SlideShare uma empresa Scribd logo
1 de 12
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
101
DEVELOPMENT OF PATTERN KNOWLEDGE DISCOVERY
FRAMEWORK USING CLUSTERING DATA MINING
ALGORITHM
Mr. Rinal H. Doshi Dr. Harshad B. Bhadka Ms. Richa Mehta
Research Scholar Director- MCA Research Scholar,
School of Engineering, C. U. Shah University, Lecturer, SKPIMCS
R.K. University, Rajkot Surendranagar, India KSV University,
L.C. I.T., Bhandu, India Gandhinagar, India
ABSTRACT
The prime objective of this research work is to identify a pattern of clustering and
extend to improve the use of Web Data Mining. This extension helps to sensitize
Knowledge Discovery and Business Improvement Intelligence. The motivation is to
analyze user access patterns and improve the access privileges of the users. These
improved access privileges helps to channelize the analysis for optimized selection of
objects. This work obtained secondary dataset of CPU processors from the web data
repository UCI. The dataset was subjected to the application of the techniques of
statistics, machines learning, and clustering data mining. The selection of appropriate
Web Mining Technique is a challenge for Knowledge Discovery. The selection primarily
depends upon the nature of a dataset. To obtain optimized solution to the challenge,
proposed work uses the Clustering Data Mining techniques. The results obtained there at
are analyzed to optimum outcome of data. To achieve optimum result this work has
proposed a framework Pattern Knowledge Discovery for macro level and micro level
pattern evaluation and test the proposed framework with its implementation for the
purpose of justification of the work.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 101-112
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
102
KEYWORDS: Web Mining, Data Mining, Knowledge Discovery Framework,
Machine Learning, Business Intelligence
1. INTRODUCTION
For this research work the focus is Data Mining and within the Data Mining the
sub area is Web Data Mining. The areas of Web Mining have three dimensions:
Content, Structure and Usage. The ultimate the focus work is Web Usage Data Mining
and in that Clustering Techniques are used to analyze user access pattern from web
dataset repositories and find hidden predictive knowledge.
2. LITERATURE REVIEW ANALYSIS AND REVIEW FINDINGS
The authors mainly focus on to get knowledge regarding improvement
and implement web development path by suggesting the sources of Web Usage Data
like Web Server, Proxy Server and Web client. They propose preparation, user
identification and session identification algorithm. They use Data Mining and
Knowledge Discovery technique for achieve targeted information [1]. While identify
the session, universal variable like time is not considered.
The work focus by authors is to generate data for web developers to optimize
web development scenario. They analyze statistical data of web browsing including
parallel browsing behavior of user to extract knowledge with the help of Graph
Mining, onPageLoad, onPageFocus, OnSessionEnd and preprocess algorithm [2].
Here they can consider time variable while calculating the user session. But not
consider the firewall and antivirus overheads while calculating user session timings.
The authors focus on to reduce Field Extraction time by improving cleaning
process of Web Usage Mining. They use Preprocess, Field Extraction, Data cleaning,
and Session information for achieving targeted objective [3]. But in this research
Machine learning approach (only talk about CLF file) is not adopted.
The authors have tried to improve Customer oriented approach in enhancement
of website development design and to formulate more customised web development.
To achieve this they apply pre- processing and clustering data mining technique on
log file and establishment web browsing path by using rate and time matrices of
visited page [4]. In this work they cannot fill the gap of untrained customers who are
monitored and analysed.
Authors of the paper analyse the comparative study of Web Mining’s today’s
structure and tomorrow view [5]. There is no clarity between web mining and
data mining in their survey work.
Author introduces Web Mining and Web Mining Techniques to achieve
targeted information related to e- commerce. They used Pattern Discovery and
Analysis tool to find user access pattern targeted to website optimization, website
design customization, customer relationship management, e-commerce security
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
103
enhancement, operating cost reduction to improve overall competitiveness of an
enterprise [6].
Authors have developed algorithm for mining learner interest and offering
personalized design for e-learning. The mining patterns provides user specific
correlated pages, learner’s interest in pages, etc. which can help to enhance the
effectiveness of teaching website improving the design [7]. To predict personalized
need of student is challenging task.
Authors used Clustering Web Usage Mining on secondary data in order to find
user access pattern and order of their visits of hyperlink. This can lead to cluster
user with similar access pattern to collaborate [8]. The challenge of their work is to
decide initial cluster and improve the cluster algorithm.
The author applied text mining on a set of 763 documents from Web databases
and analysed word frequency, keywords etc. to draw conclusions on topic/keyword of
interest [9][10]. For getting optimum outcome this work need to apply text mining on
more documents from various locations.
Authors applied Web Mining Techniques to analyze security data on e-
commerce websites based on user behaviour. The analysis involved Clustering
Techniques of K-means to partition observation into clusters with related security
issues [11]. For getting more accurate outcome more clustering technique must be
needed.
The authors have Clustering and Association Mining Techniques in inter-mix form to
Improve Web Personalization [12].
3. PROPOSED FRAMEWORK
The analysis of literature review is to be the foundation to design knowledge
discovery framework. The proposed framework is to be implemented with utilization
of diverse dimension of application of dataset to provide diversified services under
neat the propose framework. The plan of phases to be involved in the implementation
data collection, data pre-processing, and tabulate the result in all phases with their
individual analysis. The selection of appropriate Web Mining technique is the only
challenge for Knowledge Discovery and the selection of technique is based on the
nature of a dataset. The work is extended to discover knowledge by using Web Data
Mining. Proposed work focus on Clustering Data Mining Technique and analyzing
data to find out optimum outcome of data. Extracted result will generate knowledge.
To fulfill the proposed work this work focus on implementing pattern knowledge
discovery framework.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
104
3.1Graphical View Of Proposed Framework
Fig. 1: GRAPHICAL VIEW OF PROPOSED FRAMEWORK
(PATTERN KNOWLEDGE DISCOVERY FRAMEWORK)
3.2 Logical view of Proposed Framework
3.2.2 Data Acquisition Stage
Input: http information request
Processing: searching for the requested information in the Web Sources like web
repositories, weblog, Web Server, Web Data warehouse, Web Databases, External Web
Sources etc.
Output: Response of the requested information in the form of voluminous data
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
105
3.2.3 Pre-processing Stage
Input: Voluminous data acquired from data acquisition stage
Processing: Voluminous data pre-processing is done at five levels-Extraction
(Level 1), Cleaning (Level 2), Integration (Level 3), Transformation (Level 4) and finally
reduction (Level 5).
Output: Pre-processed refined data.
3.2.4 Processing Stage
Input: Refined data after the five level pre- processing stages.
Processing: Processing of the refined pre- processed data using Data Mining open
source tool WEKA. Processing is done through various clustering Data Mining algorithm
and techniques- Simple K-Means (KM), Expectation Maximization (EM), Farthest First (FF)
and Filtered Cluster (FC).
Output: Processed Clustered data
3.2.4 Evaluation and analysis Stage
Input: Clustered data from the processing stage.
Processing: Macro level pattern evaluation and statistical analysis is performed on the
various integrated User Access Pattern obtained in the form of different types of clusters after
applying the processing stage cluster Data Mining Techniques.
Output: Evaluated analytical data.
3.2.5 Pattern Knowledge Discovery Stage
Input: The Evaluated analytical data after pattern evaluation and statistical analysis.
Processing: The output obtain from evaluation stage is studied at micro level to get
patterns which results in the Knowledge Discovery of the targeted voluminous data set.
Output: Pattern Knowledge Discovery
4. IMPLEMENTATION
The process uses a set of clustering techniques for mining hidden patterns in WEKA
open source data mining tool.
4.1 Implementation using Simple K- Means Algorithm
This technique takes input from CPU_PERFORMACE pre-processed data set and
then applies K- means clustering technique.
The step involved in K- Means algorithm are: [13]
To divide items or objects into groups of subsets or sub-subsets.
To obtain central values of the clusters.
To allocate each item or object to a relevant cluster with the next-door points or
nearest mean points.
To obtain the central values of the clusters Repeat step 2 to step 4 till the conversions
has been reached. The Cluster central values are tabulated in Table 1.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
106
TABLE 1: CLUSTER CENTRAL VALUES
Attribute Full data
(213)
Cluster 0
(163)
Cluster 1
(50)
Supplier ALL* amd Zilog
CycleTimeNS 207.0469 250.7485 64.58
RAMMin 2876.8732 1845.8282 6238.08
RAMMax 12025.3333 8191.5092 24523.6
CacheMem 25.9343 11.9509 71.52
ChnlMin 4.8732 3.0613 10.78
ChnlMax 18.3099 12.7117 36.56
P_RPP 99.8732 51.6687 257.02
ALL* (213) = amd (163) + zilog (50)
This process took 12 iterations and to build the clustered datasets it took 0.02 second.
Number of clusters selected by cross validation is 2 (0 through 1).
The model and evaluation of clustered instance are tabulated in Table 2 and visualized
as Figure 2.
TABLE 3: CLUSTERED INSTANCES
Cluster no Instances Percentage %
0 163 77
1 50 23
Fig. 2: INSTANCE USING K-MEANS TECHNIQUES
This Simple K-Means technique resulted in 2 clusters comprising of amd and zilog
suppliers for CPU performance.
4.2 Implementation using Expectation Maximization Algorithm
The EM (Expectation Maximization) algorithm is a technique which reflecting the
abstraction of clustering K-Means algorithm. It tracks an iterative loom, sub-optimal, which
seeks to get the constraints of the probability distribution that can say maximum probability
of its characteristics. EM Clustering is basically model based clusters [14].
Number of clusters selected by cross validation is 6 (0 through 5).
This research work finds the means and standard deviation of different parameter like
CycleTimeNS, RAMMin, RAMMax, CacheMem, ChnlMin, ChnlMax, P_RPP.
This process took 11.22 second to build to model the clustered the datasets. The
model and evaluation of clustered instance are tabulated in Table 4 and visualized in Figure
3.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
107
TABLE 4: CLUSTERED INSTANCES FOR CPU_PERFORMANCE
Cluster no results Supplier
0 36% motorola
1 9% sony
2 9% amtel
3 2% zilog
4 20% freescale
5 24% amd
Fig. 3: INSTANCE USING EM
This EM technique resulted in 6 clusters comprising of Motorola, amd, freescale,
Sony, amtel, zilog suppliers for CPU performance.
4.3 Implementation using Farthest First Algorithm
Farthest First clustering technique offers a very fast analysis when we carry on in
brain point constrain, except builds reasonably high error rate to other clustering technique.
Farthest first is an alternative of K means that places each cluster center in turn at the point
furthest from the existing cluster centers. This point must laze contained by the data part.
These significantly speed up the clustering in mainly cases since a lesser amount of relocation
and modification is desirable [15].
This research work used farthest fast method for discovering pattern form datasets
using WEKA open source tools.
In this technique incorrect instances are 175. Cluster centroids obtain by weka tools
are tabulated in Table 5.
TABLE 5: CENTROIDS USING FF CLUSTERING TECHNIQUES
Cluster Centroids
0 125.0 512.0 1000.0 0.0 8.0 20.0 19.0
1 23.0 32000.0 64000.0 128.0 32.0 64.0 1238.0
The model and evaluation of clustered instance are tabulated Table 6 and visualized in
Figure 4.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
108
TABLE 6: CLUSTER INSTANCES FOR CPUPERFORMANCE
Cluster instances Percentage Supplier
0 208 98% amd
1 5 2% amtel
Fig. 4: INSTANCE USING FF
This FF technique resulted in 2 clusters comprising of amd and amtel suppliers for
CPU performance.
4.4 Implementation using Filtered Cluster Algorithm
In FilteredClusterer instances will be procedure by the filter not including altering its
structure. FilteredClusterer class is in the weka. clusterers. FilteredClusterer package. Details
of methods are in this package [16].
In FilteredClusterer Data Mining Techniques number of iteration is seven. In this
techniques cluster centroids are tabulated in Table 7.
TABLE 7: CLUSTER CENTRAL VALUE
Attribute Full Data
(213)
Cluster 0
(186)
Cluster 1
(27)
CycleTimeNS 207.0469 231.4462 38.963
RAMMin 2876.8732 1865.1505 9846.5185
RAMMax 12025.3333 8674.172 35111.1111
CacheMem 25.9343 16.3656 91.8519
ChnlMin 4.8732 3.2043 16.3704
ChnlMax 18.3099 13.7957 49.4074
P_RPP 99.8732 56.129 401.2222
Incorrect instance are 173. The model and evaluation of clustered instance are
tabulated in Table 8 and visualized in Figure 5.
TABLE 8: CLUSTER INSTANCE OF CPU_PERFORMANCE
cluster instances % Supplier
0 186 87% amd
1 27 13% amtel
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
109
Fig. 5: INSTANCE USING FILTERED CLUSTERERS
This Filtered cluster technique resulted in 2 clusters comprising of amd and amtel
suppliers for CPU performance.
5. RESULT ANALYSIS WITH JUSTIFICATION
The outputs generated by the application of four Data Mining Techniques on to the
dataset of CPU_PERFORMCE are tabulated in Table 2 for the purpose of Result Analysis as
Table 9.
TABLE 9: ANALYSIS TABLE
Supplier
/
Algorithm
a
m
d
a
m
t
e
l
m
o
t
o
r
o
l
a
f
r
e
e
s
c
a
l
e
S
o
n
y
z
i
l
o
g
Simple
K- means
77% 23%
EM 24% 9% 36% 20% 9% 20%
FF 98% 2%
Filtered
Cluster
87% 13%
The results are obtained by subjecting the dataset of CPU_PERFORMANCE to a
Data Mining Techniques. The data volume is 213 instances in the dataset. Each instance is a
group of seven attribute and one class. The result obtained on applying K-Means clustering
techniques. This technique generated two clusters classifying the cluster named amd (77%)
and zilog (23%) though there are 29 suppliers. This research uses K-Means clustering
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
110
technique because it produces computationally faster and tighter cluster as compare to
hierarchical clustering technique. K-Means algorithm is able to identify the non linear
structure. It is best suit for the real life dataset or web log data.
The result obtained on applying EM clustering techniques. This technique generated
six clusters classifying the cluster named Motorola (36%), amd (24%), freescale (20%),
Sony(9%), amtel(9%), zilog(2%) though there are 29 suppliers. EM clustering algorithm used
because Exception Maximization (EM) clustering algorithm is distance-based algorithm
whose dataset modeling assumption is linear combination of multi variant normal
distributions. This algorithm finds distribution parameters that maximize loglikelyhood.
This algorithm is chosen to cluster data because it can handle high dimensionality
because of its linearity and converges fast having given appropriate initialization. There are
certain cluster analysis situation with real world dataset where the need we to perform cluster
analysis a small region of interest. EM clustering algorithm gives optimized results even
compare to result given by K-Means algorithm.
The result obtained on applying FF clustering techniques. This technique generated
two clusters classifying the cluster named amd (98%) and amtel (2%) though there are 29
suppliers. This technique is used because Farthest First is K means clustering algorithm
variant that places each cluster centre in turn at the point furthest from the existing cluster
centers. This point must be positioned inside the data part. This precisely means the steps in
sequences as: Pick first center randomly, next is the point furthest from the first center, next
is the point furthest from both previous centers and so on till convergence. This greatly
speeds up the clustering because of the less need of relocation and tuning.
The result obtained on applying Filtered r clustering techniques. This technique
generated two clusters classifying the cluster named amd(87%) and amtel(13%) though there
are 29 suppliers.
With the help of weka tool, dataset of CPUPerformace are passed through different
clustering Data Mining Techniques like simple K-Means, EM, Farthest First and
FilteredClusterer methods.
In above section this research discuss about different supplier who gives best CPU
performance based up on different criteria like CycleTimeNS, RAMMin, RAMMax,
CacheMem, ChnlMin, ChnlMax, P_RPP.
For this analysis found that in simple K-Means techniques amd and zilog supplier
gives best performance. EM methods Motorola, amd, freescale, sony, amtel, zilog suppliers
gives best cpu performance. Farthest First method amd and amtel supplier gives best
performance. FilteredClusterer method amd and amtel supplier gives best performance.
All the method’s results are studied and this research gives amd is best supplier in
terms of the performance. And second supplier is amtel who gives best performance.
6. CONCLUSION
The dimensions of Web Usage Mining are to extract and analyze pattern for the
purpose of Knowledge discovery and ultimately pattern knowledge discovery.
Appropriate Web Mining Technique, Clustering Algorithm and dataset is prime
challenge of survey findings. So this work proposes a Pattern Knowledge Discovery
framework to solve the challenges in literature review.
The designed pattern Knowledge Discovery (PKD) framework which involves five
stages of pattern Knowledge Discovery process- data acquisition (stage 1), five level pre-
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
111
processing (stage 2), processing (Stage 3), Evaluation and analysis (Stage 4) and Pattern
Knowledge Discovery (Stage 5) can be used in variegated areas of applications of knowledge
data discovery (KDD) process.
From the bundle of Data Mining Techniques – Classification, Regression, Association
Rule Mining, Clustering etc. the suggested Cluster Data Mining algorithms and techniques
can be availed to get the expected precise outcome from which various inferences are
derived to perform the comparative evaluation and statistical analysis to obtain the mined
pattern knowledge.
The implementation of the PKD framework and the results obtains after applying the
various Data Mining Clustering Techniques using the open source Web Mining tool WEKA,
illustrates that the above Web Usage Mining category of Web Data Mining, the five staged
PKD framework and the proposed clustering techniques fulfils the criteria of the targeted
Data Mining Knowledge Discovery process.
7. RESEARCH EXTENSION
The research work has used Web Usage Mining category of Web Mining which has a
wide areas of applications on the web and which can be implemented in the other live and
user specific domains. The dataset acquired from the Web Sources can also be obtained from
live dataset sources from various industries, institutes , research and development
organizations.
The proposed Pattern Knowledge Discovery (PKD) framework which focusing on
clustering Data Mining Techniques can be further extended to design a versatile Data Mining
Techniques implemented robust approach in a single integrated pattern Knowledge Discovery
framework.
The Evaluation and analysis Stage can be extended to get a user friendly visual output
leading to visual Data Mining and Knowledge Discovery for much better understanding of
derived knowledge quantum.
The undertaken work has used WEKA tool, the set of similar and relevant tools can
be used for achieving more optimized results comparatively.
The research work undertaken in timeframe in predefine objective and expected
outcome will have left out issue and challenges encounter in research work. This issue and
challenges will provide opportunity to extend this work beyond its summed up research.
REFERENCES
1. Shahnaz Parvin Nina, Md. Mahamudur Rahaman, Md. Khairul Islam Bhuiyan,
Khandakar Entenam Unayes Ahmed, “Pattern Discovery of Web Usage Mining”, 2009
International Conference on Computer Technology and Development, IEEE Computer
society.
2. Mehdi Heydari, Raed Ali Helal, Khairil Imran Ghauth, “A Graph-Based Web Usage
Mining Method Considering Client Side Data”, IEEE 2009 International Conference on
Electrical Engineering and Informatics 5-7 August 2009, Selangor, Malaysia.
3. Theint Aye, “Web log cleaning for mining of web usage patterns”, IEEE 2011.
4. Shuyan Bai, Qingtian Han, Qiming Liu, Xiaoyan Gao, “Research of an algorithm based
on Web Usage Mining”, IEEE 2009.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
112
5. Kavita Sharma, Gulshan Shrivastava, Vikash Kumar, “Web Mining: Today and
Tomorrow”, IEEE 2011.
6. Zhang Haiyang, “The Research of Web Mining in E-commerce”, IEEE 2011.
7. FeiQiong Rong, “ The Application of Web Usage Mining in Personalized Network
Education”, IEEE 2011
8. K. Suresh, R. MadanaMohana, A. RamaMohanReddy, A. Subrmanyam,“ Improved
FCM Algorithm for Clustering on Web Usage Mining “, IEEE 2011
9. Lanjie Chen, Li Wei, “The Hot Research Topics and the Research Fronts in the Field of
Web Data Mining (WDM) Based on Web of Science “, The 5th international
conference on computer science & education Hefei, China. August 24-27 2010, IEEE
2010.
10. R. Manjusha, Dr. R. Ramachandran, “Web Mining Framework for Security in E-
commerce”, ICRTIT 2011, MIT, Anna University, Chennai, IEEE 2011
11. Yi Dong, Huiying Zhang, Linnan Jiao, “Research on Application of User Navigation
Pattern Mining Recommendation”, Proceeding of the 6th world congress on intelligent
control and automation, June 21-23 2006, Dalian, China, IEEE 2006
12. Ching-Ming Chao, Shih-Yang Yaang, Po-Zung Chen, Chu-Hao Sun, “An Online Web
Usage Mining System Using Stochastic Timed Petri Nets”, Fourth international
conference on Ubi-media computing, IEEE 2011
13. Kehar singh, Evolving limitations in K-Means algorithm in Data Mining and their
removal, IJCEM International Journal of Computational Engineering & Management,
Vol. 12, April 2011, ISSN (Online): 2230-7893
14. Norwati Mustapha, Expectation Maximization Clustering Algorithm for User Modeling
in Web Usage Mining Systems, European Journal of Scientific Research, ISSN 1450-
216X Vol.32 No.4 (2009), pp.467-476
15. Reuben Evans, “Clustering for Clasification” From
http://www.cs.waikato.ac.nz/~geoff/Thesis.pdf [access on 12/12/2012]
16. WEKA, “The University of Waikato”, machine learning group, weka documentation,
clusterers, From
http://weka.sourceforge.net/doc.dev/weka/clusterers/FilteredClusterer.html [access on
22/12/2012]
17. M. Karthikeyan, M. Suriya Kumar and Dr. S. Karthikeyan, “A Literature Review on
The Data Mining and Information Security”, International Journal of Computer
Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 141 - 146, ISSN
Print: 0976 – 6367, ISSN Online: 0976 – 6375
18. R. Manickam, D. Boominath and V. Bhuvaneswari,, “An Analysis of Data Mining:
Past, Present and Future”, International Journal of Computer Engineering &
Technology (IJCET), Volume 3, Issue 1, 2012, pp. 1 - 9, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375
19. R. Lakshman Naik, D. Ramesh and B. Manjula, “Instances Selection using Advance
Data Mining Techniques”, International Journal of Computer Engineering &
Technology (IJCET), Volume 3, Issue 2, 2012, pp. 47 - 53, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375

Mais conteúdo relacionado

Mais procurados

Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurIAEME Publication
 
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...cscpconf
 
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...IJwest
 
Vertical intent prediction approach based on Doc2vec and convolutional neural...
Vertical intent prediction approach based on Doc2vec and convolutional neural...Vertical intent prediction approach based on Doc2vec and convolutional neural...
Vertical intent prediction approach based on Doc2vec and convolutional neural...IJECEIAES
 
IRJET- Concept Extraction from Ambiguous Text Document using K-Means
IRJET- Concept Extraction from Ambiguous Text Document using K-MeansIRJET- Concept Extraction from Ambiguous Text Document using K-Means
IRJET- Concept Extraction from Ambiguous Text Document using K-MeansIRJET Journal
 
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET Journal
 
Educational data mining using jmp
Educational data mining using jmpEducational data mining using jmp
Educational data mining using jmpijcsit
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationeSAT Journals
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileeSAT Publishing House
 
A Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsA Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsIRJET Journal
 
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM IAEME Publication
 
Data characterization towards modeling frequent pattern mining algorithms
Data characterization towards modeling frequent pattern mining algorithmsData characterization towards modeling frequent pattern mining algorithms
Data characterization towards modeling frequent pattern mining algorithmscsandit
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningeSAT Journals
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTcsandit
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3prj_publication
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningeSAT Publishing House
 

Mais procurados (18)

Subgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructurSubgraph relative frequency approach for extracting interesting substructur
Subgraph relative frequency approach for extracting interesting substructur
 
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
A NEW IMPROVED WEIGHTED ASSOCIATION RULE MINING WITH DYNAMIC PROGRAMMING APPR...
 
50120140505015 2
50120140505015 250120140505015 2
50120140505015 2
 
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
 
Vertical intent prediction approach based on Doc2vec and convolutional neural...
Vertical intent prediction approach based on Doc2vec and convolutional neural...Vertical intent prediction approach based on Doc2vec and convolutional neural...
Vertical intent prediction approach based on Doc2vec and convolutional neural...
 
50120140503003 2
50120140503003 250120140503003 2
50120140503003 2
 
IRJET- Concept Extraction from Ambiguous Text Document using K-Means
IRJET- Concept Extraction from Ambiguous Text Document using K-MeansIRJET- Concept Extraction from Ambiguous Text Document using K-Means
IRJET- Concept Extraction from Ambiguous Text Document using K-Means
 
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
 
Educational data mining using jmp
Educational data mining using jmpEducational data mining using jmp
Educational data mining using jmp
 
Evaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classificationEvaluating the efficiency of rule techniques for file classification
Evaluating the efficiency of rule techniques for file classification
 
Evaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for fileEvaluating the efficiency of rule techniques for file
Evaluating the efficiency of rule techniques for file
 
A Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search ResultsA Survey on Automatically Mining Facets for Queries from their Search Results
A Survey on Automatically Mining Facets for Queries from their Search Results
 
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM
MULTI-DOCUMENT SUMMARIZATION SYSTEM: USING FUZZY LOGIC AND GENETIC ALGORITHM
 
Data characterization towards modeling frequent pattern mining algorithms
Data characterization towards modeling frequent pattern mining algorithmsData characterization towards modeling frequent pattern mining algorithms
Data characterization towards modeling frequent pattern mining algorithms
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
 
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENTQUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
QUERY OPTIMIZATION IN OODBMS: IDENTIFYING SUBQUERY FOR COMPLEX QUERY MANAGEMENT
 
A genetic based research framework 3
A genetic based research framework 3A genetic based research framework 3
A genetic based research framework 3
 
Using data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text miningUsing data mining methods knowledge discovery for text mining
Using data mining methods knowledge discovery for text mining
 

Destaque

Non Conventional Android Programming (English)
Non Conventional Android Programming (English)Non Conventional Android Programming (English)
Non Conventional Android Programming (English)Davide Cerbo
 
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnost
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnostElektrična vozila - Trajnostno bivanje vključuje tudi zeleno mobilnost
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnostAndrej Dovič
 
Hs workshop blogging
Hs workshop bloggingHs workshop blogging
Hs workshop bloggingHans K. Meyer
 
La mente y el desarrollo humano
La mente  y el desarrollo humanoLa mente  y el desarrollo humano
La mente y el desarrollo humanoEuler Ruiz
 
Adm EstratéGica Na GestãO PúBlica
Adm EstratéGica Na GestãO PúBlicaAdm EstratéGica Na GestãO PúBlica
Adm EstratéGica Na GestãO PúBlicapragomes
 
Ingria diseño
Ingria diseñoIngria diseño
Ingria diseñoluis8910
 
Formació d'horts urbans
Formació d'horts urbansFormació d'horts urbans
Formació d'horts urbansespailolla
 
O impacto da liderança no desempenho das organizações
O impacto da liderança no  desempenho das organizaçõesO impacto da liderança no  desempenho das organizações
O impacto da liderança no desempenho das organizaçõesFundação Dom Cabral - FDC
 
David Yawson @FTF2013
David Yawson @FTF2013David Yawson @FTF2013
David Yawson @FTF2013FTF2013
 
2012 Social Election Survey Report Presentation Slides
2012 Social Election Survey Report Presentation Slides2012 Social Election Survey Report Presentation Slides
2012 Social Election Survey Report Presentation SlidesORI
 

Destaque (20)

Non Conventional Android Programming (English)
Non Conventional Android Programming (English)Non Conventional Android Programming (English)
Non Conventional Android Programming (English)
 
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnost
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnostElektrična vozila - Trajnostno bivanje vključuje tudi zeleno mobilnost
Električna vozila - Trajnostno bivanje vključuje tudi zeleno mobilnost
 
trabajo de estadistca
trabajo de estadistcatrabajo de estadistca
trabajo de estadistca
 
Hs workshop blogging
Hs workshop bloggingHs workshop blogging
Hs workshop blogging
 
10.1.1.196.7449
10.1.1.196.744910.1.1.196.7449
10.1.1.196.7449
 
La mente y el desarrollo humano
La mente  y el desarrollo humanoLa mente  y el desarrollo humano
La mente y el desarrollo humano
 
Book: Corporate Reputation. Chapter 1
Book: Corporate Reputation. Chapter 1Book: Corporate Reputation. Chapter 1
Book: Corporate Reputation. Chapter 1
 
Liderazgo
LiderazgoLiderazgo
Liderazgo
 
Ita 2013
Ita 2013Ita 2013
Ita 2013
 
Adm EstratéGica Na GestãO PúBlica
Adm EstratéGica Na GestãO PúBlicaAdm EstratéGica Na GestãO PúBlica
Adm EstratéGica Na GestãO PúBlica
 
Violencia
ViolenciaViolencia
Violencia
 
Ingria diseño
Ingria diseñoIngria diseño
Ingria diseño
 
Questões
QuestõesQuestões
Questões
 
Formació d'horts urbans
Formació d'horts urbansFormació d'horts urbans
Formació d'horts urbans
 
O impacto da liderança no desempenho das organizações
O impacto da liderança no  desempenho das organizaçõesO impacto da liderança no  desempenho das organizações
O impacto da liderança no desempenho das organizações
 
David Yawson @FTF2013
David Yawson @FTF2013David Yawson @FTF2013
David Yawson @FTF2013
 
English presentation
English presentationEnglish presentation
English presentation
 
Board
BoardBoard
Board
 
2012 Social Election Survey Report Presentation Slides
2012 Social Election Survey Report Presentation Slides2012 Social Election Survey Report Presentation Slides
2012 Social Election Survey Report Presentation Slides
 
Dirty dozen 환경호르몬
Dirty dozen 환경호르몬Dirty dozen 환경호르몬
Dirty dozen 환경호르몬
 

Semelhante a Development of pattern knowledge discovery framework using

Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmIAEME Publication
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...James Heller
 
WebSite Visit Forecasting Using Data Mining Techniques
WebSite Visit Forecasting Using Data Mining  TechniquesWebSite Visit Forecasting Using Data Mining  Techniques
WebSite Visit Forecasting Using Data Mining TechniquesChandana Napagoda
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningIAEME Publication
 
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...ijdkp
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web dataeSAT Publishing House
 
A comparative study on different types of effective methods in text mining
A comparative study on different types of effective methods in text miningA comparative study on different types of effective methods in text mining
A comparative study on different types of effective methods in text miningIAEME Publication
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 
Comparative analysis of various data stream mining procedures and various dim...
Comparative analysis of various data stream mining procedures and various dim...Comparative analysis of various data stream mining procedures and various dim...
Comparative analysis of various data stream mining procedures and various dim...Alexander Decker
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET Journal
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningIJERA Editor
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...ijcsa
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...ijcsa
 

Semelhante a Development of pattern knowledge discovery framework using (20)

Parametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithmParametric comparison based on split criterion on classification algorithm
Parametric comparison based on split criterion on classification algorithm
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 
Pf3426712675
Pf3426712675Pf3426712675
Pf3426712675
 
WebSite Visit Forecasting Using Data Mining Techniques
WebSite Visit Forecasting Using Data Mining  TechniquesWebSite Visit Forecasting Using Data Mining  Techniques
WebSite Visit Forecasting Using Data Mining Techniques
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web mining
 
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web data
 
A comparative study on different types of effective methods in text mining
A comparative study on different types of effective methods in text miningA comparative study on different types of effective methods in text mining
A comparative study on different types of effective methods in text mining
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
50120140502013
5012014050201350120140502013
50120140502013
 
50120140502013
5012014050201350120140502013
50120140502013
 
50120140504006
5012014050400650120140504006
50120140504006
 
Comparative analysis of various data stream mining procedures and various dim...
Comparative analysis of various data stream mining procedures and various dim...Comparative analysis of various data stream mining procedures and various dim...
Comparative analysis of various data stream mining procedures and various dim...
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
50120140503012
5012014050301250120140503012
50120140503012
 
IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...IRJET-Computational model for the processing of documents and support to the ...
IRJET-Computational model for the processing of documents and support to the ...
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Development of pattern knowledge discovery framework using

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 101 DEVELOPMENT OF PATTERN KNOWLEDGE DISCOVERY FRAMEWORK USING CLUSTERING DATA MINING ALGORITHM Mr. Rinal H. Doshi Dr. Harshad B. Bhadka Ms. Richa Mehta Research Scholar Director- MCA Research Scholar, School of Engineering, C. U. Shah University, Lecturer, SKPIMCS R.K. University, Rajkot Surendranagar, India KSV University, L.C. I.T., Bhandu, India Gandhinagar, India ABSTRACT The prime objective of this research work is to identify a pattern of clustering and extend to improve the use of Web Data Mining. This extension helps to sensitize Knowledge Discovery and Business Improvement Intelligence. The motivation is to analyze user access patterns and improve the access privileges of the users. These improved access privileges helps to channelize the analysis for optimized selection of objects. This work obtained secondary dataset of CPU processors from the web data repository UCI. The dataset was subjected to the application of the techniques of statistics, machines learning, and clustering data mining. The selection of appropriate Web Mining Technique is a challenge for Knowledge Discovery. The selection primarily depends upon the nature of a dataset. To obtain optimized solution to the challenge, proposed work uses the Clustering Data Mining techniques. The results obtained there at are analyzed to optimum outcome of data. To achieve optimum result this work has proposed a framework Pattern Knowledge Discovery for macro level and micro level pattern evaluation and test the proposed framework with its implementation for the purpose of justification of the work. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 101-112 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 102 KEYWORDS: Web Mining, Data Mining, Knowledge Discovery Framework, Machine Learning, Business Intelligence 1. INTRODUCTION For this research work the focus is Data Mining and within the Data Mining the sub area is Web Data Mining. The areas of Web Mining have three dimensions: Content, Structure and Usage. The ultimate the focus work is Web Usage Data Mining and in that Clustering Techniques are used to analyze user access pattern from web dataset repositories and find hidden predictive knowledge. 2. LITERATURE REVIEW ANALYSIS AND REVIEW FINDINGS The authors mainly focus on to get knowledge regarding improvement and implement web development path by suggesting the sources of Web Usage Data like Web Server, Proxy Server and Web client. They propose preparation, user identification and session identification algorithm. They use Data Mining and Knowledge Discovery technique for achieve targeted information [1]. While identify the session, universal variable like time is not considered. The work focus by authors is to generate data for web developers to optimize web development scenario. They analyze statistical data of web browsing including parallel browsing behavior of user to extract knowledge with the help of Graph Mining, onPageLoad, onPageFocus, OnSessionEnd and preprocess algorithm [2]. Here they can consider time variable while calculating the user session. But not consider the firewall and antivirus overheads while calculating user session timings. The authors focus on to reduce Field Extraction time by improving cleaning process of Web Usage Mining. They use Preprocess, Field Extraction, Data cleaning, and Session information for achieving targeted objective [3]. But in this research Machine learning approach (only talk about CLF file) is not adopted. The authors have tried to improve Customer oriented approach in enhancement of website development design and to formulate more customised web development. To achieve this they apply pre- processing and clustering data mining technique on log file and establishment web browsing path by using rate and time matrices of visited page [4]. In this work they cannot fill the gap of untrained customers who are monitored and analysed. Authors of the paper analyse the comparative study of Web Mining’s today’s structure and tomorrow view [5]. There is no clarity between web mining and data mining in their survey work. Author introduces Web Mining and Web Mining Techniques to achieve targeted information related to e- commerce. They used Pattern Discovery and Analysis tool to find user access pattern targeted to website optimization, website design customization, customer relationship management, e-commerce security
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 103 enhancement, operating cost reduction to improve overall competitiveness of an enterprise [6]. Authors have developed algorithm for mining learner interest and offering personalized design for e-learning. The mining patterns provides user specific correlated pages, learner’s interest in pages, etc. which can help to enhance the effectiveness of teaching website improving the design [7]. To predict personalized need of student is challenging task. Authors used Clustering Web Usage Mining on secondary data in order to find user access pattern and order of their visits of hyperlink. This can lead to cluster user with similar access pattern to collaborate [8]. The challenge of their work is to decide initial cluster and improve the cluster algorithm. The author applied text mining on a set of 763 documents from Web databases and analysed word frequency, keywords etc. to draw conclusions on topic/keyword of interest [9][10]. For getting optimum outcome this work need to apply text mining on more documents from various locations. Authors applied Web Mining Techniques to analyze security data on e- commerce websites based on user behaviour. The analysis involved Clustering Techniques of K-means to partition observation into clusters with related security issues [11]. For getting more accurate outcome more clustering technique must be needed. The authors have Clustering and Association Mining Techniques in inter-mix form to Improve Web Personalization [12]. 3. PROPOSED FRAMEWORK The analysis of literature review is to be the foundation to design knowledge discovery framework. The proposed framework is to be implemented with utilization of diverse dimension of application of dataset to provide diversified services under neat the propose framework. The plan of phases to be involved in the implementation data collection, data pre-processing, and tabulate the result in all phases with their individual analysis. The selection of appropriate Web Mining technique is the only challenge for Knowledge Discovery and the selection of technique is based on the nature of a dataset. The work is extended to discover knowledge by using Web Data Mining. Proposed work focus on Clustering Data Mining Technique and analyzing data to find out optimum outcome of data. Extracted result will generate knowledge. To fulfill the proposed work this work focus on implementing pattern knowledge discovery framework.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 104 3.1Graphical View Of Proposed Framework Fig. 1: GRAPHICAL VIEW OF PROPOSED FRAMEWORK (PATTERN KNOWLEDGE DISCOVERY FRAMEWORK) 3.2 Logical view of Proposed Framework 3.2.2 Data Acquisition Stage Input: http information request Processing: searching for the requested information in the Web Sources like web repositories, weblog, Web Server, Web Data warehouse, Web Databases, External Web Sources etc. Output: Response of the requested information in the form of voluminous data
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 105 3.2.3 Pre-processing Stage Input: Voluminous data acquired from data acquisition stage Processing: Voluminous data pre-processing is done at five levels-Extraction (Level 1), Cleaning (Level 2), Integration (Level 3), Transformation (Level 4) and finally reduction (Level 5). Output: Pre-processed refined data. 3.2.4 Processing Stage Input: Refined data after the five level pre- processing stages. Processing: Processing of the refined pre- processed data using Data Mining open source tool WEKA. Processing is done through various clustering Data Mining algorithm and techniques- Simple K-Means (KM), Expectation Maximization (EM), Farthest First (FF) and Filtered Cluster (FC). Output: Processed Clustered data 3.2.4 Evaluation and analysis Stage Input: Clustered data from the processing stage. Processing: Macro level pattern evaluation and statistical analysis is performed on the various integrated User Access Pattern obtained in the form of different types of clusters after applying the processing stage cluster Data Mining Techniques. Output: Evaluated analytical data. 3.2.5 Pattern Knowledge Discovery Stage Input: The Evaluated analytical data after pattern evaluation and statistical analysis. Processing: The output obtain from evaluation stage is studied at micro level to get patterns which results in the Knowledge Discovery of the targeted voluminous data set. Output: Pattern Knowledge Discovery 4. IMPLEMENTATION The process uses a set of clustering techniques for mining hidden patterns in WEKA open source data mining tool. 4.1 Implementation using Simple K- Means Algorithm This technique takes input from CPU_PERFORMACE pre-processed data set and then applies K- means clustering technique. The step involved in K- Means algorithm are: [13] To divide items or objects into groups of subsets or sub-subsets. To obtain central values of the clusters. To allocate each item or object to a relevant cluster with the next-door points or nearest mean points. To obtain the central values of the clusters Repeat step 2 to step 4 till the conversions has been reached. The Cluster central values are tabulated in Table 1.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 106 TABLE 1: CLUSTER CENTRAL VALUES Attribute Full data (213) Cluster 0 (163) Cluster 1 (50) Supplier ALL* amd Zilog CycleTimeNS 207.0469 250.7485 64.58 RAMMin 2876.8732 1845.8282 6238.08 RAMMax 12025.3333 8191.5092 24523.6 CacheMem 25.9343 11.9509 71.52 ChnlMin 4.8732 3.0613 10.78 ChnlMax 18.3099 12.7117 36.56 P_RPP 99.8732 51.6687 257.02 ALL* (213) = amd (163) + zilog (50) This process took 12 iterations and to build the clustered datasets it took 0.02 second. Number of clusters selected by cross validation is 2 (0 through 1). The model and evaluation of clustered instance are tabulated in Table 2 and visualized as Figure 2. TABLE 3: CLUSTERED INSTANCES Cluster no Instances Percentage % 0 163 77 1 50 23 Fig. 2: INSTANCE USING K-MEANS TECHNIQUES This Simple K-Means technique resulted in 2 clusters comprising of amd and zilog suppliers for CPU performance. 4.2 Implementation using Expectation Maximization Algorithm The EM (Expectation Maximization) algorithm is a technique which reflecting the abstraction of clustering K-Means algorithm. It tracks an iterative loom, sub-optimal, which seeks to get the constraints of the probability distribution that can say maximum probability of its characteristics. EM Clustering is basically model based clusters [14]. Number of clusters selected by cross validation is 6 (0 through 5). This research work finds the means and standard deviation of different parameter like CycleTimeNS, RAMMin, RAMMax, CacheMem, ChnlMin, ChnlMax, P_RPP. This process took 11.22 second to build to model the clustered the datasets. The model and evaluation of clustered instance are tabulated in Table 4 and visualized in Figure 3.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 107 TABLE 4: CLUSTERED INSTANCES FOR CPU_PERFORMANCE Cluster no results Supplier 0 36% motorola 1 9% sony 2 9% amtel 3 2% zilog 4 20% freescale 5 24% amd Fig. 3: INSTANCE USING EM This EM technique resulted in 6 clusters comprising of Motorola, amd, freescale, Sony, amtel, zilog suppliers for CPU performance. 4.3 Implementation using Farthest First Algorithm Farthest First clustering technique offers a very fast analysis when we carry on in brain point constrain, except builds reasonably high error rate to other clustering technique. Farthest first is an alternative of K means that places each cluster center in turn at the point furthest from the existing cluster centers. This point must laze contained by the data part. These significantly speed up the clustering in mainly cases since a lesser amount of relocation and modification is desirable [15]. This research work used farthest fast method for discovering pattern form datasets using WEKA open source tools. In this technique incorrect instances are 175. Cluster centroids obtain by weka tools are tabulated in Table 5. TABLE 5: CENTROIDS USING FF CLUSTERING TECHNIQUES Cluster Centroids 0 125.0 512.0 1000.0 0.0 8.0 20.0 19.0 1 23.0 32000.0 64000.0 128.0 32.0 64.0 1238.0 The model and evaluation of clustered instance are tabulated Table 6 and visualized in Figure 4.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 108 TABLE 6: CLUSTER INSTANCES FOR CPUPERFORMANCE Cluster instances Percentage Supplier 0 208 98% amd 1 5 2% amtel Fig. 4: INSTANCE USING FF This FF technique resulted in 2 clusters comprising of amd and amtel suppliers for CPU performance. 4.4 Implementation using Filtered Cluster Algorithm In FilteredClusterer instances will be procedure by the filter not including altering its structure. FilteredClusterer class is in the weka. clusterers. FilteredClusterer package. Details of methods are in this package [16]. In FilteredClusterer Data Mining Techniques number of iteration is seven. In this techniques cluster centroids are tabulated in Table 7. TABLE 7: CLUSTER CENTRAL VALUE Attribute Full Data (213) Cluster 0 (186) Cluster 1 (27) CycleTimeNS 207.0469 231.4462 38.963 RAMMin 2876.8732 1865.1505 9846.5185 RAMMax 12025.3333 8674.172 35111.1111 CacheMem 25.9343 16.3656 91.8519 ChnlMin 4.8732 3.2043 16.3704 ChnlMax 18.3099 13.7957 49.4074 P_RPP 99.8732 56.129 401.2222 Incorrect instance are 173. The model and evaluation of clustered instance are tabulated in Table 8 and visualized in Figure 5. TABLE 8: CLUSTER INSTANCE OF CPU_PERFORMANCE cluster instances % Supplier 0 186 87% amd 1 27 13% amtel
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 109 Fig. 5: INSTANCE USING FILTERED CLUSTERERS This Filtered cluster technique resulted in 2 clusters comprising of amd and amtel suppliers for CPU performance. 5. RESULT ANALYSIS WITH JUSTIFICATION The outputs generated by the application of four Data Mining Techniques on to the dataset of CPU_PERFORMCE are tabulated in Table 2 for the purpose of Result Analysis as Table 9. TABLE 9: ANALYSIS TABLE Supplier / Algorithm a m d a m t e l m o t o r o l a f r e e s c a l e S o n y z i l o g Simple K- means 77% 23% EM 24% 9% 36% 20% 9% 20% FF 98% 2% Filtered Cluster 87% 13% The results are obtained by subjecting the dataset of CPU_PERFORMANCE to a Data Mining Techniques. The data volume is 213 instances in the dataset. Each instance is a group of seven attribute and one class. The result obtained on applying K-Means clustering techniques. This technique generated two clusters classifying the cluster named amd (77%) and zilog (23%) though there are 29 suppliers. This research uses K-Means clustering
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 110 technique because it produces computationally faster and tighter cluster as compare to hierarchical clustering technique. K-Means algorithm is able to identify the non linear structure. It is best suit for the real life dataset or web log data. The result obtained on applying EM clustering techniques. This technique generated six clusters classifying the cluster named Motorola (36%), amd (24%), freescale (20%), Sony(9%), amtel(9%), zilog(2%) though there are 29 suppliers. EM clustering algorithm used because Exception Maximization (EM) clustering algorithm is distance-based algorithm whose dataset modeling assumption is linear combination of multi variant normal distributions. This algorithm finds distribution parameters that maximize loglikelyhood. This algorithm is chosen to cluster data because it can handle high dimensionality because of its linearity and converges fast having given appropriate initialization. There are certain cluster analysis situation with real world dataset where the need we to perform cluster analysis a small region of interest. EM clustering algorithm gives optimized results even compare to result given by K-Means algorithm. The result obtained on applying FF clustering techniques. This technique generated two clusters classifying the cluster named amd (98%) and amtel (2%) though there are 29 suppliers. This technique is used because Farthest First is K means clustering algorithm variant that places each cluster centre in turn at the point furthest from the existing cluster centers. This point must be positioned inside the data part. This precisely means the steps in sequences as: Pick first center randomly, next is the point furthest from the first center, next is the point furthest from both previous centers and so on till convergence. This greatly speeds up the clustering because of the less need of relocation and tuning. The result obtained on applying Filtered r clustering techniques. This technique generated two clusters classifying the cluster named amd(87%) and amtel(13%) though there are 29 suppliers. With the help of weka tool, dataset of CPUPerformace are passed through different clustering Data Mining Techniques like simple K-Means, EM, Farthest First and FilteredClusterer methods. In above section this research discuss about different supplier who gives best CPU performance based up on different criteria like CycleTimeNS, RAMMin, RAMMax, CacheMem, ChnlMin, ChnlMax, P_RPP. For this analysis found that in simple K-Means techniques amd and zilog supplier gives best performance. EM methods Motorola, amd, freescale, sony, amtel, zilog suppliers gives best cpu performance. Farthest First method amd and amtel supplier gives best performance. FilteredClusterer method amd and amtel supplier gives best performance. All the method’s results are studied and this research gives amd is best supplier in terms of the performance. And second supplier is amtel who gives best performance. 6. CONCLUSION The dimensions of Web Usage Mining are to extract and analyze pattern for the purpose of Knowledge discovery and ultimately pattern knowledge discovery. Appropriate Web Mining Technique, Clustering Algorithm and dataset is prime challenge of survey findings. So this work proposes a Pattern Knowledge Discovery framework to solve the challenges in literature review. The designed pattern Knowledge Discovery (PKD) framework which involves five stages of pattern Knowledge Discovery process- data acquisition (stage 1), five level pre-
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 111 processing (stage 2), processing (Stage 3), Evaluation and analysis (Stage 4) and Pattern Knowledge Discovery (Stage 5) can be used in variegated areas of applications of knowledge data discovery (KDD) process. From the bundle of Data Mining Techniques – Classification, Regression, Association Rule Mining, Clustering etc. the suggested Cluster Data Mining algorithms and techniques can be availed to get the expected precise outcome from which various inferences are derived to perform the comparative evaluation and statistical analysis to obtain the mined pattern knowledge. The implementation of the PKD framework and the results obtains after applying the various Data Mining Clustering Techniques using the open source Web Mining tool WEKA, illustrates that the above Web Usage Mining category of Web Data Mining, the five staged PKD framework and the proposed clustering techniques fulfils the criteria of the targeted Data Mining Knowledge Discovery process. 7. RESEARCH EXTENSION The research work has used Web Usage Mining category of Web Mining which has a wide areas of applications on the web and which can be implemented in the other live and user specific domains. The dataset acquired from the Web Sources can also be obtained from live dataset sources from various industries, institutes , research and development organizations. The proposed Pattern Knowledge Discovery (PKD) framework which focusing on clustering Data Mining Techniques can be further extended to design a versatile Data Mining Techniques implemented robust approach in a single integrated pattern Knowledge Discovery framework. The Evaluation and analysis Stage can be extended to get a user friendly visual output leading to visual Data Mining and Knowledge Discovery for much better understanding of derived knowledge quantum. The undertaken work has used WEKA tool, the set of similar and relevant tools can be used for achieving more optimized results comparatively. The research work undertaken in timeframe in predefine objective and expected outcome will have left out issue and challenges encounter in research work. This issue and challenges will provide opportunity to extend this work beyond its summed up research. REFERENCES 1. Shahnaz Parvin Nina, Md. Mahamudur Rahaman, Md. Khairul Islam Bhuiyan, Khandakar Entenam Unayes Ahmed, “Pattern Discovery of Web Usage Mining”, 2009 International Conference on Computer Technology and Development, IEEE Computer society. 2. Mehdi Heydari, Raed Ali Helal, Khairil Imran Ghauth, “A Graph-Based Web Usage Mining Method Considering Client Side Data”, IEEE 2009 International Conference on Electrical Engineering and Informatics 5-7 August 2009, Selangor, Malaysia. 3. Theint Aye, “Web log cleaning for mining of web usage patterns”, IEEE 2011. 4. Shuyan Bai, Qingtian Han, Qiming Liu, Xiaoyan Gao, “Research of an algorithm based on Web Usage Mining”, IEEE 2009.
  • 12. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 112 5. Kavita Sharma, Gulshan Shrivastava, Vikash Kumar, “Web Mining: Today and Tomorrow”, IEEE 2011. 6. Zhang Haiyang, “The Research of Web Mining in E-commerce”, IEEE 2011. 7. FeiQiong Rong, “ The Application of Web Usage Mining in Personalized Network Education”, IEEE 2011 8. K. Suresh, R. MadanaMohana, A. RamaMohanReddy, A. Subrmanyam,“ Improved FCM Algorithm for Clustering on Web Usage Mining “, IEEE 2011 9. Lanjie Chen, Li Wei, “The Hot Research Topics and the Research Fronts in the Field of Web Data Mining (WDM) Based on Web of Science “, The 5th international conference on computer science & education Hefei, China. August 24-27 2010, IEEE 2010. 10. R. Manjusha, Dr. R. Ramachandran, “Web Mining Framework for Security in E- commerce”, ICRTIT 2011, MIT, Anna University, Chennai, IEEE 2011 11. Yi Dong, Huiying Zhang, Linnan Jiao, “Research on Application of User Navigation Pattern Mining Recommendation”, Proceeding of the 6th world congress on intelligent control and automation, June 21-23 2006, Dalian, China, IEEE 2006 12. Ching-Ming Chao, Shih-Yang Yaang, Po-Zung Chen, Chu-Hao Sun, “An Online Web Usage Mining System Using Stochastic Timed Petri Nets”, Fourth international conference on Ubi-media computing, IEEE 2011 13. Kehar singh, Evolving limitations in K-Means algorithm in Data Mining and their removal, IJCEM International Journal of Computational Engineering & Management, Vol. 12, April 2011, ISSN (Online): 2230-7893 14. Norwati Mustapha, Expectation Maximization Clustering Algorithm for User Modeling in Web Usage Mining Systems, European Journal of Scientific Research, ISSN 1450- 216X Vol.32 No.4 (2009), pp.467-476 15. Reuben Evans, “Clustering for Clasification” From http://www.cs.waikato.ac.nz/~geoff/Thesis.pdf [access on 12/12/2012] 16. WEKA, “The University of Waikato”, machine learning group, weka documentation, clusterers, From http://weka.sourceforge.net/doc.dev/weka/clusterers/FilteredClusterer.html [access on 22/12/2012] 17. M. Karthikeyan, M. Suriya Kumar and Dr. S. Karthikeyan, “A Literature Review on The Data Mining and Information Security”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 141 - 146, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375 18. R. Manickam, D. Boominath and V. Bhuvaneswari,, “An Analysis of Data Mining: Past, Present and Future”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 1 - 9, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375 19. R. Lakshman Naik, D. Ramesh and B. Manjula, “Instances Selection using Advance Data Mining Techniques”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 47 - 53, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375