ANALYSIS AND EVALUATION ON ONLINE SHOPS CUSTOMERS THROUGH DATA MINING METHODS
Journal Title: International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) - Year 2018, Vol 8, Issue 3
Abstract
Customer data analyzers of online stores are important for improving customer service and provide opportunities for greater personalization. In this paper, an approach is proposed for analyzing customer data based on data mining methods. Natural computer language processing technologies are also used to identify customers who are satisfied with the e-shop's service and those who are not. A decision tree is also built that allows for the choice of rational management decisions.
A COMPETITIVE STUDY ON CLOUDS COMPUTING, SERVICE ORIENTATION ARCHITECTURE AND WEB SERVICES IN ENTERPRISE NETWORK APPLICATION
Most Educational Universities experience challenges in building up a work of reconciliation when need to do arranging: assignment of classes, dispersion of rooms, allotment of classes and set up a better correspondence b...
Enhanced Identity-Based Signcryption System
A combination of encryption and signature is a cryptosystem called traditional signcryption, wherein sender authentication is considered a key task to be verified by third party or judge. Without the knowledge of the sen...
IMPROVED REPOSITION CLUSTER HEAD IN LEACH PROTOCOL FOR HETEROGENEOUS WIRELESS NETWORK
With the fast improvement in wireless technologies, amenities and devices, used in a distinct radio system, in which second generation (2G) and third-generation (3G) wireless scheme may be not effective to transmit data...
Efficient Trust Management Technique Using Neural Network in Cloud Computing
Cloud computing turned into a standout amongst the most imperative stage for the cloud suppliers so as to introduce the cloud suppliers in a virtual way through the internet. Cloud customers throughout the world exchang...
Performance Analysis of Select Forwarding Attack on WSN and its Detection and Removal from Network
Wireless Sensor Networks is quite vulnerable to many security compromising attacks as wormhole attack, message replay or tampering, identity spoofing, black hole attack, eavesdropping, and so on. One of the impacts of se...