Analysis of web logs and web user in web mining

LK Grace, V Maheswari, D Nagamalai - arXiv preprint arXiv:1101.5668, 2011 - arxiv.org
Log files contain information about User Name, IP Address, Time Stamp, Access Request,
number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files …

Output regulation of Arneodo-Coullet chaotic system

S Vaidyanathan - … : First International Conference on Computer Science …, 2011 - Springer
This paper investigates the problem of output regulation of the Arneodo-Coullet chaotic
system, which is one of the paradigms of the chaotic systems proposed by A. Arneodo, P …

Access patterns in web log data: a review

MHA Elhiber, A Abraham - Journal of Network and Innovative …, 2013 - cspub-jnic.org
Access Patterns in Web Log Data: A Review Page 1 Journal of Network and Innovative
Computing ISSN 2160-2174, Volume 1 (2013) pp. 348-355 © MIR Labs, www.mirlabs.net/jnic/index.html …

Web log data analysis and mining

LKJ Grace, V Maheswari, D Nagamalai - … 2-4, 2011. Proceedings, Part III 1, 2011 - Springer
Log files contain information about User Name, IP Address, Time Stamp, Access Request,
number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files …

[PDF][PDF] Comparison analysis of web usage mining using pattern recognition techniques

N Singh, A Jain, RS Raw - International Journal of Data Mining & …, 2013 - researchgate.net
Web usage mining is the application of data mining techniques to better serve the needs of
web-based applications on the web site. In this paper, we analyze the web usage mining by …

[PDF][PDF] Analysis of user behavior through web usage mining

S Parvatikar, B Joshi - International Journal of Computer Applications, 2014 - Citeseer
Internet has gained a lot of interest of customers. Maintaining good relations with customer is
the major applications in web mining. The process of extracting useful information from web …

Learning analytics for the development of adapted e‐assessment workflow system

Y Bendaly Hlaoui, F Hajjej… - Computer Applications …, 2016 - Wiley Online Library
Learning analytics (LA) is a significant area of the enhanced learning technology that has
been emerged during the last decade. In this paper, we present a Cloud Adapted Workflow …

Internet usage patterns mining from firewall event logs

J Polpinij, K Namee - Proceedings of the 2019 International Conference …, 2019 - dl.acm.org
Understanding users' behavior of internet usage is essential for the quality of service (QoS)
analysis on the internet. If the internet providers can better understand their users, they may …

Personalised web search using ACO with information scent

S Chawla - International Journal of Knowledge and Web …, 2013 - inderscienceonline.com
In this paper the information scent is used as pheromone in ACO for optimising the
personalised web search based on clustered user search query sessions. It is realised that …

Developing a framework for web analytics

V Hausmann - 2012 - kola.opus.hbz-nrw.de
Abstract The World Wide Web (WWW) has become a very important communication
channel. Its usage has steadily grown within the past. Interest by website owners in …