Web User Session Cluster Discovery Based on k-Means and k-Medoids Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 12
Abstract
The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To reveal information about user preferences from Web usage data, Web Usage Mining (WUM) techniques are extensively being applied to the Web log data. Clustering techniques are widely used in WUM to capture similar interests and trends among users accessing a Web site. Clustering aims to divide a data set into groups or clusters where inter-cluster similarities are minimized while the intra cluster similarities are maximized. This paper describes the discovery of user session clusters using k-Means and k-Medoids clustering techniques. These techniques are implemented and tested against the Web user navigational data. Performance and validity results of each technique are presented and compared.
Authors and Affiliations
Zahid Ahmed Ansari
A Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure commu...
A Performance Evaluation on Face Image Enhancement with Salt & Pepper Noise Using Gaussian Filtering
Filtering of noise is one of the most important tasks in digital image processing. Elimination of noise is an image is still a challenging task for the researchers. Various researches were underlying on face recognition...
Cybercrime: A Global Threat to Cybercommunity
Cyberspace is a virtual space equal important as real space for business, politics and communities. Cyberspace is vulnerable to borderless cyberattacks. The global problem of Cybercrime is also social, legal and it’s gro...
Krill Herd Clustering Algorithm using DBSCAN Technique
The hybrid approach is proposed to show that the clusters also show the swarm behavior. Krill herd algorithm is used to show the simulation of the herding behavior of the krill individuals. Density based approach is used...
Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network
In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degre...