Web Mining: Knowledge Discovery from Web Content
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
As the increase in the number of internet users, internet has becoming one of the rich source of data for knowledge discoveries and relevant information. Due to high diversity and dimensionality of data, knowledge discovery is a difficult task. This difficulty leads to the use of web mining for extracting useful information. The web mining is one of the application of data mining which uses data mining techniques such as classification, clustering, association rules in order to effectively mine and extract meaningful patterns from web data. In this paper we consider a survey on concept of web mining, process, classification, issues and applications.
Authors and Affiliations
Balmeet Kaur, Surbhi Sharma
Hydro-Magnetic Oscillatory Dusty Fluid Flow with Volume Fraction and Periodic Pressure Gradient in a Rotating Channel
Analytic solution of unsteady oscillatory hydro-magnetic flow of a dusty, electrically conducting fluid in a horizontal channel has been obtained under the influence of periodic pressure gradient. The system is rotating...
SVM Algorithm for the Robotic Detection of Retinal Hemorrhage in Fundus Images
Many important eye diseases as well as systemic diseases manifest themselves in the retina. Diabetic retinopathy is a vascular disease of the retina which affects patients with diabetes mellitus. A number of other anato...
Closed Loop Control of DC to DC Converter with Hybrid Input Sources
This paper proposes a closed loop based dc-to-dc power conversion circuit for distributed generation systems. With the two-port converter, the load can be powered from two different dc sources, which can be a combinatio...
A Least Path Matrix Concept to Detect Isomorphism in Planar Kinematic chain’s
In the early stage of mechanism design, it is helpful to have all possible kinematic chain with required number of links and degree of freedom. The mechanism will lead to systematic development of enumeration, identific...
Information Security through Steganography Technique
The encrypted messages will often attract the concentration of unauthorized users. They try to crack the encrypted message and get access to the actual contents of the message. To conceal the subsistence of message steg...