figure 6. The determination of the number of actual 11
13 host ident authuser date request status bytes IP address of the client (remote host) which made the request to the server identity of the client (if available) userid of the person requesting the document (if available) time that the server finished processing the request request line from the client status code that the server sends back to the client size of the object returned to the client Table 2: Apache Webserver Logfile (cf. [Apache 2005]) page requests is therefore usually done by selecting a characteristic element of a certain page, like the page document itself (e.g. home.php). Figure 6: Example Apache Logfile Nevertheless, it is not possible to determine the exact number of web page requests due to caching. Often requested pages are kept in cache of either the proxy server of an internet provider or in the clients browser itself. This improves performance, because such a cached page can be loaded faster as when it is requested of the webserver each time. A possibility to solve this problem is to force clients to reload cached pages regularely by setting the corresponding parameters. But the drawback of this strategy is a decreased performance of the webserver User and Session Identification User Identification: The next step is the identification of individual users, which is the crucial criteria for the whole Web Usage Mining process. Basically, this can be done by using the IP adresse contained in the logfile, which uniquely defines a computer in the internet. Nevertheless, there exists a number of problems concerning this approach. First, because internet provider only have a restricted number of possible IP adresses, they usually assign dynamic IP adresses to their clients. As a consequence, clients do not always have the same IP or, stated otherwise, the same IP may belong to different clients. Second, even a unique IP 12
14 adresse may be used by different users, as for example in the case of public computers in a company or in an internet cafe. And last, not all clients are really human users, there exists a number of robots or spiders which automatically search the web for information or indexing web pages. To solve these problems, a basic approach is to combine the IP address with the browser used. The ECLF logfile contains a field indicating the browser type (e.g. Internet Explorer, Firefox). As this field also indicates the access of robots and spiders, these records can be easily eliminated. But it stays difficult to determine users with dynamic IP s, because most people still use the same browser (Internet Explorer). Further, this approach does not give any result for clients using a public computer. An alternative is to use cookies for the identification of users. A webserver can send cookies to a client in order to store information like the session-id on the local harddisc of a client s machine (see Figure 7). The persistency of cookies can be set to only the current session or to a specific date. This way, it is possible to clearly identify a certain computer. Nevertheless, clients using a public computer still can not be identified. Further, a user can delete cookies or set his browser s privacy settings to either disable cookies at all, or to automatically delete them. Figure 7: Cookie Content In summary, there is no possibility to automatically identificate a user uniquely. This fact is a major problem of Web Usage Mining, because it is only possible to analyse multiple-transaction patterns with a clear identification. As a consequence, if an unambiguous identification is required, the only possibility to identify a user is by a login with username and password. 13
15 But also this approach has its drawback, because customers can invent fake identities. Session Identification: The term session refers to all page requests a specific user has done in a certain time period. Because webservers log requests independent of clients, the previous identification of users is required in order to be able to identify now such a session. The usual criteria to determine a session is the time between subsequent page requests of a user. The end of a session is reached, if the user does not request another page in a defined time period (e.g. 30 minutes). Having identified a session, valuable information can be obtained concerning the entrance of a user, the number of requested pages, the time a user spends on a certain page or the most common exit pages Data Integration In addition to the information obtained by the user and session identification, it is often useful to integrate further data for a refined analysis. Common data sources include user data, customer data or transaction data. Care needs to be taken concerning data security and privacy. No data should be accessible by unauthorized persons nor should it be used without the explicit approval of a customer. User data can be obtained by means of login and user profiles. Here the user himself enters the corresponding information into forms. A good practice is to use an opt-out default, where the user explicitly selects the optin possibility only if he agrees that this data may be used by the company. Similarly to user data, customer data from a productive system can be used as well. Finally, transaction data can be gathered automatically from e.g. online orders. This kind of data is especially useful, because it contains valuable information regarding the behaviour of customers like the buying behaviour Pattern Discovery and Analysis Having selected and cleaned the raw web data, identified users and sessions and possibly integrated further data, the actual data mining can now begin. The aim is to find patterns in the integrated data, which allow in the 14
16 subsequent analysis to obtain information concerning the customer s characteristics, needs, interests and behaviour. The usual methods used in Data Mining include Path Analysis (Sequence Analysis, Click-Stream Analysis), Classification, Clustering, Predicting and Association Analysis. The following paragraphs introduce these different methods based on [Ceyp 2002, p ], for a more detailled explanation refer to one of the available books on data mining like [Han 2000]. Path Analysis (Sequence Analysis, Click-Stream Analysis): This method tries to find out constantly recurring navigation paths of the user. This can be accomplished by analysing the discovered sessions of the users. The main interest is to optimize the website in such a way, as it is convenient to browse for a user. Further goals are to find out the user s entrance URL to a company s website. Based on this information, the locating of the website can be optimized by for example adding advertisement banners on the corresponding entrance sites. Classification: This analysis assigns customers to certain predefined classes according to some criterias. If for example a user visits a certain page and stays there for some time, this can be interpreted as an interest in the corresponding page s content. According to this content, he then can be classified e.g. as buyer or non-buyer. Clustering: With clustering, users are assigned according to similarities to a certain class. Such a class is consistent internally, but can be clearly distinguished from other classes. The example given in [Ceyp 2002, p. 116] is a travel portal that classifies customers according to their interests into e.g. last-minute, education or beach vacationer. Predicting: As implied in the name, this methode tries to predict certain values based on recorded facts. This is usually only a probabilistic approach by applying for example regression analysis. Predicting can for example be used to estimate an average order value of a customer in an online shop. Association Analysis: Association Analysis wants to discover rules having a certain significance concerning some conditions. As the measured 15
17 values do not need to be absolutely precise, this approach often is used for e.g. offering customers cross-selling opportunities. So proposes for example Amazon.com further books according to already selected books. 4 Conclusion In the case of E-CRM, it is necessary to collect information concerning the characteristics, needs, interests and behaviour of previously anonymous customers. As a huge amount of data is generated by the interaction of clients with a web application, the problem consists in extracting the relevant information out of this data. The approach to apply Web Usage Mining to identify and analyse patterns in the collected secondary web data has the potential to obtain the desired results. Nevertheless, it is not possible to definitively identify a customer. This is a major drawback, because the clear identification of clients is a key component of Web Usage Mining for E-CRM. Not having this information restricts the possible analysis afterwards, because no multiple-transaction patterns can be discovered. A solution to overcome this problem is to demand an explicit login of the customer by a username and password. But this approach requires, that the customer has the impression to obtain a profit (e.g. sales discount) by providing his personal information. In summary, the objective of Web Usage Mining is to provide information about online customers. The main application fields include the documentation of online customer behaviour, optimization of a company s internet portal, the analysis of buying behaviour and personalization of the content and layout of websites. But due to the mentioned uncertainties concerning the user identification, it is doubtable, if multiple-transactions patterns can be analysed. 16
18 List of Figures 1 Buying Cycle [Schoegel 2002, p.69] Phase Model [Schoegel 2002, p. 46] Web Mining Categories [Kosala 2000, p. 5] Datasources in E-Commerce [Hippner 2002, p. 98] Web Usage Mining Process [Hippner 2002, p. 91] Example Apache Logfile Cookie Content List of Tables 1 Application Fields of Web Usage Mining (cf. [Hippner 2002, p. 101]) Apache Webserver Logfile (cf. [Apache 2005])
19 References [Apache 2005] Apache: Apache Web Server Version 2. Log Files. URL: ( ). [Ceyp 2002] Ceyp, Michael H. 2002: Potenziale des Web Mining für das Dialog Marketing. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p [Fuernkranz 2002] Fuernkranz, Johannes 2002: Web Structure Mining. Exploiting the Graph Structure of the World-Wide Web. Austrian Research Institute for Artificial Intelligence, Wien, Austria, O.J. URL: ftp://ftp.ai.univie.ac.at/papers/oefai-tr pdf ( ). [Han 2000] Han, Jiawei / Kamber, Micheline: Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc, San Fransisco, USA. [Hippner 2002] Hippner, Hajo / Merzenich, Melanie / Wilde, Klaus D. 2002: Web Mining im E-CRM. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p [Kincaid 2002] Kincaid, Judith W. 2002: Customer Relationship Management. Getting it Right! Prentice Hall PTR, New Jersey, USA. [Kosala 2000] Kosala, Raymond / Blockeel, Hendrik: Web Mining Research: A Survey. Department of Computer Science Katholieke Universiteit Leuven, Belgium, July URL: ( ). [Schoegel 2002] Schoegel, Marcus / Schmidt, Inga 2002: E- CRM - Management von Kundenbeziehungen im Umfeld neuer Informations- und Kommunikationstechnologien. In: Schoegel, Marcus / Schmidt, Inga (Hrsg.) 2002: ecrm mit Informationstechnologien Kundenpotenziale nutzen. 1. Auflage, Symposion Publishing GmbH, Duesseldorf, Germany, p
20 [Wikipedia 2005] Wikipedia 2005: Customer relationship management URL: relationship management ( ). [Wikipedia 2005b] Wikipedia 2005: Web Mining URL: Mining ( ). [Wikipedia 2005c] Wikipedia 2005: Data Mining URL: mining ( ). 19
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationAn Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationWeb Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationCustomer Relationship Management
Customer Relationship Management CRM is Any application or initiative designed to help an organization optimize interactions with customers, suppliers, or prospects via one or more touch points for the
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationA guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
More informationWeb Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative
More informationOpinion 04/2012 on Cookie Consent Exemption
ARTICLE 29 DATA PROTECTION WORKING PARTY 00879/12/EN WP 194 Opinion 04/2012 on Cookie Consent Exemption Adopted on 7 June 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is
More informationEVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA
Articles 37 Econ Lit C8 EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Assoc. prof. Snezhana Sulova, PhD Introduction Today increasing numbers of commercial companies are using the electronic
More informationAdaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
More information5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK
5 Big Data Use Cases to Understand Your Customer Journey CUSTOMER ANALYTICS EBOOK CUSTOMER JOURNEY Technology is radically transforming the customer journey. Today s customers are more empowered and connected
More informationWeb Mining Functions in an Academic Search Application
132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS
More informationWeb Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
More informationAnalyzing the footsteps of your customers
Analyzing the footsteps of your customers - A case study by ASK net and SAS Institute GmbH - Christiane Theusinger 1 Klaus-Peter Huber 2 Abstract As on-line presence becomes very important in today s e-commerce
More informationPre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
More informationData Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
More informationAPPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical
More informationExploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
More informationgraphical Systems for Website Design
2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,
More informationHow To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
More informationWeb Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
More informationClick stream reporting & analysis for website optimization
Click stream reporting & analysis for website optimization Richard Doherty e-intelligence Program Manager SAS Institute EMEA What is Click Stream Reporting?! Potential customers, or visitors, navigate
More informationA Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationDATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
More informationCookie Policy. Introduction About Cookies
Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using
More informationUsing reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
More informationANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
More informationAssociation rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, dimitrijevic@vtsns.edu.rs Tanja Krunić, The
More informationPREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
More informationHello, Goodbye. The New Spin on Customer Loyalty. From Customer Acquisition to Customer Loyalty. Definition of CRM.
Hello, Goodbye. The New Spin on Customer Loyalty The so-called typical customer no longer exists. Companies were focused on selling as many products as possible, without regard to who was buying them.
More informationSKoolAide Privacy Policy
SKoolAide Privacy Policy Welcome to SKoolAide. SKoolAide, LLC offers online education related services and applications that allow users to share content on the Web more easily. In addition to the sharing
More informationDoc ID: URCHINB-001 (3/30/05)
Urchin 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be
More informationTEXT ANALYTICS INTEGRATION
TEXT ANALYTICS INTEGRATION A TELECOMMUNICATIONS BEST PRACTICES CASE STUDY VISION COMMON ANALYTICAL ENVIRONMENT Structured Unstructured Analytical Mining Text Discovery Text Categorization Text Sentiment
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More informationWeb Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher
Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationGoogle Analytics Guide. for BUSINESS OWNERS. By David Weichel & Chris Pezzoli. Presented By
Google Analytics Guide for BUSINESS OWNERS By David Weichel & Chris Pezzoli Presented By Google Analytics Guide for Ecommerce Business Owners Contents Introduction... 3 Overview of Google Analytics...
More informationPay Reply website Privacy Policy. Data processor. Location of data processing. Types of processed data
Pay Reply website Privacy Policy This page provides an outline of the way the personal data of Pay Reply website visitors is managed. This notice is also provided according to the terms of art. 13 of Italian
More informationISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 7, July 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationA SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
More informationGoogle Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey
1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics
More informationGeneralization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
More informationIdentifying User Behavior in domainspecific
Identifying User Behavior in domainspecific Repositories Wilko VAN HOEK a,1, Wei SHEN a and Philipp MAYR a a GESIS Leibniz Institute for the Social Sciences, Germany Abstract. This paper presents an analysis
More informationWeb Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
More informationHOW DOES GOOGLE ANALYTICS HELP ME?
Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors
More informationCONSENT TO PROCESSING IN THE UNITED STATES AND ELSEWHERE.
Privacy Statement Elanco, a division of Eli Lilly and Company (Lilly), (referred to as Elanco or Lilly in this Privacy Statement) respects the privacy of visitors to our websites, and as a result, we have
More informationWeb Mining in E-Commerce: Pattern Discovery, Issues and Applications
Web Mining in E-Commerce: Pattern Discovery, Issues and Applications Ketul B. Patel 1, Jignesh A. Chauhan 2, Jigar D. Patel 3 Acharya Motibhai Patel Institute of Computer Studies Ganpat University, Kherva,
More informationLifesize Cloud Privacy Statement
Lifesize Cloud Privacy Statement When you use Lifesize Cloud, you provide certain information to Lifesize, Inc. and its affiliates, successors and assigns (collectively referred to as Lifesize ), including
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationChapter ML:XI. XI. Cluster Analysis
Chapter ML:XI XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster
More information1. TYPES OF INFORMATION WE COLLECT.
PRIVACY POLICY GLOBAL ASSESSOR POOL, LLC, DBA PINSIGHT ( Company or we or us ) is committed to protecting your privacy. We prepared this Privacy Policy to describe our practices regarding the information
More informationGuide to Analyzing Feedback from Web Trends
Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?
More information1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
More informationBusiness Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues
Business Process Services White Paper Personalizing E-Commerce: Improving Interactivity to Increase Revenues About the Author Subramaniam MV Subramaniam is a Delivery Manager at Tata Consultancy Services
More informationA STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
More informationCookie Policy. Introduction About Cookies
Introduction About Cookies Cookie Policy Most websites you visit will use cookies in order to improve your user experience by enabling that website to remember you, either for the duration of your visit
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationGOOGLE ANALYTICS 101
GOOGLE ANALYTICS 101 Presented By Adrienne C. Dupree Please feel free to share this report with anyone who is interested in the topic of building a profitable online business. Simply forward it to them
More informationSelling Digital Goods Online
PayLoadz.com Selling Digital Goods Online How to use the PayLoadz and PayPal services to sell digital goods on your web site Updated: 02/12/2006 TABLE OF CONTENTS INTRODUCTION...3 HOW IT WORKS...3 GETTING
More informationThe web server administrator needs to set certain properties to insure that logging is activated.
Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
More informationCHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
More informationWhite paper: Google Analytics 12 steps to advanced setup for developers
White paper: Google Analytics 12 steps to advanced setup for developers We at Core work with a range of companies who come to us to advises them and manage their search and social requirements. Dr Jess
More informationCookie Policy. Introduction About Cookies
Introduction About Cookies Cookie Policy Most websites you visit will use in order to improve your user experience by enabling that website to remember you, either for the duration of your visit (using
More informationMonitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
More informationrecommendation in e-commerce
recommendation in e-commerce Luminis Recommendation Services We are leaving the age of information and entering the age of recommendation Chris Anderson Authors: Hans Bossenbroek Hans Gringhuis Luminis
More informationLead Generation in Emerging Markets
Lead Generation in Emerging Markets White paper Summary I II III IV V VI VII Which are the emerging markets? Why emerging markets? How does online help? Seasonality Do we know when to profit on what we
More information1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
More informationWeb Analytics: Enhancing Customer Relationship Management
Web Analytics: Enhancing Customer Relationship Management Nabil Alghalith Truman State University The Web is an enormous source of information. However, due to the disparate authorship of web pages, this
More informationEXHIBIT 2. CityBridge Privacy Policy. Effective November 4, 2014
EXHIBIT 2 CityBridge Privacy Policy Effective November 4, 2014 CityBridge LLC ("We") are committed to protecting and respecting your privacy. This Privacy Policy describes how we collect, use and share
More informationDARTFISH PRIVACY POLICY
OUR COMMITMENT TO PRIVACY DARTFISH PRIVACY POLICY Our Privacy Policy was developed as an extension of our commitment to combine the highestquality products and services with the highest level of integrity
More informationInternet Advertising Glossary Internet Advertising Glossary
Internet Advertising Glossary Internet Advertising Glossary The Council Advertising Network bring the benefits of national web advertising to your local community. With more and more members joining the
More informationMobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationPrivacy Policy. 1. Principle
Privacy Policy WHU Otto Beisheim School of Management (hereinafter WHU ) is committed to protecting the privacy and security of the personal information collected from visitors to, and members of, the
More informationContext Aware Predictive Analytics: Motivation, Potential, Challenges
Context Aware Predictive Analytics: Motivation, Potential, Challenges Mykola Pechenizkiy Seminar 31 October 2011 University of Bournemouth, England http://www.win.tue.nl/~mpechen/projects/capa Outline
More informationGoogle Analytics Basics
Google Analytics Basics Contents Google Analytics: An Introduction...3 Google Analytics Features... 3 Google Analytics Interface... Changing the Date Range... 8 Graphs... 9 Put Stats into Context... 10
More informationGoogle Analytics Access for Bentley Employees
Google Analytics Access for Bentley Employees 1. Google Analytics Login Google Analytics URL: http://www.google.com/analytics User name: bentleyshared@gmail.com Password: 2015analytics 2. Google Analytics
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationData protection at affilinet
at affilinet Rev. 04/03/2014 at affilinet Content at affilinet 1 1. Collection and processing of personal data and other data when visiting our Web pages 1 2. Collection and processing of our customers
More informationEffective Prediction of Kid s Behaviour Based on Internet Use
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective
More informationWeb Log Mining: A Study of User Sessions
Web Log Mining: A Study of User Sessions Maristella Agosti and Giorgio Maria Di Nunzio Department of Information Engineering University of Padua Via Gradegnigo /a, Padova, Italy {agosti, dinunzio}@dei.unipd.it
More informationMining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
More informationImproving Privacy in Web Mining by eliminating Noisy data & Sessionization
Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Rekha Garhwal Computer Science Department Om Institute of Technology & Management, Hisar, Haryana, India Abstract: data mining
More informationAn Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
More informationStudy Guide #2 for MKTG 469 Advertising Types of online advertising:
Study Guide #2 for MKTG 469 Advertising Types of online advertising: Display (banner) ads, Search ads Paid search, Ads on social networks, Mobile ads Direct response is growing faster, Not all ads are
More informationJohnson Controls Privacy Notice
Johnson Controls Privacy Notice Johnson Controls, Inc. and its affiliated companies (collectively Johnson Controls, we, us or our) care about your privacy and are committed to protecting your personal
More informationLoad testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
More information5Subscription Management Automate. 6Electronic License Activation (ELA) 7Electronic License Management. 8Electronic Software Delivery (ESD)
PAGE 1 OF 5 FEATURES SOLO Server is our flagship feature-rich license automation and distribution server. SOLO Server Lite is more for customers who want a very basic activation server and want to deeply
More informationHealthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
More information