CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL
|
|
- Hilary Arnold
- 7 years ago
- Views:
Transcription
1 CHAPTER-7 EXPERIMENTS AND TEST RESULTS FOR PROPOSED PREDICTION MODEL 7.1 Preprocessing Experiments and Results 7.2 Sessionization Experiments and Results 7.3 Pattern Discovery Experiments and Results 7.4 Conclusion Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 99
2 This chapter will deal with all experiments are conducted through out the current research. Prediction Model of web caching and perfecting consists of main three phases: Preprocessing, Sessionization, Pattern discovery and analysis; this chapter will discuss all experiments and associated results in all phases. Different tools and methods are used in proposed research for different phases. 7.1 Preprocessing Experiments and Results Preprocessing phase is experimented for current research and past research did by many authors and then comparison is done based on both approaches. Number of tests is conducted in this phase and they are narrated as under: (1) Preprocessing Test-1:- Test Description: - Parse row log file into appropriate fields of W3C Extended form. Row log file is available at following path of personal computer E:\Dharmendra\logexample\iis.log. Result: - Sample of result of above test is available in Table 7.1. Result Analysis: - Result got from above test is according to requirement of proposed research. This result can be used for further processing. Total 5000 raw are affected by this test. Query used for: - In Microsoft Log Parser, appropriate environment has to set up to execute query based on type of log data. Select * from e:\dharmendra\logexample\iis.log; Snapshot of Microsoft Visual Log Parser tool for test-1 is described in figure 7.1. (2) Preprocessing Test-2 :- Test Description: - Remove unnecessary web objects access by users. Result: - Sample of result of above test is available in figure 7.2. Result Analysis: - Result generated is perfect. This result can be used for further processing. Total 2990 raw affected by above query from raw log file having 15 days transactions. Query used for: - Following query is executed to get result. select LogFilename,date,time,c-ip,s-ip,cs-uri-stem,sc-status,time-taken from e:\dharmendra\logexample\iis.log where (cs-uri-stem like '%.htm' and ( sc-status=200 or sc-status=304 or sc-status=306) ) or( cs-uri-stem like '%.asp' and ( sc-status=200 or sc-status=304 or sc-status=306)) or( cs-uri-stem like '%.php' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( cs-uri-stem like '%.aspx' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uri-stem like '%.jpg' and timetaken >= )and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.gif' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 100
3 '%.avi' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uristem like '%.dat' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306)) Figure 7.3 describes snapshot of tool with query and result of test-2. Figure 7.1 Snapshot of Microsoft Visual Log Parser Tool for Test-1 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 101
4 Table 7.1 Log Data in W3C Field Format Log File Name Row Date Time C-ip s-site s-computer s-ip e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 102
5 Table 7.1 Log Data in W3C Field Format(Continue) Log File Name Row Date Time C-ip s-site s-computer s-ip e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW e:\dharmendra\logexample\iis.log : W3SVC1 ENVGISNEW Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 103
6 (Figure 7.2 Filtered Log Entries) [3] Preprocessing Test-3:- Test Description: - To determine unique web objects and associated hit count. Result: - Sample of result of above test is available in figure-7.4 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 104
7 Result Analysis: - Result generated is perfect. This result can be used for further processing. Total 490 unique web objects found from total 2990 web objects. Query used for:- Following query is executed to get result. select distinct cs-uri-stem, count(cs-uri-stem) from e:\dharmendra\logexample\iis.log where (cs-uri-stem like '%.htm' and ( sc-status=200 or sc-status=304 or sc-status=306) ) or( cs-uri-stem like '%.asp' and ( sc-status=200 or sc-status=304 or sc-status=306)) Figure 7.3 Snapshot of Microsoft Visual Log Parser Tool for Test-2 or( cs-uri-stem like '%.php' and ( sc-status=200 or sc-status=304 or sc-status=306)) or ( cs-uri-stem like '%.aspx' and ( sc-status=200 or sc-status=304 or sc-status=306)) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 105
8 or ( (cs-uri-stem like '%.jpg' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.gif' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306) ) or (( cs-uri-stem like '%.avi' and time-taken >= ) and( sc-status=200 or sc-status=304 or sc-status=306)) or ( (cs-uri-stem like '%.dat' and time-taken >= )and( sc-status=200 or sc-status=304 or sc-status=306)) group by cs-uri-stem [4] Preprocessing Test-4:- Test Description: - To remove web objects which does not fulfill the condition of threshold value. Result: - Sample of result of above test is available in figure-7.5. Result Analysis: - Total 120 raw is retrieved from above test, which fulfills condition of threshold. Query used for: - For this test 4, Microsoft excel tool is used. Following steps are used to accomplish this test. (i) First Max function is applied for data which is generated by test 3 to calculate highest value of hit rate. Highest hit rate generated from data is 62. = MAX (A1: A 491) (ii) Threshold value is derived by following formula. = (62 * 0.10) (iii) Advanced filtered feature is used to filter only those records which Fulfill condition of threshold value. (iv) Lastly, records are arranged in descending order of hit ratio by sorting feature of Microsoft excel. Similar kind of tests is carried out for other research for comparison purpose. Figure 7.6 describes the percentage accuracy of preprocessing phase. From figure it is found out that preprocessing accuracy of proposed model is quite less than other models as other models ignores binary objects like audio and video objects. In all other models sometimes valuable information in form of binary objects are removed and that is not the case of proposed model. Figure 7.7 describes the proportions of text objects and binary objects at every test levels so it Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 106
9 is analyzed that how binary objects are important in process of preprocessing. During preprocessing stage one test is carried out to decide threshold value of binary objects like audio and video. [5] Preprocessing Test-5:- Test Description: - To decide threshold value of image and video file. Tool used: - One online tool is used to determine load time of image and video. Reference is In this test it is assumed that average internet speed is 1.4 Mbps, average size of image ranges from 5 to 7 Mb and audio-video files starts from 20 Mb. Around 500 images and 100 videos data used in deciding threshold value. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 107
10 (Figure-7.4 Unique Web Objects and Hit Count) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 108
11 (Figure-7.5 Final list of Web Objects) Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 109
12 Number of Objects (%) Accuracy Preprocessing Accuracy Proposed Model Other Model 96 Clean Accuracy (%) Proposed Model 97.6 Other Model 99.4 Models (Figure 7.6 Preprocessing Accuracy) Proportion of Objects Text Objects Binary Objects 0 After Test 2 After Test 3 After Test 4 Text Objects Binary Objects Tests (Figure 7.7 Proportion of Text Objects and Binary Objects) 7.2 Sessionization Experiments and Results In this research, for sessionization, strategy of cookie and sessionization heuristic is used. This strategy is similar as previous work. To perform testing of sessionization one customized software is developed and based on that numbers of sessions are generated from server raw log file. The result of test is describes in table 7.2. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 110
13 Table 7.2 Sessionization Result Total Users 109 Total Unique IP 57 Total session Pattern Discovery Experiments and Results In proposed research, pattern discovery is done based on Markov Model and proposed model. Markov Model accepts inputs as a web sessions and generates outputs in terms of numbers of web objects based on appropriate ordering of model. There are number of tests are carried out to generate appropriate output based on Markov Model Pattern Discovery Experiments based on Markov Model [1] Markov Test-1:- Test Description: - To generate occurrence matrix that determines occurrences of particular web object from current state. Result:- Occurrence Matrix is generated ( Refer Table 5.3 ) Tools Used: - Microsoft Excel Tool is used for this experiment. One Macro is generating to determine number of occurrences. Macro Code:- Following code is generated for that. Sub Occurence1 () Dim c As Long Dim r As Long Dim max_col As Long Dim max_row As Long max_row = Sheet1.UsedRange.Rows.Count max_col = Sheet1.UsedRange.Columns.Count Dim values(50, 50) As Integer For r = 1 To max_row For c = 2 To max_col - 1 If (Sheet1.Cells(r, c) <> Sheet1.Cells(r, c + 1)) Then values(sheet1.cells(r, c).value, Sheet1.Cells(r, c + 1).Value) = values(sheet1.cells(r, c).value, Sheet1.Cells(r, c + 1).Value) + 1 End If Next c Next Dim colval As Integer For i = 1 To max_row colval = max_col + 1 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 111
14 [2] Markov Test-2 For c = 1 To max_col Sheet1.Cells(i, colval + 1).Value = values(i, c) colval = colval + 1 Next Next End Sub Test Description: - To generate transition probability matrix based on current state. In order to generate transition probability matrix number of tests is carried out. (a) Test 1:- Determine summation of number of occurrences from current state to all other states. Tools Used:- Microsoft Excel Query: - SUM(X: Y) Where X and Y are cell numbers. Result: - It generates summation figure from current state to all other states. (b) Test 2:- Generate transition probability from current state to all other states. Tools Used:- Microsoft Excel Query: - SUM(X: Y)/ N Where N is addition that is generated from test-1. Result: - It generates transition probability value of every cell from one cell to another. (c) Test 3:- To determine maximum value of transition probability in order to predict next web object. Tools Used:- Microsoft Excel Query: - MAX(X: Y) Result: - Prediction of Next Web Object. According to Markov Model prediction accuracy is increasing if higher order Markov Model is used. Prediction accuracy of first to tenth order Markov Model is depicted in following figure. From figure it is determined that prediction accuracy of tenth order model is about 66%. Table 7.3 describes hit ratio of first to tenth order Markov Model. From table it is determined that it is very difficult to get hit ratio equals to 1. Up to the seventh Markov Model the hit ratio tends to be negative and then after it slightly improve but not reach to an ideal value. Figure 7.9 describes same scenario in graphical representation form. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 112
15 % Accuracy Prediction Accuracy First Second Third Fourth Fifth Sixth Seventh Eight Ninth Tenth Markov Chain Order (Figure 7.8 Prediction Accuracy of Markov Orders) Table 7.3 Markov Hit Ratio Series1 Markov Chain Hit Ratio First Second Third Fourth Fifth -1 Sixth -2 Seventh -7 Eight 8 Ninth 3 Tenth 2 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 113
16 Hit Ratio Markovin Model Hit Ratio First Second Third Fourth Fifth Sixth Seventh Eight Ninth Tenth Hit Ratio Markov Chains (Figure 7.9 Markov Model Hit Ratio) Pattern Discovery Experiments based on Proposed Model In proposed model pattern discovery is done based on appropriate formation of web sessions. To perform web sessions new approach is discovered in proposed research. According to new approach web sessions are formed based on distance measurement techniques. Proposed research identified several distance measurement techniques relevant to web caching and prefetchning. Numbers of experiments are conducted for every distance measurement techniques Experiments on Lavensthein Distance Measurement technique [1] Lavensthein Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Lavensthein Test -2 Test Description: - To determine proximity of different web sessions according to Lavensthein measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 114
17 Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Lavensthein Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determine by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Lavensthein Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Table 7.4 describes the conclusion of all above tests. Table describes threshold value, number of web sessions in particular cluster, mean and standard deviation of all patterns. Table 7.4 Patten Discovery based on Lavensthein Distance Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,10 2,5,7,8,9,10,12,13,14, ,14,15 6,8,9,12,15,5,1,7,10,2,4,14,3 38 3,9,18,23 6,4,5,7,9,10,11,12,15,14,13,8,2,3,13, ,7,11,12,15,17 2,3,4,6,9,11,12,14,15,8,10,5,7, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 115
18 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,4,15 2,4,6,8,9,10,12,14,15,3, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,15 2,5,7,8,9,10,4,6,12,14,15,3, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3, 5,11,15,1, ,4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5,19 5,7,9,11,12,13,14,15,2,3,8, ,2 6,8,9,12,15,2, ,2,4,7,10,11,12,17 6,8,9,12,15,2,5,4,10,14,3,11, 7,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 116
19 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 16,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,5,13, 5,7,9,11,12,13,14,15,2,3, 6, ,8 7,6,5,2,1,9,10,12,14, ,3 3,4,5,6,7,9,10,11,12,15,14, ,18 8,9,10,2,3,4,5,6,7,11,12,15,14,13 56 Standard Deviation Mean ,10 2,5,7,8,9,10,12,13,14,15, ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13,15 79 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 117
20 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,2,1, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5,19 5,7,9,11,12,13,14,15,2,3,2,3,8, ,4,11,17 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,5,13 5,7,9,11,12,13,14,15,2,3, 6, ,8 7,6,5,2,1,9,10,12,14, ,18 8,9,10,2,3,4,5,6,7,11,12,15,14,13 56 Standard Deviation Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 118
21 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,2,1, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5 5,7,9,11,12,13,14,15,2, ,4,11,17 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 6.02 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 119
22 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,17 2,4,6,8,9,10,12,14,15,3,,5, 11,15,2,, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,5 5,7,9,11,12,13,14,15,2, ,4,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.93 Mean ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,1, ,19 5,7,9,11,12,13,14,15,2,3,8,6 79 6,16 5,6,2,3,8,7,9,4,10,11,12,13,15 79 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 120
23 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3,5,11,15,3,9,8,6, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.18 Mean ,9,18 6,4,5, 7,9,10,11,12,15,14,13, 8,2,3,6 70 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1,7 77 5,19 5,7,9,11,12,13,14,15,2,3,8,6 79 6,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11,13 88 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 121
24 Table 7.4 Pattern Discovery based on Lavensthein Distance(Continue) Threshold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.26 Mean ,11,17 2,4,6,8,9,10,12,14,15,3, ,20 7,6,5,2,1,9,10,12,14,11, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,11 2,4,6,8,9,10,12,14,15, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 1.46 Mean Experiments on Needleman Wunsch Distance Measurement technique [1] Needleman Wunsch Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 122
25 Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Needleman Wunsch Test -2 Test Description: - To determine proximity of different web sessions according to Needleman Wunsch measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Needleman Wunsch Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determined by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Needleman Wunsch Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Thres hold Table 7.5 describes the conclusion of all above tests according to Needleman Wunsch distance measurement technique. Table describes all fields that are generated as a result of all above tests. Table 7.5 Patten Discovery based on Needleman Wunsch Distance Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern ,10,11,12,14,21,23,25 2,5,7,8,9,10,12,13,14,15,4,3,,6,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 123
26 Thres hold Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 2,3,5,7,10,15,18,24,25 3,4,5,6,7,9,10,11,12,15,14,13, 2,8, ,2,6,7,8,9,10,12,15,16,18,20,23,25 6,8,9,12,15,2,5,3,7, 4,10,11,13, 14, ,5,7,8,9,10,11,12,13,15,17,19,20,22, 24 5,7,9,11,12,13,14,15,2,3,14,4,6,8, 1, ,2,4,9,10,12,13,15,19,20,24 6,8,9,12,15,2,5,4,10,14,3, 7,11, 14,13,11, ,3,7,9,10,16,18,20,23 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 13, ,2,3,4,6,8,10,15,16,18,19,20,21,22,2 3,24 6,8,9,12,15,2,3,4,5,7,10,11,14,13, 1, 2, ,3,4,7,9,10,15,18,20,24 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,3,4,5,6,8,10,11,12,14,15,16,17,18,2 0,24 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,1,2,3,4,5,6,7,8,9,12,15,17,18,20,24 2,5,7,8,9,10,6, 12,15,3,4,11,14,13,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 124
27 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 11,1,4,9,12,14,15,17,19 2,5,7,8,9,10,4,6,12,14,15,3,11,13, ,1,3,4,5,9,10,11,14,15,17,20 2,5,7,8,9,10,3,4,6,11,12,15,14,13, ,4,5,17,19 2,4,6,8,9,10,12,14,15,3,,5,7,11,13, ,1,9,11,12,17,19,25 2,5,7,8,9,10,6,4,5,11,12,15,14,13, 3, ,2,3,4,5,7,8,9,10,11,12,16,17,18,20, 24 6,8,9,12,15,2,5,3,4,7,10,11,14,13, 2,1, ,3,6,7,9,15,18,20,25 3,4,5,6,7,9,10,11,12,15,14,13,8,2, ,4,9,10,11,12,13,14,15,19,21,25 2,4,6,8,9,10,12,14,15,3,5,7,,11,13,,15, ,2,3,6,7,8,9,10,15,16,20,23,25 6,8,9,12,15,2,5,3,4,7,11,14,13,3,, 4,10,13,12, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 125
28 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 19,4,5,7,11,13,14,17,21 2,4,6,8,9,10,12,14,15,3,5,7,11,13,, ,3,4,5,6,7,8,9,10,12,15,16,18,25 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,1,7,17,19,25 2,5,7,8,9,10,3,4,6,11,12,14,15,13,1, ,4,7 2,4,6,8,9,10,12,14,15,3, ,1,3,6,7,18,24,25 2,5,7,8,9,10,3,4,6,11,12,15,14,13, ,2,4,5,7,8,9,10,15,23 6,8,9,12,15,2,5,4,10,14,15,3,7,11,13, , 1,2,3,6,14,16,17,18,20,21,23 2,5,7,8,9,10,6,12,15,3,4,11, 14,13,1,, Standard Deviation Mean ,14 6,8,9,12,15,2,5,1,7, ,7,15,24 2,3,4,6,9,11,12,14,15,8, 10,1,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 126
29 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 3,6,9,10,18,25 3,8,7,9,4,6,10,11,12,13,15,,5,14,2,1 64 4,5,7,9,10,11,12,15,17,20 5,7,9,11,12,13,14,15,2,3,,4,6, 8,10, ,4,13,19 2,4,6,8,9,10,12,14,15,3, 11, 13,5, ,3,7,16,25 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 1, ,2,4,6,8,10,15,16,18 6,8,9,12,2,5,4,10,14,15,3, 7,11, 13,1,14,, ,7,10,15,20 2,3,4,6,9,11,12,14,15,8,5,7,10, 13, ,3,4,10,12,15,18 3,4,5,6,7,9,10,11,12,15,14,13,2,8, ,3,4,7,8,9,15 3,4,5,6,7,9,10,11,12,15,14,13,2,8, 1 11,4,12,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,11,,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 127
30 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 12,4,9,11,15,17 2,4,6,8,9,10,12,14,15,3,,5,7,11,13, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1,11 2,5,7,8,9,10,4,6,,12,14,15, ,2,4,7,8,9,10,11,12,17,20,24 6,8,9,12,15,2,5,4,,10,14,3,11,,7, 1,,14,,13,2, ,6,7,18,25 3,8,7,9,4,6,10,11,12,13,15,2,,14,,5, ,4,11,12,15,19,25 2,4,6,8,9,10,12,14,15,3,,5,11,1,7,, ,3,7,9,16,25 3,4,5,6,7,9,10,11,12,15,14,13,2, 8, ,5,13,17 5,7,9,11,12,13,14,15,2,3,,6,10,4,8, ,4,8,15 2,4,6,8,9,10,12,14,15,3,7,5,2,1, ,25 8,2,1,3,4,5,7,9,10,11,12, ,2,15 6,8,9,12,15,2,5,4,10,14,3,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 128
31 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 25,3,6,16,17,18,23 3,4,5,6,7,9,10,11,12,15,14,13,8,,2, Standard Deviation 4.50 Mean ,14 6,8,9,12,15,2,5,1,7, ,9,18,25 6,4,5,,7,9,10,11,12,15,14,13,8,2,3,1 4,5,11,12,15,17,20 5,7,9,11,12,13,14,15,2,3,4,6,8,10, ,4,13,19 2,4,6,8,9,10,12,14,15,3, 11, 13,5, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,10 2,5,7,8,9,10,12,13,14, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8,, ,7,15 2,3,4,6,9,11,12,14,15,8,10, ,4,12,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,11,,1,7 72 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 129
32 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 12,4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1,11 2,5,7,8,9,10,4,6,,12,14,15, ,4,10,11,12,17 2,4,6,8,9,10,12,14,15,3,5,7, 13,, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,15,3, ,3,9,25 3,4,5,6,7,9,10,11,12,15,14,13,,8,2, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,4,8 2,4,6,8,9,10,12,14,15,3, 7,5,1, ,25 8,2,1,3,4,5,7,9,10,11,12, ,3,18,23 3,4,5,6,7,9,10,11,12,15,14,13,8, 2, Standard Deviation 7.67 Mean ,14 6,8,9,12,15,2,5,1,7,10 71 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 130
33 3,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1,7 5,13,19 3,6,9,11,12,13,14,15,2,14,10,5,7, 15, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8,, ,4,12,17 2,4,6,8,9,10,12,14,15,3,5, 11, ,4,11,17 2,4,6,8,9,10,12,14,15,3,, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,1 2,5,7,8,9, ,4,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,15,3, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 5.63 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 131
34 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1,7 5,13,19 3,6,9,11,12,13,14,15,2,14,10,5,7, 15, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 88 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,12,17 2,4,6,8,9,10,12,14,15,3,5, 11, ,4,11,17 2,4,6,8,9,10,12,14,15,3,, ,5,19 5,7,9,11,12,13,14,15,2,3,,8, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3, 5, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14,11 88 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 132
35 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern Standard Deviation 4.57 Mean ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2,3, 13 4,11,12,15,17 2,4,6,8,9,10,12,14,15,3,,5, 11, 1, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3,5 88 9,3 3,4,5,6,7,9,10,11,12,15,14, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12 2,4,6,8,9,10,12,14,15,3, 5, ,3 3,4,5,6,7,9,10,11,12,15,14, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 3.60 Mean ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 133
36 Table 7.5 Patten Discovery based on Needleman Wunsch Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of Pattern 6,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,5,6,9,10,12,14,11,10,9,1 3, ,17 2,4,6,8,9,10,12,14,15,3, ,4 2,4,6,8,9,10,12,14,15, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,8 7,6,5,2,1,9,10,12,14,11 88 Standard Deviation 2.56 Mean ,17 2,4,6,8,9,10,12,14,15,3, ,11 2,4,6,8,9,10,12,14,15,3,7 91 Standard Deviation 0 Mean Experiments on Smith Waterman Distance Measurement technique [1] Smith Waterman Test -1 Test Description: - To determine distance measure between web sessions according to Lavensthein distance measurement technique. Tool used: - One online tool is used to determine distance measure between web sessions. Reference is Results: - One metric with distance value is generated as a result of this test. [2] Smith Waterman Test -2 Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 134
37 Test Description: - To determine proximity of different web sessions according to Smith Waterman measurement technique. Tool used: - Microsoft Excel tool is used to determine proximity based on conditional formatting option. Metric generated in previous test result is used as an input. Results: - As results of this test number of sessions involved in each cluster is determined based on particular threshold value. [3] Smith Waterman Test -3 Test Description: - To determine accuracy of pattern. Tool used: - Microsoft Excel tool is used to determine accuracy of pattern. Accuracy of pattern is determined by taking average of each permutation combination web session pair. Results: - Accuracy value is generating for each pattern. [4] Smith Waterman Test-4 Test Description: - To determine mean and standard deviation in order to take appropriate action. Tool used: - Microsoft Excel tool is used to determine mean and standard deviation of patterns generated at specific threshold value. Results: - Mean and standard deviation of patterns are generated as a result of test. Table 7.6 describes the conclusion of all above tests according to Smith Waterman distance measurement technique. Table describes all fields that are generated as a result of all above tests. Figure 7.10 describes pattern accuracy based on all distance measurement techniques used in proposed work. Result shows that Smith Waterman distance measurement techniques reach to 100 percent accuracy level. Figure 7.11 describes hit ratio based on Lavensthein distance measurement technique. Figure 7.12 shows the hit ratio results based on Needleman Wunsch distance measurement technique. Figure 7.13 describes results of hit ratio based on Smith Waterman distance measurement technique. From the results of hit ratio it is derived that Smith Waterman distance measurement technique gives an ideal value of hit ratio that is nearer to 1. Table 7.6 Patten Discovery based on Smith Waterman Distance Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,3,4,9,10,11,12,14,15,17,18,25 3,4,5,6,7,9,10,11,12,15,14,13,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 135
38 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 2,4,11,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,1, ,1,7,9,18,23,25 2,5,7,8,9,10,3,4,6,11,12,14,15,13,3, ,1,2,7,10,11,12,15,17 2,5,7,8,9,10,6,12,15,3,4,11,14,13,3, ,10,13,19 2,5,7,8,9,10,12,13,14,15,3,6, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,3,4,11,13,15,17,18 3,4,5,6,7,9,10,11,12,15,14,13,2,,8, ,20,21 7,6,5,2,1,9,10,12,14,11,13,5, ,1,3,18 2,5,7,8,9,10,3,4,6,11,12,15,14, ,1,4,5,11,14,15,17,19,25 2,5,7,8,9,10,4,6,,12,14,15,3,,11,13, ,1,2,4,7,10,12,15,17 2,5,7,8,9,10,6,12,15,,4,,14,3,1113, ,1,4,11,17 2,5,7,8,9,10,4,6,,12,14,15, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6,, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 136
39 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 14,1,2,10 2,5,7,8,9,10,6,,12,15,,13, ,1,2,4,7,10,11,17 2,5,7,8,9,10,6,12,15,,4,14,3,,11, ,6 3,8,7,9,4,6,10,11,12,13, ,1,2,4,7,10,11,12,15 2,5,7,8,9,10,6,12,15,4,14,3,11,13, ,1,3,7,9,23,25 2,5,7,8,9,10,3,4,6,,11,12,15,14,13, ,5,10,13 5,7,9,11,12,13,14,15,2,3,8,10,,6,9, ,8,21 7,6,5,2,1,,9,10,12,14,11, ,8,20 7,6,5,2,1,,9,10,12,14,11, ,23 3,4,5,6,8,1,11, ,3,18,22 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,3,10,18 2,5,7,8,9,10,3,4,6,,11,12,15,14, Standard Deviation Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 137
40 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern ,10,12,14,25 2,5,7,8,9,10,12,13,14,15,3,4,11,6, ,4,11,14,15,17 2,4,6,8,9,10,12,14,15,3,,5,1, ,9,18,25 6,4,5,7,9,10,11,12,15,14,13,8,2,3,1 75 4,2,11,12,15,17 6,8,9,12,15,2,5,4,10,14,3,11,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,13,18 3,6,9,11,12,13,14,15,2,10,8,4,5, ,20,21 7,6,5,2,1,9,10,12,14,11,13,5, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1,14,25 2,5,7,8,9,10,6,12,15,1,3,4,11, ,2,4,12,15,17 6,8,9,12,15,2,5,4,10,14,3,11,2,14,1, ,1,4,11,17 2,5,7,8,9,10,4,6,,12,14,15, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6,, ,1,2,10 2,5,7,8,9,10,6,,12,15,,13, ,2,4,11,17 6,8,9,12,15,2,5,4,10,14,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 138
41 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 16,6 3,8,7,9,4,6,10,11,12,13, ,2,4,11,12,15 6,8,9,12,15,2,5,4,10,,14,3,11,4, ,3,7,9,25 3,4,5,6,7,9,10,11,12,15,14,13,2,8, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8,21 7,6,5,2,1,,9,10,12,14,11, ,8,20 7,6,5,2,1,,9,10,12,14,11, ,23 3,4,5,6,8,1,11, ,22 3,4,5,6,8,1,11, ,1,3,10,18 2,5,7,8,9,10,3,4,6,,11,12,15,14, Standard Deviation Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14,15 6,8,9,12,15,2,5,1,7,10,4,14, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,12,15,17 2,4,6,8,9,10,12,14,15,3,5,11,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,13,18 3,6,9,11,12,13,14,15,2,10,8,4,5, ,20 7,6,5,2,1,9,10,12,14,11, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 139
42 Thres hold Number of Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Sessions Involved in Web Objects Referred in that Accuracy of pattern each cluster 9,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,4,17 2,4,6,8,9,10,12,14,15,3, ,5,7,19 5,7,9,11,12,13,14,15,2,3,14,,4,6, ,1,2 2,5,7,8,9,10,6,12, ,2,4,11,17 6,8,9,12,15,2,5,4,10,14,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,12,15 2,4,6,8,9,10,12,14,15,3,5,11,3,1, ,3,7,9 3,4,5,6,7,9,10,11,12,15,14,13,2, ,5,13 5,7,9,11,12,13,14,15,2,3,6, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 140
43 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5 5,7,9,11,12,13,14,15,2, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.80 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 141
44 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,5 5,7,9,11,12,13,14,15,2, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.80 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 142
45 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 4,11,15,17 2,4,6,8,9,10,12,14,15,3,1, ,13,19 3,6,9,11,12,13,14,15,2,10,5,7, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3,18 3,4,5,6,7,9,10,11,12,15,14,13,8, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3,9 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.25 Mean ,10,14,25 2,5,7,8,9,10,12,13,14,15,6,1,3,4, ,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,15,17 2,4,6,8,9,10,12,14,15,3,1, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 143
46 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4,15,17 2,4,6,8,9,10,12,14,15,3,1, ,1,2 2,5,7,8,9,10,6,12, ,4,11,17 2,4,6,8,9,10,12,14,15,3, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11,15 2,4,6,8,9,10,12,14,15,3,1, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, ,1 2,5,7,8,9,10 83 Standard Deviation 9.26 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,17 2,4,6,8,9,10,12,14,15,3, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 144
47 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 5,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4,17 2,4,6,8,9,10,12,14,15,3, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4,11 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.57 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,9,18 6,4,5,7,9,10,11,12,15,14,13,8,2, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 145
48 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) Thres hold Number of Sessions Involved in each cluster Web Objects Referred in that Accuracy of pattern 8,20 7,6,5,2,1,9,10,12,14,11, ,3 3,4,5,6,7,9,10,11,12,15,14, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.73 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 146
49 Table 7.6 Patten Discovery based on Smith Waterman Distance(Continue) 17,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.86 Mean ,10,14 2,5,7,8,9,10,12,13,14,15,6,1 85 2,14 6,8,9,12,15,2,5,7, ,18 8,9,10,2,3,4,5,6,7,,11,12,15,14, ,11,17 2,4,6,8,9,10,12,14,15,3, ,19 5,7,9,11,12,13,14,15,2,3,8, ,16 5,6,2,3,8,7,9,4,10,11,12,13, ,20 7,6,5,2,1,9,10,12,14,11, ,1 2,5,7,8,9, ,4 2,4,6,8,9,10,12,14,15, ,1,2 2,5,7,8,9,10,6,12, ,6 3,8,7,9,4,6,10,11,12,13, ,4 2,4,6,8,9,10,12,14,15, ,3 3,4,5,6,7,9,10,11,12,15,14, ,5 5,7,9,11,12,13,14,15,2, ,8 7,6,5,2,1,9,10,12,14, Standard Deviation 6.86 Mean Prediction Model for Web Caching and Prefetching with Web Usage Mining to optimize web objects 147
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
More informationPre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
More informationPREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
More informationA Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
More informationAnalyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationAutomatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationAn Approach to Convert Unprocessed Weblogs to Database Table
An Approach to Convert Unprocessed Weblogs to Database Table Kiruthika M, Dipa Dixit, Pranay Suresh, Rishi M Department of Computer Engineering, Fr. CRIT, Vashi, Navi Mumbai Abstract With the explosive
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationWeb Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationProperties of sequences Since a sequence is a special kind of function it has analogous properties to functions:
Sequences and Series A sequence is a special kind of function whose domain is N - the set of natural numbers. The range of a sequence is the collection of terms that make up the sequence. Just as the word
More informationAN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt no3man_mohamed@himc.psu.edu.eg
More informationWeb Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
More informationIn this presentation, you will be introduced to data mining and the relationship with meaningful use.
In this presentation, you will be introduced to data mining and the relationship with meaningful use. Data mining refers to the art and science of intelligent data analysis. It is the application of machine
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationThey can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat
HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended
More informationData Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
More informationANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
More informationA SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
More informationAn Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
More informationImproving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP
Improving the Performance of Data Mining Models with Data Preparation Using SAS Enterprise Miner Ricardo Galante, SAS Institute Brasil, São Paulo, SP ABSTRACT In data mining modelling, data preparation
More informationTutorial for proteome data analysis using the Perseus software platform
Tutorial for proteome data analysis using the Perseus software platform Laboratory of Mass Spectrometry, LNBio, CNPEM Tutorial version 1.0, January 2014. Note: This tutorial was written based on the information
More informationResearch on Application of Web Log Analysis Method in Agriculture Website Improvement
Research on Application of Web Log Analysis Method in Agriculture Website Improvement Jian Wang 1 ( 1 Agricultural information institute of CAAS, Beijing 100081, China) wangjian@caas.net.cn Abstract :
More informationCHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
More informationUnderstanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
More informationAn Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
More informationWindows Server 2012 Server Manager
Windows Server 2012 Server Manager Introduction: Prior to release of Server Manager in Windows Server 2008, Enterprise solution was to use different third party vendors which includes CA, HP utilities
More informationCMS Diagnostics Guide
Sitecore CMS 6.0-6.5 CMS Diagnostics Guide Rev: 22 August 2012 Sitecore CMS 6.0-6.5 CMS Diagnostics Guide A developer's guide to diagnosis of Sitecore CMS performance Sitecore CMS 6.0-6.5 Table of Contents
More informationKnowledge Discovery and Data Mining. Structured vs. Non-Structured Data
Knowledge Discovery and Data Mining Unit # 2 1 Structured vs. Non-Structured Data Most business databases contain structured data consisting of well-defined fields with numeric or alphanumeric values.
More informationSoftware Assurance Marketplace Use Case
Software Assurance Marketplace Use Case Overview Software Assurance Tool Developer May 2013 - Revision 1.0 The Software Assurance Marketplace (SWAMP) will support five user communities as shown in the
More informationExpert Finding Using Social Networking
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 1-1-2009 Expert Finding Using Social Networking Parin Shah San Jose State University Follow this and
More informationCourse 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services
Course 6234A: Implementing and Maintaining Microsoft SQL Server 2008 Analysis Services Length: Delivery Method: 3 Days Instructor-led (classroom) About this Course Elements of this syllabus are subject
More informationModel-Based Cluster Analysis for Web Users Sessions
Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece gpallis@ccf.auth.gr
More informationwww.apacheviewer.com Apache Logs Viewer Manual
Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File
More informationCisco NetFlow Reporting Instruction Manual Version 1.0
Cisco NetFlow Reporting Instruction Manual Version 1.0 WiredCity 777 Davis St, Suite 250 San Leandro CA 94577 Ph: + 1 510 297 5874 Fax: +1 510-357-8136 itmonitor@wiredcity.com www.wiredcity.com www.wiredcity.com
More informationBig Data Preprocessing Mechanism for Analytics of Mobile Web Log
Int. J. Advance Soft Compu. Appl, Vol. 6, No. 1, March 2014 ISSN 2074-8523; Copyright SCRG Publication, 2014 Big Data Preprocessing Mechanism for Analytics of Mobile Web Log You Joung Ham, Hyung-Woo Lee
More informationSoftware Engineering I CS524 Professor Dr. Liang Sheldon X. Liang
Software Requirement Specification Employee Tracking System Software Engineering I CS524 Professor Dr. Liang Sheldon X. Liang Team Members Seung Yang, Nathan Scheck, Ernie Rosales Page 1 Software Requirements
More informationData Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
More informationUsing Database Performance Warehouse to Monitor Microsoft SQL Server Report Content
Using Database Performance Warehouse to Monitor Microsoft SQL Server Report Content Applies to: Enhancement Package 1 for SAP Solution Manager 7.0 (SP18) and Microsoft SQL Server databases. SAP Solution
More informationWhite Paper April 2006
White Paper April 2006 Table of Contents 1. Executive Summary...4 1.1 Scorecards...4 1.2 Alerts...4 1.3 Data Collection Agents...4 1.4 Self Tuning Caching System...4 2. Business Intelligence Model...5
More informationThe web server administrator needs to set certain properties to insure that logging is activated.
Access Logs As before, we are going to use the Microsoft Virtual Labs for this exercise. Go to http://technet.microsoft.com/en-us/bb467605.aspx, then under Server Technologies click on Internet Information
More informationPreprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
More informationICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
More informationWEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
More informationData Analysis in E-Learning System of Gunadarma University by Using Knime
Data Analysis in E-Learning System of Gunadarma University by Using Knime Dian Kusuma Ningtyas tyaz tyaz tyaz@student.gunadarma.ac.id Prasetiyo prasetiyo@student.gunadarma.ac.id Farah Virnawati virtha
More informationW ith the ubiquity of e-mail comes the increased A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! Exchange Message Tracking Logs Message Forensics
A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! VOL. 11, NO. 8 REPORT APRIL 14, 2011 BNA INSIGHT Exchange Message Tracking Logs Message Forensics BY JAMES R. SCARAZZO W ith the ubiquity of e-mail comes the
More informationCache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
More informationCategorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationTF04 - Leveraging SQL Server Business Intelligence Tools
TF04 - Leveraging SQL Server Business Intelligence Tools PUBLIC INFORMATION Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. Le Roy Howe Commercial Engineering PUBLIC INFORMATION Follow RSTechED
More informationDATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
More informationOverview. Physical Database Design. Modern Database Management McFadden/Hoffer Chapter 7. Database Management Systems Ramakrishnan Chapter 16
HNC Computing - s HNC Computing - s Physical Overview Process What techniques are available for physical design? Physical Explain one physical design technique. Modern Management McFadden/Hoffer Chapter
More informationIntelligent Process Management & Process Visualization. TAProViz 2014 workshop. Presenter: Dafna Levy
Intelligent Process Management & Process Visualization TAProViz 2014 workshop Presenter: Dafna Levy The Topics Process Visualization in Priority ERP Planning Execution BI analysis (Built-in) Discovering
More informationORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM
ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for
More informationIT462 Lab 5: Clustering with MS SQL Server
IT462 Lab 5: Clustering with MS SQL Server This lab should give you the chance to practice some of the data mining techniques you've learned in class. Preliminaries: For this lab, you will use the SQL
More informationA Comparison Framework of Similarity Metrics Used for Web Access Log Analysis
A Comparison Framework of Similarity Metrics Used for Web Access Log Analysis Yusuf Yaslan and Zehra Cataltepe Istanbul Technical University, Computer Engineering Department, Maslak 34469 Istanbul, Turkey
More informationPure1 Manage User Guide
User Guide 11/2015 Contents Overview... 2 Pure1 Manage Navigation... 3 Pure1 Manage - Arrays Page... 5 Card View... 5 Expanded Card View... 7 List View... 10 Pure1 Manage Replication Page... 11 Pure1
More informationATLAS.ti for Mac OS X Getting Started
ATLAS.ti for Mac OS X Getting Started 2 ATLAS.ti for Mac OS X Getting Started Copyright 2014 by ATLAS.ti Scientific Software Development GmbH, Berlin. All rights reserved. Manual Version: 5.20140918. Updated
More informationA permutation can also be represented by describing its cycles. What do you suppose is meant by this?
Shuffling, Cycles, and Matrices Warm up problem. Eight people stand in a line. From left to right their positions are numbered,,,... 8. The eight people then change places according to THE RULE which directs
More informationEnterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects
Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects Abstract: Build a model to investigate system and discovering relations that connect variables in a database
More informationBeating the MLB Moneyline
Beating the MLB Moneyline Leland Chen llxchen@stanford.edu Andrew He andu@stanford.edu 1 Abstract Sports forecasting is a challenging task that has similarities to stock market prediction, requiring time-series
More informationDATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY
More informationVALUE STREAM MAPPING FOR SOFTWARE DEVELOPMENT PROCESS. Ganesh S Thummala. A Research Paper. Submitted in Partial Fulfillment of the
VALUE STREAM MAPPING FOR SOFTWARE DEVELOPMENT PROCESS by Ganesh S Thummala A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree In Management Technology
More informationWhatsVirtual for WhatsUp Gold v16.0 User Guide
WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual
More informationEffective User Navigation in Dynamic Website
Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya
More informationTrendWorX32 SQL Query Engine V9.2 Beta III
TrendWorX32 SQL Query Engine V9.2 Beta III Documentation (Preliminary November 2009) OPC Automation at your fingertips 1. Introduction TrendWorX32 Logger logs data to a database. You can use the TrendWorX32
More informationA Cube Model for Web Access Sessions and Cluster Analysis
A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,dcheung@eti.hku.hk Michael K. Ng,
More informationRapidResponse Training Catalog
RapidResponse Training Catalog Contents About RapidResponse Training... 4 RapidResponse Roles... 4 Consumers... 5 Contributors... 6 Contributors + RapidResponse Applications... 6 Authors... 8 Basic Authors...
More informationMonitoring Pramati Web Server
Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,
More informationPVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1
2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationApplied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
More informationData Visualization for Data QC
Data Visualization for Data QC March, 2012 Steve Berman Deloitte Consulting Agenda Overview Reasons to Use Data Visualization in Data Cleansing Examples Tools Wrap-Up 1 How QC has worked up to now Checking
More informationWeb Site Hosting Services
Web Site Hosting Services Putting your Web Site online with robust, reliable service Web hosting is what you need to put a website online on the internet it s the space where your website lives. Different
More informationProduct Guide. Sawmill Analytics, Swindon SN4 9LZ UK sales@sawmill.co.uk tel: +44 845 250 4470
Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed
More informationCreating a universe on Hive with Hortonworks HDP 2.0
Creating a universe on Hive with Hortonworks HDP 2.0 Learn how to create an SAP BusinessObjects Universe on top of Apache Hive 2 using the Hortonworks HDP 2.0 distribution Author(s): Company: Ajay Singh
More informationMicrosoft Internet Information Services (IIS)
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Microsoft Internet Information Services (IIS) September 30, 2014 Microsoft IIS Page 1 of 11 Important Note: The information
More informationBest Practices for Hadoop Data Analysis with Tableau
Best Practices for Hadoop Data Analysis with Tableau September 2013 2013 Hortonworks Inc. http:// Tableau 6.1.4 introduced the ability to visualize large, complex data stored in Apache Hadoop with Hortonworks
More informationClick on "View" then "Internet Options" then use the up or down arrow in the history section to adjust the number of days.
Quick Tips for parents 1. Checking Internet History Please be aware, that a child can clear the history of sites visited. If you find that your children have been emptying the history file, we would suggest
More informationOptimizing Object Freshness Controls in Web Caches
Optimizing Object Freshness Controls in Web Caches Mark Nottingham 12/192 Little Collins Street Melbourne VIC 3000 Australia mnot@pobox.com Abstract Mechanisms for controlling object freshness and refresh
More informationHow To Mine A Web Site For Data Mining
Data Preparation for Mining World Wide Web Browsing Patterns Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava Department of Computer Science and Engineering University of Minnesota 4-192 EECS Bldg.,
More informationIMPLEMENTATION OF A TIME TABLE GENERATOR USING VISUAL BASIC.NET
IMPLEMENTATION OF A TIME TABLE GENERATOR USING VISUAL BASIC.NET Joseph M. Mom and Jonathan A. Enokela Department of Electrical and Electronics Engineering, University of Agriculture, Makurdi, Nigeria E-Mail:
More informationOracle Big Data SQL Technical Update
Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical
More informationPractical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
More informationData exploration with Microsoft Excel: analysing more than one variable
Data exploration with Microsoft Excel: analysing more than one variable Contents 1 Introduction... 1 2 Comparing different groups or different variables... 2 3 Exploring the association between categorical
More informationAbout Me: Brent Ozar. Perfmon and Profiler 101
Perfmon and Profiler 101 2008 Quest Software, Inc. ALL RIGHTS RESERVED. About Me: Brent Ozar SQL Server Expert for Quest Software Former SQL DBA Managed >80tb SAN, VMware Dot-com-crash experience Specializes
More informationMiSeq: Imaging and Base Calling
MiSeq: Imaging and Page Welcome Navigation Presenter Introduction MiSeq Sequencing Workflow Narration Welcome to MiSeq: Imaging and. This course takes 35 minutes to complete. Click Next to continue. Please
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationCOURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
More informationSESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS
SESSION DEPENDENT DE-IDENTIFICATION OF ELECTRONIC MEDICAL RECORDS A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Science with Honors Research Distinction in Electrical
More informationWeb Log Mining: A Study of User Sessions
UNIVERSITY OF PADUA Department of Information Engineering PersDL 2007 10th DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries Corfu, Greece,
More informationHow To Create A Data Science System
Enhance Collaboration and Data Sharing for Faster Decisions and Improved Mission Outcome Richard Breakiron Senior Director, Cyber Solutions Rbreakiron@vion.com Office: 571-353-6127 / Cell: 803-443-8002
More informationCA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
More information