AN INTELLIGENT APPROACH OF WEB DATA MINING
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5
Abstract
With an explosive growth of the World Wide Web, websites are playing an important role in providing an information and knowledge to the end users. Web usage patterns are an important aspect to discover hidden and meaningful information. It will be big challenge in web mining when the volume of traffic is large and the volume of web data is still in the growing phase. To face the challenge an intelligent approach of web traffic analysis has been highlighted in this paper.
Authors and Affiliations
Shakti Kundu
Improving Ad Hoc Network Performances by Estimating Available Bandwidth
The term bandwidth refers to the data rate that a network link or a network path can transfer. Bandwidth is one of the uarantee attribute to measure the performance of the network. Measuring available bandwidth in ad ho...
Mining Best-N Frequent Patterns in a Video Sequence
Video mining is used to discover and describe interesting patterns in video data, which has become one of the core problem areas of the data mining research community. Compared to the mining of other types of data (e.g.,...
A Novel Approach for English to South Dravidian Language Statistical Machine Translation System
Development of a well fledged bilingual machine translation (MT) system for any two natural languages with limited lectronic resources and tools is a challenging and demanding task. This paper presents the development o...
Exploring the self reconfiguration of FPGA: design flow, architecture and performance
Run-time partial reconfiguration of programmable hardware devices can be applied to enhance many applications in high-end embedded systems, particularly those that employ recent platform FPGAs. Partial Reconfigurable FPG...
The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol
the Extensible Authentication Protocol (EAP) is a generic ramework supporting multiple types of authentication ethods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP excha...