SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




  An Advanced Optimal Web Intelligent Model for
  Mining Web User Usage Behavior using Genetic
                  Algorithm
                   Prof. V.V.R. Maheswara Rao1, Dr. V. Valli Kumari2 and Dr. K.V.S.V.N Raju2,
                              1
                               Shri Vishnu Engineering College for Women, Bhimavaram, India,
                                                Email: mahesh_vvr@yahoo.com
                             2
                               College of Engineering, Andhra University, Visakhapatnam, India,
                                    Email: vallikumari@gmail.com, kvsvn.raju@gmail.com


Abstract—With the continued growth and proliferation of                a way that it automatically discovers the usage behavior of
Web services and Web based information systems, the                    web user.
volumes of user data have reached astronomical proportions.               The overall web usage mining process can be divided
Analyzing such data using Web Usage Mining can help to                 into Four interdependent stages as shown in Fig 1 : Data
determine the visiting interests or needs of the web user. This
type of analysis involves the automatic discovery of
                                                                       collection, Pre Processing, Pattern Discovery and Pattern
meaningful patterns, which represents fine grained                     Analysis.
navigational behavior of visitors from a large collection of
semi structured web log data. Due to the non linear and
complex nature of weblog all the existing conventional
mining techniques are failed in the process of pattern
discovery, result in only local optimal solutions. In order to
get the global optimal solutions, Web intelligent models are
required such as Genetic algorithms.                                                     Fig.1.Web mining subtasks.
The present paper introduces the Advanced Optimal Web                     Due to the dynamic and complex nature of web log
Intelligent Model with granular computing nature of Genetic            data, the existing systems find difficulty in handling the
Algorithms, IOG. The IOG model is designed on the
semantic enhanced content data, which works more
                                                                       newly emerged problems during all the phases of web
efficiently than that on normal data. The unique parameters            usage mining in particular, the pattern discovery. To
of the IOG fitness function generates balanced weights, to             proceed towards web intelligence, reducing the need of
represent the significance of characteristics, which yields the        human intervention, it is necessary to incorporate and
dissimilar characteristics of page vector. The evaluation              embed artificial intelligence into web mining tools. To
function of IOG improves the page quality and reduces the              achieve the intelligence soft computing methodologies
execution time to a specified number of iterations as it               seem to be a good candidate.
considers practical measures like page, link and mean                     Genetic algorithms are examples of evolutionary
qualities. The genetic operators are intended in drawing the           computing methods and are optimization type algorithms
stickiness among the characteristics of a page vector. By
integrating all the above the web intelligent model IOG,
                                                                       for both supervised and unsupervised techniques. A
proceed towards intelligence and significantly improves the            Genetic Algorithm is an elegantly simple, yet extremely
investigation of web user usage behavior.                              powerful way for prediction and description of complex
                                                                       objective functions like Fitness and Evaluate in dynamic
Index Terms—Web Usage Mining, Genetic Algorithm,                       environment. Moreover, GA employs a set of operators
Pattern Discovery
                                                                       that mimic the concept of survival of Fittest by
                                                                       regenerating recombination of the algorithm in response to
                    I. INTRODUCTION                                    a calculated difference between desired solution states.
   Over the last decade, with the continued increase in the               The goal of present paper is to deploy Intelligent
usage of the WWW, web mining has been established as                   Optimal Genetic Algorithm IOG, in order to find the
an important area of research. Whenever, the web users                 optimized solutions for investigating the web user usage
visit the WWW, they leave abundant information in web                  behavior. The important task in any intelligent mining
log, which is structurally complex, heterogeneous, high                application is the preparation of a suitable target data set
dimensional and incremental in nature. Analyzing such                  for which mining and statistical algorithms can be applied.
data can help to determine the browsing interest of web                For IOG, the present research frame work, Firstly,
user. To do this, web usage mining focuses on                          concentrating on modelling the web log data due to its
investigating the potential knowledge from browsing                    complex nature. The main thrust of the data modelling is
patterns of the users and to find the correlation between              to generate the semantic enhanced content data. The
the pages on analysis. The main goal of web usage mining               integration of semantic content with IOG can potentially
is to Capture, Model and Analyze the web log data in such

                                                                  44
© 2010 ACEEE
DOI: 01.IJNS.01.03.220
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



provide a better understanding of the underlying                     growing in nature, it is necessary for web miners to utilize
relationships among the pages.                                       soft computing tools like Genetic Algorithms in order to
   The IOG Fitness function is designed in such a way                get global optimal information intelligently. GA employs a
that, it generates dissimilar page vectors, each vector have         set of operators that mimic the concept of survival of
similar characteristics. In addition, the IOG Evaluation             Fittest by regenerating recombination of the algorithm in
function is planned to identify the quality of optimized             response to a calculated difference between desired
population averaged mean for page vectors by considering             solution states over a period of time.
both link and page quality of each vector. The IOG frame                To investigate the usage behavior of the web user, one
work collectively uses Fitness, Operators and Evaluation             has to extract the potential patterns through the sessions,
functions, helps to investigate the web user usage behavior          generated by the pre processing stage of web log. Directly
significantly.                                                       the data can’t be given as an input to the genetic
   The present paper is organized as follows. The related            algorithm, therefore the pre processed sessions data has to
work described in section 2. In next section 3, the                  be modeled which is suitable for genetic environment. By
overview of proposed work is introduced. In subsequent               the data modelling semantic enhanced content data is
section 4, the experimental analysis is shown. In                    generated, which improves performance of the GA
subsequent section 5, the conclusions are made. Finally in           significantly.
section 6 acknowledgements are mentioned.
                                                                     3.1. Web log Data Modeling for IOG:
                  II. RELATED WORK                                      The web log pre-processing results in a set of n
                                                                     pageviews,        P = {p1, p2, ···, pn}, and a set of m user
    Over the past two decades, major advances in the field           transactions, T = {t1,t2,···,tm}, where each ti in T is a
of molecular biology, coupled with advances in genomic               subset of P. Pageviews are semantically meaningful
technologies have lead to an explosive growth in                     entities to which mining tasks are applied. Each
biological information generated by scientific community.            transaction t can be conceptually viewed as an l-length
It is an interdisciplinary field involving Biology,                  sequence of ordered pairs
Computer Science, Mathematics and Statistics to analyze
biological sequence data.                                               t     p ,w p     , p ,w p       ,…, p ,w p          1
   Genetic algorithms have been showed to be an effective
                                                                         where each p     p for some j in {1, 2, ···, n}, and w p
tool to use in data mining and pattern Discovery [3], [4],
[5], [6], [7]. Sankar K Pal, Varun Talwar [1] introduced             is the weight associated with pageviews p in transaction t,
several soft compute methodologies and deliberately                  representing its significance. In web usage mining tasks
expresses the relevance of genetic algorithms in the web             the weights are, either binary representing the existence or
log scenario. William F. Punch [2] used the genetic                  non-existence of a pageview in the transaction or they can
algorithm optimization technique through feature                     be a function of the duration of the pageview in the user’s
selection. In this method the error rate in data mining              session. In the case of time durations, it should be noted
techniques in local optimization shows better performance            that usually the time spent by a user on the last pageview
rather than in global optimization.                                  in the session is not available. Hence for the proposed
    The present IOG frame work concentrating on                      frame work weights are associated based on binary
assigning the weights to the characteristics of initial              representation.
population, which minimizes the error rate in identifying
the relation among the pages.
   Data analysis tools used earlier in web mining were
mainly based on statistical techniques like regression and
estimation. Recently GAs have been gaining the attention
of researchers for solving certain web mining problems
with the need to handle large data sets in computationally
efficient manner.

     III. OVERVIEW OF THE PROPOSED WORK
   The web usage mining is a task of applying data mining
techniques to extract useful patterns from web log data in
various stages as shown in Fig 2. These patterns can be
                                                                                   Fig.2 Web Usage Mining Architecture
used to investigate interesting characteristics of web users.
Generally the web log data is complex and non-linearly




                                                                45
© 2010 ACEEE
DOI: 01.IJNS.01.03.220
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                                                                                       ,          ,…,                          3
                                                                                                                th
                                                                     Where              is the weight of the j characteristic in
                                                                     pageview p, for 1 ≤ j ≤ r. For the whole collection of
                                                                     pageviews in the site, one can represent                 an n×r
                                                                     PageView - Characteristic Matrix
                                                                         , ,…,       .
                                                                           The integration process, involve the transformation of
                                                                     user transactions in UPVM into “content-enhanced”
                                                                     transactions containing the semantic characteristics of the
                                                                     pageviews. The goal of such a transformation is to
                                                                     represent each user session as a vector of characteristics
              Fig. 3. An example of a Hypothetical UPVM              rather than as a vector over pageviews. In this way, a
   For association rule mining the ordering of pageviews             user’s session reflects not only the pages visited, but also
in a transaction is not relevant, one can represent each user        the significance of various characteristics that are relevant
transaction as a vector over the n-dimensional space of              to the user’s interaction. While, in practice, there are
pageviews. Given the transaction vector t (bold face lower           several ways to accomplish this transformation, the most
case letter represents a vector) as:                                 direct approach involves mapping each pageview in a
          ,
                                                                     transaction to one or more content characteristics. The
               ,    ,…,                                   2          range of this mapping can be representing the set of
                                                                     characteristics. Conceptually, the transformation can be
where each                 ) for some j in {1, 2, ···, n}, if
                                                                     viewed as the multiplication of UPVM with PVCM. The
  appears in the transaction t, and           0 otherwise.           result is a new matrix TCM        t , t , … , t , where each ti
Thus, conceptually, the set of all user transactions can be          is a r-dimensional vector over the set of characteristics.
viewed as an m×n User-PageView Matrix, denoted by                    Thus, a user transaction can be represented as a content
UPVM. An example of a hypothetical user-pageview                     characteristics vector, reflecting the user’s interests.
matrix is depicted in Fig. 3. In this example, the weights              As an example of content-enhanced transactions
for each pageview is the amount of time (e.g., in seconds)           consider Fig.4 which shows a hypothetical matrix of user
that a particular user spent on the pageview.                        sessions (UPVM) as well as an index for the
     An association or sequential pattern mining                     corresponding Web site conceptually represented as a
techniques can be applied on UPVM as described in                    term-pageview matrix (TPVM). Note that the transpose of
example to obtain patterns and in turn these patterns are            this TPVM is the pageview-characteristic matrix (PVCM).
used to find important relationships among pages based on            The UPVM simply reflects the pages visited by users in
the navigational patterns of users in the site.                      various sessions. On the other hand, the TPVM represents
     As noted earlier, it is also possible to integrate other        the concepts that appear in each page. For simplicity the
sources of knowledge, such as semantic information from              weights are assumed with binary values.
the content of web pages with the web usage mining                      The        corresponding         Characteristics-Enhanced
process. Generally, the characteristics from the content of          Transaction Matrix CETM (derived by multiplying the
web pages reflects behavior of web user. Each pageview p             UPVM and the transpose of the TPVM) is depicted in Fig.
can be represented as an r-dimensional characteristics               5. The resulting data is very much suitable for the
vector, where r is the total number of extracted                     proposed IOG as initial population.
characteristics from the site in a global dictionary. The
vector, denoted by p, can be given by:




                                                                                        Fig. 4 b. Examples of TPVM
                    Fig. 4 a . Examples of a UPVM




                                                                46
© 2010 ACEEE
DOI: 01.IJNS.01.03.220
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010




                              Fig. 5 The Characteristics-Enhanced Transaction Matrix from matrices of Fig. 4

                                                                        possible in a chromosome but also rewards chromosomes
 3.2. Intelligent Optimal Genetic Algorithm IOG:
                                                                        with many pages. This drawback is balanced with second
   GAs are local optimal algorithms that start from an                  term of the Fitness function. Let ID be such an ideal
initial collection of pages (a population) representing                 dimension; the ratio t C               np/abs |C| ID        1
possible solution to the problem. Each page characteristics             constitutes the second term of the fitness function. It
are called a chromosome and has an associated value                     reaches its maximum np when the dimension of C is
called fitness function (ff) that contributes in the                    exactly equal to the ideal dimension ID and rapidly
generation of new population by means of genetic                        decreases when the number of pages contained in
operators. Every position in a chromosome is called a                   chromosome C is less than or greater than ID.
gene, and its value is called the allelic value. This value                The chromosomes that are present in the initial
may vary on an assigned allelic alphabet. Often, the allelic            population are characterized by the highest possible
alphabet is {0, 1}. At each generation, the algorithm uses              variability as far as the page vectors to which the number
the fitness function values to evaluate the survival capacity           of pages belong or concerned. The evaluation of the
of each page characteristics by using simple operators to               population may alter this characteristic, creating
create a new set of artificial creators (a new population)              chromosomes with high fitness where the pages belong to
that tries to improve on the current ff values by using                 the same vector and are very similar to each other.
pieces of old ones. Evaluation is interrupted when no                   Moreover, the fact that pages belonging to different
significant improvement of the fitness function can be                  vectors are different in the vectorized space may not be
obtained.                                                               guaranteed, as it depends both on the nature of the data
3.2.1. Proposed IOG Genetic Algorithm:                                  and the quality of the initial Vectorization process. For this
                                                                        reason, fitness function third term is introduced, which
01: Define the Evaluation function F.
                                                                        measures directly the overall dissimilarity of the pages in
02: t ← 0 (iteration No =0, pop size =0)
                                                                        the chromosomes. Let D(pi, pj ) be the Euclidean distance
03: Initialize P (t).
                                                                        of the vectors representing pages pi and pj. then t C
04: Evaluate P(t) (page from modeled data).
                                                                        ∑ , C,        D p , p is the sum of the distance between
05: Generate an offspring page O.
06: t ← t+1 (new population).                                           the pairs of pages in chromosome C and the measures the
07: Select P (t) from P (t-1).                                          total variability expressed by C. The final form of the
08: Crossover P (t).                                                    fitness function for chromosome C is then
09: Mutation P(t)                                                                    ff C      α. t C          β. t C       γ. t C
09: Evaluate P (t).
10: Go To 5 (while no termination (no of iterations)).                     Where α, β and γ are parameters that depend on the
11: Sort P (t) (sort the pages given to the user in                     magnitude of the initial score and of the vectors that
    descending order according to their support).                       represent the pages. In particular α, β and γ are chosen so
12: End Condition P (t) Gives the output to the user.                   the contributions given by t1(C), t2(C) and t3(C) are
                                                                        balanced. Additionally, they may be tuned to express the
3.2.2. IOG – Fitness Function:                                          relevance attributed to the different aspects represented by
   In the Fitness function, dc indicates number of                      the three terms. The goal of the GA is to find, by means of
characteristics included in each chromosome and nc                      the genetic operators, a chromosome C* such that
indicates the number of chromosomes. The population                                         ff C       max                ff C
                                                                                                                  ,…..,
with thus contain np=dc.nc phases. The fitness function
computed for each chromosome is expressed as a positive                 3.2.3. IOG Evaluation Function:
value that is higher for “better” chromosomes and is thus                  The Fitness function ff that evaluates web pages is a
to be maximized. It is composed of three terms. The first               mathematical formulation of the user query and numerous
term is the sum of the score of the pages in chromosome                 evaluation functions. First, let us define the followings in
C, i.e., t C     ∑ C score p                                            the simplest forms for practical considerations.
   where score(pi) is the original score given to page pi as
previously described. This term considers the positive
effect of having as many pages with as high a score as
                                                                   47
© 2010 ACEEE
DOI: 01.IJNS.01.03.220
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



1) Link quality F(L)                                                Quality. The experimental results indicate that noticeable
                                                                    improvement of IOG performance over the Standard
                  #                                    4            mining Techniques as shown in Fig 6.
                                                                                     45
                                                                                     40
                                                                                     35
2) Page quality F (P)




                                                                      Mean quality
                                                                                     30
                                                                                     25                                             Standard DM
                                                                                                                                    Technique
                                                      5                              20
                                                                                     15                                             GA Results
                                                                                     10

Where ‘m’ is the total number of links per page.                                      5
                                                                                      0




                                                                                         0

                                                                                                0

                                                                                                        0

                                                                                                       00

                                                                                                       00

                                                                                                       00

                                                                                                       00

                                                                                                       00

                                                                                                       00
                                                                                      30

                                                                                             60

                                                                                                     90
3) Mean quality function Mq




                                                                                                    12

                                                                                                    15

                                                                                                    18

                                                                                                    21

                                                                                                    24

                                                                                                    27
                                                                                                        No. Iterations



                                                     6                       Fig 6. Comparison of population quality of GA w.r.t standard DM
                    2                                                                                  Technique
         Where Fmax (P) and Fmin (P) are the maximum and
minimum values of the page qualities respectively after             B) The IOG model compared with the standard web
applying the GA. It should be noted that the upper value of         mining techniques with respective Execution. The
Fmax (P) is m*n, and the least value of Fmin(P) is zero.            experimental result shows the IOG is essentially taking
Hence, the upper limit of Mq is (m*n)/2. Application of             less time when compared with Standard mining
the GA to web pages will increase some qualities of pages           Techniques as shown in Fig 7.
and decrease others.
3.2.4. IOG – Operators:
     The genetic algorithm uses crossover and mutation
operators to generate the offspring of the existing
population. Before genetic operators are applied, parents
have been selected for evolution to the next generation.
One can use the crossover and mutation algorithm and
produce next generation. The probability of deploying
crossover and mutation operators can be changed. The                  Fig 7. Comparison of execution of GA w.r.t standard DM Technique
genetic operators work iteratively and are:                         C) The IOG ran for different cross over probabilities
• Reproduction, where individual characteristics are                (Pc=0, 0.25, 0.5, 0.75, 1). The average mean quality values
     copied according to their fitness function values (the         are tabulated for ten different enhanced contents as shown
     higher the value of characteristic, the higher of the          in table 1.
     probability of contributing to one or more offspring in
                                                                                               Table 1. The values of averaged mean quality
     the next generation)
• Crossover, in which the members reproduced in the
     new mating pool are mated randomly and, afterward,
     each pair of characteristics undergoes a cross change
• Mutation, which is an occasional random alteration
     of the allelic value of a chromosome that occurs with
     small probability
3.2.5. IOG – End condition:
   GA needs an End Condition to end the generation
process. If no sufficient improvement found in two or
more consecutive generations, one can stop the GA                   D) The IOG model experimented for different cross over
process. In other cases, one can use time limitation as a           probabilities (Pc=0, 0.25, 0.5, 0.75, 1) for different no. of
criterion for ending the process.                                   iterations. It is showing high performance at the average
                                                                    mean Pc as in Fig 8.
             IV. EXPERIMENTAL STUDY
   The proposed IOG has been implemented in a standard
environment. For the IOG algorithm number dissimilar
characteristic vectors are given as input. Theses vectors
are generated by the weblog data modeling of IOG,
considering a weblog consists of more than 3000 pages.
   A) The IOG model compared with the standard web
mining techniques with respective population Mean
                                                               48
© 2010 ACEEE
DOI: 01.IJNS.01.03.220
ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010



                 45                                                                     proposed IOG model helps to investigate the usage
                 40                                                                     behavior of the web user in any application domain.
                 35
  Mean quality



                 30                                                      Pc=0
                 25                                                      Pc=0.25                      VI. ACKNOWLEDGEMENTS
                 20                                                      Pc=0.5
                 15                                                      Pc=0.75          The authors recorded their acknowledgements to Shri
                 10
                  5
                                                                         Pc=1           Vishnu Engineering College for Women, Bhimavaram,
                  0                                                                     Andhra University, Visakhapatnam and Acharya
                      300   600   900 1200 1500 1800 2100 2400 2700
                                                                                        Nagarjuna University, Guntur authorities for their constant
                                       No. Iterations
                                                                                        support and cooperation.
                 Fig 8. Population averaged Mean quality for different number of
                                      iterations at 500 pages                                                  REFERENCES

E) The IOG ran for different cross over probabilities                                   [1] Sankar K. Pal, Fellow, IEEE, Varun Talwar “Web Mining
                                                                                             in Soft Computing Framework: Relevance, State of the Art
(Pc=0, 0.25, 0.5, 0.75, 1) for different number of iterations.
                                                                                             and Future Directions” IEEE transactions on neural
The IOG is executing with significantly less time at the                                     networks, vol. 13, no. 5, september 2002.
average mean Pc as shown in Fig 9.                                                      [2] Behrouz Minaei-Bidgoli, William F. Punch “Using Genetic
                                                                                             Algorithms for Data Mining Optimization in an Educational
                                                                                             Web-based System” .
                                                                                        [3] Freitas, A.A. A survey of Evolutionary Algorithms for Data
                                                                                             Mining        and       Knowledge      Discovery,      See:
                                                                                             ww.pgia.pucpr.br/~alex/papers. A chapter of: A. Ghosh and
                                                                                             S. Tsutsui. (Eds.) “Advances in Evolutionary Computation”.
                                                                                             Springer-Verlag, (2002).
                                                                                        [4] Jain, A. K.; Zongker, D. “Feature Selection: Evaluation,
                                                                                             Application, and Small Sample Performance”, IEEE
                                                                                             Transaction on Pattern Analysis and Machine Intelligence,
                                                                                             Vol. 19, No. 2, Feb-97.
          Fig 9. Execution of GA for different no. of iterations at 500 pages           [5] Falkenauer E. Genetic Algorithms and Grouping Problems.
                                                                                             John Wiley & Sons, (1998).
F) In addition, the standard analysis algorithms are applied                            [6] Pei, M., Goodman, E.D., and Punch, W.F. "Pattern
on the collective output (desired patterns) generated by                                     Discovery from Data Using Genetic Algorithms",
IOG, the web user usage interests are identified as shown                                    Proceeding of 1st Pacific-Asia Conference Knowledge
in Fig 10.                                                                                   Discovery & Data Mining (PAKDD-97).
                                                                                        [7] Park Y and Song M. A genetic algorithm for clustering
                                                                                             problems. Genetic Programming 1998: Proceeding of 3rd
                                                                                             Annual Conference, 568-575. Morgan Kaufmann, (1998).
                                                                                        [8] De Jong K.A., Spears W.M. and Gordon D.F. (1993). Using
                                                                                             genetic algorithms for concept learning. Machine Learning
                                                                                             13, 161-188, 1993.
                                                                                        [9] M. Eirinaki and M. Vazirgiannis. Web mining for web
                                                                                             personalization. ACM Transactions on Internet Technology
                                                                                             (TOIT), 3(1):1_27, 2003.
                                                                                        [10] T. Kamdar, Creating Adaptive Web Servers Using
                                                                                             Incremental Weblog Mining, masters thesis, Computer
                                                                                             Science Dept., Univ. of Maryland, Baltimore, C0–1, 2001
                                                                                        [11] Proceedings of the IEEE International Conference on Tools
                                                                                             with Artificial Intelligence, 1999.
                             Fig 10. Analysis web user Usage interests                  [12] M. S. Chen, J. S. Park and P. S. Yu, “Efficient Data Mining
                                                                                             for Path Traversal Patterns in a Web Environment”, IEEE
                                       V. CONCLUSION                                         Transaction on Knowledge and Data Engineering, 1998.
                                                                                        [13] Wang Shachi, Zhao Chengmou. Study on Enterprise
   The present model has proven experimentally the                                           Competitive IntelligenceSystem.[J]. Science Technology
relevance of web intelligent methodologies in the                                            and Industrial, 2005.
identification of the desired patterns. Associating the                                 [14] M. Craven, S. Slattery and K. Nigam, “First-Order Learning
balanced weights generated by IOG model worked                                               for Web Mining”, In Proceedings of the 10th European
significantly better than that technique of characteristic                                   Conference on Machine Learning, Chemnitz, 1998.
selection. According to the results the proposed technique                              [15] Tsuyoshi, M and Saito, K. Extracting User’s Interest for
                                                                                             Web Log Data. Proceeding of IEEE/ACM/WIC
is more effective in improving the page quality, Mean
                                                                                             International Conference on Web Intelligence (WI’06),
quality and reduces the execution time and hence the                                         2006.




                                                                                   49
© 2010 ACEEE
DOI: 01.IJNS.01.03.220

Más contenido relacionado

Destacado

Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
 
Speed Observer Based Load Angle Control of Induction Motor Drive
Speed Observer Based Load Angle Control of Induction Motor DriveSpeed Observer Based Load Angle Control of Induction Motor Drive
Speed Observer Based Load Angle Control of Induction Motor DriveIDES Editor
 
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...IDES Editor
 
On Fixed Point error analysis of FFT algorithm
On Fixed Point error analysis of FFT algorithmOn Fixed Point error analysis of FFT algorithm
On Fixed Point error analysis of FFT algorithmIDES Editor
 
Determination of the Weakest Branch in a Radial Distribution System using Rea...
Determination of the Weakest Branch in a Radial Distribution System using Rea...Determination of the Weakest Branch in a Radial Distribution System using Rea...
Determination of the Weakest Branch in a Radial Distribution System using Rea...IDES Editor
 
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...IDES Editor
 
Printed UWB Circular and Modified Circular Disc Monopole Antennas
Printed UWB Circular and Modified Circular Disc Monopole AntennasPrinted UWB Circular and Modified Circular Disc Monopole Antennas
Printed UWB Circular and Modified Circular Disc Monopole AntennasIDES Editor
 
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...IDES Editor
 
Broadband Communications and Applications from High Altitude Platforms
Broadband Communications and Applications from High Altitude PlatformsBroadband Communications and Applications from High Altitude Platforms
Broadband Communications and Applications from High Altitude PlatformsIDES Editor
 

Destacado (10)

Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
Energy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sourcesEnergy-Efficient LDPC Decoder using DVFS for binary sources
Energy-Efficient LDPC Decoder using DVFS for binary sources
 
Speed Observer Based Load Angle Control of Induction Motor Drive
Speed Observer Based Load Angle Control of Induction Motor DriveSpeed Observer Based Load Angle Control of Induction Motor Drive
Speed Observer Based Load Angle Control of Induction Motor Drive
 
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Cloud...
 
On Fixed Point error analysis of FFT algorithm
On Fixed Point error analysis of FFT algorithmOn Fixed Point error analysis of FFT algorithm
On Fixed Point error analysis of FFT algorithm
 
Determination of the Weakest Branch in a Radial Distribution System using Rea...
Determination of the Weakest Branch in a Radial Distribution System using Rea...Determination of the Weakest Branch in a Radial Distribution System using Rea...
Determination of the Weakest Branch in a Radial Distribution System using Rea...
 
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...
The Analysis of Dead Time on Switching Loss in High and Low Side MOSFETs of Z...
 
Printed UWB Circular and Modified Circular Disc Monopole Antennas
Printed UWB Circular and Modified Circular Disc Monopole AntennasPrinted UWB Circular and Modified Circular Disc Monopole Antennas
Printed UWB Circular and Modified Circular Disc Monopole Antennas
 
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...
State Of The Art of Electronic Load Controller of Self- Excited Asynchronous ...
 
Broadband Communications and Applications from High Altitude Platforms
Broadband Communications and Applications from High Altitude PlatformsBroadband Communications and Applications from High Altitude Platforms
Broadband Communications and Applications from High Altitude Platforms
 

Más de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Más de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Último (20)

Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

An Advanced Optimal Web Intelligent Model for Mining Web User Usage Behavior using Genetic Algorithm

  • 1. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 An Advanced Optimal Web Intelligent Model for Mining Web User Usage Behavior using Genetic Algorithm Prof. V.V.R. Maheswara Rao1, Dr. V. Valli Kumari2 and Dr. K.V.S.V.N Raju2, 1 Shri Vishnu Engineering College for Women, Bhimavaram, India, Email: mahesh_vvr@yahoo.com 2 College of Engineering, Andhra University, Visakhapatnam, India, Email: vallikumari@gmail.com, kvsvn.raju@gmail.com Abstract—With the continued growth and proliferation of a way that it automatically discovers the usage behavior of Web services and Web based information systems, the web user. volumes of user data have reached astronomical proportions. The overall web usage mining process can be divided Analyzing such data using Web Usage Mining can help to into Four interdependent stages as shown in Fig 1 : Data determine the visiting interests or needs of the web user. This type of analysis involves the automatic discovery of collection, Pre Processing, Pattern Discovery and Pattern meaningful patterns, which represents fine grained Analysis. navigational behavior of visitors from a large collection of semi structured web log data. Due to the non linear and complex nature of weblog all the existing conventional mining techniques are failed in the process of pattern discovery, result in only local optimal solutions. In order to get the global optimal solutions, Web intelligent models are required such as Genetic algorithms. Fig.1.Web mining subtasks. The present paper introduces the Advanced Optimal Web Due to the dynamic and complex nature of web log Intelligent Model with granular computing nature of Genetic data, the existing systems find difficulty in handling the Algorithms, IOG. The IOG model is designed on the semantic enhanced content data, which works more newly emerged problems during all the phases of web efficiently than that on normal data. The unique parameters usage mining in particular, the pattern discovery. To of the IOG fitness function generates balanced weights, to proceed towards web intelligence, reducing the need of represent the significance of characteristics, which yields the human intervention, it is necessary to incorporate and dissimilar characteristics of page vector. The evaluation embed artificial intelligence into web mining tools. To function of IOG improves the page quality and reduces the achieve the intelligence soft computing methodologies execution time to a specified number of iterations as it seem to be a good candidate. considers practical measures like page, link and mean Genetic algorithms are examples of evolutionary qualities. The genetic operators are intended in drawing the computing methods and are optimization type algorithms stickiness among the characteristics of a page vector. By integrating all the above the web intelligent model IOG, for both supervised and unsupervised techniques. A proceed towards intelligence and significantly improves the Genetic Algorithm is an elegantly simple, yet extremely investigation of web user usage behavior. powerful way for prediction and description of complex objective functions like Fitness and Evaluate in dynamic Index Terms—Web Usage Mining, Genetic Algorithm, environment. Moreover, GA employs a set of operators Pattern Discovery that mimic the concept of survival of Fittest by regenerating recombination of the algorithm in response to I. INTRODUCTION a calculated difference between desired solution states. Over the last decade, with the continued increase in the The goal of present paper is to deploy Intelligent usage of the WWW, web mining has been established as Optimal Genetic Algorithm IOG, in order to find the an important area of research. Whenever, the web users optimized solutions for investigating the web user usage visit the WWW, they leave abundant information in web behavior. The important task in any intelligent mining log, which is structurally complex, heterogeneous, high application is the preparation of a suitable target data set dimensional and incremental in nature. Analyzing such for which mining and statistical algorithms can be applied. data can help to determine the browsing interest of web For IOG, the present research frame work, Firstly, user. To do this, web usage mining focuses on concentrating on modelling the web log data due to its investigating the potential knowledge from browsing complex nature. The main thrust of the data modelling is patterns of the users and to find the correlation between to generate the semantic enhanced content data. The the pages on analysis. The main goal of web usage mining integration of semantic content with IOG can potentially is to Capture, Model and Analyze the web log data in such 44 © 2010 ACEEE DOI: 01.IJNS.01.03.220
  • 2. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 provide a better understanding of the underlying growing in nature, it is necessary for web miners to utilize relationships among the pages. soft computing tools like Genetic Algorithms in order to The IOG Fitness function is designed in such a way get global optimal information intelligently. GA employs a that, it generates dissimilar page vectors, each vector have set of operators that mimic the concept of survival of similar characteristics. In addition, the IOG Evaluation Fittest by regenerating recombination of the algorithm in function is planned to identify the quality of optimized response to a calculated difference between desired population averaged mean for page vectors by considering solution states over a period of time. both link and page quality of each vector. The IOG frame To investigate the usage behavior of the web user, one work collectively uses Fitness, Operators and Evaluation has to extract the potential patterns through the sessions, functions, helps to investigate the web user usage behavior generated by the pre processing stage of web log. Directly significantly. the data can’t be given as an input to the genetic The present paper is organized as follows. The related algorithm, therefore the pre processed sessions data has to work described in section 2. In next section 3, the be modeled which is suitable for genetic environment. By overview of proposed work is introduced. In subsequent the data modelling semantic enhanced content data is section 4, the experimental analysis is shown. In generated, which improves performance of the GA subsequent section 5, the conclusions are made. Finally in significantly. section 6 acknowledgements are mentioned. 3.1. Web log Data Modeling for IOG: II. RELATED WORK The web log pre-processing results in a set of n pageviews, P = {p1, p2, ···, pn}, and a set of m user Over the past two decades, major advances in the field transactions, T = {t1,t2,···,tm}, where each ti in T is a of molecular biology, coupled with advances in genomic subset of P. Pageviews are semantically meaningful technologies have lead to an explosive growth in entities to which mining tasks are applied. Each biological information generated by scientific community. transaction t can be conceptually viewed as an l-length It is an interdisciplinary field involving Biology, sequence of ordered pairs Computer Science, Mathematics and Statistics to analyze biological sequence data. t p ,w p , p ,w p ,…, p ,w p 1 Genetic algorithms have been showed to be an effective where each p p for some j in {1, 2, ···, n}, and w p tool to use in data mining and pattern Discovery [3], [4], [5], [6], [7]. Sankar K Pal, Varun Talwar [1] introduced is the weight associated with pageviews p in transaction t, several soft compute methodologies and deliberately representing its significance. In web usage mining tasks expresses the relevance of genetic algorithms in the web the weights are, either binary representing the existence or log scenario. William F. Punch [2] used the genetic non-existence of a pageview in the transaction or they can algorithm optimization technique through feature be a function of the duration of the pageview in the user’s selection. In this method the error rate in data mining session. In the case of time durations, it should be noted techniques in local optimization shows better performance that usually the time spent by a user on the last pageview rather than in global optimization. in the session is not available. Hence for the proposed The present IOG frame work concentrating on frame work weights are associated based on binary assigning the weights to the characteristics of initial representation. population, which minimizes the error rate in identifying the relation among the pages. Data analysis tools used earlier in web mining were mainly based on statistical techniques like regression and estimation. Recently GAs have been gaining the attention of researchers for solving certain web mining problems with the need to handle large data sets in computationally efficient manner. III. OVERVIEW OF THE PROPOSED WORK The web usage mining is a task of applying data mining techniques to extract useful patterns from web log data in various stages as shown in Fig 2. These patterns can be Fig.2 Web Usage Mining Architecture used to investigate interesting characteristics of web users. Generally the web log data is complex and non-linearly 45 © 2010 ACEEE DOI: 01.IJNS.01.03.220
  • 3. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 , ,…, 3 th Where is the weight of the j characteristic in pageview p, for 1 ≤ j ≤ r. For the whole collection of pageviews in the site, one can represent an n×r PageView - Characteristic Matrix , ,…, . The integration process, involve the transformation of user transactions in UPVM into “content-enhanced” transactions containing the semantic characteristics of the pageviews. The goal of such a transformation is to represent each user session as a vector of characteristics Fig. 3. An example of a Hypothetical UPVM rather than as a vector over pageviews. In this way, a For association rule mining the ordering of pageviews user’s session reflects not only the pages visited, but also in a transaction is not relevant, one can represent each user the significance of various characteristics that are relevant transaction as a vector over the n-dimensional space of to the user’s interaction. While, in practice, there are pageviews. Given the transaction vector t (bold face lower several ways to accomplish this transformation, the most case letter represents a vector) as: direct approach involves mapping each pageview in a , transaction to one or more content characteristics. The , ,…, 2 range of this mapping can be representing the set of characteristics. Conceptually, the transformation can be where each ) for some j in {1, 2, ···, n}, if viewed as the multiplication of UPVM with PVCM. The appears in the transaction t, and 0 otherwise. result is a new matrix TCM t , t , … , t , where each ti Thus, conceptually, the set of all user transactions can be is a r-dimensional vector over the set of characteristics. viewed as an m×n User-PageView Matrix, denoted by Thus, a user transaction can be represented as a content UPVM. An example of a hypothetical user-pageview characteristics vector, reflecting the user’s interests. matrix is depicted in Fig. 3. In this example, the weights As an example of content-enhanced transactions for each pageview is the amount of time (e.g., in seconds) consider Fig.4 which shows a hypothetical matrix of user that a particular user spent on the pageview. sessions (UPVM) as well as an index for the An association or sequential pattern mining corresponding Web site conceptually represented as a techniques can be applied on UPVM as described in term-pageview matrix (TPVM). Note that the transpose of example to obtain patterns and in turn these patterns are this TPVM is the pageview-characteristic matrix (PVCM). used to find important relationships among pages based on The UPVM simply reflects the pages visited by users in the navigational patterns of users in the site. various sessions. On the other hand, the TPVM represents As noted earlier, it is also possible to integrate other the concepts that appear in each page. For simplicity the sources of knowledge, such as semantic information from weights are assumed with binary values. the content of web pages with the web usage mining The corresponding Characteristics-Enhanced process. Generally, the characteristics from the content of Transaction Matrix CETM (derived by multiplying the web pages reflects behavior of web user. Each pageview p UPVM and the transpose of the TPVM) is depicted in Fig. can be represented as an r-dimensional characteristics 5. The resulting data is very much suitable for the vector, where r is the total number of extracted proposed IOG as initial population. characteristics from the site in a global dictionary. The vector, denoted by p, can be given by: Fig. 4 b. Examples of TPVM Fig. 4 a . Examples of a UPVM 46 © 2010 ACEEE DOI: 01.IJNS.01.03.220
  • 4. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 Fig. 5 The Characteristics-Enhanced Transaction Matrix from matrices of Fig. 4 possible in a chromosome but also rewards chromosomes 3.2. Intelligent Optimal Genetic Algorithm IOG: with many pages. This drawback is balanced with second GAs are local optimal algorithms that start from an term of the Fitness function. Let ID be such an ideal initial collection of pages (a population) representing dimension; the ratio t C np/abs |C| ID 1 possible solution to the problem. Each page characteristics constitutes the second term of the fitness function. It are called a chromosome and has an associated value reaches its maximum np when the dimension of C is called fitness function (ff) that contributes in the exactly equal to the ideal dimension ID and rapidly generation of new population by means of genetic decreases when the number of pages contained in operators. Every position in a chromosome is called a chromosome C is less than or greater than ID. gene, and its value is called the allelic value. This value The chromosomes that are present in the initial may vary on an assigned allelic alphabet. Often, the allelic population are characterized by the highest possible alphabet is {0, 1}. At each generation, the algorithm uses variability as far as the page vectors to which the number the fitness function values to evaluate the survival capacity of pages belong or concerned. The evaluation of the of each page characteristics by using simple operators to population may alter this characteristic, creating create a new set of artificial creators (a new population) chromosomes with high fitness where the pages belong to that tries to improve on the current ff values by using the same vector and are very similar to each other. pieces of old ones. Evaluation is interrupted when no Moreover, the fact that pages belonging to different significant improvement of the fitness function can be vectors are different in the vectorized space may not be obtained. guaranteed, as it depends both on the nature of the data 3.2.1. Proposed IOG Genetic Algorithm: and the quality of the initial Vectorization process. For this reason, fitness function third term is introduced, which 01: Define the Evaluation function F. measures directly the overall dissimilarity of the pages in 02: t ← 0 (iteration No =0, pop size =0) the chromosomes. Let D(pi, pj ) be the Euclidean distance 03: Initialize P (t). of the vectors representing pages pi and pj. then t C 04: Evaluate P(t) (page from modeled data). ∑ , C, D p , p is the sum of the distance between 05: Generate an offspring page O. 06: t ← t+1 (new population). the pairs of pages in chromosome C and the measures the 07: Select P (t) from P (t-1). total variability expressed by C. The final form of the 08: Crossover P (t). fitness function for chromosome C is then 09: Mutation P(t) ff C α. t C β. t C γ. t C 09: Evaluate P (t). 10: Go To 5 (while no termination (no of iterations)). Where α, β and γ are parameters that depend on the 11: Sort P (t) (sort the pages given to the user in magnitude of the initial score and of the vectors that descending order according to their support). represent the pages. In particular α, β and γ are chosen so 12: End Condition P (t) Gives the output to the user. the contributions given by t1(C), t2(C) and t3(C) are balanced. Additionally, they may be tuned to express the 3.2.2. IOG – Fitness Function: relevance attributed to the different aspects represented by In the Fitness function, dc indicates number of the three terms. The goal of the GA is to find, by means of characteristics included in each chromosome and nc the genetic operators, a chromosome C* such that indicates the number of chromosomes. The population ff C max ff C ,….., with thus contain np=dc.nc phases. The fitness function computed for each chromosome is expressed as a positive 3.2.3. IOG Evaluation Function: value that is higher for “better” chromosomes and is thus The Fitness function ff that evaluates web pages is a to be maximized. It is composed of three terms. The first mathematical formulation of the user query and numerous term is the sum of the score of the pages in chromosome evaluation functions. First, let us define the followings in C, i.e., t C ∑ C score p the simplest forms for practical considerations. where score(pi) is the original score given to page pi as previously described. This term considers the positive effect of having as many pages with as high a score as 47 © 2010 ACEEE DOI: 01.IJNS.01.03.220
  • 5. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 1) Link quality F(L) Quality. The experimental results indicate that noticeable improvement of IOG performance over the Standard # 4 mining Techniques as shown in Fig 6. 45 40 35 2) Page quality F (P) Mean quality 30 25 Standard DM Technique 5 20 15 GA Results 10 Where ‘m’ is the total number of links per page. 5 0 0 0 0 00 00 00 00 00 00 30 60 90 3) Mean quality function Mq 12 15 18 21 24 27 No. Iterations 6 Fig 6. Comparison of population quality of GA w.r.t standard DM 2 Technique Where Fmax (P) and Fmin (P) are the maximum and minimum values of the page qualities respectively after B) The IOG model compared with the standard web applying the GA. It should be noted that the upper value of mining techniques with respective Execution. The Fmax (P) is m*n, and the least value of Fmin(P) is zero. experimental result shows the IOG is essentially taking Hence, the upper limit of Mq is (m*n)/2. Application of less time when compared with Standard mining the GA to web pages will increase some qualities of pages Techniques as shown in Fig 7. and decrease others. 3.2.4. IOG – Operators: The genetic algorithm uses crossover and mutation operators to generate the offspring of the existing population. Before genetic operators are applied, parents have been selected for evolution to the next generation. One can use the crossover and mutation algorithm and produce next generation. The probability of deploying crossover and mutation operators can be changed. The Fig 7. Comparison of execution of GA w.r.t standard DM Technique genetic operators work iteratively and are: C) The IOG ran for different cross over probabilities • Reproduction, where individual characteristics are (Pc=0, 0.25, 0.5, 0.75, 1). The average mean quality values copied according to their fitness function values (the are tabulated for ten different enhanced contents as shown higher the value of characteristic, the higher of the in table 1. probability of contributing to one or more offspring in Table 1. The values of averaged mean quality the next generation) • Crossover, in which the members reproduced in the new mating pool are mated randomly and, afterward, each pair of characteristics undergoes a cross change • Mutation, which is an occasional random alteration of the allelic value of a chromosome that occurs with small probability 3.2.5. IOG – End condition: GA needs an End Condition to end the generation process. If no sufficient improvement found in two or more consecutive generations, one can stop the GA D) The IOG model experimented for different cross over process. In other cases, one can use time limitation as a probabilities (Pc=0, 0.25, 0.5, 0.75, 1) for different no. of criterion for ending the process. iterations. It is showing high performance at the average mean Pc as in Fig 8. IV. EXPERIMENTAL STUDY The proposed IOG has been implemented in a standard environment. For the IOG algorithm number dissimilar characteristic vectors are given as input. Theses vectors are generated by the weblog data modeling of IOG, considering a weblog consists of more than 3000 pages. A) The IOG model compared with the standard web mining techniques with respective population Mean 48 © 2010 ACEEE DOI: 01.IJNS.01.03.220
  • 6. ACEEE Int. J. on Network Security, Vol. 01, No. 03, Dec 2010 45 proposed IOG model helps to investigate the usage 40 behavior of the web user in any application domain. 35 Mean quality 30 Pc=0 25 Pc=0.25 VI. ACKNOWLEDGEMENTS 20 Pc=0.5 15 Pc=0.75 The authors recorded their acknowledgements to Shri 10 5 Pc=1 Vishnu Engineering College for Women, Bhimavaram, 0 Andhra University, Visakhapatnam and Acharya 300 600 900 1200 1500 1800 2100 2400 2700 Nagarjuna University, Guntur authorities for their constant No. Iterations support and cooperation. Fig 8. Population averaged Mean quality for different number of iterations at 500 pages REFERENCES E) The IOG ran for different cross over probabilities [1] Sankar K. Pal, Fellow, IEEE, Varun Talwar “Web Mining in Soft Computing Framework: Relevance, State of the Art (Pc=0, 0.25, 0.5, 0.75, 1) for different number of iterations. and Future Directions” IEEE transactions on neural The IOG is executing with significantly less time at the networks, vol. 13, no. 5, september 2002. average mean Pc as shown in Fig 9. [2] Behrouz Minaei-Bidgoli, William F. Punch “Using Genetic Algorithms for Data Mining Optimization in an Educational Web-based System” . [3] Freitas, A.A. A survey of Evolutionary Algorithms for Data Mining and Knowledge Discovery, See: ww.pgia.pucpr.br/~alex/papers. A chapter of: A. Ghosh and S. Tsutsui. (Eds.) “Advances in Evolutionary Computation”. Springer-Verlag, (2002). [4] Jain, A. K.; Zongker, D. “Feature Selection: Evaluation, Application, and Small Sample Performance”, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 19, No. 2, Feb-97. Fig 9. Execution of GA for different no. of iterations at 500 pages [5] Falkenauer E. Genetic Algorithms and Grouping Problems. John Wiley & Sons, (1998). F) In addition, the standard analysis algorithms are applied [6] Pei, M., Goodman, E.D., and Punch, W.F. "Pattern on the collective output (desired patterns) generated by Discovery from Data Using Genetic Algorithms", IOG, the web user usage interests are identified as shown Proceeding of 1st Pacific-Asia Conference Knowledge in Fig 10. Discovery & Data Mining (PAKDD-97). [7] Park Y and Song M. A genetic algorithm for clustering problems. Genetic Programming 1998: Proceeding of 3rd Annual Conference, 568-575. Morgan Kaufmann, (1998). [8] De Jong K.A., Spears W.M. and Gordon D.F. (1993). Using genetic algorithms for concept learning. Machine Learning 13, 161-188, 1993. [9] M. Eirinaki and M. Vazirgiannis. Web mining for web personalization. ACM Transactions on Internet Technology (TOIT), 3(1):1_27, 2003. [10] T. Kamdar, Creating Adaptive Web Servers Using Incremental Weblog Mining, masters thesis, Computer Science Dept., Univ. of Maryland, Baltimore, C0–1, 2001 [11] Proceedings of the IEEE International Conference on Tools with Artificial Intelligence, 1999. Fig 10. Analysis web user Usage interests [12] M. S. Chen, J. S. Park and P. S. Yu, “Efficient Data Mining for Path Traversal Patterns in a Web Environment”, IEEE V. CONCLUSION Transaction on Knowledge and Data Engineering, 1998. [13] Wang Shachi, Zhao Chengmou. Study on Enterprise The present model has proven experimentally the Competitive IntelligenceSystem.[J]. Science Technology relevance of web intelligent methodologies in the and Industrial, 2005. identification of the desired patterns. Associating the [14] M. Craven, S. Slattery and K. Nigam, “First-Order Learning balanced weights generated by IOG model worked for Web Mining”, In Proceedings of the 10th European significantly better than that technique of characteristic Conference on Machine Learning, Chemnitz, 1998. selection. According to the results the proposed technique [15] Tsuyoshi, M and Saito, K. Extracting User’s Interest for Web Log Data. Proceeding of IEEE/ACM/WIC is more effective in improving the page quality, Mean International Conference on Web Intelligence (WI’06), quality and reduces the execution time and hence the 2006. 49 © 2010 ACEEE DOI: 01.IJNS.01.03.220