Mining for Web Engineering
|
|
|
- Ross Bishop
- 10 years ago
- Views:
Transcription
1 Mining for Engineering A. Venkata Krishna Prasad 1, Prof. S.Ramakrishna 2 1 Associate Professor, Department of Computer Science, MIPGS, Hyderabad 2 Professor, Department of Computer Science, Sri Venkateswara University, Tirupati Abstract The main theme of the research paper is to identify the web engineering tasks from mining process. In this paper, all areas are studied that are basically required for web mining and web engineering tasks. Keywords Mining, Engineering, site errors, objects, logs, I. INTRODUCTION Because plays a critical role in businesses, governments and societies, improvising productivity and quality is an important goal of Engineering. Although the development of applications may seem easy, it is often more complex and challenging than many of us think. In many ways it is also different and more complex than the traditional software development. Two key attributes distinguish web-based systems development from traditional software development: rapid growth of the requirements of -based systems and the continual change of their information content. based systems need to be designed and built for scalability and maintainability; these features cannot be added later. In addition, a -based system must meet the needs of its much different stake-holders-the diverse range of the system users, persons who maintain the system, the organization that needs the system, and also those who fund the system development [1]. Applications are evolutionary. For many web applications, it s not possible to specify fully what they should or will contain at the start of their development, because their structure and functionality will evolve over time. Hence, based system development is not a one-time event as currently perceived and practiced by many web developers; it is, instead, an iterative process with a long life cycle. II. RELATED WORK A based product model of the system describes various components of the system and how they are linked. An overall system architecture describing how the network and the various servers such as web servers, applications servers, and database servers interact. The application architecture shows us a map of various information and functional s. An information may provide the same information to all the users or provide customized or personalized information to each user. Functional s such as login page, registration pages, web forms for data collections and the shopping carts used in e-commerce systems collect and process the users input. Specific requirements for look and feel consistency of information, scalability, maintainability and quality control mechanisms determine the software architecture [4]. The primary cause of system failures are the flawed design and development process and poor management of their development. The emerging engineering discipline deals with the process of developing -based systems and applications. The essence of engineering is to successfully manage the diversity and complexity of application development and hence, avoid potential failures, which can have serious implications. It is a proactive approach to building applications. To tackle the above mentioned problems, engineers are increasingly applying Data Mining algorithms to various engineering tasks. For instance, mining algorithms can be applied to trace the patterns in which a user browses the pages and group together those pages making the retrieval of the information fast, thus increasing the responsiveness. development is a process, not simply a one-time event. Thus, Engineering deals with all aspects of -based systems development, starting from conception and development to implementation, performance evaluation, and continual maintenance. Engineering, therefore, covers a range of areas: requirements elicitation and analysis; system modelling; architecture; system design; page design; scripting/coding; interface with databases, ERP systems, and other -based systems; quality; usability; security; system performance evaluation; testing; development methodologies; development process; metrics; and project management [3]. III. MINING APPROACH FOR WEB ENGINEERING Engineering must be a systematic discipline and quantifiable approach for development, operation and maintenance of web based business applications. A successful Engineering Applications is one which can improves insights of web based business intelligence by sharing results among various s in the process of effective decision making. To achieve the goal of business intelligence in web based applications, one has to concentrate on various aspects ISSN: Page 151
2 of web content. A mining approach for web engineering application is necessary to study the role of various components of web application in business intelligence. In this part of research work, an algorithm was developed as a web mining approach which can investigate the components of web that are used in business intelligence[4]. The different phases in mining for web engineering are shown in figure 1. Phases in Mining Process: An algorithm consists of 3 phases. They are Phase 1: Extracting Data from web application Phase 2: Mining Approaches to extract features of web application Phase 3: Engineering tasks associated with Mining Phase 1: Extracting Data from web application: An algorithm was developed using the web program in extracting the components of web such as site Structure, site Error Reports, site objects used in web design, and contents of log. The Program retrieves all necessary web data elements using a standard set of web tools. These tools include site Extractor, page Analyzer, W3C HTML Validator, Power Mapper, and log Expert. The overall structure of the algorithm is shown in figure 2.The description of the algorithm is shown in table 1. 1) Algorithm Description: The URL address of site is thoroughly scanned using web site extractor to get all web pages of the web site and each web page is stored in a separate database. A snap shot of website extractor is shown in figure 3. The web objects of each web page of web site are gathered using web page analyzer. All these objects are stored in a separate data base. A snap shot of web page analyzer is shown in figure 4. The web site structure shows organization of web pages in the web site starting from home page. A tool Power Mapper constructs a site map for the web site in a hierarchical tree structure. The structure of a website is stored in a database for further process. The World Wide consortium (W3C) developed a standard web tool W3C HTML Validator to generate error reports of web site. All error reports are then stored in a separate database. The snapshot of website errors report is shown in figure 5. The standard web tool web log expert is used to extract information of web log. A web server log file records users transactions in the web. Usually, the web log file contains information about the user IP address, the requested page, time of request, the volume of the requested page, its referrer, and other useful information. log file is the main source of data analysis in web mining. log file contains data about requested URL, time and date of request, method used, etc. The snap shot of web log file is shown in figure 6. Phase 2: mining techniques to extract features of web application: mining is the usage of data mining techniques to extract interesting information from web data. Patterns extracted from applying web mining techniques on web data can be used to maintain websites by improving their usability. The patterns can also be used to study user behaviour and interests, facilitate support and services introduced to the website navigator, improve the structure of the website, and facilitate personalization and adaptive websites. After extracting web engineering data, various web mining techniques are applied on data base which consists of web information. 1) Association Rule Mining: A set of associations rules are applied on elements of web site structure to identify relationships among various s of web engineering application. Association rule mining is one of the data mining techniques that play an important role in our approach. An association rule is an expression of the form X Y, where X and Y are sets of items and have no items in common. This rule means that given a database of transactions D where each transaction T D is a set of items. X Y denotes that whenever a transaction T contains X then there is a probability that it contains Y also. The rule X Y holds in the transactions set T with confidence c if c% of transactions in T that contain X also contain Y. The rule has support s in T if s% of the transactions in T contains both X and Y. Association rule mining is finding all association rules with support and confidence values that are greater than or equal a user-specified minsup and minconf respectively. In general, the process of extracting interesting association rules consists of two major steps. Step 1: The first step is finding all itemsets that satisfy minsup (known as Frequent-Itemset generation). Step 2: The second step, is generating all association rules that satisfy minconf using itemsets generated in the first step. After generating frequent itemsets, association rules that are greater than or equal to minconf are generated. Those rules are called interesting association rules. Those rules can be invested in many different applications. One of those applications is improving the structure of the company s website that the mined database belongs to. This is done during the website s design phase by creating links between items that seem to be sold together, or highlight those links if they are already exist, and/or create index pages which are pages that have direct links to some products that may be of interest for some group of customers. All paragraphs must be indented. All paragraphs must be justified, i.e. both leftjustified and right-justified. 2) Classification: Classification is dividing an existing set of events or transactions into other predefined sets or classes based on some characteristics. In web usage mining, classification is used to group users into predefined groups with respect to their navigation patterns in order to develop profiles of users belonging to a particular class or category. The work in [2] proposes an approach to reorganize a website based on user access patterns and the classification of web pages into two categories: index pages and content pages. ISSN: Page 152
3 In [8], the authors propose a web mining strategy for web personalization based on a novel pattern recognition strategy which analysis and classifies users taking into account both user provided data and navigational behaviour of the users. 3) Clustering: Clustering is the process of partitioning a given population of events or items into sets of similar elements, so that items within a cluster have high similarity in comparison to one another, but are very dissimilar to items in other clusters. In web usage mining there are two main interesting clusters to be discovered: usage clusters and pages clusters [4]. The authors in [5] present an approach to cluster web pages to obtain high quality clusters of web pages and use those clusters to produce index pages, where index pages are web pages that have direct links to pages that may be of interest of some group of website navigators. In [5] clustering techniques are applied to web log file to discover those subsets of web pages that need to be connected and to improve the already connected pages. Phase 3: Engineering Tasks associated with web mining The Mining techniques that are applied on data produce various tasks related to Engineering frame work. These tasks associated with web services, web architectures, web configuration management data, web application classification, web testing, requirements elicitation and analysis; system modelling; architecture; system design; web communities, site Navigation, page design; quality; usability; security; system performance evaluation; testing; development methodologies; development process; metrics; and project management [6]. These services are very much essential in any type of web application. Patterns extracted from applying web mining techniques on web data can be used to maintain websites by improving their usability through simplifying user navigation and information accessibility and improving the content and the structure of the website in a way that meets the requirements of both website owner and user which will consequently increase the overall profit of the business or the industry that the maintained website belongs to [8]. Conclusion The main theme of this paper is to develop a mining process for web engineering tasks. Here an attempt is made to find all areas involved in mining process. Further the work can be extended to find services of web mining process required for web engineering. 1. Ajith Abraham, Business Intelligence from Usage Mining, Department of Computer Science, Oklahoma State University, USA. 2. Anupam Joshi and Pranam Kolari, Engineering Column: Mining: Research and Practice, IEEE Computing and Science and Engineering, July/August 2004 pp Athula Ginge and San Murugesan, Engineering: A Methodology for Developing Scalable, Maintainable Applications, Cutter IT Journal,Vol.14, No.7, July 2001, pp.: G.Sreedhar, Dr. A.A.Chari, Dr. V.V.Venkata Ramana, A Qualitative and Quantitative Frame work for effective Site Design, IJCA, Vol 2, May 2010, PP Jiawei Han, Kevin Chen-Chuan Chang, Data Mining for Intelligence, IEEE Computer November, 2002 pp Martha Koutri and Sophia Daskalaki. Improving Site Usability Through a Clustering Approach, In Proceedings of the 10th International Conference on Human-Computer Interaction HCI, Crete, Greece, 2003, PP Tao Xie, Jian Pei, Ahmed E. Hassan Mining Software Engineering Data, 29 th International Conference on Software Engineering, 2007, IEEE. 8. Wingyan Chung Designing -based Business Intelligence Systems: A Framework and Case Studies: In DESRIST, February 24-25, California CA USA 2006, pp REFERENCES ISSN: Page 153
4 UML Models Logs Design Structure of Data Engineering Data (Phase 1) Classifica tion Associati on rule Clusterin g Frequent patterns Graph mining Data Mining Techniques (Phase 2) Site Navigatio n Monitori ng Testing Metrics Develop ment Engineering Tasks Associated with Mining (Phase 3) Figure 1:Phases of Mining for Engineering ISSN: Page 154
5 Home Page URL Program site extract Log site error site analysis site structure site compone nts log details site errors objects site Structure Figure 2: Architecture of Algorithm 155
6 Table 1: Pseudo code for Algorithm Input: Home Page (URL H ) Begin Accept URL H Retrieve list_of_pages using SiteExtractor(URL H ) PageCount = count(list_of_pages) SiteMap = PowerMapper(URL H ) log = logexpert(url H ) Store SiteMap into WEBSITE_STRUCTURE For i = 1 to PageCount do Begin Identify errors(i) using PageValidator(i) Store errors(i) into WEBSITE-ERRORS Page_Dt(i) = webpageanalyzer(i) Broken_Link(i) = LinkChecker(i) Retrieve web objects(i) using SiteExtractor Store web objects(i) into WEB_COMPONENTS Store Page_Dt(i) into WEBOBJECTS_DT End End Output: site errors, web site structure, web objects, web log data Figure 3: site Extractor 156
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
Web Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
Improving Apriori Algorithm to get better performance with Cloud Computing
Improving Apriori Algorithm to get better performance with Cloud Computing Zeba Qureshi 1 ; Sanjay Bansal 2 Affiliation: A.I.T.R, RGPV, India 1, A.I.T.R, RGPV, India 2 ABSTRACT Cloud computing has become
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Evaluating Qualitative Measures for Effective Website Design
Evaluating Qualitative Measures for Effective Website Design G. Sreedhar Sr. Lecturer Dept. of Computer Science Rashtriya Sanskrit Vidyapeetha (Deemed University) Tirupati [email protected] Dr. A.A.Chari
Analyzing Download Time Performance of University Websites in India
, pp.1-6 http://dx.doi.org/10.14257/ijwse.2014.1.1.01 Analyzing Time Performance of University Websites in India G. Sreedhar Associate Professor Department of Computer Science, Rashtriya Sanskrit Vidyapeetha
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
Generalization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
Financial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
A Survey on Association Rule Mining in Market Basket Analysis
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 409-414 International Research Publications House http://www. irphouse.com /ijict.htm A Survey
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
Selection of Optimal Discount of Retail Assortments with Data Mining Approach
Available online at www.interscience.in Selection of Optimal Discount of Retail Assortments with Data Mining Approach Padmalatha Eddla, Ravinder Reddy, Mamatha Computer Science Department,CBIT, Gandipet,Hyderabad,A.P,India.
Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe
Website Personalization using Data Mining and Active Database Techniques Richard S. Saxe Abstract Effective website personalization is at the heart of many e-commerce applications. To ensure that customers
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. [email protected]
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Mahadev Yadav 1, Prof. Arvind Upadhyay 2 1,2 Computer Science and Engineering, IES IPS Academy, Indore India Abstract
Enhanced Boosted Trees Technique for Customer Churn Prediction Model
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
RULE-BASE DATA MINING SYSTEMS FOR
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES A.Kaleeswaran 1, V.Ramasamy 2 Assistant Professor 1&2 Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 1&2 Abstract: The main
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
Recommendation Tool Using Collaborative Filtering
Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,
An Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
Model-Based Cluster Analysis for Web Users Sessions
Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece [email protected]
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Fast and Easy Delivery of Data Mining Insights to Reporting Systems
Fast and Easy Delivery of Data Mining Insights to Reporting Systems Ruben Pulido, Christoph Sieb [email protected], [email protected] Abstract: During the last decade data mining and predictive
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM M. Mayilvaganan 1, S. Aparna 2 1 Associate
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Visualizing e-government Portal and Its Performance in WEBVS
Visualizing e-government Portal and Its Performance in WEBVS Ho Si Meng, Simon Fong Department of Computer and Information Science University of Macau, Macau SAR [email protected] Abstract An e-government
APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical
Business Intelligence in E-Learning
Business Intelligence in E-Learning (Case Study of Iran University of Science and Technology) Mohammad Hassan Falakmasir 1, Jafar Habibi 2, Shahrouz Moaven 1, Hassan Abolhassani 2 Department of Computer
PREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and
Clustering Techniques and STATISTICA Case Study: Defining Clusters of Shopping Center Patrons STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table
IT services for analyses of various data samples
IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical
RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS
ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Response Time Analysis of Web Templates
Response Time Analysis of Web Templates Prerequisites To generate trace files that are required for the detailed performance analysis you need to download and unpack the file IEMon.zip. This file can be
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE Manoj Pandita 1, Pallavi Shinde 2, Dnyanada Shirsat 3, Seema Yadav 4 1 Student, Department of Information Technology, K.J
A Framework for Software Architecture Visualization and Evaluation
A Framework for Software Architecture Visualization and Evaluation Dr. S. Margret Anouncia Merin Cherian Anubhuti Parija Professor, M.S Software Engg M.S Software Engg School of Computing Sciences VITU,
Web Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA
Articles 37 Econ Lit C8 EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Assoc. prof. Snezhana Sulova, PhD Introduction Today increasing numbers of commercial companies are using the electronic
Analysing Large Web Log Files in a Hadoop Distributed Cluster Environment
Analysing Large Files in a Hadoop Distributed Cluster Environment S Saravanan, B Uma Maheswari Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham,
A SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
Journal of Global Research in Computer Science RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM
Volume 2, No. 5, May 2011 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info RESEARCH SUPPORT SYSTEMS AS AN EFFECTIVE WEB BASED INFORMATION SYSTEM Sheilini
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis
Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis K.S.Pandiyan, Dr.S.Sivakumar Research scholar, Professor, Department of Geology, Anna University, Chennai Abstract
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
Mining Association Rules on Grid Platforms
UNIVERSITY OF TUNIS EL MANAR FACULTY OF SCIENCES OF TUNISIA Mining Association Rules on Grid Platforms Raja Tlili [email protected] Yahya Slimani [email protected] CoreGrid 11 Plan Introduction
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
Chapter 5. Regression Testing of Web-Components
Chapter 5 Regression Testing of Web-Components With emergence of services and information over the internet and intranet, Web sites have become complex. Web components and their underlying parts are evolving
Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012 Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms G. Sunil
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
V&V and QA throughout the M&S Life Cycle
Introduction to Modeling and Simulation and throughout the M&S Life Cycle Osman Balci Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg,
Numerical Algorithms Group
Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful
E-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.
University of Fribourg, Switzerland Department of Computer Science Information Systems Research Group Seminar Online CRM, 2005 Prof. Dr. Andreas Meier E-CRM and Web Mining. Objectives, Application Fields
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
A Novel Technique of Privacy Protection. Mining of Association Rules from Outsourced. Transaction Databases
A Novel Technique of Privacy Protection Mining of Association Rules from Outsource Transaction Databases 1 Dhananjay D. Wadkar, 2 Santosh N. Shelke 1 Computer Engineering, Sinhgad Academy of Engineering
Intelligent Log Analyzer. André Restivo <[email protected]>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
A Survey on Product Aspect Ranking
A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,
World-wide online monitoring interface of the ATLAS experiment
World-wide online monitoring interface of the ATLAS experiment S. Kolos, E. Alexandrov, R. Hauser, M. Mineev and A. Salnikov Abstract The ATLAS[1] collaboration accounts for more than 3000 members located
Patent Big Data Analysis by R Data Language for Technology Management
, pp. 69-78 http://dx.doi.org/10.14257/ijseia.2016.10.1.08 Patent Big Data Analysis by R Data Language for Technology Management Sunghae Jun * Department of Statistics, Cheongju University, 360-764, Korea
