Access Patterns in Web Log Data: A Review
|
|
|
- Linda Fletcher
- 10 years ago
- Views:
Transcription
1 Journal of Network and Innovative Computing ISSN , Volume 1 (2013) pp MIR Labs, Access Patterns in Web Log Data: A Review Mohammed Hamed Ahmed Elhiber and Ajith Abraham * Sudan University of Science and Technology, Faculty of Computer Science, Khartoum, Sudan [email protected] *Machine Intelligence Research Labs (MIR Labs), Scientific Network for Innovation and Research Excellence Washington, USA [email protected] Abstract: The traffic on World Wide Web is increasing rapidly and huge amount of information is generated due to users interactions with web sites. To utilize this information, identifying usage pattern of users is very important. Web Usage Mining is the application of data mining techniques to discover the useful, hidden information about the users and interesting patterns from data extracted from Web Log files. It supports to know frequently accessed pages, predict user navigation, improve web site structure etc. In order to apply Web Usage Mining, various steps are performed. This paper discusses the process of Web Usage Mining consisting steps: Data Collection, Pre-processing, Pattern Discovery and Pattern Analysis. It has also presented several approaches such as statistical analysis; clustering, association rules and sequential pattern are being used to discover patterns in web usage mining. The pattern analysis phase means applying data mining techniques such as SQL and OLAP on the pattern discovery data to filter insignificant information to obtain the valuable information. Keywords: World Wide Web, data mining, Web Usage Mining, OLAP. 1. Introduction World Wide Web is a major source of information and it creates new challenges of information retrieval as the amount of information on the web increasing exponentially. Web Mining is the application of data mining techniques to extract and analyze useful information from Web data. Based on kind of data to be mined Web Mining can be classified into three different categories: Web Content Mining, Web Structure Mining and Web Usage Mining [1]. Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. In Web Usage Mining, data mining techniques are applied to preprocessed web log data in order to find interesting and useful patterns. The web log files on the web server are major source of data for Web Usage Mining. Web usage mining techniques that can automatically extract frequent access patterns from the history of previous user click streams stored in Web log files. The process of Web Usage Mining consisting steps: Data Collection, Pre-processing, Pattern Discovery and Pattern Analysis [2]. Pre-processed and cleaned data could be used for pattern discovery, pattern analysis, Web usage statistics, Clustering, Association Rules and sequential rules. Clustering is a technique to group together a set of items having similar characteristics. In the Web Usage domain, there are two kinds of interesting clusters to be discovered: usage clusters and page clusters. Clustering of users tends to establish groups of users exhibiting similar browsing patterns. Pattern analysis is the last step in the overall Web Usage mining process. The motivation behind pattern analysis is to filter out uninteresting rules or patterns from the set found in the pattern discovery phase. The most common form of pattern analysis consists of: - A knowledge query mechanism such as SQL. - Another method is to load usage data into a data cube in order to perform Online Analytical Processing (OLAP) operations. - Visualization techniques, such as graphing patterns or assigning colors to different values, can often highlight overall patterns or trends in the data. The paper is organized as following: the next section briefly describes some of the main concepts and definitions of the Web Mining followed by log file formats in Section 3. Section 4 presents review Data Preprocessing on Web Server Logs and Section 5 depicts a review of the different techniques in Pattern Discovery. Finally the conclusions of this paper are provided. 2. Web Mining The term Web-mining (web data-mining), was first mentioned by Etzioni [3], who suggested that traditional data mining techniques for finding hidden patterns in huge databases, can be applied to web-based information. Web mining is an emerging methodology in education research, assisting instructors and developers in improving learning environments and supporting decision-making of policymakers. Web Mining is use of Data Mining techniques to automatically discover and extract information from web data [4]. Web mining is the general name of the data mining technique used in an attempt to make content analysis from the online web sites. Web mining has the
2 Access Patterns in Web Log Data: A Review 349 facility of utilization in two different areas, the first is the analysis related to the content of the pages presented and the second is the analysis based on the user interaction. According to the differences of the mining objects, there are roughly three knowledge discovery domains that pertain to web mining[1][5][6][7]: Web Content Mining, Web Structure Mining, and Web Usage Mining ( see Figure 1). Web Mining Web Content Mining Web Structure Mining Figure 1: Web mining taxonomy Web Usage Mining Web Log Files preprocessing pattern Discovery pattern analysis Figure 2: Phases of Web Usage Mining 2.1. The Usage Mining on the Web Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs) derived from the users' interaction with the web pages during certain period of Web sessions. Web usage mining consists of three phases, namely preprocessing, pattern discovery, and pattern analysis [8][9][10][11][12], (see Figure 2). The goal of web usage mining is to get into the records of the servers (log files) that store the transactions that are performed in the web in order to find patterns revealing the usage the customers [13][14]. WUM has become an active area of research in field of data mining due to its vital importance [15] Analysis of Mined Knowledge The output of knowledge mining algorithms is often not in a form suitable for direct human consumption, and hence there is a need to develop techniques and tools for helping an analyst better assimilate it. Issues that need to be addressed in this area include usage analysis tools and interpretation of mined knowledge [16] Web access patterns Web access pattern mining is an application of sequence mining on web log data to generate interesting user access behavior on World Wide Web. Mining of web access patterns generated by the users interaction with the World Wide Web is thrust area of research. 3. The log file: what is it and how do we store information? 3.1 The log file definition A log file is defined as a file that lists actions that have occurred [17]. These files are generated by servers a computer or a device on a network that manages network resources and contain a list of all requests made to the server by the network s users. A Web log file [18] records activity information when a Web user submits a request to a Web Server. The main source of raw data is the web access log, which we shall refer to as log file. 3.2 The way to store information on a log file As it is the rule for every file, information in the log file has to be written in a specific format; that is in a specific
3 350 Elhiber sequence and in a certain way that will facilitate the analysis of the file and instruct the computer as to how to read and use [17]. These Log files can be located in 3 places [19][20]. Web Servers- A web server is dispenses the web pages as they are requested. Figure 3: Pre-processing step Proxy Server- A proxy server is a intermediary compute that acts as a computer hub through which user requests are processed. Web Client- A Web client is a computer application, such as a web browser, that runs on a user local computer or workstation and connects to a server as necessary Web Server Log File A server log file is a log file that automatically creates and maintains the activities performed in it. This file is used to record each and every hit to a web site [21]. It maintains a history of page requests, also helps us in understanding how and when your website pages and application are being accessed by the web browser. These log files contain information such as the IP address of the remote host, content requested, and a time of request NCSA Log Formats National Centre for Supercomputing Application (NCSA) established in 1986 developed a web server called httpd at its centre NCSA Common Log or Access Log Format Stores basic information about the request received. Syntax Host IP address, Proprietor, Username, date: time, request method, status code, byte size NCSA Combined Log Format Stores all common log information with two additional fields: referrer and user_agent. Syntax Host IPaddress, Proprietor, Username, date: time, request method, status code, byte size, referrer, User_agent. 4. Data Pre-processing on Web Server Logs The data collected in web log file is incomplete and not suitable for mining directly. Pre-processing is necessary to convert the data into suitable form for pattern discovery [22]. We begin Pre-processing phase by data extraction then data cleaning and data filtering because the origin web logs data sources are blended with irrelevant information. Data preprocessing plays an important role in Web usage mining. It is used to filter and organize only appropriate information before using web mining algorithms on the web server logs. The original server logs are cleaned, formatted, and then grouped into meaningful sessions before being utilized by WUM. This phase contains three sub steps: Data Cleaning, User Identification, and Session Identification (see Figure 3).
4 Access Patterns in Web Log Data: A Review Data Cleaning The data cleaning process removes the data tracked in web logs that are useless or irrelevant for mining purposes. The request processed by auto search engines, such as Crawler, Spider, and Robot, and requests for graphical page content. Thus the data cleaning step removes the following entries from the original log file[23]. The entries having suffixes like.jpg,.jpeg,.css,.map etc., Entries having status code failure. Remove all records which are not contain method GET. Remove navigation sessions performed by Crawler,Spider, and Robot User Identification User identification is the process of identifying each different user accessing Web site. Goal of user identification is to mine every user s access characteristic, and then make user clustering and provide personal service for the users. Each user has unique IP address and each IP address represents one user. But in fact there are three conditions: (l) Some users has unique IP address. (2) Some user has two or more IP addresses. (3) Due to proxy server, some user may share one IP address. Rules for user identification are: Different IP addresses refer to different users. The same IP with different operating systems or different browsers should be considered as different users. While the IP address, operating system and browsers are all the same, new user can be determined whether the requesting page can be reached by accessed pages before, according to the topology of the site. Users is uniquely Identified by combination of referrer URL and user agent 4.3 User session After identify the users; we need to identify the sessions. To do this we can divide the access of the same users in sessions. It s difficult to detect when one session is finish and start another. To detect sessions is common use of time between requests; if two requests are called in of time frame, we can suppose that these requests are in the same session; in other way below of time frame we can consider two different sessions. A good time frame is 30 minutes. 5. Pattern Discovery After data preprocessing phase, the pattern discovery method should be applied. This phase consists of different techniques derived from various fields such as statistics, machine learning method mainly have Association Rules, data mining, pattern recognition, etc. applied to the Web domain and to the available data [5]. Several methods and techniques have already been developed for this step [8]. Some of the frequently used solutions are statistical analysis, clustering and association rules Statistical Analysis Statistical analysis is the most common method to extract knowledge about visitors to a Web site. We can compute various kinds of descriptive statistics measurements like (frequency, mean, median, etc) on variables such as page views, viewing time, or length of the navigation path. Although the statistical analysis useful for improving system performance, enhancing system security, or facilitating site modification. For example, we can detect unauthorized entry points to our Web site. 5.2 Clustering Clustering has been widely used in Web Usage Mining to group together similar sessions among large amount of data based on a general idea of distance function which computes the similarity between groups. [24] Clustering means the act of partitioning an unlabeled dataset into groups of similar objects. Each group, called a cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. In the past few decades, cluster analysis has played a central role in diverse domains of science and engineering [25], [26]. Two types of clusters can be found in web usage mining: user clusters and page clusters. User clusters will discover users having same browsing patterns whereas page clusters will discover pages possessing similar content [27]. Here we will briefly describe some techniques to discover patterns from processed data. Commonly used clustering algorithms are: K-means, Fuzzy C-means, k-nearest Neighbor and Neural Network k-means Clustering The k-means method partitions the data set or to classify your objects based on attributes into positive k cluster in which each observation belongs to the cluster with the nearest mean [28]. The classification is done by minimizing the sum of squared distance in each cluster. Thus, the strength of K-means algorithm lies in its computational efficiency and the nature of easy to use. The procedure follows a simple way to classify a student s data set: The basic step of k- means clustering is simple. In the beginning we determine number of cluster k and assume the centroid or center of clusters.
5 352 Elhiber We can take random objects as the initial centroid or the first k object which serve as initial centroid. Then the k means algorithm will do its steps until convergence. Iterate until stable (= no move group) to group the object based on minimum distance. 3. Real Time Operation: ANN computations may be carried out in parallel, and special hardware devices are being designed and 4. Manufactured which take advantage of this capability. 5. Fault Tolerance via Redundant Information Coding: Partial destruction of a network leads to the corresponding degradation of Fuzzy C-Means Clustering The fuzzy C-means (FCM) algorithm is one of the most popular techniques used for clustering. It is a kind of partitional clustering algorithm, which aims at partitioning a given data set into disjoint subsets so that specific clustering criteria are optimized[29].the algorithm is an iterative clustering method that produces an optimal c partition by minimizing the weighted within group sum of squared error objective function JFCM [30]: J FCM = n c ( u ik ) q d 2 (x k,v i ) k=1 i=1 where X = {x1, x2,, xn} Rp is the data set in the p-dimensional vector space, n is the number of data items, c is the number of clusters with 2 c < n, uik is the degree of membership of xk in the ith cluster, q is a weighting exponent on each fuzzy membership, vi is the prototype of the centre of cluster i, d2 (xk, vi) is a distance measure between object xk and cluster centre vi Neural Network based Clustering. The use of neural network is an efficient technique for web usage mining to extract hidden knowledge from web-data in easy and efficient manner. An advantage of ANNs is their ability to represent both linear as well as non-linear relationships. These networks are data mining techniques that have been inspired by the desire to develop artificial systems capable of performing intelligent computations similar to those performed within the human brain. An ANN acquires its knowledge through repeated presentations of data. It learns by adjusting the weights of the network connections, which is similar to adjusting the synaptic weights within the inter-neuron connections within the human brain [31].Neural networks, with their remarkable ability to derive meaning from complicated or imprecise data, can be used to extract patterns and detect trends that are too complex to be noticed by either humans or other computer techniques. Neural Network has other advantage [32]: 1. Adaptive learning: An ability to learn how to do tasks based on the data given for training or initial experience. 2. Self-Organization: An ANN can create its own organization or representation of the information it receives during learning time Association Rules Association rule mining are one of the major techniques of data mining and it is the most common form of localpattern discovery in unsupervised learning systems. It serves as a useful tool for finding correlations between items in large database [33]. This method can be used to find group of pages which are frequently accessed together with support exceeding a threshold. It is not necessary that the pages are connected directly. For example, Apriori algorithm can be used to find relation between users who access a faculty page of a college and those who access a syllabus download page. 5.4 Prediction Prediction and classification are used for predicting users' future requests systems. To provide prediction in Web Usage Mining system we describe most popular approaches for classifying user navigation patterns for predicting users' future requests Decision Tree Decision trees are one of the most popular approaches for both classification and predictions. They are generated based on specific rules. Decision tree is a classifier in a tree structure. Leaf node is the outcome obtained. It is computed with respect to the existing attributes. Decision node is based on an attribute, which branches for each possible outcome for that attribute. Decision trees can be thought as a sequence of questions, which leads to a final outcome. Each question depends on the previous question hence this case leads to a branching in the decision tree. While generating the decision tree, the main goal is to minimize the average number of questions in each case. This task provides increase in the performance of prediction Support Vector Machine The SVM algorithm was developed by [34] and has become a powerful method in machine learning, applicable to both classification and regression. Our motivation to use the SVM algorithm in our approach is that this algorithm has been used in real-world applications and is well known for its superior practical results [35]. It is an elegant tool for solving pattern recognition and regression problems. Over the past few years, it has attracted a lot of researchers from the neural
6 Access Patterns in Web Log Data: A Review 353 network and mathematical programming community; the main reason for this being its ability to provide excellent generalization performance. SVMs have also been demonstrated to be valuable for several real-world applications. [36]. Support Vector Machines (SVMs) are popular machine learning method for classification and other learning tasks [37] K-NN Nearest Neighbor (also known as Collaborative Filtering or Instance-based Learning) is a useful data mining technique that allows you to use your past data instances, with known output values, to predict an unknown output value of a new data instance. So, at this point, this description should sound similar to both regression and classification. k-nearest Neighbor is one of the most popular algorithms for text categorization. Many researchers have found that the knn algorithm achieves very good performance in their experiments on different data sets [38].The general principle is to find the k training samples to determine the k nearest neighbors based on a distance measure. Next, the majority of those k nearest neighbors decide the category of the next instance Sequential Patterns The technique of sequential pattern discovery can be applied to web server logs. It attempts to find intersession patterns such that the presence of a set of items is followed by another item in a time-ordered set of sessions [22]. Using sequential pattern discovery, useful user trends can be discovered, website navigation can be improved and adopt web site contents to individual client requirements or to provide clients with automatic recommendations that best suit customer profiles Pattern Analysis This is the final step in the WUM process. It helps to filter insignificant information to obtain the valuable information. The Pattern Discovery of web usage patterns, through techniques described above, would not be very useful unless there were mechanisms and tools to help an analyst better understand them. The pattern analysis phase means applying data mining techniques on the pattern discovery data. The patterns are analyzed using several techniques. The most common form of pattern analysis consists of Structured Query Language (SQL), Online Analytical Processing (OLAP)[18]. In OLAP techniques, the result of pattern discovery is loaded into data cube and then OLAP operations are performed. After this, to interpret the results, visualization techniques are used [22], such as graphing patterns or assigning colors to different values, can often highlight overall patterns or trends in the data. The result of pattern analysis helps to improve the system performance and to modify the web site. It helps to attract the visitors and to give the personalized services to regular user. The result of such analysis might include: most recent visit per page, who is visiting which page, the frequency of use of each hyperlink, and most recent use of hyperlinks. 6. Conclusions Web usage mining model is a kind of mining to server logs. It is plays an important role in realizing, enhancing the usability of the website design, the improvement of customers relations and improving the requirement of system performance and so on. WUM has been a potential technology for understanding behavior of the user on the Web. There are several techniques proposed by different researchers for the web usage mining. This paper discussed about various techniques available for web usage mining. This paper mainly discusses about three vial steps in WUM such as preprocessing, pattern discovery and pattern analysis. In this paper various algorithms of pattern discovery techniques like Fuzzy C-Means and techniques of clustering, DT and SVM techniques of classification etc. are described for user future request prediction. The patterns are analyzed using several techniques. This paper described the most common form of pattern analysis consists of Structured Query Language (SQL), Online Analytical Processing (OLAP). This paper gives a detailed look about web mining, web using mining, web server log file and its format. Further we plan to apply WUM process for extracting knowledge or pattern from the SUST server logs. Acknowledgements I thank my guide Dr. Ajith Abraham for many useful and constructive comments and suggestions, which helped me to significantly improve my work. References: [1] Arvind Kumar Sharma,Dr. P.C. Gupta, Exploration of Efficient Methodologies for the Improvement In Web Mining Techniques: A Survey, International Journal of Research in IT & Management Vol 1, Issue 3, pp.85-95, July [2] A. Al-qwaqenah and M. Al-kabi, Discovering the Web Usage in three Jordanian Universities, The International Conference on Information and Communication Systems, pp. 1 8, [3] P. Toth, Applying Web-mining Methods for Analysis in Virtual Learning Environment, Budapest Tech Polytechnical Institution, Centre for Teacher Training and Engineering Education.
7 354 [4] K. B. Patel, J. A. Chauhan, and J. D. Patel, Web Mining in E-Commerce : Pattern Discovery, Issues and Applications, International Journal of P2P Network Trends and Technology, vol. 1, no. 3, pp , [5] A. Upadhyay and B. Purswani, Web Usage Mining has Pattern Discovery, International Journal of Scientific and Research Publications, vol. 3, no. 2, pp. 1 4, [6] M. Pratap, S. Dohare, P. Arya, and A. Bajpai, Novel Web Usage Mining for Web Mining Techniques, International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 1, pp , [7] A. Kusmakar, Web Usage Mining : A Survey on Pattern Extraction from Web Logs, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 9, pp , [8] K. Etminani, Web Usage Mining: users navigational patterns extraction from web logs using Ant-based Clustering Method, IFSA- EUSFLAT, pp , [9] R. Gupta and P. Gupta, Application specific web log pre-processing, Int.J.Computer Technology & Applications, vol. 3, no. 1, pp , [10] R. Gupta and P. Gupta, Fast Processing of Web Usage Mining with Customized Web Log Preprocessing and modified Frequent Pattern Tree, International Journal of Science and Communication Networks, vol. 1, no. 3, pp , [11] and D. S. Singh, Arun, Avinav Pathak, Web Usage Mining : Discovery Of Mined Data Patterns and their Applications, International Journal of Computer Science and Management Research, vol. 2, no. 5, pp , [12] M. S. Kamat, J. W. Bakal, and M. Nashipudi, Improved Data Preparation Technique in Web Usage Mining, International Journal of Computer Networks and Communications Security, vol. 1, no. 7, pp , [13] S. K. Pani, L.Panigrahy, V.H.Sankar, Bikram Keshari Ratha, A.K.Mandal, S.K.Padhi, Web Usage Mining: A Survey on Pattern Extraction from Web Logs, International Journal of Instrumentation, Control & Automation, Volume 1, Issue 1,pp.15-23, Elhiber [14] Sawan Bhawsar, Kshitij Pathak, Sourabh Mariya, Sunil Parihar," Extraction of Business Rules from Web logs to improve Web Usage Mining", Vol 2, Issue 8, Aug,pp , [15] P. Nithya and P. Sumathi, A Survey on Web Usage Mining: Theory and Applications, International Journal, vol. 3, no. August, pp , [16] H. Yogish, D. Raju, and T. Manjunath, The Descriptive Study of Knowledge Discovery from Web Usage Mining, IJCSI International Journal of Computer Science Issues, vol. 8, no. 5, pp , [17] G. K. Lekeas, Data mining the web: the case of City University s Log Files, [18] Jaideep Srivastava, Robert Cooley, Mukund Deshpande, Pang Ning Tan Web usage mining: Discovery and Applications of usage patterns from web data SIGKDD Explorations- vol-1, issue-2,pages 12-33, Jan [19] K. Suneetha and R. Krishnamoorthi, Identifying user behavior by analyzing web server access log file, IJCSNS International Journal of Computer Science and Network Security, vol. 9, no. 4, pp , [20] S. G. Langhnoja, M. P. Barot, and D. B. Mehta, Web Usage Mining Using Association Rule Mining on Clustered Data for, International Journal of Data Mining Techniques and Applications, vol. 02, no. 01, pp , [21] O. CU and P. Bhargavi, Analysis of Web Server log by web usage mining for extracting users patterns, tjprc. org/view_archives. Php, vol. 3, no. 2, pp , [22] K. B. Patel, Process of Web Usage Mining to find Interesting Patterns from Web Usage Data, International Journal of Computer Applications & Technology, vol. 3, no. 1, pp , [23] P. Nithya and P. Sumathi, An Effective Web Usage Analysis using Fuzzy Clustering, ARPN Journal of Science and Technology, vol. 3, no. 7, pp , [24] Y. Xie, V.V. Phoha, web user clustering from access log using belief function, in: proceedings of the first international conference on knowledge capture (k-cap 2001), ACM press,, pp , 2001.
8 Access Patterns in Web Log Data: A Review 355 [25] S. Das, A. Abraham, and a. Konar, Automatic Clustering Using an Improved Differential Evolution Algorithm, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 38, no. 1, pp , Jan [26] H. Izakian and A. Abraham, Fuzzy C-means and fuzzy swarm for fuzzy clustering problem, Expert Systems with Applications, vol. 38, no. 3, pp , Mar [27] S. Dhawan and S. Goel, Web Usage Mining: Finding Usage Patterns from Web Logs, American International Journal of Research in Science, Technology, Engineering & Mathematics, pp , [36] Shevade, Shirish Krishnaj, et al. "Improvements to the SMO algorithm for SVM regression." Neural Networks, IEEE Transactions on 11.5 (2000): [ 37] Vishwanathan, S. V. M., and M. Narasimha Murty. "SSVM: a simple SVM algorithm." Neural Networks, IJCNN'02. Proceedings of the 2002 International Joint Conference on. Vol. 3. IEEE, [38] Li Baoli, Chen Yuzhong, and Yu Shiwen, A Comparative Study on Automatic Categorization Methods for Chinese Search Engine, Proceedings of the Eighth Joint International Computer Conference, Hangzhou: Zhejiang University Press, pp [28] I. Frades and R. Matthiesen, Overview on techniques in cluster analysis, Bioinformatics Methods in Clinical Research, pp , Springer, [29] X. Lou, J. Li, and H. Liu, Improved Fuzzy C- means Clustering Algorithm Based on Cluster Density Related Work, Journal of Computational Information Systems, vol. 2, no. January, pp. 72 [30] Pal N.R., Pal K., Keller J.M., Bezdek J.C., A possibilistic fuzzy c-means clustering algorithm, IEEE Transactions on Fuzzy Systems 13(4), 2005, pp [31] Patel, Pretesh B., and Tshilidzi Marwala. "Caller behaviour classification using computational intelligence methods." International journal of neural systems (2010): [32] A. Sharma, Web usage mining using neural network, International Journal of Reviews in Computing, vol. 9, no. April, pp , [33] G. Pandey, S. Patel, V. Singhal, and A. Kansara, A Process Oriented Perception of Personalization Techniques in Web Mining, International Journal of Science and Modern Engineering (IJISME), vol. 1, no. 2, pp , [34] Boser, B. E., Guyon, I. M., and Vapnik, V. N. "A training algorithm for optimal margin classifiers", in D. Haussler, editor, 5th Annual ACM Workshop on COLT (ACM Press, Pittsburgh, PA), (1992) [35] Burges, C. A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, (1998),2(2),
An Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
Web Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
A SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering [email protected]
How To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool
International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 4, Issue 1, 2013, pp1-8 http://bipublication.com ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information
SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT
Pre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Web Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
Numerical Algorithms Group
Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Visualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR [email protected] Abstract An e-government
Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Web Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. [email protected]
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Analysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
VOL. 3, NO. 7, July 2013 ISSN 2225-7217 ARPN Journal of Science and Technology 2011-2012. All rights reserved.
An Effective Web Usage Analysis using Fuzzy Clustering 1 P.Nithya, 2 P.Sumathi 1 Doctoral student in Computer Science, Manonmanaiam Sundaranar University, Tirunelveli 2 Assistant Professor, PG & Research
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Mahadev Yadav 1, Prof. Arvind Upadhyay 2 1,2 Computer Science and Engineering, IES IPS Academy, Indore India Abstract
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari [email protected]
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari [email protected] Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
PREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
ANALYSIS OF WEB SERVER LOG BY WEB USAGE MINING FOR EXTRACTING USERS PATTERNS
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 123-136 TJPRC Pvt. Ltd. ANALYSIS OF WEB SERVER LOG BY WEB
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Clustering Technique in Data Mining for Text Documents
Clustering Technique in Data Mining for Text Documents Ms.J.Sathya Priya Assistant Professor Dept Of Information Technology. Velammal Engineering College. Chennai. Ms.S.Priyadharshini Assistant Professor
Clustering. Adrian Groza. Department of Computer Science Technical University of Cluj-Napoca
Clustering Adrian Groza Department of Computer Science Technical University of Cluj-Napoca Outline 1 Cluster Analysis What is Datamining? Cluster Analysis 2 K-means 3 Hierarchical Clustering What is Datamining?
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
Classification algorithm in Data mining: An Overview
Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
A Cube Model for Web Access Sessions and Cluster Analysis
A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,[email protected] Michael K. Ng,
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Generalization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing
www.ijcsi.org 198 Data Mining Framework for Direct Marketing: A Case Study of Bank Marketing Lilian Sing oei 1 and Jiayang Wang 2 1 School of Information Science and Engineering, Central South University
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Inner Classification of Clusters for Online News
Inner Classification of Clusters for Online News Harmandeep Kaur 1, Sheenam Malhotra 2 1 (Computer Science and Engineering Department, Shri Guru Granth Sahib World University Fatehgarh Sahib) 2 (Assistant
Data Mining of Web Access Logs
Data Mining of Web Access Logs A minor thesis submitted in partial fulfilment of the requirements for the degree of Master of Applied Science in Information Technology Anand S. Lalani School of Computer
Advanced Ensemble Strategies for Polynomial Models
Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Fuzzy Clustering Technique for Numerical and Categorical dataset
Fuzzy Clustering Technique for Numerical and Categorical dataset Revati Raman Dewangan, Lokesh Kumar Sharma, Ajaya Kumar Akasapu Dept. of Computer Science and Engg., CSVTU Bhilai(CG), Rungta College of
Neural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
NEURAL NETWORKS IN DATA MINING
NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,
Predicting required bandwidth for educational institutes using prediction techniques in data mining (Case Study: Qom Payame Noor University)
260 IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.6, June 2011 Predicting required bandwidth for educational institutes using prediction techniques in data mining (Case
Introduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam
An Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
Data Mining Analytics for Business Intelligence and Decision Support
Data Mining Analytics for Business Intelligence and Decision Support Chid Apte, T.J. Watson Research Center, IBM Research Division Knowledge Discovery and Data Mining (KDD) techniques are used for analyzing
BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL
The Fifth International Conference on e-learning (elearning-2014), 22-23 September 2014, Belgrade, Serbia BOOSTING - A METHOD FOR IMPROVING THE ACCURACY OF PREDICTIVE MODEL SNJEŽANA MILINKOVIĆ University
DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Web Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques
Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques Subhashree K 1, Prakash P S 2 1 Student, Kongu Engineering College, Perundurai, Erode 2 Assistant Professor,
Mining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Web Mining as a Tool for Understanding Online Learning
Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA [email protected] James Laffey University of Missouri Columbia Columbia, MO USA [email protected]
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt [email protected]
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art. Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland
Data Mining and Knowledge Discovery in Databases (KDD) State of the Art Prof. Dr. T. Nouri Computer Science Department FHNW Switzerland 1 Conference overview 1. Overview of KDD and data mining 2. Data
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Data Mining for Fun and Profit
Data Mining for Fun and Profit Data mining is the extraction of implicit, previously unknown, and potentially useful information from data. - Ian H. Witten, Data Mining: Practical Machine Learning Tools
Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm
Dynamic Data in terms of Data Mining Streams
International Journal of Computer Science and Software Engineering Volume 2, Number 1 (2015), pp. 1-6 International Research Publication House http://www.irphouse.com Dynamic Data in terms of Data Mining
