Data warehousing and Phases used in Internet Mining
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 2
Abstract
In this paper, we describe the data warehousing and data mining. Data Warehousing is the process of storing the data on large scale and Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. As massive amount of data is continuously being collected and stored, many industries are becoming interested in mining some patterns (association rules, correlations, clusters etc) from their database. Association rule mining is one of the important tasks that are used to find out the frequent itemset from customer transactional database. Each transaction consists of items purchased by a customer in a visit. Internet mining is the application of data mining techniques to discover patterns from the Internet. Internet Usage Mining (IUM) is the process of application of data mining techniques over web data. The data sources are mainly the web server logs, proxy server logs and cookies stored in the user’s computer. IUM is composed of three phases namely, preprocessing, pattern discovery and pattern analysis. This paper describes these phases in detail. A necessary introduction to Internet Mining is also provided for the purpose of background knowledge.
Authors and Affiliations
Jitender Ahlawat , Joni Birla , Mohit Yadav
An Improved Approach to perform Crawling and avoid Duplicate Web Pages
When a web search is performed it includes many duplicate web pages or the websites. It means we can get number of similar pages at different web servers. We are proposing a Web Crawling Approach to Detect and avoid Dupl...
IS BAILOUT AN ANSWER TO GLOBAL FINANCIAL CRISIS?
The financial system in the USA, identified as the largest economy in the world, with a strong and robust financial system, has been in the eye of a storm in the past two years and more so in the recent months. To contro...
Reliability Investigation for a Fleet of Load Haul Dump Machines in a Mine
The recent deployment of complex and capital intensive equipment in mines has resulted in increased interest in the maintenance and operational reliability of these equipments. This is because random equipment failure ha...
Analysis of the Protected Extensible Authentication Protocol
The Internet Engineering Task Force (IETF) has proposed new protocols for highly secured wireless networking. The purpose of this paper is to implement one such proposed security protocol - PEAP (Protected Extensible Aut...
REVIEW OF ARTIFICIAL IMMUNE SYSTEM TO ENHANCE SECURITY IN MOBILE AD-HOC SYSTEMS
Mobile Ad-hoc Networks consist of wireless host that communicate with each other. The routes in a Mobile Ad-hoc Network may consist of many hops through other hosts between source and destination. The hosts are not...