PERFECTIONS AND PSYCHIATRING USER PROFILE IN WEB SITES USING WEB USAGE MINING & CLUSTERING SESSIONS
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 2
Abstract
The web site under study is part of a nonprofit organization that does not "sell" any products, it was crucial to understand "who" the users Ire, "what" they looked at, and "how their interests changed with time," all of which are important questions in Customer Relationship Management (CRM). A complete framework and findings are presented in mining web usage patterns from web log files of a real web site that has all the challenging aspects of real-life web usage mining, including evolving user profiles and external data describing ontology of the web content. The behavior of a web site's users may change so quickly that attempting to make predictions, according to the frequent patterns coming from the analysis of an access log file, becomes challenging. In order for the obsolescence of the behavioral patterns to become as possible, the ideal method would provide frequent patterns in real time, allowing the result to be available immediately. Hence, this is an approach for discovering and tracking evolving user profiles here also describes how the discovered user profiles can be enriched with explicit information need that is inferred from search queries extracted from web log data. An objective validation strategy is also used to assess the quality of the mined profiles, in particular their adaptability in the face of evolving user behavior. In this a method allowing finding frequent behavioral patterns in real time, whatever the number of connected users has been measured.
Authors and Affiliations
Senthil Pandian Paramasivam, Dr. S Srinivasan
A Formal Study of Cryptanalysis on Ciphers
Cryptanalysis is co-study of cryptography. A cipher is said to be successful cipher if it design resists all cipher attacks. Cryptanalyis are two-fold. One way is a benign activity where cryptanalysis is performed to...
Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks
Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...
High Efficiency and Less Pollutant Power PlantsUsing Biomass Mixed with Municipal Solid Waste and coal Dust
This paper deals with the new component of fuel which is used to generate the power with higher efficiency and lesser pollutants. The new component is the mixture of biomass (husk) and MSW and coal dust in the ratio o...
Electro Alert : An automatic meter reading system with GPRS facility
The digital technology, the wireless communication, and the communication have significantly changed the electric meter generation from Traditional Meter to Automatic Meter. A high percentage of electricity revenue is l...
Self-motivated probe forms designed for database Uncertainties
Query form is a standout amongst the most broadly utilized client interfaces for questioning databases. Conventional inquiry structures are planned and precharacterized by engineers or DBA in different data administra...