Design and Development of Efficient Algorithm in Web Usage Mining For Web Personalization

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-4                       
Year of Publication : 2013
Authors : Mohit M.Patel , Shailendra K.Mishra

MLA 

Mohit M.Patel , Shailendra K.Mishra. "Design and Development of Efficient Algorithm in Web Usage Mining For Web Personalization". International Journal of Engineering Trends and Technology (IJETT). V4(4):1101-1104 Apr 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

With the promoting of Cyber Crime informationization process, more and more complex data is accumulated, the data mining techniques used in Cyber Crime. The work, that finding in hidden and useful information to guide Cyber Crime Department from large number of web users data, will be helpful to the Cyber Crime reform and development. This article proposes one kind of improvement ID3 algorithm, this algorithm simplified information entropy solution, which is the standard of attribute selection and reduced co mplication of calculation. This application motivates us to stabiles different proxy server to decrease the cybercrime and increase the secure way for surfing.

References

[1] Extraction of Business Rules from Web logs to Improve Web Usage Mining. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250 - 2459, Volume 2, Issue 8, August 2012)
[2] Web Log Data Cleaning For Enhan cing Mining Process, International Journal of Communication and Computer Technologies Volume 01 – No.11, Issue: 03 December 2012ISSN NUMBER: 2278 - 9723
[3] Web Usage Mining: A Survey on Pattern Extraction from Web Logs, International Journal of Instrumen tation, Control & Automation (IJICA), Volume 1, Issue 1, 2011
[4] Using Data Fusion and Web Mining to Support Feature Location in Software, M Revelle, B Dit, D Poshyvanyk - (ICPC), 2010 IEEE 18th, 2010 - ieeexplore.ieee.org
[5] Clustering WSDL Documents to Bootstrap the Discovery of Web Services,K Elgazzar, AE Hassan, P Martin - Services (ICWS), 2010 IEEE, 2010 - ieeexplore.ieee.org
[6] A Novel Approach for clustering web user sessions using RST,Ms.Jyoti et al / International Journal on Computer Science and Engineering Vol.2(1), 2009, 56 - 61
[7] Jiawei Han,Micheline Kamber . Data mining: conceptsandtechniques . MorganKaufmann . 2006 . 58 - 61
[8] Web Usage Mining on Proxy Servers: A Case Study
[9] An Effective System for Mining Web Log.

Keywords
Web Log Mining; Web Usage Mining, Decision tree; ID3 algorithm; performance analysis.