Implementation of an Efficient Matrix based Algorithm for Clustering in Web Usage Mining
Journal Title: International Journal of Computational Engineering and Management IJCEM - Year 2012, Vol 15, Issue 4
Abstract
Usage patterns discovered through Web usage mining are effective in capturing item-to-item and user-to-user relationships and similarities at the level of user sessions. However, without the benefit of deeper domain knowledge, such patterns provide little insight into the underlying reasons for which such items or users are grouped together. Furthermore, the inherent and increasing heterogeneity of the Web has required Web-based applications to more effectively integrate a variety of types of data across multiple channels and from different sources. Thus, a focus on techniques and architectures for more effective integration and mining of content, usage, and structure data from different sources is likely to lead to the next generation of more useful and more intelligent applications, and more sophisticated tools for Web usage mining that can derive intelligence from user transactions on the Web. This paper gives an insight into the proposed MABAC Algorithm and the implementation to show how it provides useful information within clusters.
Authors and Affiliations
Kanika Gupta, Kirti Aggarwal and Neha Aggarwal
Socio-Economic Status and Quality of Life of Women in Hostels
Hostels are temporary dwelling place for women working far away from their native place. Hostels provide the same facilities as that of their home besides certain limitations. Women with different socio-economic status c...
A Heuristic Based Load Balancing Algorithm
In today’s competitive environment the objectives and goals of the producers (also called resource owners) and consumers (also called end users) are different. Computational grid has been considered as the best paradigm...
Personal Protective Equipments are Last Resort of Safety
This study and analysis will deal with this concept that before applying control over hazard to reduce risk, think on the hierarchy of control over hazards. The Personal Protective Equipments should be the last resort t...
Fractional Fourier Transform of Tempered Boehmians
Tempered Boehmians are introduced as a natural extension of tempered distributions. For this class of Boehmians it is possible to define an extension of the Fractional Fourier transforms. The Fractional Fourier transform...
Energy Efficient Multihop Routing scheme with in Network Aggregation for WSN
This paper introduces an energy efficient, multi-hop routing scheme, with in-network aggregation. The technique uses clustering as the base of our algorithm. Ant Colony Optimization (ACO) is implemented over clustering a...