Journal Indexing & Metrics

Total Downloads: 6
Total Views: 236
Content List:
Authors Affiliation Abstract Keywords References
Cite
Share

Integrated Web Usage Mining Algorithm for User’s Navigation

Ms. Khushboo Saxena, Dr. Akash Saxena

First Published December 20,2016

Authors
  1. Ms. Khushboo Saxena
  2. Dr. Akash Saxena
Affiliation
  • Asst. Porofessor Corporate Institute of Science and Technology, Bhopal
  • Associate Professor Compucom Institute of IT & Management, Jaipur
Abstract
In an era of technology, human collects huge amount of structural and unstructured data, in this scenario World Wide Web (WWW) performs vital role to find the solution in a single place. Various implementers give different types of data model to implement this. Web mining can be understand by three ways i.e. web structure mining, web usage mining, and web content mining. This paper focus on web usage mining, aims to describe pre-fetching system, extract useful information among huge amount of data, define user’s navigation, customer future prediction on the basis of navigation, Web personalization, web caching.
Various work of web usage mining has been proposed based on their threshold, time taken, and error rate; so in this paper, we proposed an integrated efficient web usage mining algorithm using fuzzy clustering and genetic algorithm which is able to generate better results as compared to previous results.
Keywords

World Wide Web (WWW), , Fuzzy Clustering, , Genetic algorithm, Web Usage Mining

References
  1. K. Krishna, M. Narasimha Murty(1999).Genetic K-Means Algorithm. IEEE Transactions on systems, man, and cybernetics-part b: cybernetics,Vol. 29, No. 3, pp: 433- 439.
  2. X Wang, J M. Garibaldi (2005). Simulated Annealing Fuzzy Clustering in Cancer Diagnosis, Informatica, 29, pp. 61–70
  3. Qingtian Han, Xiaoyan Gao , Wenguo Wu (2008). Study on Web Mining Algorithm Based on Usage Mining, Computer- Aided Industrial Design and Conceptual Design. 9th International Conference on 22-25 Nov. 2008
  4. K.Poongothai, M.Parimala and Dr. S.Sathiyabama.(2011) Efficient Web Usage Mining with Clustering. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 3,pp 203-209.
  5. Suresh, K.; Mohana, R. Madana; RamaMohanReddy, A.(2011).Improved FCM algorithm for Clustering on Web Usage Mining. SInternational Journal of Computer Science Issues (IJCSI);Jan2011, Vol. 8 Issue 1, pp.42
  6. Ranu Singhal, Nirupama Tiwari(2012). Web Log Mining Based on Improved FCM Algorithm using Multiobjective Genetic Algorithm. International Journal of Software and Web Sciences, pp-59-63
  7. Karunesh Gupta , Manish Shrivastava (2012). Web Usage Data Clustering Using Improved Genetic Fuzzy C-Means Algorithm. International Journal of Advanced Computer Research,Volume-2 Number-2 Issue-4
  8. Soniya P. Chaudhari, Prof. Hitesh Gupta, Prof. S. J. Patil (2013).Web Log Clustering using FCM and Swarm Intelligence Based Algorithms. International Journal of Innovative Research in Science, Engineering and Technology
  9. Shaily G. Langhnoja, Mehul P. Barot, Darshak B. Mehta(2013).Web Usage Mining to Discover Visitor Group with Common Behavior Using DBSCAN Clustering Algorithm. International Journal of Engineering and Innovative Technology ,Volume 2, Issue 7
  10. Helo´ýna Alves Arnaldo and Benjam´ýn R. C. Bedregal (2013). A new way to obtain the initial centroid clusters in Fuzzy C-Means algorithm
  11. Ranu Singhal, NirupamaTiwari (2013), A Survey: Web Log Mining using Genetic Algorithm. International Journal Of Engineering Sciences & Research Technology pp 1284-1286
  12. Aparna N. Gupta (2014).A Review: Study of Various Clustering Techniques in Web Usage Mining. International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 3,pp 5888-5891
  13. Rupinder Kaur, Simarjeet Kaur(2014).A Review: Techniques for Clustering of Web Usage Mining. International Journal of Science and Research, Vol 3 Issue 5 pp 1541-1545
  14. Deepak Kumar Niware (2014). Web Usage Mining through Efficient Genetic Fuzzy C-Means. International Journal of Computer Science and Network Security, VOL.14 No.6,p.p 113-117
Article Menu
Total Downloads: 6
Total Views: 786
Cite
Share
1