An Efficient Web Mining Algorithm To Mine Web Log Information
|
|
|
- Roger Turner
- 10 years ago
- Views:
Transcription
1 An Efficient Web Mining Algorithm To Mine Web Log Information R.Shanthi 1, Dr.S.P.Rajagopalan 2 Research Scholar, Dept. Of Computer Applications, Sathyabama University, Chennai, India 1 Professor, Dept. Of Computer Applications, Dr.M.G.R.University, Chennai, India 2 ABSTRACT: This paper focuses on the efficient application of the Web Mining Algorithm for web log analysis which is applied to identify the context associated with the web design of an e commerce web portal that demands security. As priority is given to efficiency, the comparative study made with other similar algorithm like E-web Miner Algorithm and Apriori All, it has been proved that this proposed Web Page Collection web mining algorithm as the best [or say the most suited] performer to manage time and space complexity.thus this algorithm, better known as Efficient web Miner possesses valid by computational comparative performance analysis. The number of data base scanning drastically gets reduced in Web Page Collection algorithm. Here it may be noted that E -Web Miner can be applied successfully in any weblog analysis which includes information centric network design. Keywords: E-Web Miner IMPROVED Apriori-ALL Algorithm, E Web, weblog. I. INTRODUCTION Web mining is the latest variation of data mining concerning web data which are mostly structured are the result of various web activities. Web mining is broadly categorized as Web Content mining, Web Structure Mining and Web Usage Mining and all these categories function using the data of different web contents such as web page content of HTML/XML code for the pages (web structure). This can be linear or hierarchical or any actual linkage structure access information of web pages (web usage) e.g. Number of hits/subscription/visit (Dunham 2003) User profile, cookies etc., In short this research paper attempts to prove that E Web Miner has lower complexities of time and space and is better than improved Apriori- All Algorithm. A. WEB LOG ANALYSIS Web Log mining is the outcome of web usage mining which contains information of web access of different users. Here any kind of access (Hans and Kamber 2001) information's recorded by the web server into log file for corresponding data. Analysis of log files provides the full details of the access patterns of the users, example profiles of the user s behavior, operating system used, particular time period of usage in the way of successful/unsuccessful transactions etc., thus summarizing all these information in a pre decided format. E.g. A log file of Microsoft Internet Information Server 5.0 having format Of W3 C extension norm (Bair, 2003) completing the task of analyzing these log files exposes the two way results depending upon the perspective chosen, viz from the client part of view or the server point of view. If it is, for instance, from the server point of view, the web log analysis reveals the in details about the availability of these servers, vulnerability of servers, security loopholes of servers, user etc. By this analysis, the web designer can fill up the gaps by improving the required services and web site design. Similarly, the clients are also benefited through the information provided by the web log analysis regarding the frequency of the usage of particular web page etc. B. CONVENTIONAL SEARCH ENGINE Information on any kind of searches largely depends on the selection of apt and appropriate key words used through such engines linked with the web sites. But here the individual s query fetches only small set of information known as Over abundance which refers to the limited number of web pages, are accessed through Search engines within short interval. (E.g. 12 Sec, 17 sec) etc., Problem of limited coverage refers to access of indices, created and by search engines and are updated periodically. These indices are directly accesses for retrieval on the request of the query (Bin. Deond Xiang 2003). Copyright to IJIRCCE
2 If the user s background and knowledge are found inadequate, then the problem of limited customization of semantics, or ontology crops up. Thus the other problem of limited query is based only on the Single keyboard without any context or associated semantics: popularity/usage of number of access of a web page is strongly retrieves on the basis of its popularity. C. SEQUENTIAL PATTERN It is defined as an ordered set of web pages that satisfy a given support of defined confidentiality. It is the client who creates this support and sequential pattern. Thus a user can invoke many sessions; a sequential pattern over total number of clients may emerge in many sessions which excludes / rules out the contiguously accessed pages. So sequential pattern is said to be having a n number of web pages between its home page (fast click) and the destination home page. D. SEQUENTIAL PATTERN ALGORITHM FOR WEB LOG ANALYSIS Traversal system, a web mining technique applied on click stream data (Tough Pilion 2005) reveals a set of web pages visited by a user in a session wherein the design of a web page can be improved from this information. The data provided by contiguous web pages help in creating/forming new links which in turn helps/supports for easy forward traversal to benefit the real time system. A performance analysis, incorporating such links changes the sequence visited by a user with a limited set of meaningful patterns, reduces the route length of pre-fetching and caching. As data generated in web log is asynchronous in nature, the access pattern of a user can never be monitored in time synchronous manner. Web log mining is used in many applications like pre-fetching, server side transformation and customization. It is type of operation where the web sites information is converted into more suitable information for the web users, who visit and discover their idea. In different aspects the research has been made for the issues of creating web interfaces from the web log based on the user behaviours. II BACKGROUND Several approaches have been proposed for efficient application of the Web Mining Algorithm for web log analysis. Dynamic techniques avoid many problems faced by static techniques and are subject of recent studies. The application of meta heuristic techniques in the field of mining is proposed. 2.1 APRIORI ALGORITHMS Apriori is a classic algorithm for frequent item set mining and association rule learning over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger item sets as long as those item sets appear sufficiently often in the database. The frequent item sets determined by Apriori can be used to determine association rules which highlight general trends in the database. This has applications in domains such as market basket analysis. 2.2 APRIORI-ALL ALGORITHMS The algorithm happens to be a modification of Apriori Algorithm [Dunham, 2003]. The modification allows to put the data in correct order by using User-ID and time-stamp sort. The major difference between Apriori and Apriori-All is that Apriori-All makes use of full join for candidate sets. In case of Apriori, it is only forth joined. Thus, Apriori-All is more appropriate for web usage mining rather than Apriori. Apriori is found suitable for web log mining. The sorting of candidate sets identifies the sequential patterns that are complete reference sequence for a user across various transactions. It is iterative in the senses that first scan finds large 1-itemset. Initially, a frequent 1-itemset is the same as a frequent 1-sequence. The subsequent scan divulges more candidate sets from this larger item sets of the previous scan and it may be counted for reference. The counting indicates support. Copyright to IJIRCCE
3 III PROPOSED STRATEGY On the decades various web mining algorithms have been developed in order to cater various clients and server side needs. Some of the following subsections present a bird s view as: A. THE APRIORIALL ALGORITHM The Algorithm is a modification of Apriori Algorithm (Dunham 2003) which puts the data in order by using I D and time stamp sort. The major difference between A Priori and Apriori All is that Apriori-All uses the optimum use of candidate s sets. Where as in the Apriori, it is been fourthly joined. This difference obviously holds that Apriori-All as more appropriated for the web usage mining while Apriori is identified /treated as more suitable for web log mining. (The sorting of candidate sets identified the complete sequential pattern with the reference /sequence for a user across various transactions. The large 1-intemset resembles frequent-i-sequence. This further reveals /exposes more candidate sets). This is performed in Apriori in the following manner and the Algorithm is Input: U= { U1,U2,,Ui } // The set of users D={t1,t2,,tk} //Database of sessions with UserID S //Support Output: sequential patterns Ck D`=sort D` on UserID and time of first page reference in Each session; L1 with UserID={large 1-itemsets}; For (k=2; Lk-1! =null; k++) do Ck=Apriori-gen(Lk-1,U);//new candidate set For all transaction ti _ D` do Ci=subset(Ck, ti); For all candidate c _ Ci do c.count++; Lk={c _ Ck, c.count>s};//s:support Find maximal reference sequences from L; Procedure Apriori-gen(Lk-1,S,U) Ck=null; For each itemset Li _ Lk-1 For each itemset Lj _ Lk-1 If Li and Lj has same U Copyright to IJIRCCE
4 begin C=Li join Lj; If has infrequent-subset(c,lk-1) Delete c; Else Add c to Ck; Return Ck; Procedure has infrequent-subset(c,lk-1) For each (k-1) subset s of c If s Lk-1 then returns False; Else True. The authors Tong and Pi-lian introduced/took the lead to suggest the AprioriAll Algorithm by reducing the size of the candidate sets, where in the number of scanning data base is reduced in generating the large set proving efficiency. (Check technically) Here user property and candidate set pressing is not considered while Apriori All Algorithm is (Tony and PiLion 2005) rather presented as: Input: U= {U1, U2 Ui} // the set of users D= {t1, t2, tk} //Database of sessions with UserID S //Support Output: sequential patterns Ck D`=sort D` on UserID and time of first page reference in each session; L1 with UserID= {large 1-itemsets}; For (k=2; Lk-1! =null; k++) do Ck=Apriori-gen (Lk-1,U);//new candidate set For all transaction ti _ D` do Ci=subset(Ck, ti); For all candidate c _ Ci do c.count++; Lk={c _ Ck, c.count>s};//s:support Find maximal reference sequences from L; Procedure Apriori-gen(Lk-1,S,U) Ck=null; For each itemset Li _ Lk-1 For each itemset Lj _ Lk-1 Copyright to IJIRCCE
5 If Li and Lj has same U begin C=Li join Lj; If has infrequent-subset(c, Lk-1) Delete c; Else Add c to Ck; Return Ck; Procedure has infrequent-subset(c, Lk-1) For each (k-1) subset s of c If s Lk-1 then return False; Else True B. WEB MINING EFFORT The Collector Engine System- a collaborative web mining system was introduced / suggested in E Commerce (GUO 2006) by GUO. This is a multi agent system provides post retrieval analysis and user collaborative across web search and web mining. Here the users are benefited, who can activate search session and share the same with other users also. Collector Engine System consists of four types of software agent s viz. User Agent, collaborator agent, Scheduler Agent and Web Agent. Each of these bears various responsibilities and accordingly, as the name suggests. User Agent: Retrieves pages from the Web, the collaborator agent-facilitates the sharing of information among different user agents, The Scheduler Agent maintains a list of monitoring and carrying out tasks based on users schedules, The Web Agent maintains the exact filtering the trashy information (Pitkow 1997). Copyright to IJIRCCE
6 Figure 1: Agent running model of CES The figure-1 also explains the functions of CES with these agents interacting with the information/fulfilling their tasks accordingly as explained already. I.e. consisting the actual network of collected information with local data structure. The main disadvantage with CES is the system will be of a non automated collection of user profiles. But this can be avoided by including more content based or collaborative information recommendation functionalities. C. COOKIE PICKER Cookies are used mainly to track/are exploited to the maximum by websites to track a User profile which violates privacy of the user and security of communicator. This has paved way for the introduction of Cookie Picker, Cookie management Scheme (check technically) through which Usefulness of cookies from a web site is validated. This sets the cookies usage permission on behalf of the users. D.WEB LOG MINING GAO (GAO2010) used patterns reorganizations system to study the client behavior from the web data towards providing quality service. Client Behavior Pattern Recognition System is described in figure 2 that reflects the five hierarchical structures in the recognition system: Application layer: includes a machine interactive interface diagram, used for information exchange between client and system. System Control layer: Includes a question formation and result using function with the coordination and control of the functional models. Data analysis layer: it consists of data mining and online analysis process, used for system log data analysis by log mining online analysis technique. The paper (Gao 2010) generates interest at the framework level and various application parameters of the framework prompted to present the following architecture on which algorithm would be applied. The following system (figure 3) based on web log mining architecture for proposing the basic interactive elements for E-Web miner. Copyright to IJIRCCE
7 Figure 2: Pattern Recognition System Figure 3: Proposed Web Miner Frameworks The Rule base of web miner consists of the following factors -Learning mechanism in data /knowledge base -Rule base configuration of baseline. The rule based generations secure web log miner mines data in a secured way by defining a property set and rule based configuration mechanism. Copyright to IJIRCCE
8 E. WEB LOG MINING Of course web log mining is comparatively is paid less attention in the application of E Commerce (Yen men 2010) Web mining technique has been able to generate interest in establishing personalization service system. The relationship of web data mining with E Commerce is well established wherein data security is the main concern in web data (Jan 2007) ensuring quality issues of communication such as security. Thus these Web data are analyzed towards designing a security Protocol. Towards fulfilling this technique ANSIX 959 Standard has been formed (Levi and koe 2001) developed towards preparing convenient and secures electronic payment Protocol. F. E-WEB MINING ALGORITHM E-Web Mining is the improvisation of the Web mining algorithm which removes the loopholes in the Apriori-All Algorithm. E- Web Mining Algorithm 1. Make the set of web pages in the ascending order for the various users 2. Now assign the set of pages in the string array a for the user u 3: Initialize the f=0, max= 0, where f is frequency and max is maximum 4. Consider I vary from 1 to n; also J varies from 0 to (n-1) 5. If substring (a[i], a[j]) f=f+1; END IF b [I] =f; IF max<= f Max =f; END IF 6. Discover the positions in array b, where the value is nearly equal to maximum value and chooses the substring from all values. 7. Repeat the step 6 for all the substring with their positions. IV PROPOSED WEB PAGE COLLECTION ALGORITHM Consider the given web access log, a major task is to identify the collection of pages which tend co-occurred in the specific visits. Usually the clustering techniques are used for the web log access to analysis the web log effectively. In the clustering the documents are represented in N-dimensional space formed by term factor. A cluster is defined as collections of documents close to each other and relatively distinct from other clusters. In the proposed approach the Web Page Collection Algorithm is introduced that uses cluster mining in order to find a group of connected pages at a web site. The proposed algorithm takes web server access log as input and maps it into form clustering. Afterwards the cluster mining is applied to the output data. Finally the output is obtained by mining the web user s logs. WEBPAGECOLLECTION ALGORITHM Input: web access log Output: Mined web users log 1. Take the web log access of users for the particular domain 2. Select a random user into the unique profile set Copyright to IJIRCCE
9 3. Find the co-occurrence frequencies among web pages and 3. Next cluster the similar results 4. Then rank the clusters that is found 5. Create the web page that contain the related links of the specific domain V COMPARISION WITH EXISTING WORK The comparative study of Proposed Web Page Collection Mining algorithm and the E-Web Mining Algorithm are carried out by running over a number of transactions from the item set. The result is tabulated in Table 1 Number of Transactions Number of Items E-Web Mining (Time) Web Page Collection (Time) Table 1: Simulation Results PERFORMANCE GRAPH Processing time Web Mining Algorithm WebPageCollection algorithm Number of transactions Figure 4: Performance Graph of Proposed Web Mining Algorithm The figure 4 explains the execution time among the proposed web mining time and Apriori All Time. The main objective of this experiment is to reduce the number of elements in every candidate set without any repetition but with changes in the larger sets. The observation can be studied as follows: Firstly candidate set pruning gets reduced in steps. Copyright to IJIRCCE
10 Secondly by applying pruning, the number of elements of candidate set is decreased. Repetitive scanning of data base is eliminated totally. Proving the E web miner as effective. VI CONCLUSION This paper presents strategy for automatic web log information mining by Web Page Collection algorithm and is been proved to be more effective. It stands above other web mining algorithms. With the mined results, the web applications is developed and provides adaptive user interface Further the other type of explore in web applications will focus in the future work. It also includes the information integration of content knowledge and knowledge extraction from the various web sites. REFERENCES 1] Tong, Wang and Pi-lian, He, Web Log Mining by an Improved AprioriAll Algorithm World Academy of Science, Engineering and Technology, Vol pp [2] Dunham., Margaret H., Data Mining Introductory and Advanced Topics. Beijing: Tsinghua University Press, 2003, p [3] Han Jiawei and Kamber Micheline Data Mining Concepts and Techniques [M].Beijing: China Machine Press, 2001, p [4] Bain Tony SQL Server 2000 Data Warehouse and Analysis Services. Beijing: China Electric Power Press, 2003, p [5] Bin, Lin jie, de, Liu ming and xiang, Chen Data mining and OLAP Theory & Practice [M]. Beijing: Tsinghua University Press, 2003, p [6] Tong, Wang and Pi-lian, He, Web Log Mining by an Improved AprioriAll Algorithm World Academy of Science, Engineering and Technology, Vol pp [7] Wen-Hai Gao Research On Client Behaviour Pattern Recognition System Based On Web Log Mining, Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, July 2010, DO1, /10/$ IEEE, pp [8] Levi Albert, and Koç Çetin Kaya CONSEPP: Convenient and Secure Electronic Payment Protocol Based on X9.59 Proceedings, the 17 th Annual Computer Security Applications Conference, pages , New Orleans, Louisiana, IEEE Computer Society Press, Los Alamitos, California, December 10-14, 2001 [9] Guo, Di, Collector Engine System: A Web Mining Tool for E-Commerce, Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) DOI computer society / IEEE Yuewen, LI, Research on E-Commerce Secure Technology DOI / IEEE [10] Mei Li and Cheng Feng, Overview of WEB Mining Technology and Its Application in E-commerce, nd International Conference on Computer Engineering and Technology,Volume 7.DOI / IEEE pp V7-277-V7-280 [11] Yue, Chuan, Xie, Mengjun, and Wang, Haining, Automatic Cookie Usage Setting with Cookie Picker, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) DOI / IEEE BIOGRAPHY R.Shanthi, receieved B.Sc and M.C.A Degree from University of Madras in 1999 and She is working as a Assistant Professor in Computer Science Department of A.M.Jain College, Chennai, India. She has 10 years of teaching experience. She is pursuing Ph.D in Sathyabama University, Chennai, India. Dr.S.P.Rajagopalan received M.Sc from IIT Madras, M.Phil and Ph.D from Madras University, Chennai, India. He is working as a Professor (Emeritus) in School of Computer Science & Engineering of M.G.R.University, Chennai. He has 40 years of teaching experience. He has published 4 Books. He has about 100 publications in International Journals and National Journals. His special fields of interest include Quantitative Techniques, Data Processing and Project Management, Management Information System, Programming Languages, Simulation, Text generation, Cryptography and Data Mining. Copyright to IJIRCCE
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Analysis of Web Log from Database System utilizing E-web Miner Algorithm
Analysis of Web Log from Database System utilizing E-web Miner Algorithm Mukul B. Chavan P.G. Student, Dept. of Computer Engineering G.H. Raisoni College of Engg & Mgmt, Wagholi Pune, India [email protected]
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
A Vague Improved Markov Model Approach for Web Page Prediction
A Vague Improved Markov Model Approach for Web Page Prediction ABSTRACT Priya Bajaj and Supriya Raheja Department of Computer Science & Engineering, ITM University Gurgaon, Haryana 122001, India Today
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012 Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms G. Sunil
A Survey of Customer Relationship Management
A Survey of Customer Relationship Management RumaPanda 1, Dr. A. N. Nandakumar 2 1 Assistant Professor, Dept. of C.S.E. Vemana I T, VTU,Bangalore, Karnataka, India 2 Professor & Principal, R. L. Jalappa
An Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
Dynamic Data in terms of Data Mining Streams
International Journal of Computer Science and Software Engineering Volume 2, Number 1 (2015), pp. 1-6 International Research Publication House http://www.irphouse.com Dynamic Data in terms of Data Mining
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
Importance of Domain Knowledge in Web Recommender Systems
Importance of Domain Knowledge in Web Recommender Systems Saloni Aggarwal Student UIET, Panjab University Chandigarh, India Veenu Mangat Assistant Professor UIET, Panjab University Chandigarh, India ABSTRACT
Data Outsourcing based on Secure Association Rule Mining Processes
, pp. 41-48 http://dx.doi.org/10.14257/ijsia.2015.9.3.05 Data Outsourcing based on Secure Association Rule Mining Processes V. Sujatha 1, Debnath Bhattacharyya 2, P. Silpa Chaitanya 3 and Tai-hoon Kim
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework
Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 [email protected] 2 [email protected] Abstract A vast amount of assorted
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Mining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
An Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm R.Karthiyayini 1, J.Jayaprakash 2 Assistant Professor, Department of Computer Applications, Anna University (BIT Campus),
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making
International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: [email protected]) Dr. G.N. Singh Department of Physics and
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering [email protected]
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
Intinno: A Web Integrated Digital Library and Learning Content Management System
Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master
QOS Based Web Service Ranking Using Fuzzy C-means Clusters
Research Journal of Applied Sciences, Engineering and Technology 10(9): 1045-1050, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: March 19, 2015 Accepted: April
An Enhanced Quality Approach for Ecommerce Website using DEA and High Utility Item Set Mining
An Enhanced Quality Approach for Ecommerce Website using DEA and High Utility Item Set Mining Varsha Kulkarni 1, Vilas Jadhav 2. 1 PG Scholar, Dept. of Computer Engineering, MGMCET, Kamothe, Navi Mumbai,
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic
Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm
R. Sridevi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Finding Frequent Patterns Based On Quantitative Binary Attributes Using FP-Growth Algorithm R. Sridevi,*
A Review on Data Mining in Cloud Computing Environment
A Review on Data Mining in Cloud Computing Environment R.Kabilan, Dr.N.Jayaveeran Research Scholar, P.G & Research Dept. of Computer Science, Khadir Mohideen College, Adirampattinam, Thanjavur District.
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
PREDICTIVE DATA MINING ON WEB-BASED E-COMMERCE STORE
PREDICTIVE DATA MINING ON WEB-BASED E-COMMERCE STORE Jidi Zhao, Tianjin University of Commerce, [email protected] Huizhang Shen, Tianjin University of Commerce, [email protected] Duo Liu, Tianjin
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains
A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains Dr. Kanak Saxena Professor & Head, Computer Application SATI, Vidisha, [email protected] D.S. Rajpoot Registrar,
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
Improving Apriori Algorithm to get better performance with Cloud Computing
Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Data Mining for Data Cloud and Compute Cloud
Data Mining for Data Cloud and Compute Cloud Prof. Uzma Ali 1, Prof. Punam Khandar 2 Assistant Professor, Dept. Of Computer Application, SRCOEM, Nagpur, India 1 Assistant Professor, Dept. Of Computer Application,
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
SCHEDULING IN CLOUD COMPUTING
SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Comparative Performance Analysis of MySQL and SQL Server Relational Database Management Systems in Windows Environment
ISSN (Online) 2278-121 ISSN (Print) 2319-594 Vol. 4, Issue 3, March 215 Comparative Performance Analysis of and Relational Database Management Systems in Windows Environment Amlanjyoti Saikia 1, Sherin
Discovery of Maximal Frequent Item Sets using Subset Creation
Discovery of Maximal Frequent Item Sets using Subset Creation Jnanamurthy HK, Vishesh HV, Vishruth Jain, Preetham Kumar, Radhika M. Pai Department of Information and Communication Technology Manipal Institute
How To Solve The Kd Cup 2010 Challenge
A Lightweight Solution to the Educational Data Mining Challenge Kun Liu Yan Xing Faculty of Automation Guangdong University of Technology Guangzhou, 510090, China [email protected] [email protected]
Web Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
A Clustering Model for Mining Evolving Web User Patterns in Data Stream Environment
A Clustering Model for Mining Evolving Web User Patterns in Data Stream Environment Edmond H. Wu,MichaelK.Ng, Andy M. Yip,andTonyF.Chan Department of Mathematics, The University of Hong Kong Pokfulam Road,
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Patterns of Information Management
PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Web usage mining: Review on preprocessing of web log file
Web usage mining: Review on preprocessing of web log file Sunita sharma Ashu bansal M.Tech., CSE Deptt. A.P., CSE Deptt. Hindu College of Engg. Hindu College of Engg. Sonepat, Haryana Sonepat, Haryana
Association rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, [email protected] Tanja Krunić, The
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
Design of Data Archive in Virtual Test Architecture
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei
Optimization of ETL Work Flow in Data Warehouse
Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. [email protected] P Srinivasu
Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,
Design of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
Distributed Framework for Data Mining As a Service on Private Cloud
RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &
Application of Data Warehouse and Data Mining. in Construction Management
Application of Data Warehouse and Data Mining in Construction Management Jianping ZHANG 1 ([email protected]) Tianyi MA 1 ([email protected]) Qiping SHEN 2 ([email protected])
Natural Language to Relational Query by Using Parsing Compiler
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
