SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 6, November - December (2013), pp. 156-160
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

EFFECTIVE WEB MINING TECHNIQUE FOR RETRIEVAL
INFORMATION ON THE WORLD WIDE WEB
Miss Purvi Dubey
Information Technology, Medicapas Institute of Science and Technology, RGPV
Indore (M.P.), India
Asst. Prof. Sourabh Dave
Information Technology, Medicapas Institute of Science and Technology, RGPV
Indore (M.P.), India

ABSTRACT
In today’s age the major problem is related to the predicting user’s web page request. In the
past few years the markov model is used for this problem. The effective web mining techniques like
Clustering, Association rule mining and markov model having many drawbacks. We are proposing
an approach for overcome that drawbacks which help us to improving search engine and helping user
to find interesting web pages.
Keywords – Association rule mining, Clustering, Hybrid model, Markov model, Page Rank
algorithm.
1. INTRODUCTION
Web is a complicated system of interconnected elements, the method of gaining coal or other
minerals from a mine is called mining, so the web mining is an application of data mining techniques
to explore pattern from the web [1].
1.1 Classification Of web Mining –web mining can be classified in to the three subheadings
1.1.1 Web content mining: - Web content mining is the process of extracting information from
content of document, so it is called web content mining.

156
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

1.1.2 Web structure mining: - Web structure mining is the process of getting a conclusion from
reference book in the web.
1.1.3 Web Usage mining: - web usage mining is the process of extracting patterns in web access log
and it is also called web log mining [2].
2. WEB MINING TECHNIQUES
Web mining techniques having the following points:2.1 PageRank
Pagerank works by counting the number and quality of links to a page for determine a rough
estimate how important a web site is. Pagerank is defining as follows: We assume page a has pages
T1..., Tn, which point to it (i.e., are citations). The parameter d is damping factor which can be set
between o and 1 and is usually set 0.85. Out_deg (A) denotes the number of links going out of page
A (out-degree of A).
Definition 2.1.1 PageRank: - The page rank of a page A is given as follows:
௉ோሺ்௜ሻ

ܴܲ ሺ‫ܣ‬ሻ ൌ ሺ1 െ ݀ሻ ൅ ݀ ቂ∑௡ ௉ோሺ்௜ሻቃ (1)
௜ୀଵ
Page rank of PR(A) cab be calculated using a simple iterative algorithm, and corresponds to
the principal eigenvector of the normalized link matrix of the web. Let n be the number of documents
we have. We define the link matrix M, where the Mij entry is 1/nj if there is a link form document j to
document i, otherwise Mij is o. nj is the number of the forwarded link of document. Then we can
compute the PageRank on the graph which is the dominant eigenvector of the matrix A [5].
2.2 Clustering
The clustering is a effective process in which search result combine it to a interesting page
groups according to the typed query and allows user to navigate into a document quickly.
2.3 Markov Model
A traditional markov model describing a sequence of possible event in which the probability
of each event depends only on the state attained in the previous event.
2.4 Association rule mining
In data mining association rule mining is a popular and well researched method for
discovering interesting relations between variables in large database. It is related to identify strong
rules discovered in database using measure of interestingness.
3. PROBLEM FORMULATION T
The web mining techniques having the following problems.
3.1 PageRank
The PageRank work well when the search results are good, user can easily go to the
interested page , from top ranked result which is found by the PageRank. The problem arises when
the search results are several types. To overcome this problem clustering is used. To overcome this
problem clustering is used.
157
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

3.2 Clustering
As we discussed earlier clustering is defined as the process in which search results combine
into a interesting page group according to the typed query and allows user to enter a document
quickly.
The general idea of clustering is to partition the search results into clusters and the search
result is a set of top-rank research result is called clustering, the clustering also having some
drawbacks that are:(i)

(ii)

The organizing way of clustering is not always deliver a correct information as
expected by user, for example if a user want to find the “phone number”or” mobile
number”when entering the query “contact number” , but the cluster discovered by the
current method may partition the results into “flat number ” and “street number” such
cluster would not be very useful for users.
Sometime, the cluster captions are not describable so it misleads the user to find
search results.

To overcome from this problems many strategies are used in which the problem solved in the
part. And the method fails if we want the results of single query in the query clusters. Other methods
analyzed the different clicked url of a query in user click through logs directly. The number of
different clicked is not related to the type of query which user wants.
3.3 Markov model
One limitation of applying the markov model techniques to the web personalization and
prediction is the difficulty of data interpretation and visualization. The main problem that faces the
markov model users is the identification of an optimal number of markov model orders.
3.4 Limitations of association rule mining
The main problem with association rule mining is the frequent item problem where the items
that occur together with a high frequency will also appear together in many of the resulting rules, and
thus, resulting in inconsistent predictions.
4. PROPOSED ALGORITHM
As we discussed in problem formulation part the PageRank and clustering having some
drawbacks, our main aim is improving the search engine delivery results, so we are proposing the
following approach
(i)
(ii)
(iii)
(iv)
(v)
(vi)
(vii)
(viii)
(ix)
(x)

Pick access log information from the web server.
From the log information retrieve only IP address and URL form web server and prevent
noise and filtrate the inconsequential expansion.
Keep each transaction in individual cluster and create click stream transaction.
Now, explore similarity between transactions.
Recognize first K neighbors having similarity more than threshold, for each transaction
and remove other neighbors.
Group the pairs with highest similarity.
Update equality for objects in the neighborhood of combined pair.
Detect new set of K neighbors from 2K neighbor of combined pair.
Update the neighbor in the previous list of combined pairs.
Reduplication of step (vi) to (vii) until no more combination is possible.
158
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

(xi)
(xii)
(xiii)
(xiv)
(xv)
(xvi)

Detect the clusters, the one having access sequence equal to test sessions.
Begin with highest possible value of K.
Apply the markov-model and explore K-th order states for the session from its cluster.
If the support is so much less, estimate next lower order states for the test session from its
cluster.
Again apply step (xiv) until states are generated with enough support.
Show the page with highest probability as the recommended page.

5. RESULTS
In this section we will present the experimental results to check the performance of proposing
algorithm. Fig 1 describes better web page prediction accuracy by applying proposed algorithm as
compare to applying the traditional markov model.
The accuracy of prediction is given by:
Acc=Te ∩ Tr / Te (2)
Where, Te is the number of test case and Tr is the number of training cases.
Figure shows that the accuracy of proposed algorithm is much higher than the traditional
markov model.
100
90
80
70
60
50
40
30
20
10
0
Traditional Markov Model

Proposed Algorithm

Figure: - Accuracy of proposed algorithm compare to traditional markov model

We have applied proposed model on 60 test sessions and we found 51 session having
accurate predictions while the traditional model gave only 42 sessions accurate prediction out of 60
test sessions, the proposed model having 85% accuracy while the traditional model have 70%
accuracy.
159
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME

6. CONCLUSION
The proposed algorithm will help users to find interesting web pages. It also enhances the
search result delivery. The limitations of the proposed approach algorithm it is based on estimate so
the result is not always exact. The result shown in the figure shows the accuracy of proposed
algorithm as compare to traditional markov model. The Proposed approach can be used to enhance
the search engine results and main advantage of this algorithm it is used to promote e-commerce,
online marketing, purchasing of goods and services.
REFERENCES
[1]

Cooley, B. mobasher, and J. Shrivastava, Web mining: Information and pattern discovery on
www, IEEE, 1997, 1082-3409.
[2] Pooja Sharma, Asst.prof Rupali bhartiya, An efficient Algorithm for improved web usage
mining, ISSN, 3(2), 766-79.
[3] Miss shital c.patil , prof. R.R keole, Web usage mining and web content mining- A combine
approach for enhancing search engine delivery, ISSN, 3(10),2013,800-803.
[4] Poonam kaushal, Hybrid model for better prediction of web page, International journal of
scientific and research publication,2(8),2012,1-4.
[5] Arun K Pujari, Data mining techniques (Hyderabad (a.p.) India universities press (India)
Private limited, 2010)
[6] Poonam Kaushal, Prediction of user’s next web page request by hybrid technique,
International Journal of engineering technology and advanced engineering, 2(3),2012,
339-342.
[7] Suresh Subramanian and Dr. Sivaprakasam, “Genetic Algorithm with a Ranking Based
Objective Function and Inverse Index Representation for Web Data Mining”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2013,
pp. 84 - 90, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[8] M. Karthikeyan, M. Suriya Kumar and Dr. S. Karthikeyan, “A Literature Review on the Data
Mining and Information Security”, International Journal of Computer Engineering &
Technology (IJCET), Volume 3, Issue 1, 2012, pp. 141 - 146, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[9] Alamelu Mangai J, Santhosh Kumar V and Sugumaran V, “Recent Research in Web Page
Classification – A Review”, International Journal of Computer Engineering & Technology
(IJCET), Volume 1, Issue 1, 2010, pp. 112 - 122, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[10] Prakasha S, Shashidhar Hr and Dr. G T Raju, “A Survey on Various Architectures, Models
and Methodologies for Information Retrieval”, International Journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 182 - 194, ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375.
[11] R. Lakshman Naik, D. Ramesh and B. Manjula, “Instances Selection Using Advance Data
Mining Techniques”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 2, 2012, pp. 47 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[12] Prof. Sindhu P Menon and Dr. Nagaratna P Hegde, “Research on Classification Algorithms
and its Impact on Web Mining”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 4, 2013, pp. 495 - 504, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

160

More Related Content

What's hot

Results of Fitted Neural Network Models on Malaysian Aggregate Dataset
Results of Fitted Neural Network Models on Malaysian Aggregate DatasetResults of Fitted Neural Network Models on Malaysian Aggregate Dataset
Results of Fitted Neural Network Models on Malaysian Aggregate DatasetjournalBEEI
 
Sub-Graph Finding Information over Nebula Networks
Sub-Graph Finding Information over Nebula NetworksSub-Graph Finding Information over Nebula Networks
Sub-Graph Finding Information over Nebula Networksijceronline
 
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...IJDKP
 
IRJET- Python Based Machine Learning for Profile Matching
IRJET- 	  Python Based Machine Learning for Profile MatchingIRJET- 	  Python Based Machine Learning for Profile Matching
IRJET- Python Based Machine Learning for Profile MatchingIRJET Journal
 
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations lokesh shanmuganandam
 
Using Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebUsing Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebIJwest
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET Journal
 
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET Journal
 
Enhancing Keyword Query Results Over Database for Improving User Satisfaction
Enhancing Keyword Query Results Over Database for Improving User Satisfaction Enhancing Keyword Query Results Over Database for Improving User Satisfaction
Enhancing Keyword Query Results Over Database for Improving User Satisfaction ijmpict
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17redpel dot com
 
report
reportreport
reportbutest
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesEswar Publications
 
Distributed Link Prediction in Large Scale Graphs using Apache Spark
Distributed Link Prediction in Large Scale Graphs using Apache SparkDistributed Link Prediction in Large Scale Graphs using Apache Spark
Distributed Link Prediction in Large Scale Graphs using Apache SparkAnastasios Theodosiou
 
A real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingA real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingjournalBEEI
 
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...rahulmonikasharma
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkarsamarai_apoc
 

What's hot (19)

G1803054653
G1803054653G1803054653
G1803054653
 
Results of Fitted Neural Network Models on Malaysian Aggregate Dataset
Results of Fitted Neural Network Models on Malaysian Aggregate DatasetResults of Fitted Neural Network Models on Malaysian Aggregate Dataset
Results of Fitted Neural Network Models on Malaysian Aggregate Dataset
 
Sub-Graph Finding Information over Nebula Networks
Sub-Graph Finding Information over Nebula NetworksSub-Graph Finding Information over Nebula Networks
Sub-Graph Finding Information over Nebula Networks
 
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...
AN EFFECTIVE RANKING METHOD OF WEBPAGE THROUGH TFIDF AND HYPERLINK CLASSIFIED...
 
IRJET- Python Based Machine Learning for Profile Matching
IRJET- 	  Python Based Machine Learning for Profile MatchingIRJET- 	  Python Based Machine Learning for Profile Matching
IRJET- Python Based Machine Learning for Profile Matching
 
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations
UsingSocialNetworkingTheoryToUnderstandPowerinOrganizations
 
Using Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic WebUsing Page Size for Controlling Duplicate Query Results in Semantic Web
Using Page Size for Controlling Duplicate Query Results in Semantic Web
 
IRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine LearningIRJET- Noisy Content Detection on Web Data using Machine Learning
IRJET- Noisy Content Detection on Web Data using Machine Learning
 
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...IRJET -  	  Conversion of Unsupervised Data to Supervised Data using Topic Mo...
IRJET - Conversion of Unsupervised Data to Supervised Data using Topic Mo...
 
Enhancing Keyword Query Results Over Database for Improving User Satisfaction
Enhancing Keyword Query Results Over Database for Improving User Satisfaction Enhancing Keyword Query Results Over Database for Improving User Satisfaction
Enhancing Keyword Query Results Over Database for Improving User Satisfaction
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
report
reportreport
report
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Spe165 t
Spe165 tSpe165 t
Spe165 t
 
String Identifier in Multiple Medical Databases
String Identifier in Multiple Medical DatabasesString Identifier in Multiple Medical Databases
String Identifier in Multiple Medical Databases
 
Distributed Link Prediction in Large Scale Graphs using Apache Spark
Distributed Link Prediction in Large Scale Graphs using Apache SparkDistributed Link Prediction in Large Scale Graphs using Apache Spark
Distributed Link Prediction in Large Scale Graphs using Apache Spark
 
A real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streamingA real-time big data sentiment analysis for iraqi tweets using spark streaming
A real-time big data sentiment analysis for iraqi tweets using spark streaming
 
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...
Detection and Privacy Preservation of Sensitive Attributes Using Hybrid Appro...
 
Mtp ppt soumya_sarkar
Mtp ppt soumya_sarkarMtp ppt soumya_sarkar
Mtp ppt soumya_sarkar
 

Viewers also liked

Viewers also liked (10)

40220140501008 2
40220140501008 240220140501008 2
40220140501008 2
 
10220140501001 (1)
10220140501001 (1)10220140501001 (1)
10220140501001 (1)
 
20320130405009
2032013040500920320130405009
20320130405009
 
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement ofFeature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
 
50120140501016
5012014050101650120140501016
50120140501016
 
50120140501014
5012014050101450120140501014
50120140501014
 
50120140502004
5012014050200450120140502004
50120140502004
 
10120140504014 2
10120140504014 210120140504014 2
10120140504014 2
 
El razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicialEl razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicial
 
10120130406014 2-3
10120130406014 2-310120130406014 2-3
10120130406014 2-3
 

Similar to 50120130406017

Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningIRJET Journal
 
A Novel Framework on Web Usage Mining
A Novel Framework on Web Usage MiningA Novel Framework on Web Usage Mining
A Novel Framework on Web Usage MiningIRJET Journal
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET Journal
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseLeMeniz Infotech
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningIAEME Publication
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningEditor IJCATR
 
Data mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationData mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationijcsit
 
A Novel Data Extraction and Alignment Method for Web Databases
A Novel Data Extraction and Alignment Method for Web DatabasesA Novel Data Extraction and Alignment Method for Web Databases
A Novel Data Extraction and Alignment Method for Web DatabasesIJMER
 
Vision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsVision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsIJMER
 
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET Journal
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement PortalIRJET Journal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...cscpconf
 
Development of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingDevelopment of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingIAEME Publication
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing WebsitesIRJET Journal
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...James Heller
 

Similar to 50120130406017 (20)

Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
Deepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine LearningDeepcoder to Self-Code with Machine Learning
Deepcoder to Self-Code with Machine Learning
 
Ak4301197200
Ak4301197200Ak4301197200
Ak4301197200
 
A Novel Framework on Web Usage Mining
A Novel Framework on Web Usage MiningA Novel Framework on Web Usage Mining
A Novel Framework on Web Usage Mining
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database Techniques
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web mining
 
Semantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data MiningSemantically Enriched Knowledge Extraction With Data Mining
Semantically Enriched Knowledge Extraction With Data Mining
 
Data mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationData mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configuration
 
A Novel Data Extraction and Alignment Method for Web Databases
A Novel Data Extraction and Alignment Method for Web DatabasesA Novel Data Extraction and Alignment Method for Web Databases
A Novel Data Extraction and Alignment Method for Web Databases
 
Vision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result RecordsVision Based Deep Web data Extraction on Nested Query Result Records
Vision Based Deep Web data Extraction on Nested Query Result Records
 
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming DataIRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
IRJET- E-MORES: Efficient Multiple Output Regression for Streaming Data
 
50120140504006
5012014050400650120140504006
50120140504006
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement Portal
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
 
Development of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework usingDevelopment of pattern knowledge discovery framework using
Development of pattern knowledge discovery framework using
 
Detection of Phishing Websites
Detection of Phishing WebsitesDetection of Phishing Websites
Detection of Phishing Websites
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

50120130406017

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 156-160 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME EFFECTIVE WEB MINING TECHNIQUE FOR RETRIEVAL INFORMATION ON THE WORLD WIDE WEB Miss Purvi Dubey Information Technology, Medicapas Institute of Science and Technology, RGPV Indore (M.P.), India Asst. Prof. Sourabh Dave Information Technology, Medicapas Institute of Science and Technology, RGPV Indore (M.P.), India ABSTRACT In today’s age the major problem is related to the predicting user’s web page request. In the past few years the markov model is used for this problem. The effective web mining techniques like Clustering, Association rule mining and markov model having many drawbacks. We are proposing an approach for overcome that drawbacks which help us to improving search engine and helping user to find interesting web pages. Keywords – Association rule mining, Clustering, Hybrid model, Markov model, Page Rank algorithm. 1. INTRODUCTION Web is a complicated system of interconnected elements, the method of gaining coal or other minerals from a mine is called mining, so the web mining is an application of data mining techniques to explore pattern from the web [1]. 1.1 Classification Of web Mining –web mining can be classified in to the three subheadings 1.1.1 Web content mining: - Web content mining is the process of extracting information from content of document, so it is called web content mining. 156
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 1.1.2 Web structure mining: - Web structure mining is the process of getting a conclusion from reference book in the web. 1.1.3 Web Usage mining: - web usage mining is the process of extracting patterns in web access log and it is also called web log mining [2]. 2. WEB MINING TECHNIQUES Web mining techniques having the following points:2.1 PageRank Pagerank works by counting the number and quality of links to a page for determine a rough estimate how important a web site is. Pagerank is defining as follows: We assume page a has pages T1..., Tn, which point to it (i.e., are citations). The parameter d is damping factor which can be set between o and 1 and is usually set 0.85. Out_deg (A) denotes the number of links going out of page A (out-degree of A). Definition 2.1.1 PageRank: - The page rank of a page A is given as follows: ௉ோሺ்௜ሻ ܴܲ ሺ‫ܣ‬ሻ ൌ ሺ1 െ ݀ሻ ൅ ݀ ቂ∑௡ ௉ோሺ்௜ሻቃ (1) ௜ୀଵ Page rank of PR(A) cab be calculated using a simple iterative algorithm, and corresponds to the principal eigenvector of the normalized link matrix of the web. Let n be the number of documents we have. We define the link matrix M, where the Mij entry is 1/nj if there is a link form document j to document i, otherwise Mij is o. nj is the number of the forwarded link of document. Then we can compute the PageRank on the graph which is the dominant eigenvector of the matrix A [5]. 2.2 Clustering The clustering is a effective process in which search result combine it to a interesting page groups according to the typed query and allows user to navigate into a document quickly. 2.3 Markov Model A traditional markov model describing a sequence of possible event in which the probability of each event depends only on the state attained in the previous event. 2.4 Association rule mining In data mining association rule mining is a popular and well researched method for discovering interesting relations between variables in large database. It is related to identify strong rules discovered in database using measure of interestingness. 3. PROBLEM FORMULATION T The web mining techniques having the following problems. 3.1 PageRank The PageRank work well when the search results are good, user can easily go to the interested page , from top ranked result which is found by the PageRank. The problem arises when the search results are several types. To overcome this problem clustering is used. To overcome this problem clustering is used. 157
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 3.2 Clustering As we discussed earlier clustering is defined as the process in which search results combine into a interesting page group according to the typed query and allows user to enter a document quickly. The general idea of clustering is to partition the search results into clusters and the search result is a set of top-rank research result is called clustering, the clustering also having some drawbacks that are:(i) (ii) The organizing way of clustering is not always deliver a correct information as expected by user, for example if a user want to find the “phone number”or” mobile number”when entering the query “contact number” , but the cluster discovered by the current method may partition the results into “flat number ” and “street number” such cluster would not be very useful for users. Sometime, the cluster captions are not describable so it misleads the user to find search results. To overcome from this problems many strategies are used in which the problem solved in the part. And the method fails if we want the results of single query in the query clusters. Other methods analyzed the different clicked url of a query in user click through logs directly. The number of different clicked is not related to the type of query which user wants. 3.3 Markov model One limitation of applying the markov model techniques to the web personalization and prediction is the difficulty of data interpretation and visualization. The main problem that faces the markov model users is the identification of an optimal number of markov model orders. 3.4 Limitations of association rule mining The main problem with association rule mining is the frequent item problem where the items that occur together with a high frequency will also appear together in many of the resulting rules, and thus, resulting in inconsistent predictions. 4. PROPOSED ALGORITHM As we discussed in problem formulation part the PageRank and clustering having some drawbacks, our main aim is improving the search engine delivery results, so we are proposing the following approach (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) Pick access log information from the web server. From the log information retrieve only IP address and URL form web server and prevent noise and filtrate the inconsequential expansion. Keep each transaction in individual cluster and create click stream transaction. Now, explore similarity between transactions. Recognize first K neighbors having similarity more than threshold, for each transaction and remove other neighbors. Group the pairs with highest similarity. Update equality for objects in the neighborhood of combined pair. Detect new set of K neighbors from 2K neighbor of combined pair. Update the neighbor in the previous list of combined pairs. Reduplication of step (vi) to (vii) until no more combination is possible. 158
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME (xi) (xii) (xiii) (xiv) (xv) (xvi) Detect the clusters, the one having access sequence equal to test sessions. Begin with highest possible value of K. Apply the markov-model and explore K-th order states for the session from its cluster. If the support is so much less, estimate next lower order states for the test session from its cluster. Again apply step (xiv) until states are generated with enough support. Show the page with highest probability as the recommended page. 5. RESULTS In this section we will present the experimental results to check the performance of proposing algorithm. Fig 1 describes better web page prediction accuracy by applying proposed algorithm as compare to applying the traditional markov model. The accuracy of prediction is given by: Acc=Te ∩ Tr / Te (2) Where, Te is the number of test case and Tr is the number of training cases. Figure shows that the accuracy of proposed algorithm is much higher than the traditional markov model. 100 90 80 70 60 50 40 30 20 10 0 Traditional Markov Model Proposed Algorithm Figure: - Accuracy of proposed algorithm compare to traditional markov model We have applied proposed model on 60 test sessions and we found 51 session having accurate predictions while the traditional model gave only 42 sessions accurate prediction out of 60 test sessions, the proposed model having 85% accuracy while the traditional model have 70% accuracy. 159
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 6. CONCLUSION The proposed algorithm will help users to find interesting web pages. It also enhances the search result delivery. The limitations of the proposed approach algorithm it is based on estimate so the result is not always exact. The result shown in the figure shows the accuracy of proposed algorithm as compare to traditional markov model. The Proposed approach can be used to enhance the search engine results and main advantage of this algorithm it is used to promote e-commerce, online marketing, purchasing of goods and services. REFERENCES [1] Cooley, B. mobasher, and J. Shrivastava, Web mining: Information and pattern discovery on www, IEEE, 1997, 1082-3409. [2] Pooja Sharma, Asst.prof Rupali bhartiya, An efficient Algorithm for improved web usage mining, ISSN, 3(2), 766-79. [3] Miss shital c.patil , prof. R.R keole, Web usage mining and web content mining- A combine approach for enhancing search engine delivery, ISSN, 3(10),2013,800-803. [4] Poonam kaushal, Hybrid model for better prediction of web page, International journal of scientific and research publication,2(8),2012,1-4. [5] Arun K Pujari, Data mining techniques (Hyderabad (a.p.) India universities press (India) Private limited, 2010) [6] Poonam Kaushal, Prediction of user’s next web page request by hybrid technique, International Journal of engineering technology and advanced engineering, 2(3),2012, 339-342. [7] Suresh Subramanian and Dr. Sivaprakasam, “Genetic Algorithm with a Ranking Based Objective Function and Inverse Index Representation for Web Data Mining”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 5, 2013, pp. 84 - 90, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [8] M. Karthikeyan, M. Suriya Kumar and Dr. S. Karthikeyan, “A Literature Review on the Data Mining and Information Security”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 141 - 146, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [9] Alamelu Mangai J, Santhosh Kumar V and Sugumaran V, “Recent Research in Web Page Classification – A Review”, International Journal of Computer Engineering & Technology (IJCET), Volume 1, Issue 1, 2010, pp. 112 - 122, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [10] Prakasha S, Shashidhar Hr and Dr. G T Raju, “A Survey on Various Architectures, Models and Methodologies for Information Retrieval”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 182 - 194, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [11] R. Lakshman Naik, D. Ramesh and B. Manjula, “Instances Selection Using Advance Data Mining Techniques”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 47 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Prof. Sindhu P Menon and Dr. Nagaratna P Hegde, “Research on Classification Algorithms and its Impact on Web Mining”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 495 - 504, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 160