Knowledge Retrieval from Web Server Logs Using Web Usage Mining
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
Now a days the data of internet is increasing day by day and web-based applications are very common. The main problem that faces any website admin or any web application system is data increase per-second, which is stored in different types and formats in server log files about users, their future needs and maintains the structure and content of website or web services according to their previous data. The main aim of web usage mining is discovering useful information or knowledge from usage data registered in log files, based on primary kinds of data used in the mining process. Using one of the web mining techniques, this paper uses a web usage mining technique to find knowledge from web server log files where all user navigation history is registered.
Correlation between Anthropometric Variable and Goal Shooting of Korfball Player
Background: To correlate selected kin anthropometric variables with the Korfball shooting ability. Methods: A samples of 20 national and international players were selected from the teams participated in Senior National...
Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
With the emerging of highly advance technology, risks in systems are also increases which even cannot be prevented by many security measures. Attacks in different form are being used to exploit the system through network...
Morphological Features and Influence of Age and Breed on the Morphometry of Red Blood Cells of Female Cattle
The study was carried out on three female cattle groups namely; local (indigenous), Red Sindhi and cross breed Jersey in order to study the influence of age (10 months-2 years, i.e., group 1, 2-6 years, i.e., group 2 and...
A New Method for Construction of MV-optimal Generalized Group Divisible Designs with two Groups
In this article, we consider the construction of generalized group divisible designs with two groups (GGDD(2)) from balanced incomplete block designs (BIBD). We also discuss MV-optimality of these designs.
Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Abstract-The DTN technology is the famous technology which used in the military network it is differ from the normal peer to peer network it is having the storage network if the connection is not establish it will store...