Enviar búsqueda
Cargar
50120140504006
•
0 recomendaciones
•
227 vistas
IAEME Publication
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 9
Descargar ahora
Descargar para leer sin conexión
Recomendados
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal
Paper id 37201536
Paper id 37201536
IJRAT
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IJERA Editor
Enabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
eSAT Publishing House
Recomendados
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal
Paper id 37201536
Paper id 37201536
IJRAT
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET Journal
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IJERA Editor
Enabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
eSAT Publishing House
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
ijiert bestjournal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
Editor IJCATR
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
AIRCC Publishing Corporation
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
TELKOMNIKA JOURNAL
An4201262267
An4201262267
IJERA Editor
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
IRJET Journal
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Publishing House
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
Data stream mining techniques: a review
Data stream mining techniques: a review
TELKOMNIKA JOURNAL
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
10120140504006 2-3
10120140504006 2-3
IAEME Publication
30120140504013
30120140504013
IAEME Publication
20320140502004
20320140502004
IAEME Publication
30120140502012
30120140502012
IAEME Publication
Más contenido relacionado
La actualidad más candente
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
ijiert bestjournal
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
Editor IJCATR
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
AIRCC Publishing Corporation
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
TELKOMNIKA JOURNAL
An4201262267
An4201262267
IJERA Editor
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
IRJET Journal
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Publishing House
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
eSAT Journals
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
Data stream mining techniques: a review
Data stream mining techniques: a review
TELKOMNIKA JOURNAL
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
La actualidad más candente
(18)
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
An4201262267
An4201262267
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
Data stream mining techniques: a review
Data stream mining techniques: a review
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Destacado
10120140504006 2-3
10120140504006 2-3
IAEME Publication
30120140504013
30120140504013
IAEME Publication
20320140502004
20320140502004
IAEME Publication
30120140502012
30120140502012
IAEME Publication
30120140505001 2
30120140505001 2
IAEME Publication
30420140502003
30420140502003
IAEME Publication
Implementation of maximal length sequences for
Implementation of maximal length sequences for
IAEME Publication
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
IAEME Publication
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
IAEME Publication
Investigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensated
IAEME Publication
Bases socioculturais 2 história grêmio futebol clube
Bases socioculturais 2 história grêmio futebol clube
Alexsandro Medeiros
O process
O process
Eliana da Silva
George pólya
George pólya
benjaaaaaaaaaaaaaaa
La artesanía
La artesanía
Clarii_2009
Nociones gestion-talento-humano
Nociones gestion-talento-humano
Belen Rojas
El refranero español
El refranero español
Alba Degege
Formulario proyecto tic 2015
Formulario proyecto tic 2015
gisecastilla
Bondia Lleida 19072012
Bondia Lleida 19072012
Bondia Lleida Sl
Jump - Programa de Estágio DOW
Jump - Programa de Estágio DOW
TM Jr. UFBA
Pics of jess_..._blog
Pics of jess_..._blog
stoliros
Destacado
(20)
10120140504006 2-3
10120140504006 2-3
30120140504013
30120140504013
20320140502004
20320140502004
30120140502012
30120140502012
30120140505001 2
30120140505001 2
30420140502003
30420140502003
Implementation of maximal length sequences for
Implementation of maximal length sequences for
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
Investigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensated
Bases socioculturais 2 história grêmio futebol clube
Bases socioculturais 2 história grêmio futebol clube
O process
O process
George pólya
George pólya
La artesanía
La artesanía
Nociones gestion-talento-humano
Nociones gestion-talento-humano
El refranero español
El refranero español
Formulario proyecto tic 2015
Formulario proyecto tic 2015
Bondia Lleida 19072012
Bondia Lleida 19072012
Jump - Programa de Estágio DOW
Jump - Programa de Estágio DOW
Pics of jess_..._blog
Pics of jess_..._blog
Similar a 50120140504006
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
James Heller
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...
IRJET Journal
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
ijcsa
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
IRJET Journal
50120140505007
50120140505007
IAEME Publication
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
paperpublications3
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
IAEME Publication
Web personalization using clustering of web usage data
Web personalization using clustering of web usage data
ijfcstjournal
20120140504021
20120140504021
IAEME Publication
Cloud java titles adrit solutions
Cloud java titles adrit solutions
Adrit Techno Solutions
G017334248
G017334248
IOSR Journals
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structure
iosrjce
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET Journal
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web mining
IAEME Publication
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
ijwscjournal
Search Engine Scrapper
Search Engine Scrapper
IRJET Journal
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
ijdpsjournal
Similar a 50120140504006
(20)
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
50120140505007
50120140505007
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
Web personalization using clustering of web usage data
Web personalization using clustering of web usage data
20120140504021
20120140504021
Cloud java titles adrit solutions
Cloud java titles adrit solutions
G017334248
G017334248
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structure
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web mining
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
Search Engine Scrapper
Search Engine Scrapper
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Último
(20)
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
50120140504006
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 48 AN ENHANCED ALGORITHM FOR CLASSIFICATION OF WEB DATA FOR WEB USAGE MINING USING SUPERVISED NEURAL NETWORK ALGORITHMS Jaykumar Jagani1 , Prof. Kamlesh Patel2 1, 2 (Computer Engineering, R.K. University, Kasturbadham, Near Tramba, Rajkot, Gujarat) ABSTRACT The usage of data on the web is growing with a speed of light; huge amount of data is present on web. To extract useful information from such huge web data efficient data extraction or mining methods are required to achieve a variety of functionalities such a as Web AD market change analysis, web profile analysis, user trend analysis, Session Tracking, Cyber crime Detection etc. The idea behind using the concepts of neural network learning algorithms to classify the large amount of web data for Web Usage Mining are to provide accuracy and speed by the diverse characteristics of neural networks. A number of Neural Network learning algorithms provide better supervised learning. They are proficient to handle massive dynamic data. LVQ (Learning Vector Quantization) algorithms are very useful for supervised learning, dynamic labeling or post-training map labeling and supervised version of SOM through that the one can able to approximate the distribution of class with a lesser amount of codebook vectors and capable to minimize classification errors respectively. HLVQ (Hierarchical Learning Vector Quantization) is the technique that follows a concept of tree hierarchy generation in which more than one level of classification can be performed on the same dataset to check the accuracy of the classification. In this paper, the discussion is to define a new technique that will work on hierarchical as well as multi pass approach where during the classification each hierarchy is generated using Multi pass LVQ (MLVQ) algorithms. As a result of that HLVQ becomes more accurate and as MLVQ is used with many passes it will take lesser time. The basic HLVQ approach will follow the basic LVQ algorithms for hierarchy generation of all phases. In addition to that this new Improved HLVQ provides better accuracy through ornamental advantages of Multi pass LVQs and Optimized LVQ algorithms to classify and handle large volume of data. Keywords: Hierarchical LVQ, Multi pass LVQ, Neural Networks, Classification, Web Log Data and Web Usage Mining. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 49 1. INTRODUCTION Web users are growing day by day so the data on the web is on the rise [6]. If any mega firms or IT companies want to continue to exist in the market, they need to analyze the recent web data and past web data as well as the current trends of new generation users and calculation of upcoming trends of market. All these are possible only through the analysis of web data. Various data mining techniques are applied on large amount web data to extract useful knowledge and useful usage patterns for decision making to their IT sectors or any other mega firms by business Analysts [3]. As there are many web scaling problems such as user trend analysis of surfing, traffic flow analysis, distributed control handling, web traffic management and many more. Session tracking and website reorganization, distributed traffic sharing on distributed servers can be identified and analysis based on web data can be possible through Web Usage Mining. But for that the very important process in any mining technique is classification. Classification is the process of classify the data according to the class labels. But generally web data is not as much good to classify easily, because of many tricky reasons, web data becomes noisy. Web data can be gathered by web log files that are generated by user interactions to the web and stored on the web server. E.g. user interacts with some CGI based website, then the interaction of user is not been added to the log files. And many times some special entries are hidden by some users intentionally. So at later, Classification results will not be accurate. And traditional classification algorithms are not so accurate to classify the web log data, such as Bayes classification. So, the concept of Neural Network learning algorithms is very useful for handling large dynamic data. Neural Network learning algorithms are very accurate for classification. For large amount of rough data, the accurate classification is required and that classification can be possible using concepts of neural network [1] [4] [6] [2]. In this Paper, the discussion is based on a variety of neural network learning algorithms that help to handle huge web data as well as improved classification and clustering of data with less number of errors. Learning Vector Quantization (LVQ) algorithms are very constructive learning algorithms that classify the web data successfully [9]. Learning vector quantization is handy to approximate of allocation of class with fewer number of codebook vectors and capable to minimize classification errors [9]. HLVQ technique is following a concept of hierarchy generation in multi pass in which more than one pass can be performed on the same model using diverse algorithms and is very useful for achieving best chosen results. So in this paper, the discussion is based on a new technique that will work on multi pass as well as on hierarchical approach. So the advantages of both techniques will be achieved in single algorithm and algorithm is improved in classification with more accuracy and takes less time. 2. WEB USAGE MINING Web Usage Mining in a simple term is to extract the usage knowledge about the web users through various data mining techniques from web data is web usage mining [4]. Web Usage Mining is going to prove more useful method in current and next generation’s web exploring people world [6]. So, there is a huge research scope available in this area to develop and implement new ideas that how Usage Mining can be more effective and as a result of that end user is able to get better facilities as developer firms will able to identify user’s interest and will able to deliver the products likewise. 2.1 SOURCES OF DATA FOR WEB USAGE MINING The input data for the various classification algorithms for Web Usage Mining can be found from (1) Web servers (2) Proxy Servers (3) Web Clients [3]. The data is stored on the web in web log files. Each and every user activity is stored in respective server. The data is fetched from that
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 50 server for analysis. The web data available on the server is in a specific format known as extended common log format (ECLF) [5]. ECLF Format I/P Address Rfc 931 Auth User Req. Time Stamp Req. Format Status Bytes Referrer User Agent Important terms Ipaddress- network address of user machine Rfc 931- remote login name of user Status- as success / page not found like errors User agent- software or browser (web client) Authuser – original user name Bytes – size of transferred information [6] Figure-1: Web Usage Mining process As per Figure 1, it is clear that process of web usage mining is much similar to data mining process. The Only difference in data mining and web mining is that at the Starting level in data will come from various data bases, warehouses, and flat files and in web mining data will come from server log files. In this Paper, We are focused on initial phase of web usage mining process where clustering and classification process are done to provide better extraction and stability of data. Pattern Analysis Usage Path Analysis Sequence Matching Association Rules Classification & Clustering Converted Data Integrated Data Filtered Data Clean Log Web Log data Pre-processing Transaction Filtering Data integration Query process FormationUsage functions
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 51 3. APPLYING NEURAL NETWORKS Neural network provides many supervised learning algorithms that can be helpful in mining process, especially to give class labels to uncategorized data i.e. classification. Here is some brief about neural networks and its useful characteristics. The network of highly connected, self-intelligent neurons (Nodes) to do any task with once training is neural network. 3.1 NEURAL NETWORKS AT A GLANCE Artificial neural network (ANN) is a knowledge processing paradigm that inspired from biological nervous system. This technology is more useful because of its unique structure of system. ANN is the arrangement of large number of highly connected processing elements, called neurons in medical science as in brain, working together to solve a particular problem [1]. ANN is configured i.e. initializes with training or testing data to solve a particular problem such as, clustering or classification. Neural networks are highly capable to do the things such as meaning derivation from complex data. It is mostly used in finding usage trends that are sometimes very common but complex and even not carried out by machines. Neural network has many advantages as follows: • Self-adaptive learning How to deal with problems based on initial training or experience from the network. • Self-organization Artificial neural network creates its own organization and behavior and representation of knowledge it accepts while learning. • Real time operations Neural network computation may carry out parallel but for that special hardware are required to design. • Fault tolerance via multiple information copies Partial destroys or failure of network cannot affect the performance of the network [6]. Figure-2: Processing Architecture of Neural Network As figure 2, shows the recurrent network of ANN map nodes with its all three layers. 4. BRIEF ABOUT NEURAL NETWORK SUPERVISED LEARNING ALGORITHMS The list of such algorithm is big, but in this paper, we are discussing on some of the best classifiers among them, described in following sections. Z2Z1 X1 X2 X3 X4 X5 Output layer Hidden Layer Input layer
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 52 4.1 LEARNING VECTOR QUANTIZATION (LVQ) It is a machine learning algorithm and supervised version of SOM Algorithm. Through LVQ the approximation of distribution of class with less number of codebook vectors and is able to minimize classification errors. Codebook vectors are considered as class boundary representations. The algorithm is associated with neural network of class learning algorithms [8]. 4.1.1 ADVANTAGES OF LVQ LVQ is capable to summarize large datasets to smaller number of codebook vectors that are useful for visualization and classification. Training rate is so fast compare to any other network like back propagation. The Generated model updated incrementally. Here some LVQ versions are available. 4.2 VERSIONS OF LVQ They are denoted as LVQ1, LVQ2, LVQ3, OLVQ1, OLVQ3, MLVQ and hierarchical LVQ [11]. 4.3 LVQ ALGORITHM COMPARISON Table 1: All LVQ algorithm comparison with respect to various fields Fields LVQ OLVQ MLVQ HLVQ Version Beginner Optimized Multiple passes Hierarchical Accuracy Less More than LVQ More than OLVQ More than MLVQ Time High Less than LVQ Less than OLVQ Less than MLVQ Efficiency Low Moderate High High Codebooks More Moderate Less Less Capacity Low Moderate High High 4.4 WORKING OF HLVQ Here defined the steps for basics HLVQ. HLVQ is divided into two Stages like P is 1st and Q is 2nd [10]. Table 2: Basic HLVQ Steps 1. Initialize the codebook vectors and the learning rate α for P. 2. Randomly select an input vector I1 3. Find the winner unit closest to I1 by considering Euclidian Distance Cc to I. i.e. Step 3.1 3.1 Modify the weights of the winner unit: If and I belong to the same class, If C and I belong to different classes, 4. Repeat from step 2 until the neural network A is stabilized or until a fixed number of iterations have been carried out. 5. Initialize the codebook vectors for Q. 6. Randomly select an input vector I2. 7. Repeat Step 3 and 3.1 8. Reduce learning Rate of & repeat step 5 until fixed steps.
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 53 5. PROPOSED APPROACH As it is obvious that multi pass and hierarchical LVQs are having advantages such as multi pass LVQ is a hybrid of basic and optimized LVQ so it has advantages of all basic LVQs and it works in the pass, so speed achieved for even more learning data is more and Hierarchical LVQ gives accuracy as it works in detail with domains and sub domains i.e. hierarchy levels also. Now if any technique has the advantages of both multi pass LVQ and Hierarchical LVQ, then it would be very good to classify with it any large data within efficient time. Such method is proposed as Hierarchical Multi pass LVQ. It has advantage of both multi pass and hierarchical technique that is speed and accuracy both. So, classification errors are reduced and process speed is also increased that means the large raw data can be classified in sufficient amount of time with more accuracy. 5.1 STEPS FOR IMPROVED HIERARCHICAL LVQ Here we are proposing the steps for Improved HLVQ: Here is an input vector, C is codebook vector, and is learning rate and N is neural Network. Table 3: Proposed Improved HLVQ algorithm 1. Initialize the codebook vectors C with fixed learning rate α for first stage. 2. Initialize and trigger the neural network with Bipolar Sigmoid function as an activation function as it works in a fixed range of values. So Classification errors can be removed. As it convergence is fast it will train Network rapidly. 3. Give an input vector I and find the closest unit nearby vector C using Euclidian distance between them. 4. Update the weights of closest unit 4.1 If they are in same class then unit weight is added in classification results and result is correct. If they are not in same class then unit weight is subtracted and result is not accurate. 5. Repeat from step 3 until the neural network N is stabilized with fixed number of iterations. 6. Reduce learning rate at end of each level. 7. Repeat the same procedure for Second Stage by considering the best result amongst the current stage and all previous stage. 8. Select most accurate unit and discard all rest. 9. Repeat the procedure until the whole dataset is classified. 5.1.1 WORKING OF IMPROVED LVQ For Improved HLVQ, an LVQ model is constructed using multi pass and each codebook vector is treated as a cluster centroid. All codebook vectors are evaluated and numbers are selected as candidates for sub-models. Sub models are also constructed using multi pass for all candidate codebook vectors and those sub models that do not perform well (in terms of classification accuracy), their parent codebook vector are kept as participant of the model. During test phase a data instance is first mapped to its BMU, if that BMU has a sub-model (that was not pruned during
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 54 training), the sub model is used for classification, if that was pruned during training; the class value in the BMU is used for classification. So In short at each level the model is constructed using multi pass LVQ and codebook vectors are evaluated and given numbers as candidate for sub model. The sub model is also constructed using multi pass LVQ specially OLVQ1. So, at each and every hierarchy level the sub models are constructed using multi pass LVQ if sub model is more inaccurate then it is rejected and parent node is considered as an element in model. By using this approach accuracy maintains at each and every level and construction of sub models are also fast and accurate. 5.1.2 ROLE OF ACTIVATION FUNCTION IN PERFORMANCE OF ANN Activation function plays a great role in triggering the Neural Networks. Activation Functions makes the convergence fast. So that neural networks can be trained accurately and rapidly. There are many activation functions used in supervised learning algorithms, they are nothing but mathematical functions used to initiate the neural network. The activation functions are chosen from their convergence and initialization time. The general comparison of various Activation functions is given below. From Table 4, it is quite clear to use sigmoid or hyperbolic tangent function as a activation function to trigger ANN. Table 4: General comparison of various Activation functions Functions Sigmoid Hyperbolic Tangent Neuronal Logarithmic Sine Exp Hidden Nodes 10 20 9 29 7 23 Training Accuracy 89.3 95.8 94.9 90.7 94 76.7 Testing Accuracy 84 92 94 86 93 63 5.2 COMPARISON OF BOTH HLVQ AND IMPROVED HLVQ Table 5: HLVQ vs Improved HLVQ Basic Approach My approach IMPROVED HLVQ It is basic hierarchical approach with one algorithms for all time i.e. lvq3 Hierarchical approach with different algorithms for all stage classification Parameters: Accuracy, Time Parameters: Accuracy, Time Available Algorithms For Initial Time: LVQ1,LVQ2, LVQ3, OLVQ1,OLVQ3 For Next Rounds (if exists): MLVQ, OLVQ1,OLVQ3 For first stage generation For first stage generation Take Any one Approach Take the Same Approach e.g. OLVQ1 e.g. OLVQ1 For Second stage generation For Second stage generation Took the same Approach Here I changed Approach I took e.g. OLVQ1 MLVQ Continues same for rest of stages Continues same for rest of stages Reduce learning Rate Result is benefit in accuracy and Time
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 55 6. ANALYSIS OF RESULTS Here I have tried some simulation and Implementation of both approaches and made comparative study of the results of both algorithms and based on my approach and I have found the new results comparatively better than old approach with increase in accuracy with less execution time. I have taken sample data and compare both the approaches. Results are as follows gives the clear cut idea of it. Data samples are Breast Cancer (BC), Super Market (SM), Log data (LOG), Segment- Challenge (SC) Classification results are derived based on two parameters as accuracy and Time. Table 6: Simulation HLVQ vs. Improved HLVQ Field Datasets Algorithm Params LOG SM SC BC HLVQ Accuracy 79.95 48.8 86.86 89.51 Time 34ms 64ms 12ms 5ms Vs Improved Accuracy 81,94 58.2 89.51 95.10 HLVQ Time 19ms 63ms 11ms 4ms 7. CONCLUSION At the end, after studying, learning and comparing a lot, to handle the large volume of web data, there would be a distinct need of neural network concept, because only through neural network learning algorithms, such huge volume of web data can be handled and applied to any application for knowledge extraction. All neural network learning algorithms have their own advantages and disadvantages. LVQ is a supervised model of SOM and used for giving class label to data. LVQ is capable to summarize large datasets to smaller number of codebook vectors that are useful for visualization and classification. Training rate is so fast compare to any other network like back propagation. The Generated model updated incrementally. Various versions of LVQ are having one or more disadvantage such as LVQ need to be able to generate useful distance measures for all attributes. They are highly dependent on initialization parameters and training. So by using more than one LVQ approach together will give benefits in recovering from demerits of LVQ. Improved
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 56 HLVQ is one such technique that provides fast and accurate classification with reduced size of codebooks. So, in short, by using Improved HLVQ, the classification of large web data will become easy. The basic HLVQ algorithm works on the same approach in all hierarchy generation that will give the same static classification results. When Improved HLVQ uses more than one approach to classify the data, so the disadvantages of the same method will excluded and only merits of both approaches are enlighten for accurate classification. So, Improved HLVQ will be proved as a great classification technique and will be useful for huge datasets as well. 8. REFERENCES [1] Sonali muddalwar, Shashank Kawan, “Applying artificial neural networks in web usage mining”, international journal of computer science and management research, vol. 1, issue 4, [Nov-12]. [2] Anshuman Sharma, “Web usage mining neural network”, international journal of reviews in computing, vol. 9, [10th april, 2012]. [3] Valishali A. Zilpe, Dr. Mohammad Atique, “Neural network approach for web usage mining”, ETCSIT, published in IJCA [2011]. [4] Jaydeep Srivastava, “Web Mining: Accomplishments and future directions”, http://www.cs.unm.edu/faculty/srivastava.html. [5] John R. Punin, Mukkai S. Krishnamoorthy, Mohammed J. Zaki, “Web usage mining- language and algorithms”, rensseluer polytechnic institute, troy NY 12180. [6] Jaykumar Jagani, Prof. Kamlesh Patel, “An Enhanced Approach for Classification in Web Usage Mining using Neural Network Learning Algorithms for Supervised Learning”, IJCA (0975-8887), Volume-90, No-17, March 2014. [7] Jaykumar Jagani, Prof. Kamlesh Patel, “A survey of web usage mining with neural network and proposed solutions on several issues”, ISSN: 0975–6760, Nov 12 To Oct 13, Volume – 02, Issue [02]. [8] Renata M. C. R. de Souza, Telmo de M. Silva Filho,” Optimized Learning Vector Quantization Classifier with an Adaptive Euclidean Distance”, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, volume 5768. [9] Diamantini, Claudia , Spalvieri, A. “Certain facts about Kohonen's LVQ1 algorithm”, Circuits and Systems, 1994. ISCAS '94., 1994 IEEE International Symposium on, Volume:6. [10] Sang-Woon Kimy and B. J. Oommenz, “Enhancing Prototype Reduction Schemes with LVQ3-Type Algorithms”, Natural Sciences and Engineering Research Council of Canada, and Myongji University, Korea, kimsw@mju.ac.kr, oommen@scs.carleton.ca. [11] R. R. Janghel, Ritu Tiwari, Anupam Shukla, “Breast Cancer Diagnostic System using Hierarchical Learning Vector Quantization”, IJCA Proceedings on National Seminar on Application of Artificial Intelligence in Life Sciences 2013. [12] Mahesh kumar, Uday Kumar,” Classification of Parkinson’s disease using Lvq, Logistic Model Tree, K-star for Audioset”, Hogskolan Darlana University, 2011, roda wagen 3s-781 88. [13] Suitable MLP Network Activation Functions for Breast Cancer and Thyroid Disease Detection, Second International Conference on Computational Intelligence, Modeling and Simulation, 2010, IEEE, http://eprints.usm.my/20282/1/4262a039.pdf. [14] Ravita Mishra, “Web Usage Mining Contextual Factor: Human Information Behavior”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 1, 2014, pp. 12 - 29, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.
Descargar ahora