An Enhanced Quality Approach for Ecommerce Website using DEA and High Utility Item Set Mining
|
|
|
- Rosanna Blankenship
- 10 years ago
- Views:
Transcription
1 An Enhanced Quality Approach for Ecommerce Website using DEA and High Utility Item Set Mining Varsha Kulkarni 1, Vilas Jadhav 2. 1 PG Scholar, Dept. of Computer Engineering, MGMCET, Kamothe, Navi Mumbai, India 2 Professor, Dept. of Computer Engineering, MGMCET, Kamothe, Navi Mumbai, India ABSTRACT: Today, E-commerce is booming everywhere. Customer s satisfaction is an important issue in every Business-to-Consumer website. Sometimes it is difficult to evaluate performance of website and to find utility for the product. It depends on customer to visit, see or purchase any product. Entrepreneur is unaware of its nature. Here, we have adopted DEA (Data Envelopment Analysis) method which is working on dataset. DEA is used to evaluate performance of DMU s (Decision Making Units). Here, we have taken up Utility Pattern Growth algorithm for finding High utility item sets. Our scheme E-commerce website Quality and Utility Analysis System (EQUAS) will analyse the website and will results in popularity of website to an entrepreneur. Our scheme will contribute to the improvement of overall quality of website and promote the healthy development in e-commerce. The goal of utility mining is to discover all the high utility item sets whose utility values are beyond a user specified threshold in a transaction database. Utility Mining identifies the item sets with highest utilities, by considering profit, quantity, cost or other user preferences. DEA analyzes quality by calculating user popularity rates and utility item set mining investigates profit earning items. KEYWORDS: data envelopment analysis (DEA), decision making units (DMU s), E-commerce website Quality and Utility Analysis System (EQUAS). I. INTRODUCTION Quality of e-commerce website affects on its performance directly. With the rapid development and wide application of e-commerce, academia and business are desperately in need of an effective website evaluation technique to compare the relative merits of website which will be helpful for website construction [1]. DEA is one of the techniques to evaluate the quality of e-commerce website. DEA is relatively new data oriented approach for evaluating the performance of a set of entities called DMU s which convert multiple inputs into multiple outputs. Proposed model will calculate inefficiencies in units and results will be used for improvement of website. In addition to DEA, we have included utility mining technique for finding high utility item sets. Data mining is the extraction of hidden, previously unknown and potentially useful information from databases. Data mining is sometimes called as knowledge discovery. Based on user queries it analyzes the relationships in stored data. Data mining is mostly used in financial data analysis, retail industry, intrusion detection and other scientific applications. Data mining models can be applied to specific scenarios such as forecasting, risk and probability. To discover the useful patterns from database, frequent pattern mining has been applied to different databases. Searching of frequent patterns from large databases is very important in many applications. The goal of frequent item set mining is to identify all frequent item sets and it collects the set of items that occur frequently together. An item set is called high utility item set if its utility is not less than user specified minimum utility threshold [2]. The information of high utility item sets is maintained in a tree based structure called utility pattern tree. High utility item sets can be generated from UP-Tree efficiently. We have designed E-commerce website Quality and Utility Analysis System (EQUAS) to calculate inefficiency of a website as well as perform utility mining of high utility item sets. DEA will work on website log data and utility mining will work on transactional databases to form a tree structure. Copyright to IJIRCCE DOI: /IJIRCCE
2 II. RELATED WORK Zijuan Liu [1] chose input oriented BCC model which is ideal for modelling of purchase situations. It is done by comparing with hypothetical DMU s to calculate constant rates. It highlights difference between CCR and BCC model. It defined input oriented BCC model. Vincent S. Tseng et Al [2] explains about discovery of high utility item sets like profit to eliminate unpromising items. It is mainly used for transactional databases. Here, they used UP-Growth and UP-Growth+ algorithms. They can effectively used for long transactions. Jyothi Pillai, O.P.Vyas [3] explained efficiency of utility mining in the field of data mining. Utility mining discovers item sets that frequently occur. Chuen Tse Kuah et al formalized significance of DEA and its different models. The popularity of DEA is due to its ability to measure relative efficiencies of multiple-input and multiple-output DMUs without prior weights on the inputs and outputs. Corrado lo Storto [4] evaluated website quality from user viewpoint using DEA. The framework is implemented to compare websites that sell products online. Jyothi Pillai, O.P.Vyas [5] defined emerging technologies in mining. It illustrated utility mining in terms of profit, cost and other expressions of user experiences. Vincent S. Tseng [6] defined UP-Growth(Utility Pattern Growth) algorithm for discovering high utility item sets and removing unpromising items by providing threshold like profit, quantity etc. A tree structure called UP-Tree is created to to generate candidate item sets to avoid repeated scanning of database. Smita R. Londhe et al [7] tried to avoid space consumption and execution time for long transactions by defining two algorithms namely, UP-Growth and UP- Growth+ algorithms. Adinarayanareddy B et al [8] mainly focus on Up- Growth algorithm and their production of large number candidate item sets which requires more space and affects mining performance. III. PROPOSED ALGORITHM A. Design Considerations: All the ports which are required should be free. B. Description of the Proposed Algorithm: We have designed E-commerce website Quality and Utility Analysis System (EQUAS). We have implemented this system using software Java 1.6 and database SQL server Our aim is to build a quality evaluation system which will diagnose datasets on the basis of their efficiency and investigates profit earning items. Our reference paper has built a system which uses BCC model. A BCC model is input oriented and used for evaluation purpose. A model is established based on input data and output data of derived from CCR [2]. DEA is used to evaluate efficiency of E-commerce website. In order to find unpromising items and to overcome the drawback of excess scanning of database, utility mining is also performed along with DEA. Proposed model will calculate inefficiencies in units and results will be used for improvement of website. In this the unit of analysis represents a production unit. We conceptualize consumer-website interaction during online shopping as a production process in which the customer conducts a purchase and inputs are converted into outputs. Finding Utility A novel algorithms as well as a compact data structure for efficiently discovering high utility item sets from transactional databases. Utility pattern growth (UP-Growth) [4] and a compact tree structure, called utility pattern tree (UP-Tree), for discovering high utility item sets and maintaining important information related to utility patterns within databases are proposed. High-utility item sets can be generated from UP-Tree efficiently with only two scans of original databases. To improve mining performance and avoid repeated scanning of database, we used here utility pattern tree [2]. To analyse performance of website we propose an enhanced method called, E-commerce website Quality and Utility Analysis System (EQUAS) which calculates inefficiency of website functionality and utility mining to obtain high quality item sets. In this section we discussed our EQUAS system s design and algorithm and in next section we focus implementation and results. Copyright to IJIRCCE DOI: /IJIRCCE
3 Figure 1: Proposed System IV. SYSTEM FLOW 1. An e-commerce website will be developed on which DEA will work to analyze quality of the website and utility mining will be performed to calculate the profit earned by the website. 2. Collecting web log data from datasets to find out value of input and output variables through DMU. 3. Calculating unit inefficiencies to analyze website functionality. 4. Calculating conversion rates from one page to another and obtaining average value of each conversion rate 5. Organizing web log data to calculate profit by using item set and its unique identifier. 6. Remove unpromising data by extracting only utility item sets whose threshold is greater than or equal to minimum threshold. 7. Applying UP-Growth algorithm to generate UP-Tree which is representation of information of high utility item sets. V. RESULTS We can divide the result into two parts. One is the quality analysis system developed by using DEA and another one is utility mining based on transactional database. First is to enhance background performance of the system and another is to increase the profit. We can see that rate of people who tends to purchase product is lower than product list. So, here we have scope to enhance our website quality. Some ways are arrange products properly, transaction should not be complex. Also here in second graph Transaction unit (TU) and Transaction weighted unit (TWU) are shown. TU is addition of each item in single transaction. Each transaction is number of items purchased by single user. TWU is addition of TU s which contain same element. Copyright to IJIRCCE DOI: /IJIRCCE
4 Total Average TU TWU Figure 2: Result of DEA Figure 3: TU and TWU calculation After calculation of TU and TWU we have inserted user defined threshold. It is owner specified means website owner can put in some value. System categorizes items into promising and unpromising items. Suppose threshold is then result could be: Figure 4: Output representation VI. CONCLUSION AND FUTURE WORK The overall performance of an e-commerce website can be analysed by this proposed technique. Using our approach EQUAS, we can verify website quality based on log data and utility mining helps to eliminate unpromising data by considering parameter profit as a threshold. Existing systems doesn t provide efficiency analysis as well as unpromising item removal mechanism. We used here both DEA and utility mining to check website popularity as well as removal of doubtful data to gain more profit. Implications of this study relate to a new model of a set of criteria that used to measure the efficiency of the design, usability and performance of websites. In case of DEA, it is only as good as the initial selection of input and output variables. With the help of utility mining, high utility item sets will be discovered whose values are beyond user specified threshold. Copyright to IJIRCCE DOI: /IJIRCCE
5 REFERENCES 1. Zijuan Liu, Diagnosing Ecommerce website quality Based on DEA, 2nd International Conference on Computer Science and Network Technology, , , Vincent S. Tseng, Bai-En Shie, Cheng-Wei Wu, and Philip S. Yu, Efficient Algorithms for Mining High Utility Item sets from Transactional Databases, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 8, AUGUST Chuen Tse Kuah, Kuan Yew Wong, Farzad Behrouzi, A Review on Data Envelopment Analysis (DEA), 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation, , , Corrado lo Storto, Evaluating ecommerce websites cognitive efficiency: An integrative framework based on data envelopment analysis, Applied Ergonomics, 44, , Jyothi Pillai, O.P.Vyas, Overview of Item set Utility Mining and its Applications, International Journal of Computer Applications ( ) Volume 5 No.11, August Vincent S. Tseng, Cheng-Wei Wu, Bai-En Shie, and Philip S. Yu, UP-Growth: An Efficient Algorithm for High Utility Item set Mining, KDD 10, July 25 28, Smita R. Londhe, Rupali A. Mahajan, Bhagyashree J. Bhoyar, Overview on Methods for Mining High Utility Item set from Transactional Database, International Journal of Scientific Engineering and Research (IJSER), Volume 1 Issue 4, December Adinarayanareddy B, O Srinivasa Rao, MHM Krishna Prasad, An Improved UP-Growth High Utility Item set Mining, IJCA, Volume 58 No.2, 25-28, November BIOGRAPHY Varsha Kulkarni is pursuing her Master degree of Engineering in Computer engineering from MGM s college of Engineering and Technology, Kamothe, Navi Mumbai, India. She also received Bachelor of Engineering in Computer engineering from MGM s college of Engineering and Technology, Kamothe, Navi Mumbai, India. Her research interests are data mining, web mining, web technology, website designing etc. Vilas Jadhav is an Assistant Professor in Computer Engineering department, MGM s college of Engineering and Technology, Kamothe, Navi Mumbai, India. His research interests are Data mining, Software Engineering, Web Engineering etc. Copyright to IJIRCCE DOI: /IJIRCCE
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
A Survey on Product Aspect Ranking
A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Hybrid Data Envelopment Analysis and Neural Networks for Suppliers Efficiency Prediction and Ranking
1 st International Conference of Recent Trends in Information and Communication Technologies Hybrid Data Envelopment Analysis and Neural Networks for Suppliers Efficiency Prediction and Ranking Mohammadreza
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis
Query Optimization Approach in SQL to prepare Data Sets for Data Mining Analysis Rajesh Reddy Muley 1, Sravani Achanta 2, Prof.S.V.Achutha Rao 3 1 pursuing M.Tech(CSE), Vikas College of Engineering and
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
New Matrix Approach to Improve Apriori Algorithm
New Matrix Approach to Improve Apriori Algorithm A. Rehab H. Alwa, B. Anasuya V Patil Associate Prof., IT Faculty, Majan College-University College Muscat, Oman, [email protected] Associate
Assessing Learners Behavior by Monitoring Online Tests through Data Visualization
International Journal of Electronics and Computer Science Engineering 2068 Available Online at www.ijecse.org ISSN : 2277-1956 Assessing Learners Behavior by Monitoring Online Tests through Data Visualization
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
RULE-BASE DATA MINING SYSTEMS FOR
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES A.Kaleeswaran 1, V.Ramasamy 2 Assistant Professor 1&2 Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 1&2 Abstract: The main
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Data Mining System, Functionalities and Applications: A Radical Review
Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm R.Karthiyayini 1, J.Jayaprakash 2 Assistant Professor, Department of Computer Applications, Anna University (BIT Campus),
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Indirect Positive and Negative Association Rules in Web Usage Mining
Indirect Positive and Negative Association Rules in Web Usage Mining Dhaval Patel Department of Computer Engineering, Dharamsinh Desai University Nadiad, Gujarat, India Malay Bhatt Department of Computer
2.1. Data Mining for Biomedical and DNA data analysis
Applications of Data Mining Simmi Bagga Assistant Professor Sant Hira Dass Kanya Maha Vidyalaya, Kala Sanghian, Distt Kpt, India (Email: [email protected]) Dr. G.N. Singh Department of Physics and
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
A Survey of Customer Relationship Management
A Survey of Customer Relationship Management RumaPanda 1, Dr. A. N. Nandakumar 2 1 Assistant Professor, Dept. of C.S.E. Vemana I T, VTU,Bangalore, Karnataka, India 2 Professor & Principal, R. L. Jalappa
Healthcare Measurement Analysis Using Data mining Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik
Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data
Volume 39 No10, February 2012 Future Trend Prediction of Indian IT Stock Market using Association Rule Mining of Transaction data Rajesh V Argiddi Assit Prof Department Of Computer Science and Engineering,
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
Comparative Performance Analysis of MySQL and SQL Server Relational Database Management Systems in Windows Environment
ISSN (Online) 2278-121 ISSN (Print) 2319-594 Vol. 4, Issue 3, March 215 Comparative Performance Analysis of and Relational Database Management Systems in Windows Environment Amlanjyoti Saikia 1, Sherin
Importance of Online Product Reviews from a Consumer s Perspective
Advances in Economics and Business 1(1): 1-5, 2013 DOI: 10.13189/aeb.2013.010101 http://www.hrpub.org Importance of Online Product Reviews from a Consumer s Perspective Georg Lackermair 1,2, Daniel Kailer
KEYWORD SEARCH IN RELATIONAL DATABASES
KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Client Perspective Based Documentation Related Over Query Outcomes from Numerous Web Databases
Beyond Limits...Volume: 2 Issue: 2 International Journal Of Advance Innovations, Thoughts & Ideas Client Perspective Based Documentation Related Over Query Outcomes from Numerous Web Databases B. Santhosh
Mining for Web Engineering
Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara
International Journal of Innovative Research in Computer and Communication Engineering
FP Tree Algorithm and Approaches in Big Data T.Rathika 1, J.Senthil Murugan 2 Assistant Professor, Department of CSE, SRM University, Ramapuram Campus, Chennai, Tamil Nadu,India 1 Assistant Professor,
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD
72. Ontology Driven Knowledge Discovery Process: a proposal to integrate Ontology Engineering and KDD Paulo Gottgtroy Auckland University of Technology [email protected] Abstract This paper is
Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL
Preparing Data Sets for the Data Mining Analysis using the Most Efficient Horizontal Aggregation Method in SQL Jasna S MTech Student TKM College of engineering Kollam Manu J Pillai Assistant Professor
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Sla Aware Load Balancing Algorithm Using Join-Idle Queue for Virtual Machines in Cloud Computing
Sla Aware Load Balancing Using Join-Idle Queue for Virtual Machines in Cloud Computing Mehak Choudhary M.Tech Student [CSE], Dept. of CSE, SKIET, Kurukshetra University, Haryana, India ABSTRACT: Cloud
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Sales and Invoice Management System with Analysis of Customer Behaviour
Sales and Invoice Management System with Analysis of Customer Behaviour Sanam Kadge Assistant Professor, Uzair Khan Arsalan Thange Shamail Mulla Harshika Gupta ABSTRACT Today, the organizations advertise
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks
www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,
An Online Purchase Portal for Books and Seeds in Regional Language (Punjabi)
An Online Purchase Portal for Books and Seeds in Regional Language (Punjabi) Er. Deepinder Kaur 1, Er. Salam Din 2 Department of SEEIT, PAU, Ludhiana, India 1 Associate Professor, Department of SEEIT,
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
SPMF: a Java Open-Source Pattern Mining Library
Journal of Machine Learning Research 1 (2014) 1-5 Submitted 4/12; Published 10/14 SPMF: a Java Open-Source Pattern Mining Library Philippe Fournier-Viger [email protected] Department
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
Operational Efficiency and Firm Life Cycle in the Korean Manufacturing Sector
, pp.151-155 http://dx.doi.org/10.14257/astl.2015.114.29 Operational Efficiency and Firm Life Cycle in the Korean Manufacturing Sector Jayoun Won 1, Sang-Lyul Ryu 2 1 First Author, Visiting Researcher,
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Grid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
Framework model on enterprise information system based on Internet of things
International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675
Big Data Mining: Challenges and Opportunities to Forecast Future Scenario
Big Data Mining: Challenges and Opportunities to Forecast Future Scenario Poonam G. Sawant, Dr. B.L.Desai Assist. Professor, Dept. of MCA, SIMCA, Savitribai Phule Pune University, Pune, Maharashtra, India
KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH
KNOWLEDGE DISCOVERY FOR SUPPLY CHAIN MANAGEMENT SYSTEMS: A SCHEMA COMPOSITION APPROACH Shi-Ming Huang and Tsuei-Chun Hu* Department of Accounting and Information Technology *Department of Information Management
PRIVACY PRESERVING ASSOCIATION RULE MINING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,
Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad Email: [email protected]
96 Business Intelligence Journal January PREDICTION OF CHURN BEHAVIOR OF BANK CUSTOMERS USING DATA MINING TOOLS Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad
A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH
205 A STUDY OF DATA MINING ACTIVITIES FOR MARKET RESEARCH ABSTRACT MR. HEMANT KUMAR*; DR. SARMISTHA SARMA** *Assistant Professor, Department of Information Technology (IT), Institute of Innovation in Technology
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
DEA implementation and clustering analysis using the K-Means algorithm
Data Mining VI 321 DEA implementation and clustering analysis using the K-Means algorithm C. A. A. Lemos, M. P. E. Lins & N. F. F. Ebecken COPPE/Universidade Federal do Rio de Janeiro, Brazil Abstract
ESSENTIALS AND STRATEGIES OF E-MARKETING. Mr. R. Srinivasan, J.Jollyvinisheeba Assistant Manager, Novo Nordisk India Private Limited, Bangalore
International Journal of scientific research and management (IJSRM) Special Issue On e- Road Ahead Of India Pages 251-255 2013 Website: www.ijsrm.in ISSN (e): 2321-3418 ESSENTIALS AND STRATEGIES OF E-MARKETING
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Review on Data Mining in Cloud Computing Environment
A Review on Data Mining in Cloud Computing Environment R.Kabilan, Dr.N.Jayaveeran Research Scholar, P.G & Research Dept. of Computer Science, Khadir Mohideen College, Adirampattinam, Thanjavur District.
Mobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
Supply chain intelligence: benefits, techniques and future trends
MEB 2010 8 th International Conference on Management, Enterprise and Benchmarking June 4 5, 2010 Budapest, Hungary Supply chain intelligence: benefits, techniques and future trends Zoltán Bátori Óbuda
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Business Lead Generation for Online Real Estate Services: A Case Study
Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University
Keywords: Data Warehouse, Data Warehouse testing, Lifecycle based testing, performance testing.
DOI 10.4010/2016.493 ISSN2321 3361 2015 IJESC Research Article December 2015 Issue Performance Testing Of Data Warehouse Lifecycle Surekha.M 1, Dr. Sanjay Srivastava 2, Dr. Vineeta Khemchandani 3 IV Sem,
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Data Mining Approach in Security Information and Event Management
Data Mining Approach in Security Information and Event Management Anita Rajendra Zope, Amarsinh Vidhate, and Naresh Harale Abstract This paper gives an overview of data mining field & security information
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
Improving Apriori Algorithm to get better performance with Cloud Computing
Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become
Efficiency in Software Development Projects
Efficiency in Software Development Projects Aneesh Chinubhai Dharmsinh Desai University [email protected] Abstract A number of different factors are thought to influence the efficiency of the software
ANDROID BASED ERP SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
DATA MINING STRATEGIES AND TECHNIQUES FOR CRM SYSTEMS
DATA MINING STRATEGIES AND TECHNIQUES FOR CRM SYSTEMS Dr. Abdullah S. Al-Mudimigh, Zahid Ullah, Farrukh Saleem Department of Information System College of Computer and Information Sciences King Saud University,Riyadh
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL
SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL Krishna Kiran Kattamuri 1 and Rupa Chiramdasu 2 Department of Computer Science Engineering, VVIT, Guntur, India
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Database Optimizing Services
Database Systems Journal vol. I, no. 2/2010 55 Database Optimizing Services Adrian GHENCEA 1, Immo GIEGER 2 1 University Titu Maiorescu Bucharest, Romania 2 Bodenstedt-Wilhelmschule Peine, Deutschland
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick Propagation Network
Novel Mining of Cancer via Mutation in Tumor Protein P53 using Quick Propagation Network Ayad. Ghany Ismaeel, and Raghad. Zuhair Yousif Abstract There is multiple databases contain datasets of TP53 gene
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
