CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL

Size: px
Start display at page:

Download "CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL"

Transcription

1 CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL 7.1 Preprocessing Experiments and Results 7.2 Sessionization Experiments and Results 7.3 Pattern Discovery Experiments and Results 7.4 Conclusion Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 99

2 This chapter will deal with all experiments are conducted through out the current research. Prediction Model of web caching and perfecting consists of main three phases: Preprocessing, Sessionization, Pattern discovery and analysis; this chapter will discuss all experiments and associated results in all phases. Different tools and methods are used in proposed research for different phases. 7.1 Preprocessing Experiments and Results Preprocessing phase is experimented for current research and past research did by many authors and then comparison is done based on both approaches. Number of tests is conducted in this phase and they are narrated as under: (1) Preprocessing Test-1:- Test Description: - Parse row log file into appropriate fields of W3C Extended form. Row log file is available at following path of personal computer E:\Dharmendra\logexample\iis.log. Result: - Sample of result of above test is available in Table 7.1. Result Analysis: - Result got from above test is according to requirement of proposed research. This result can be used for further processing. Total 5000 raw are affected by this test. Query used for: - In Microsoft Log Parser, appropriate environment has to set up to execute query based on type of log data. Select * from e:\dharmendra\logexample\iis.log; Snapshot of Microsoft Visual Log Parser tool for test-1 is described in figure 7.1. (2) Preprocessing Test-2 :- Test Description: - Remove unnecessary web objects access by users. Result: - Sample of result of above test is available in figure 7.2. Result Analysis: - Result generated is perfect. This result can be used for further processing. Total 2990 raw affected by above query from raw log file having 15 days transactions. Query used for: - Following query is executed to get result. select LogFilename,date,time,c-ip,s-ip,cs-uri-stem,sc-status,time-taken from e:\dharmendra\logexample\iis.log where (cs-uri-stem like '%.htm' and ( sc-status=200 or sc-status=304 or sc-status=306) ) or( cs-uri-stem like '%.asp' and ( sc-status=200 or sc-status=304 or sc-status=306)) or( cs-uri-stem like '%.php' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( cs-uri-stem like '%.aspx' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uri-stem like '%.jpg' and timetaken >= )and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.gif' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 100

3 '%.avi' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uristem like '%.dat' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306)) Figure 7.3 describes snapshot of tool with query and result of test-2. Figure 7.1 Snapshot of Microsoft Visual Log Parser Tool for Test-1 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 101

4 Table 7.1 Log Data in W3C Field Format Log File Name Row Date Time C-ip s-site s-computer s-ip e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 102

5 Table 7.1 Log Data in W3C Field Format(Continue) Log File Name Row Date Time C-ip s-site s-computer s-ip e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 103

6 (Figure 7.2 Filtered Log Entries) [3] Preprocessing Test-3:- Test Description: - To determine unique web objects and associated hit count. Result: - Sample of result of above test is available in figure-7.4 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 104

7 Result Analysis: - Result generated is perfect. This result can be used for further processing. Total 490 unique web objects found from total 2990 web objects. Query used for:- Following query is executed to get result. select distinct cs-uri-stem, count(cs-uri-stem) from e:\dharmendra\logexample\iis.log where (cs-uri-stem like '%.htm' and ( sc-status=200 or sc-status=304 or sc-status=306) ) or( cs-uri-stem like '%.asp' and ( sc-status=200 or sc-status=304 or sc-status=306)) Figure 7.3 Snapshot of Microsoft Visual Log Parser Tool for Test-2 or( cs-uri-stem like '%.php' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( cs-uri-stem like '%.aspx' and ( sc-status=200 or sc-status=304 or sc-status=306)) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 105

8 or ( (cs-uri-stem like '%.jpg' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.gif' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.avi' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uri-stem like '%.dat' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306)) group by cs-uri-stem [4] Preprocessing Test-4:- Test Description: - To remove web objects which does not fulfill the condition of threshold value. Result: - Sample of result of above test is available in figure-7.5. Result Analysis: - Total 120 raw is retrieved from above test, which fulfills condition of threshold. Query used for: - For this test 4, Microsoft excel tool is used. Following steps are used to accomplish this test. (i) First Max function is applied for data which is generated by test 3 to calculate highest value of hit rate. Highest hit rate generated from data is 62. = MAX (A1: A 491) (ii) Threshold value is derived by following formula. = (62 * 0.10) (iii) Advanced filtered feature is used to filter only those records which Fulfill condition of threshold value. (iv) Lastly, records are arranged in descending order of hit ratio by sorting feature of Microsoft excel. Similar kind of tests is carried out for other research for comparison purpose. Figure 7.6 describes the percentage accuracy of preprocessing phase. From figure it is found out that preprocessing accuracy of proposed model is quite less than other models as other models ignores binary objects like audio and video objects. In all other models sometimes valuable information in form of binary objects are removed and that is not the case of proposed model. Figure 7.7 describes the proportions of text objects and binary objects at every test levels so it Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 106

9 is analyzed that how binary objects are important in process of preprocessing. During preprocessing stage one test is carried out to decide threshold value of binary objects like audio and video. [5] Preprocessing Test-5:- Test Description: - To decide threshold value of image and video file. Tool used: - One online tool is used to determine load time of image and video. Reference is In this test it is assumed that average internet speed is 1.4 Mbps, average size of image ranges from 5 to 7 Mb and audio-video files starts from 20 Mb. Around 500 images and 100 videos data used in deciding threshold value. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 107

10 (Figure-7.4 Unique Web Objects and Hit Count) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 108

11 (Figure-7.5 Final list of Web Objects) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 109

12 Number of Objects (%) Accuracy Preprocessing Accuracy Proposed Model Other Model 96 Clean Accuracy (%) Proposed Model 97.6 Other Model 99.4 Models (Figure 7.6 Preprocessing Accuracy) Proportion of Objects Text Objects Binary Objects 0 After Test 2 After Test 3 After Test 4 Text Objects Binary Objects Tests (Figure 7.7 Proportion of Text Objects and Binary Objects) 7.2 Sessionization Experiments and Results In this research, for sessionization, strategy of cookie and sessionization heuristic is used. This strategy is similar as previous work. To perform testing of sessionization one customized software is developed and based on that numbers of sessions are generated from server raw log file. The result of test is describes in table 7.2. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 110

13 Table 7.2 Sessionization Result Total Users 109 Total Unique IP 57 Total session Pattern Discovery Experiments and Results In proposed research, pattern discovery is done based on Markov Model and proposed model. Markov Model accepts inputs as a web sessions and generates outputs in terms of numbers of web objects based on appropriate ordering of model. There are number of tests are carried out to generate appropriate output based on Markov Model Pattern Discovery Experiments based on Markov Model [1] Markov Test-1:- Test Description: - To generate occurrence matrix that determines occurrences of particular web object from current state. Result:- Occurrence Matrix is generated ( Refer Table 5.3 ) Tools Used: - Microsoft Excel Tool is used for this experiment. One Macro is generating to determine number of occurrences. Macro Code:- Following code is generated for that. Sub Occurence1 () Dim c As Long Dim r As Long Dim max_col As Long Dim max_row As Long max_row = Sheet1.UsedRange.Rows.Count max_col = Sheet1.UsedRange.Columns.Count Dim values(50, 50) As Integer For r = 1 To max_row For c = 2 To max_col - 1 If (Sheet1.Cells(r, c) <> Sheet1.Cells(r, c + 1)) Then values(sheet1.cells(r, c).value, Sheet1.Cells(r, c + 1).Value) = values(sheet1.cells(r, c).value, Sheet1.Cells(r, c + 1).Value) + 1 End If Next c Next Dim colval As Integer For i = 1 To max_row colval = max_col + 1 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 111

14 [2] Markov Test-2 For c = 1 To max_col Sheet1.Cells(i, colval + 1).Value = values(i, c) colval = colval + 1 Next Next End Sub Test Description: - To generate transition probability matrix based on current state. In order to generate transition probability matrix number of tests is carried out. (a) Test 1:- Determine summation of number of occurrences from current state to all other states. Tools Used:- Microsoft Excel Query: - SUM(X: Y) Where X and Y are cell numbers. Result: - It generates summation figure from current state to all other states. (b) Test 2:- Generate transition probability from current state to all other states. Tools Used:- Microsoft Excel Query: - SUM(X: Y)/ N Where N is addition that is generated from test-1. Result: - It generates transition probability value of every cell from one cell to another. (c) Test 3:- To determine maximum value of transition probability in order to predict next web object. Tools Used:- Microsoft Excel Query: - MAX(X: Y) Result: - Prediction of Next Web Object. According to Markov Model prediction accuracy is increasing if higher order Markov Model is used. Prediction accuracy of first to tenth order Markov Model is depicted in following figure. From figure it is determined that prediction accuracy of tenth order model is about 66%. Table 7.3 describes hit ratio of first to tenth order Markov Model. From table it is determined that it is very difficult to get hit ratio equals to 1. Up to the seventh Markov Model the hit ratio tends to be negative and then after it slightly improve but not reach to an ideal value. Figure 7.9 describes same scenario in graphical representation form. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 112

15 % Accuracy Prediction Accuracy First Second Third Fourth Fifth Sixth Seventh Eight Ninth Tenth Markov Chain Order (Figure 7.8 Prediction Accuracy of Markov Orders) Table 7.3 Markov Hit Ratio Series1 Markov Chain Hit Ratio First Second Third Fourth Fifth -1 Sixth -2 Seventh -7 Eight 8 Ninth 3 Tenth 2 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 113

16 Hit Ratio Markovin Model Hit Ratio First Second Third Fourth Fifth Sixth Seventh Eight Ninth Tenth Hit Ratio Markov Chains (Figure 7.9 Markov Model Hit Ratio) Pattern Discovery Experiments based on Proposed Model In proposed model pattern discovery is done based on appropriate formation of web sessions. To perform web sessions new approach is discovered in proposed research. According to new approach web sessions are formed based on distance measurement techniques. Proposed research identified several distance measurement techniques relevant to web caching and prefetchning. Numbers of experiments are conducted for every distance measurement techniques Experiments on Lavensthein Distance Measurement technique [1] Lavensthein Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Lavensthein Test -2 Test Description: - To determine proximity of different web sessions according to Lavensthein measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 114

17 Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Lavensthein Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determine by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Lavensthein Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Table 7.4 describes the conclusion of all above tests. Table describes threshold value, number of web sessions in particular cluster, mean and standard deviation of all patterns. Table 7.4 Patten Discovery based on Lavensthein Distance Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,10 2,5,7,8,9,10,12,13,14, ,14,15 6,8,9,12,15,5,1,7,10,2,4,14,3 38 3,9,18,23 6,4,5,7,9,10,11,12,15,14,13,8,2,3,13, ,7,11,12,15,17 2,3,4,6,9,11,12,14,15,8,10,5,7, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 115

18 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,4,15 2,4,6,8,9,10,12,14,15,3, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,15 2,5,7,8,9,10,4,6,12,14,15,3, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3, 5,11,15,1, ,4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5,19 5,7,9,11,12,13,14,15,2,3,8, ,2 6,8,9,12,15,2, ,2,4,7,10,11,12,17 6,8,9,12,15,2,5,4,10,14,3,11, 7,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 116

19 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 16,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,5,13, 5,7,9,11,12,13,14,15,2,3, 6, ,8 7,6,5,2,1,9,10,12,14, ,3 3,4,5,6,7,9,10,11,12,15,14, ,18 8,9,10,2,3,4,5,6,7,11,12,15,14,13 56 Standard Deviation Mean ,10 2,5,7,8,9,10,12,13,14,15, ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13,15 79 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 117

20 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,2,1, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5,19 5,7,9,11,12,13,14,15,2,3,2,3,8, ,4,11,17 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,5,13 5,7,9,11,12,13,14,15,2,3, 6, ,8 7,6,5,2,1,9,10,12,14, ,18 8,9,10,2,3,4,5,6,7,11,12,15,14,13 56 Standard Deviation Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 118

21 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,2,1, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5 5,7,9,11,12,13,14,15,2, ,4,11,17 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 6.02 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 119

22 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,17 2,4,6,8,9,10,12,14,15,3,,5, 11,15,2,, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5 5,7,9,11,12,13,14,15,2, ,4,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.93 Mean ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,19 5,7,9,11,12,13,14,15,2,3,8,6 79 6,16 5,6,2,3,8,7,9,4,10,11,12,13,15 79 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 120

23 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3,5,11,15,3,9,8,6, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.18 Mean ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1,7 77 5,19 5,7,9,11,12,13,14,15,2,3,8,6 79 6,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11,13 88 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 121

24 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.26 Mean ,11,17 2,4,6,8,9,10,12,14,15,3, ,20 7,6,5,2,1,9,10,12,14,11, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,11 2,4,6,8,9,10,12,14,15, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 1.46 Mean Experiments on Needleman Wunsch Distance Measurement technique [1] Needleman Wunsch Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 122

25 Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Needleman Wunsch Test -2 Test Description: - To determine proximity of different web sessions according to Needleman Wunsch measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Needleman Wunsch Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determined by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Needleman Wunsch Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Thres hold Table 7.5 describes the conclusion of all above tests according to Needleman Wunsch distance measurement technique. Table describes all fields that are generated as a result of all above tests. Table 7.5 Patten Discovery based on Needleman Wunsch Distance Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern ,10,11,12,14,21,23,25 2,5,7,8,9,10,12,13,14,15,4,3,,6,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 123

26 Thres hold Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 2,3,5,7,10,15,18,24,25 3,4,5,6,7,9,10,11,12,15,14,13, 2,8, ,2,6,7,8,9,10,12,15,16,18,20,23,25 6,8,9,12,15,2,5,3,7, 4,10,11,13, 14, ,5,7,8,9,10,11,12,13,15,17,19,20,22, 24 5,7,9,11,12,13,14,15,2,3,14,4,6,8, 1, ,2,4,9,10,12,13,15,19,20,24 6,8,9,12,15,2,5,4,10,14,3, 7,11, 14,13,11, ,3,7,9,10,16,18,20,23 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 13, ,2,3,4,6,8,10,15,16,18,19,20,21,22,2 3,24 6,8,9,12,15,2,3,4,5,7,10,11,14,13, 1, 2, ,3,4,7,9,10,15,18,20,24 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,3,4,5,6,8,10,11,12,14,15,16,17,18,2 0,24 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,1,2,3,4,5,6,7,8,9,12,15,17,18,20,24 2,5,7,8,9,10,6, 12,15,3,4,11,14,13,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 124

27 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 11,1,4,9,12,14,15,17,19 2,5,7,8,9,10,4,6,12,14,15,3,11,13, ,1,3,4,5,9,10,11,14,15,17,20 2,5,7,8,9,10,3,4,6,11,12,15,14,13, ,4,5,17,19 2,4,6,8,9,10,12,14,15,3,,5,7,11,13, ,1,9,11,12,17,19,25 2,5,7,8,9,10,6,4,5,11,12,15,14,13, 3, ,2,3,4,5,7,8,9,10,11,12,16,17,18,20, 24 6,8,9,12,15,2,5,3,4,7,10,11,14,13, 2,1, ,3,6,7,9,15,18,20,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,4,9,10,11,12,13,14,15,19,21,25 2,4,6,8,9,10,12,14,15,3,5,7,,11,13,,15, ,2,3,6,7,8,9,10,15,16,20,23,25 6,8,9,12,15,2,5,3,4,7,11,14,13,3,, 4,10,13,12, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 125

28 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 19,4,5,7,11,13,14,17,21 2,4,6,8,9,10,12,14,15,3,5,7,11,13,, ,3,4,5,6,7,8,9,10,12,15,16,18,25 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,1,7,17,19,25 2,5,7,8,9,10,3,4,6,11,12,14,15,13,1, ,4,7 2,4,6,8,9,10,12,14,15,3, ,1,3,6,7,18,24,25 2,5,7,8,9,10,3,4,6,11,12,15,14,13, ,2,4,5,7,8,9,10,15,23 6,8,9,12,15,2,5,4,10,14,15,3,7,11,13, , 1,2,3,6,14,16,17,18,20,21,23 2,5,7,8,9,10,6,12,15,3,4,11, 14,13,1,, Standard Deviation Mean ,14 6,8,9,12,15,2,5,1,7, ,7,15,24 2,3,4,6,9,11,12,14,15,8, 10,1,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 126

29 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 3,6,9,10,18,25 3,8,7,9,4,6,10,11,12,13,15,,5,14,2,1 64 4,5,7,9,10,11,12,15,17,20 5,7,9,11,12,13,14,15,2,3,,4,6, 8,10, ,4,13,19 2,4,6,8,9,10,12,14,15,3, 11, 13,5, ,3,7,16,25 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 1, ,2,4,6,8,10,15,16,18 6,8,9,12,2,5,4,10,14,15,3, 7,11, 13,1,14,, ,7,10,15,20 2,3,4,6,9,11,12,14,15,8,5,7,10, 13, ,3,4,10,12,15,18 3,4,5,6,7,9,10,11,12,15,14,13,2,8, ,3,4,7,8,9,15 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 1 11,4,12,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,11,,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 127

30 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 12,4,9,11,15,17 2,4,6,8,9,10,12,14,15,3,,5,7,11,13, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1,11 2,5,7,8,9,10,4,6,,12,14,15, ,2,4,7,8,9,10,11,12,17,20,24 6,8,9,12,15,2,5,4,,10,14,3,11,,7, 1,,14,,13,2, ,6,7,18,25 3,8,7,9,4,6,10,11,12,13,15,2,,14,,5, ,4,11,12,15,19,25 2,4,6,8,9,10,12,14,15,3,,5,11,1,7,, ,3,7,9,16,25 3,4,5,6,7,9,10,11,12,15,14,13,2, 8, ,5,13,17 5,7,9,11,12,13,14,15,2,3,,6,10,4,8, ,4,8,15 2,4,6,8,9,10,12,14,15,3,7,5,2,1, ,25 8,2,1,3,4,5,7,9,10,11,12, ,2,15 6,8,9,12,15,2,5,4,10,14,3,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 128

31 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 25,3,6,16,17,18,23 3,4,5,6,7,9,10,11,12,15,14,13,8,,2, Standard Deviation 4.50 Mean ,14 6,8,9,12,15,2,5,1,7, ,9,18,25 6,4,5,,7,9,10,11,12,15,14,13,8,2,3,1 4,5,11,12,15,17,20 5,7,9,11,12,13,14,15,2,3,4,6,8,10, ,4,13,19 2,4,6,8,9,10,12,14,15,3, 11, 13,5, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,10 2,5,7,8,9,10,12,13,14, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8,, ,7,15 2,3,4,6,9,11,12,14,15,8,10, ,4,12,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,11,,1,7 72 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 129

32 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 12,4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1,11 2,5,7,8,9,10,4,6,,12,14,15, ,4,10,11,12,17 2,4,6,8,9,10,12,14,15,3,5,7, 13,, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,15,3, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,,8,2, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,4,8 2,4,6,8,9,10,12,14,15,3, 7,5,1, ,25 8,2,1,3,4,5,7,9,10,11,12, ,3,18,23 3,4,5,6,7,9,10,11,12,15,14,13,8, 2, Standard Deviation 7.67 Mean ,14 6,8,9,12,15,2,5,1,7,10 71 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 130

33 3,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1,7 5,13,19 3,6,9,11,12,13,14,15,2,14,10,5,7, 15, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8,, ,4,12,17 2,4,6,8,9,10,12,14,15,3,5, 11, ,4,11,17 2,4,6,8,9,10,12,14,15,3,, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1 2,5,7,8,9, ,4,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,15,3, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.63 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 131

34 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1,7 5,13,19 3,6,9,11,12,13,14,15,2,14,10,5,7, 15, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 88 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,17 2,4,6,8,9,10,12,14,15,3,5, 11, ,4,11,17 2,4,6,8,9,10,12,14,15,3,, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3, 5, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14,11 88 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 132

35 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern Standard Deviation 4.57 Mean ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 88 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3, 5, ,3 3,4,5,6,7,9,10,11,12,15,14, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 3.60 Mean ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 133

36 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 6,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3, ,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 2.56 Mean ,17 2,4,6,8,9,10,12,14,15,3, ,11 2,4,6,8,9,10,12,14,15,3,7 91 Standard Deviation 0 Mean Experiments on Smith Waterman Distance Measurement technique [1] Smith Waterman Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Smith Waterman Test -2 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 134

37 Test Description: - To determine proximity of different web sessions according to Smith Waterman measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Smith Waterman Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determined by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Smith Waterman Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Table 7.6 describes the conclusion of all above tests according to Smith Waterman distance measurement technique. Table describes all fields that are generated as a result of all above tests. Figure 7.10 describes pattern accuracy based on all distance measurement techniques used in proposed work. Result shows that Smith Waterman distance measurement techniques reach to 100 percent accuracy level. Figure 7.11 describes hit ratio based on Lavensthein distance measurement technique. Figure 7.12 shows the hit ratio results based on Needleman Wunsch distance measurement technique. Figure 7.13 describes results of hit ratio based on Smith Waterman distance measurement technique. From the results of hit ratio it is derived that Smith Waterman distance measurement technique gives an ideal value of hit ratio that is nearer to 1. Table 7.6 Patten Discovery based on Smith Waterman Distance Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,3,4,9,10,11,12,14,15,17,18,25 3,4,5,6,7,9,10,11,12,15,14,13,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 135

38 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 2,4,11,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,1, ,1,7,9,18,23,25 2,5,7,8,9,10,3,4,6,11,12,14,15,13,3, ,1,2,7,10,11,12,15,17 2,5,7,8,9,10,6,12,15,3,4,11,14,13,3, ,10,13,19 2,5,7,8,9,10,12,13,14,15,3,6, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,3,4,11,13,15,17,18 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,20,21 7,6,5,2,1,9,10,12,14,11,13,5, ,1,3,18 2,5,7,8,9,10,3,4,6,11,12,15,14, ,1,4,5,11,14,15,17,19,25 2,5,7,8,9,10,4,6,,12,14,15,3,,11,13, ,1,2,4,7,10,12,15,17 2,5,7,8,9,10,6,12,15,,4,,14,3,1113, ,1,4,11,17 2,5,7,8,9,10,4,6,,12,14,15, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6,, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 136

39 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 14,1,2,10 2,5,7,8,9,10,6,,12,15,,13, ,1,2,4,7,10,11,17 2,5,7,8,9,10,6,12,15,,4,14,3,,11, ,6 3,8,7,9,4,6,10,11,12,13, ,1,2,4,7,10,11,12,15 2,5,7,8,9,10,6,12,15,4,14,3,11,13, ,1,3,7,9,23,25 2,5,7,8,9,10,3,4,6,,11,12,15,14,13, ,5,10,13 5,7,9,11,12,13,14,15,2,3,8,10,,6,9, ,8,21 7,6,5,2,1,,9,10,12,14,11, ,8,20 7,6,5,2,1,,9,10,12,14,11, ,23 3,4,5,6,8,1,11, ,3,18,22 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,3,10,18 2,5,7,8,9,10,3,4,6,,11,12,15,14, Standard Deviation Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 137

40 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,10,12,14,25 2,5,7,8,9,10,12,13,14,15,3,4,11,6, ,4,11,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,1, ,9,18,25 6,4,5,7,9,10,11,12,15,14,13,8,2,3,1 75 4,2,11,12,15,17 6,8,9,12,15,2,5,4,10,14,3,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,13,18 3,6,9,11,12,13,14,15,2,10,8,4,5, ,20,21 7,6,5,2,1,9,10,12,14,11,13,5, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,14,25 2,5,7,8,9,10,6,12,15,1,3,4,11, ,2,4,12,15,17 6,8,9,12,15,2,5,4,10,14,3,11,2,14,1, ,1,4,11,17 2,5,7,8,9,10,4,6,,12,14,15, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6,, ,1,2,10 2,5,7,8,9,10,6,,12,15,,13, ,2,4,11,17 6,8,9,12,15,2,5,4,10,14,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 138

41 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 16,6 3,8,7,9,4,6,10,11,12,13, ,2,4,11,12,15 6,8,9,12,15,2,5,4,10,,14,3,11,4, ,3,7,9,25 3,4,5,6,7,9,10,11,12,15,14,13,2,8, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8,21 7,6,5,2,1,,9,10,12,14,11, ,8,20 7,6,5,2,1,,9,10,12,14,11, ,23 3,4,5,6,8,1,11, ,22 3,4,5,6,8,1,11, ,1,3,10,18 2,5,7,8,9,10,3,4,6,,11,12,15,14, Standard Deviation Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14,15 6,8,9,12,15,2,5,1,7,10,4,14, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,13,18 3,6,9,11,12,13,14,15,2,10,8,4,5, ,20 7,6,5,2,1,9,10,12,14,11, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 139

42 Thres hold Number of Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Sessions Involved in Web Objects Referred in that Accuracy of pattern each cluster 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,4,17 2,4,6,8,9,10,12,14,15,3, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6, ,1,2 2,5,7,8,9,10,6,12, ,2,4,11,17 6,8,9,12,15,2,5,4,10,14,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,3,1, ,3,7,9 3,4,5,6,7,9,10,11,12,15,14,13,2, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 140

43 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5 5,7,9,11,12,13,14,15,2, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.80 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 141

44 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5 5,7,9,11,12,13,14,15,2, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.80 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 142

45 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.25 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 143

46 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.26 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,17 2,4,6,8,9,10,12,14,15,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 144

47 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4,17 2,4,6,8,9,10,12,14,15,3, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.57 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 145

48 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.73 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 146

49 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) 17,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.86 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.86 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 147

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests

More information

Pre-Processing: Procedure on Web Log File for Web Usage Mining

Pre-Processing: Procedure on Web Log File for Web Usage Mining Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.

More information

PREPROCESSING OF WEB LOGS

PREPROCESSING OF WEB LOGS PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data

More information

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data

A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate

More information

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

Automatic Recommendation for Online Users Using Web Usage Mining

Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

Research and Development of Data Preprocessing in Web Usage Mining

Research and Development of Data Preprocessing in Web Usage Mining Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the

More information

An Approach to Convert Unprocessed Weblogs to Database Table

An Approach to Convert Unprocessed Weblogs to Database Table An Approach to Convert Unprocessed Weblogs to Database Table Kiruthika M, Dipa Dixit, Pranay Suresh, Rishi M Department of Computer Engineering, Fr. CRIT, Vashi, Navi Mumbai Abstract With the explosive

More information

Advanced Preprocessing using Distinct User Identification in web log usage data

Advanced Preprocessing using Distinct User Identification in web log usage data Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of

More information

Web Usage mining framework for Data Cleaning and IP address Identification

Web Usage mining framework for Data Cleaning and IP address Identification Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract

More information

Arti Tyagi Sunita Choudhary

Arti Tyagi Sunita Choudhary Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining

More information

Properties of sequences Since a sequence is a special kind of function it has analogous properties to functions:

Properties of sequences Since a sequence is a special kind of function it has analogous properties to functions: Sequences and Series A sequence is a special kind of function whose domain is N - the set of natural numbers. The range of a sequence is the collection of terms that make up the sequence. Just as the word

More information

AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING

AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt no3man_mohamed@himc.psu.edu.eg

More information

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Web Usage Mining: Identification of Trends Followed by the user through Neural Network International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web

More information

In this presentation, you will be introduced to data mining and the relationship with meaningful use.

In this presentation, you will be introduced to data mining and the relationship with meaningful use. In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING

ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.

More information

A SURVEY ON WEB MINING TOOLS

A SURVEY ON WEB MINING TOOLS IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS

More information

An Effective Analysis of Weblog Files to improve Website Performance

An Effective Analysis of Weblog Files to improve Website Performance An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL

More information

Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP

Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP ABSTRACT In data mining modelling, data preparation

More information

Tutorial for proteome data analysis using the Perseus software platform

Tutorial for proteome data analysis using the Perseus software platform Tutorial for proteome data analysis using the Perseus software platform Laboratory of Mass Spectrometry, LNBio, CNPEM Tutorial version 1.0, January 2014. Note: This tutorial was written based on the information

More information

Research on Application of Web Log Analysis Method in Agriculture Website Improvement

Research on Application of Web Log Analysis Method in Agriculture Website Improvement Research on Application of Web Log Analysis Method in Agriculture Website Improvement Jian Wang 1 ( 1 Agricultural information institute of CAAS, Beijing 100081, China) wangjian@caas.net.cn Abstract :

More information

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS

CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

An Enhanced Framework For Performing Pre- Processing On Web Server Logs

An Enhanced Framework For Performing Pre- Processing On Web Server Logs An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and

More information

Windows Server 2012 Server Manager

Windows Server 2012 Server Manager Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities

More information

CMS Diagnostics Guide

CMS Diagnostics Guide Sitecore CMS 6.0-6.5 CMS Diagnostics Guide Rev: 22 August 2012 Sitecore CMS 6.0-6.5 CMS Diagnostics Guide A developer's guide to diagnosis of Sitecore CMS performance Sitecore CMS 6.0-6.5 Table of Contents

More information

Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data

Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data Knowledge Discovery and Data Mining Unit # 2 1 Structured vs. Non-Structured Data Most business databases contain structured data consisting of well-defined fields with numeric or alphanumeric values.

More information

Software Assurance Marketplace Use Case

Software Assurance Marketplace Use Case Software Assurance Marketplace Use Case Overview Software Assurance Tool Developer May 2013 - Revision 1.0 The Software Assurance Marketplace (SWAMP) will support five user communities as shown in the

More information

Expert Finding Using Social Networking

Expert Finding Using Social Networking San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 1-1-2009 Expert Finding Using Social Networking Parin Shah San Jose State University Follow this and

More information

Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services

Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Length: Delivery Method: 3 Days Instructor-led (classroom) About this Course Elements of this syllabus are subject

More information

Model-Based Cluster Analysis for Web Users Sessions

Model-Based Cluster Analysis for Web Users Sessions Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece gpallis@ccf.auth.gr

More information

www.apacheviewer.com Apache Logs Viewer Manual

www.apacheviewer.com Apache Logs Viewer Manual Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File

More information

Cisco NetFlow Reporting Instruction Manual Version 1.0

Cisco NetFlow Reporting Instruction Manual Version 1.0 Cisco NetFlow Reporting Instruction Manual Version 1.0 WiredCity 777 Davis St, Suite 250 San Leandro CA 94577 Ph: + 1 510 297 5874 Fax: +1 510-357-8136 itmonitor@wiredcity.com www.wiredcity.com www.wiredcity.com

More information

Big Data Preprocessing Mechanism for Analytics of Mobile Web Log

Big Data Preprocessing Mechanism for Analytics of Mobile Web Log Int. J. Advance Soft Compu. Appl, Vol. 6, No. 1, March 2014 ISSN 2074-8523; Copyright SCRG Publication, 2014 Big Data Preprocessing Mechanism for Analytics of Mobile Web Log You Joung Ham, Hyung-Woo Lee

More information

Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang

Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Software Requirement Specification Employee Tracking System Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Team Members Seung Yang, Nathan Scheck, Ernie Rosales Page 1 Software Requirements

More information

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House

Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,

More information

Using Database Performance Warehouse to Monitor Microsoft SQL Server Report Content

Using Database Performance Warehouse to Monitor Microsoft SQL Server Report Content Using Database Performance Warehouse to Monitor Microsoft SQL Server Report Content Applies to: Enhancement Package 1 for SAP Solution Manager 7.0 (SP18) and Microsoft SQL Server databases. SAP Solution

More information

White Paper April 2006

White Paper April 2006 White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5

More information

The web server administrator needs to set certain properties to insure that logging is activated.

The web server administrator needs to set certain properties to insure that logging is activated. Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

ICE Trade Vault. Public User & Technology Guide June 6, 2014

ICE Trade Vault. Public User & Technology Guide June 6, 2014 ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,

More information

WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS

WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development

More information

Data Analysis in E-Learning System of Gunadarma University by Using Knime

Data Analysis in E-Learning System of Gunadarma University by Using Knime Data Analysis in E-Learning System of Gunadarma University by Using Knime Dian Kusuma Ningtyas tyaz tyaz tyaz@student.gunadarma.ac.id Prasetiyo prasetiyo@student.gunadarma.ac.id Farah Virnawati virtha

More information

W ith the ubiquity of e-mail comes the increased A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! Exchange Message Tracking Logs Message Forensics

W ith the ubiquity of e-mail comes the increased A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! Exchange Message Tracking Logs Message Forensics A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! VOL. 11, NO. 8 REPORT APRIL 14, 2011 BNA INSIGHT Exchange Message Tracking Logs Message Forensics BY JAMES R. SCARAZZO W ith the ubiquity of e-mail comes the

More information

Cache Configuration Reference

Cache Configuration Reference Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...

More information

Categorical Data Visualization and Clustering Using Subjective Factors

Categorical Data Visualization and Clustering Using Subjective Factors Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING

AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering

More information

Introduction. A. Bellaachia Page: 1

Introduction. A. Bellaachia Page: 1 Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.

More information

TF04 - Leveraging SQL Server Business Intelligence Tools

TF04 - Leveraging SQL Server Business Intelligence Tools TF04 - Leveraging SQL Server Business Intelligence Tools PUBLIC INFORMATION Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. Le Roy Howe Commercial Engineering PUBLIC INFORMATION Follow RSTechED

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Overview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16

Overview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16 HNC Computing - s HNC Computing - s Physical Overview Process What techniques are available for physical design? Physical Explain one physical design technique. Modern Management McFadden/Hoffer Chapter

More information

Intelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy

Intelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy Intelligent Process Management & Process Visualization TAProViz 2014 workshop Presenter: Dafna Levy The Topics Process Visualization in Priority ERP Planning Execution BI analysis (Built-in) Discovering

More information

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for

More information

IT462 Lab 5: Clustering with MS SQL Server

IT462 Lab 5: Clustering with MS SQL Server IT462 Lab 5: Clustering with MS SQL Server This lab should give you the chance to practice some of the data mining techniques you've learned in class. Preliminaries: For this lab, you will use the SQL

More information

A Comparison Framework of Similarity Metrics Used for Web Access Log Analysis

A Comparison Framework of Similarity Metrics Used for Web Access Log Analysis A Comparison Framework of Similarity Metrics Used for Web Access Log Analysis Yusuf Yaslan and Zehra Cataltepe Istanbul Technical University, Computer Engineering Department, Maslak 34469 Istanbul, Turkey

More information

Pure1 Manage User Guide

Pure1 Manage User Guide User Guide 11/2015 Contents Overview... 2 Pure1 Manage Navigation... 3 Pure1 Manage - Arrays Page... 5 Card View... 5 Expanded Card View... 7 List View... 10 Pure1 Manage Replication Page... 11 Pure1

More information

ATLAS.ti for Mac OS X Getting Started

ATLAS.ti for Mac OS X Getting Started ATLAS.ti for Mac OS X Getting Started 2 ATLAS.ti for Mac OS X Getting Started Copyright 2014 by ATLAS.ti Scientific Software Development GmbH, Berlin. All rights reserved. Manual Version: 5.20140918. Updated

More information

A permutation can also be represented by describing its cycles. What do you suppose is meant by this?

A permutation can also be represented by describing its cycles. What do you suppose is meant by this? Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs

More information

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database

More information

Beating the MLB Moneyline

Beating the MLB Moneyline Beating the MLB Moneyline Leland Chen llxchen@stanford.edu Andrew He andu@stanford.edu 1 Abstract Sports forecasting is a challenging task that has similarities to stock market prediction, requiring time-series

More information

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY

More information

VALUE STREAM MAPPING FOR SOFTWARE DEVELOPMENT PROCESS. Ganesh S Thummala. A Research Paper. Submitted in Partial Fulfillment of the

VALUE STREAM MAPPING FOR SOFTWARE DEVELOPMENT PROCESS. Ganesh S Thummala. A Research Paper. Submitted in Partial Fulfillment of the VALUE STREAM MAPPING FOR SOFTWARE DEVELOPMENT PROCESS by Ganesh S Thummala A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree In Management Technology

More information

WhatsVirtual for WhatsUp Gold v16.0 User Guide

WhatsVirtual for WhatsUp Gold v16.0 User Guide WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual

More information

Effective User Navigation in Dynamic Website

Effective User Navigation in Dynamic Website Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya

More information

TrendWorX32 SQL Query Engine V9.2 Beta III

TrendWorX32 SQL Query Engine V9.2 Beta III TrendWorX32 SQL Query Engine V9.2 Beta III Documentation (Preliminary November 2009) OPC Automation at your fingertips 1. Introduction TrendWorX32 Logger logs data to a database. You can use the TrendWorX32

More information

A Cube Model for Web Access Sessions and Cluster Analysis

A Cube Model for Web Access Sessions and Cluster Analysis A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,dcheung@eti.hku.hk Michael K. Ng,

More information

RapidResponse Training Catalog

RapidResponse Training Catalog RapidResponse Training Catalog Contents About RapidResponse Training... 4 RapidResponse Roles... 4 Consumers... 5 Contributors... 6 Contributors + RapidResponse Applications... 6 Authors... 8 Basic Authors...

More information

Monitoring Pramati Web Server

Monitoring Pramati Web Server Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,

More information

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1 2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System

More information

A Survey on Web Mining From Web Server Log

A Survey on Web Mining From Web Server Log A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013. Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing

More information

Data Visualization for Data QC

Data Visualization for Data QC Data Visualization for Data QC March, 2012 Steve Berman Deloitte Consulting Agenda Overview Reasons to Use Data Visualization in Data Cleansing Examples Tools Wrap-Up 1 How QC has worked up to now Checking

More information

Web Site Hosting Services

Web Site Hosting Services Web Site Hosting Services Putting your Web Site online with robust, reliable service Web hosting is what you need to put a website online on the internet it s the space where your website lives. Different

More information

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470 Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed

More information

Creating a universe on Hive with Hortonworks HDP 2.0

Creating a universe on Hive with Hortonworks HDP 2.0 Creating a universe on Hive with Hortonworks HDP 2.0 Learn how to create an SAP BusinessObjects Universe on top of Apache Hive 2 using the Hortonworks HDP 2.0 distribution Author(s): Company: Ajay Singh

More information

Microsoft Internet Information Services (IIS)

Microsoft Internet Information Services (IIS) McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Microsoft Internet Information Services (IIS) September 30, 2014 Microsoft IIS Page 1 of 11 Important Note: The information

More information

Best Practices for Hadoop Data Analysis with Tableau

Best Practices for Hadoop Data Analysis with Tableau Best Practices for Hadoop Data Analysis with Tableau September 2013 2013 Hortonworks Inc. http:// Tableau 6.1.4 introduced the ability to visualize large, complex data stored in Apache Hadoop with Hortonworks

More information

Click on "View" then "Internet Options" then use the up or down arrow in the history section to adjust the number of days.

Click on View then Internet Options then use the up or down arrow in the history section to adjust the number of days. Quick Tips for parents 1. Checking Internet History Please be aware, that a child can clear the history of sites visited. If you find that your children have been emptying the history file, we would suggest

More information

Optimizing Object Freshness Controls in Web Caches

Optimizing Object Freshness Controls in Web Caches Optimizing Object Freshness Controls in Web Caches Mark Nottingham 12/192 Little Collins Street Melbourne VIC 3000 Australia mnot@pobox.com Abstract Mechanisms for controlling object freshness and refresh

More information

How To Mine A Web Site For Data Mining

How To Mine A Web Site For Data Mining Data Preparation for Mining World Wide Web Browsing Patterns Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava Department of Computer Science and Engineering University of Minnesota 4-192 EECS Bldg.,

More information

IMPLEMENTATION OF A TIME TABLE GENERATOR USING VISUAL BASIC.NET

IMPLEMENTATION OF A TIME TABLE GENERATOR USING VISUAL BASIC.NET IMPLEMENTATION OF A TIME TABLE GENERATOR USING VISUAL BASIC.NET Joseph M. Mom and Jonathan A. Enokela Department of Electrical and Electronics Engineering, University of Agriculture, Makurdi, Nigeria E-Mail:

More information

Oracle Big Data SQL Technical Update

Oracle Big Data SQL Technical Update Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Data exploration with Microsoft Excel: analysing more than one variable

Data exploration with Microsoft Excel: analysing more than one variable Data exploration with Microsoft Excel: analysing more than one variable Contents 1 Introduction... 1 2 Comparing different groups or different variables... 2 3 Exploring the association between categorical

More information

About Me: Brent Ozar. Perfmon and Profiler 101

About Me: Brent Ozar. Perfmon and Profiler 101 Perfmon and Profiler 101 2008 Quest Software, Inc. ALL RIGHTS RESERVED. About Me: Brent Ozar SQL Server Expert for Quest Software Former SQL DBA Managed >80tb SAN, VMware Dot-com-crash experience Specializes

More information

MiSeq: Imaging and Base Calling

MiSeq: Imaging and Base Calling MiSeq: Imaging and Page Welcome Navigation Presenter Introduction MiSeq Sequencing Workflow Narration Welcome to MiSeq: Imaging and. This course takes 35 minutes to complete. Click Next to continue. Please

More information

Object Recognition and Template Matching

Object Recognition and Template Matching Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of

More information

COURSE RECOMMENDER SYSTEM IN E-LEARNING

COURSE RECOMMENDER SYSTEM IN E-LEARNING International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand

More information

SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS

SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science with Honors Research Distinction in Electrical

More information

Web Log Mining: A Study of User Sessions

Web Log Mining: A Study of User Sessions UNIVERSITY OF PADUA Department of Information Engineering PersDL 2007 10th DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries Corfu, Greece,

More information

How To Create A Data Science System

How To Create A Data Science System Enhance Collaboration and Data Sharing for Faster Decisions and Improved Mission Outcome Richard Breakiron Senior Director, Cyber Solutions Rbreakiron@vion.com Office: 571-353-6127 / Cell: 803-443-8002

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information