Implementation of The K-Means Clustering Algorithm to Analyze the User Interest by Analyzing the University Web Log Servers
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
Web Usage mining is considered as one of the very important category of the web data mining, which manages the extraction of useful and interesting data from the web log documents. Web utilization has turned out to be the essential part among the young people. The teenage group peoples are inexorably open and shared the online and social culture, which enables them to get data and keep up kinships and connections. But, however they are the very crucial young stage, which sometimes can lead to risky and immature decisions. To keep check on them we analyze the user behavior to predict their interests. The web documents are collected from the university computer center. In this work, K-means clustering algorithm is used. The clusters are formed according to the frequency of the sites visited, and then the analysis is done to judge the interest of the student. It has been find out that most of the student’s interest falls in the category of the Information technology.
Authors and Affiliations
Anmol Kaur, Raman Maini
Monopoly
Market is the most important place where seller and buyers meet each other and exchange commodity. In absence of market the economic growth of society goes down. Therefore a well-planned marketing is very important for...
A Network-Coding-Based Storage System in a Cloud-of-Clouds
NCCloud is constructed on high of a network-coding-based storage theme referred to as the practical minimumstorage make (FMSR) codes, that maintain a similar fault tolerance and knowledge redundancy as in ancient erasure...
Investigation on the Overturning Stability of a Jack up Mobile Offshore Production Unit by Site- Specific Analysis to Find a Solution to Avoid the Failure of Its Leg Lattice Structure
The site-specific assessment analysis has been performed on a three legged drill rig with spud cans to investigate the failure of the leg lattice structure of the legs of a Jack-up Rig which is being converted from Mobi...
Feeder Zone Control and Metal Impurity Detection in Blow Room Machines
this project has been designed to detect the metal impurities present in the raw cotton input for the blow room machines and to monitor the level of cotton in the feeder zone of the machine. This is done with the help o...
Comparative Study of Various Visual Cryptography Techniques to Analyze the Quality of Reconstruction
Visual cryptography is one among the cryptographic techniques available, where the secret information is encrypted by giving a key. The secret image will be encrypted into n number of shares. By stacking the shares, the...