AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 5
Abstract
Nowadays, WWW (World Wide Web) becomes more popular and user friendly for transferring information. Therefore people are more interested in analyzing log files which can offer more useful insight into web site usage. Web usage mining is one of the data mining fields, which deals with the discovery and extract useful information from web logs. There are three phases in web usage mining, preprocessing, Pattern Discovery and Pattern Analysis. This paper describes the importance of preprocessing methods and steps involved in retrieving the required information effectively.
Authors and Affiliations
S. Prince Mary , E. Baburaj
Data link system via Financial Information Exchange protocol using Simple Binary Encoding
The main goal of this project is to make transactions faster between stock exchange and traders. Financial Information Exchange (FIX) is a dominant standard for data link between the participants of exchange trades in re...
A STUDY ON DIFFERENT FEATURE EXTRACTION TECHNIQUES FOR LESION IDENTIFICATION IN MRI BREAST IMAGES
This study discusses the different feature extraction techniques for lesion identification in Dynamic Contrast Enhancement - Magnetic Resonance Imaging (DCE - MRI) of Breast. In DCE- MRI, kinetic feature extraction is a...
Comparative study on classification power of the attributes and reducts
In rough set theory, reduct are those attributes which are important and are able to represent the whole range of attributes. They show up the important features of database. In the present study of educational data mini...
An Analytical Study of Different Image Inpainting Techniques
Inpainting is the technique of filling in holes in an image to preserve its overall continuity. Applications of this technique include the restoration of old photographs and damaged film; removal of superimposed text lik...
VARIABLE RATE STEGANOGRAPH Y IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedd...