Web Miner: A Tool for Discovery of Usage Patterns From Web Data
Journal Title: International Journal on Computer Science and Engineering - Year 2013, Vol 5, Issue 5
Abstract
As there is a huge amount of data available online, the World Wide Web is a fertile area for data mining research. In recent years a various surveys have been performed on static data of web sites to perform web usage mining. This paper deals with the Web usage mining of a website which is hosted on IIS web server. Web usage mining is the area of data mining which deals with the discovery and analysis of usage patterns from Web data, specifically web logs, in order to perform improvements in web based applications. Web usage mining consists of three phases, pre-processing, pattern discovery, and pattern analysis. After the completion of these three phases the user can find the required usage patterns and use this information for the specific needs. The research is being performed on a log file using Log Parser.
Authors and Affiliations
Roop Ranjan , Sameena Naaz , Neeraj Kaushik
Enhancing the Communication Channel Through Secure Shell And Irrational DES
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry...
High payload using mixed codebooks of Vector Quantization
Abstract—Data hiding involves conveying secret messages under the cover digital media such as images. It is the science of concealed communication. The term hiding can refer to keeping the very existence of the embedded...
A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum
This work proposes a DWT based Steganographic technique. Cover image is decomposed into four sub bands using DWT. Two Encoded secret images are embedded within the HL and HH sub bands respectively. During embedding secre...
A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping
The combination of chaotic theory and cryptography forms an important field of information security. In the past decade, chaos based image encryption is given much attention in the research of information security and a...
Study on Identification of Harmonic Contributions Between Utility and Customer
Harmonic contributions can be decreased in Power System transmission and Distribution by planning the voltage harmonic levels in the acceptable limits so that Harmonic pollution can be limited to some extent. In this res...