SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Computer Engineering and Intelligent Systems                                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.8, 2012



        A Heuristic Approach for Web log mining using Bayesian
                                                  Networks
                                      Nanasaheb Kadu*      Devendra Thakore
                         Bharti Vidyapeet College of Engineering, BV Deemed Univesity,Pune,India
                        * E-mail of the corresponding author: kamleshkadu@rediffmail.com

Abstract
In the era of globalization and World Wide Web, the Web Applications are playing vital role in our daily life.
When more users are using a web application more stress will be applying on the servers. So the whole system
or web server may get slow down hereby the process may also slow down or even it may crash down. This
makes the users to keep waiting for longer period for the response from the web server. A heuristic approach is
presented to catalyze this slow down process by applying        mining concept for the web log of the web server,
which in deed consist of all the transactions carried out by the end user. By applying Bayesian Networks concept
we stream the mined data so perfectly that in the future we can route the end users request to the web server
based on the Bayesian results. This makes the system to run on long go and sustain in too busy scenario also.
Keywords: Bayesian Networks, Web Server, Web Log, Data Sets, Data Mining, Graph Model, Node.

Introduction
A national ID card as a general identification document could be used in many different situations, both in
dealing with government agencies and private entities. In fact, one of the main goals of introducing a national ID
card is the so called 'synergy effect' of replacing multiple identification documents with a single, standardized,
and widely recognized document. A prominently discussed use of national ID cards is immigration and border
control. Another important use of national ID cards is to authenticate a person's entitlement to government
services. Services such as welfare payments and health could be made dependent on the presentation of an ID
card. In addition, voter registries could be based on national ID cards.
      In line with the a fore mentioned synergy effect, a national ID card could also replace identification
documents that are currently used in the private sector, but that are issued by the government for other purposes -
e.g., driver's licenses, health cards, and social insurance numbers. It is likely that private entities would switch to
asking customers for their national ID card for identification and age verification, rather than dealing with a
multitude of different identification documents such as driver's licenses, health cards or birth certificates.
      A citizen card helps in having all the utilities and services under one unique Id. This system not only helps
us to know the information about the services or utilities but also it gives the information about the character of
the citizen in credit rating while He/she performing the transactions like banking, Electricity, Banking,
Insurance, Tax, Provident Fund, Telephone Municipality, Credit rating etc.
      Credit rating tells the behavior of the person whether citizen’s character is good or bad The notion of the
above stated idea is in itself an exciting prospect. The Ministry of Home Affairs has commissioned TCS, a MNC
software consultancy based in India, to do a feasibility study for the National ID card scheme. This complete
system gets the request from the many real time departments like banking, Electricity, Banking, Insurance, Tax,
Provident Fund, Telephone Municipality, Credit rating etc through the web portal and these all web portal may
perform slow in the high peak hours or on high load in the day to day life. But all of this is implicitly traced in
the web log file of the web server so that mining on these log file and by applying Bayesian Network we can
distinguish these incoming request based on the priority so that complete system work smoothly and even we
will get better performance of complete system.
      Moreover in this proposed system we designed and embedded complete system so that all the real time
departments and Citizen identity card department also on the same web application and by applying Bayesian
result we succeed to simulate the result on the same platform.
      The rest of the paper is organized as follows: section 2 will introduce about related work done so far.
Section 3 will give proposed work; section 4 will explain expected results. Section5 will conclude this paper.




                                                          10
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.8, 2012

2. Related Work
As mentioned earlier some work has been done on this topic. We now review important literature on BN learning.
A BN is a probabilistic graphical model that represents uncertain knowledge (Jensen, 1996). Spiegelhalter and
Lauritzen (1990) and Buntine (1991) discuss parameter learning of a BN from complete data, whereas Binder,
Koller, Russel and Kanazawa (1997) and Thiesson (1995) discuss parameter learning from incomplete data using
gradient method. Lauritzen (1995) has proposed an EM algorithm to learn Bayesian network parameters,
whereas Bauer, Koller and Singer (1997) describe methods for accelerating convergence of the EM algorithm.
(1998) have used BNs for speech recognition, whereas Breese, Heckerman and Kadie (1998) have discussed
collaborative filtering methods that use BN learning algorithms.
      Applications to causal learning in social sciences has been presented by Spirtes et al. (1993) An important
problem is how to learn the Bayesian network from data in dis tributed sites. The centralized solution to this
problem is to download all datasets from distributed sites. Kenji (1997) has worked on the homogeneous
distributed learning scenario. In this case, every distributed site has the same feature but different observations.
In this paper, we address the heterogeneous case, where each site has data about only a subset of the features. To
our knowledge, there is no significant work that addresses the heterogeneous case.
      Learning using Gibbs sampling has been proposed by Thomas, Spiegelhalter and Gilks (1992) and Gilks,
Richardson and Spiegelhalter (1996). The Bayesian score to learn the structure of a BN is discussed by Cooper
and Herskovits (1992), Buntine (1991), and Heck erman, Geiger and Chickering (1995). Learning the structure
of a BN based on the Minimal Description Length (MDL) principle has been presented by Bouck aert (1994),
Lam and Bacchus (1994), and Suzuki (1993). Learning BN structure using greedy hillclimbing and other
variants was introduced by Heckerman and Gieger (1995), whereas Chickering (1996) introduced a method
based on search over equivalence network classes. Methods for approximating full Bayesian model averaging
were presented by Buntine(1991), Heckerman and Gieger (1995), and Madigan and Raftery (1994).Learning the
structure of BN from incomplete data was considered by Chick-ering and Heckerman (1997), Cheeseman and
Stutz (1996), Friedman (1998), Meila and Jordan (1998), and Singh (1997). The relationship between causality
and Bayesian networks has been discussed by Heckerman and Gieger (1995), Pearl (1993), and Spirtes, Glymour
and Scheines (1993). Buntine (1991), Fried- man and Goldszmidt (1997), and Lam and Bacchus (1994) discuss
how to sequentially update the structure of a BN based on additional data. Applications of Bayesian network to
clustering (Auto Class) and classification has been presented in (Cheeseman and Stutz, 1996; Ezawa and T, 1995;
Friedman, Geiger and Goldszmidt, 1997; Singh and Provan, 1995). Zweig and Russel.

3. Proposed Method
In this approach, we used data from real world domain a web server log data. This approach illustrates the ability
of the proposed collective learning approach to learn the parameters of a Bayesian Network from the real world
web log data. Web Server log contains records of user interactions when request for the resources in the servers
is received. Web log mining can provide useful information about different user profiles. This in turn can be used
to offer personalized services as well as to better design and organize the web resources based on usage history.
In our application, the raw web log file was obtained from the web server, in which we hosted Our Application
Named Unique Identity Number (UIN) (Whose Description is given in Introduction) in LAN. There are mainly
three steps in our process.
      First we preprocess the raw web log file to transform it to a session form, which is amendable to our
application. This actually Involves identifying a sequence of logs as a single session. Based on the IP address
(or Cookies if available) and time of access. Each session corresponds to the logs from a single user in a single
web session. We consider each session as data sample. These things can be performed by the Using concepts of
Java Sessions, RMI, and Cookies.
      In our second step we categorize the resource (Jsp, Video, Audio, text etc) requested from the server into
different categories. For our Example, Based on the different resources on the UIN Web Server, We consider
mainly eight categories. They are U-Unique identity Number, T-Telephone,                 E-Electrical,    G- Gas,
R-RTO, B-Bank, I-Insurance, P-Pass Port.
      These categories are our main features in our implementation, In general, we would have several tens (or
perhaps a couple of hundred) of categories, Depending on the web server. This categorization has to be done
carefully, and would have to be automated for a large web server.
      Finally, each feature value in a session is set to one or zero, depending on whether the user requested
resources corresponding to the category. An 8-feature, Binary dataset was thus obtained, which was used to learn
a Bayesian Network. A central Bayesian Network was first obtained using the whole dataset. We then split these
features into two sets corresponding to the respective scenario in the web server. And then by applying Bayesian
Network theorem we will get the mining result.


                                                        11
Computer Engineering and Intelligent Systems                                                             www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.8, 2012

4. Bayesian Network
Bayesian network is a complete model for the variables and their relationships; it can be used to answer
probabilistic queries about them. For example, the network can be used to find out updated knowledge of the
state of a subset of variables when other variables (the evidence variables) are observed. This process of
computing the posterior distribution of variables given evidence is called probabilistic inference. The posterior
gives a universal sufficient statistic for detection applications, when one wants to choose values for the variable
subset which minimize some expected loss function, for instance the probability of decision error. A Bayesian
network can thus be considered a mechanism for automatically applying Bayesian theorem to complex problems.
The most common exact inference methods are: variable elimination, which eliminates (by integration or
summation) the non-observed ,non-query variables one by one by distributing the sum over the product; clique
tree propagation, which caches the computation so that many variables can be queried at one time and new
evidence can be propagated quickly; and recursive conditioning and AND/OR search, which allow for
a space-time tradeoff and match the efficiency of variable elimination when enough space is used. All of these
methods have complexity that is exponential in the network's tree width. The most common approximate
inference algorithms are importance sampling,
stochastic MCMC simulation, mini-bucketelimination, loopybeliefpropagation, generalized belief propagation,
and variation methods.
A Bayesian network (BN) is a probabilistic graph model. It can be defined as a pair (G, p), where G = (V; E) is a
directed acyclic graph (DAG) (Jensen, 1996; Heckerman, 1998). Here, V is the vertex set which represents
variables in the problem and E is the edge set which denotes probabilistic relationships among the variables For a
variable X 2 V, a parent of X is a node from which there is a directed link to X. Let pa(X) denotes the set of parents
of X, and then the conditional independence property can be represented as follows:



This property can simplify the computations in a Bayesian network model. For example, the joint distribution of
the set of all variables in V can be written as a product of conditional probabilities as follows:




Then by ASIA model we will get a graph for all the departments that we taken in our scenario which helps to
route the end users request through the web server seamlessly. A graph for our proposed system is shown below.




                                Fig 1: A Proposed Graph System for Bayesian System.


5. Result Analysis
In our proposed system the end result will yields the lesser time for getting the response from the web server for
the request raised by the end-user. This exponentially decrease in response time is due to the Bayesian Networks
as this theorem will create a graph for the so called departments hits at the web server log data. So the System


                                                         12
Computer Engineering and Intelligent Systems                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.8, 2012

will implement this predefined generated graph to re-route the request of the end user to the appropriate
departments or server directly without consuming much more time.

6. Conclusion
In this paper problem of enforcing delay in response from the web server on high pay load scenario is
successfully handled by using Bayesian networks on collected web log mined data from the real web server.
Here Bayesian network creates a graph based on the priority of the hits collected by the different server or
different department on a centralized system. This graph implicitly provides a route or artificial intelligence to
the system to re-route the request in busy load timings directly for desired pages .This drastically decreases the
response time for the end users based on his/ her request history. This will be useful approach for minimizing the
server crash problems or server delay problems in the dominated web word.

References
Abe, N., Takeuchi, J. and Warmuth, M. (1991), Polynomial learnability of probabilistic concepts with respect to
the Kullback-Leibler divergence, in `Proceedings of the 1991Workshop on Computational Learning Theory', pp.
277-289.
Bauer, E., Koller, D. and Singer, Y. (1997), Update rules for parameter estimation in Bayesian networks, in D.
Geiger and P. Shanoy, eds, `Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence',
Morgan Kaufmann, pp. 3-13.
Beinlich, I., Suermondt, H., Chavez, R. and Cooper, G. (1989), The alarm monitoring system: A case study with
two probabilistic inference techniques for belief networks, in `Proceedings of the Second European Conference on
Artificial Intelligence in Medical Care', Springer Verlag, pp. 247-256.
Binder, J., Koller, D., Russel, S. and Kanazawa, K. (1997), `Adaptive probabilistic networks with hidden
variables', Machine Learning 29, 213-244.
Bouckaert, R. R. (1994), Properties of Bayesian network learning algorithms, in R. L. De Mantaras and D. Poole,
eds, `Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence', Morgan Kaufmann, pp.
102-109.
Chen, R., Sivakumar, K. and Kargupta, H. (2001a), An approach to online Bayesian learning from multiple data
streams, in H. Hargupta, K. Sivakumar and R. Wirth, eds, `Proceedings of the Workshop on Ubiquitous Data
Mining: Technology for Mobile and Distributed KDD (In the 5th European Conference, PKDD 2001)', Freiburg,
Germany, pp. 31-45.
Zweig, G. and Russel, S. J. (1998), Speech recognition with dynamic Bayesian networks, in `Proceedings of the
Fifteenth National Conference on Artificial Intelligence'.
Suzuki, J. (1993), A construction of Bayesian networks from databases based on an MDL scheme, in D.
Heckerman and A. Mamdani, eds, `Proceedings of the Ninth Conference on Uncertainty in Artificial Intelligence',
Morgam Kaufmann, pp. 266-273.




                                                       13
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Mais conteúdo relacionado

Mais procurados

Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek outiaemedu
 
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEM
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEMCONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEM
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEMIJNSA Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
 
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...IJNSA Journal
 
Information Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceInformation Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceINFOGAIN PUBLICATION
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
LSTM deep learning method for network intrusion detection system
LSTM deep learning method for network intrusion  detection system LSTM deep learning method for network intrusion  detection system
LSTM deep learning method for network intrusion detection system IJECEIAES
 

Mais procurados (9)

Anomalous symmetry succession for seek out
Anomalous symmetry succession for seek outAnomalous symmetry succession for seek out
Anomalous symmetry succession for seek out
 
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEM
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEMCONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEM
CONSTRUCTING THE 2-ELEMENT AGDS PROTOCOL BASED ON THE DISCRETE LOGARITHM PROBLEM
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
 
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...
COLLECTIVE SIGNATURE PROTOCOLS FOR SIGNING GROUPS BASED ON PROBLEM OF FINDING...
 
Information Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of IntelligenceInformation Upload and retrieval using SP Theory of Intelligence
Information Upload and retrieval using SP Theory of Intelligence
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
LSTM deep learning method for network intrusion detection system
LSTM deep learning method for network intrusion  detection system LSTM deep learning method for network intrusion  detection system
LSTM deep learning method for network intrusion detection system
 

Semelhante a A heuristic approach for web log mining using bayesian networks

A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...IJECEIAES
 
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docxCase Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docxketurahhazelhurst
 
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkImpact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkIJECEIAES
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...IJECEIAES
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction EttaBenton28
 
Big data challenges for e governance
Big data challenges for e governanceBig data challenges for e governance
Big data challenges for e governancebharati k
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big datajournalBEEI
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data FusionIRJET Journal
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abstncct
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNIRJET Journal
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySusan Cox
 
Sensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approachSensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approachIJECEIAES
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the artNazrul Islam
 
Cert Overview
Cert OverviewCert Overview
Cert Overviewmattnik
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGIJNSA Journal
 

Semelhante a A heuristic approach for web log mining using bayesian networks (20)

A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
A Novel Integrated Framework to Ensure Better Data Quality in Big Data Analyt...
 
50120140506002
5012014050600250120140506002
50120140506002
 
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docxCase Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
Case Study—PART 1—Jurisdictional Declaration CriteriaLevels .docx
 
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian networkImpact of big data congestion in IT: An adaptive knowledgebased Bayesian network
Impact of big data congestion in IT: An adaptive knowledgebased Bayesian network
 
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
 
Big data challenges for e governance
Big data challenges for e governanceBig data challenges for e governance
Big data challenges for e governance
 
[IJCT-V3I2P30] Authors: Sunny Sharma
[IJCT-V3I2P30] Authors: Sunny Sharma[IJCT-V3I2P30] Authors: Sunny Sharma
[IJCT-V3I2P30] Authors: Sunny Sharma
 
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big dataMulti-dimensional cubic symmetric block cipher algorithm for encrypting big data
Multi-dimensional cubic symmetric block cipher algorithm for encrypting big data
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data Fusion
 
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
Ncct   Ieee Software Abstract Collection Volume 1   50+ AbstNcct   Ieee Software Abstract Collection Volume 1   50+ Abst
Ncct Ieee Software Abstract Collection Volume 1 50+ Abst
 
320 324
320 324320 324
320 324
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
Safe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh EssaySafe Drinking Water In Bangladesh Essay
Safe Drinking Water In Bangladesh Essay
 
3.7
3.73.7
3.7
 
Sensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approachSensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approach
 
Next generation big data analytics state of the art
Next generation big data analytics state of the artNext generation big data analytics state of the art
Next generation big data analytics state of the art
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTINGSECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
SECURITY ISSUES ASSOCIATED WITH BIG DATA IN CLOUD COMPUTING
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

A heuristic approach for web log mining using bayesian networks

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.8, 2012 A Heuristic Approach for Web log mining using Bayesian Networks Nanasaheb Kadu* Devendra Thakore Bharti Vidyapeet College of Engineering, BV Deemed Univesity,Pune,India * E-mail of the corresponding author: kamleshkadu@rediffmail.com Abstract In the era of globalization and World Wide Web, the Web Applications are playing vital role in our daily life. When more users are using a web application more stress will be applying on the servers. So the whole system or web server may get slow down hereby the process may also slow down or even it may crash down. This makes the users to keep waiting for longer period for the response from the web server. A heuristic approach is presented to catalyze this slow down process by applying mining concept for the web log of the web server, which in deed consist of all the transactions carried out by the end user. By applying Bayesian Networks concept we stream the mined data so perfectly that in the future we can route the end users request to the web server based on the Bayesian results. This makes the system to run on long go and sustain in too busy scenario also. Keywords: Bayesian Networks, Web Server, Web Log, Data Sets, Data Mining, Graph Model, Node. Introduction A national ID card as a general identification document could be used in many different situations, both in dealing with government agencies and private entities. In fact, one of the main goals of introducing a national ID card is the so called 'synergy effect' of replacing multiple identification documents with a single, standardized, and widely recognized document. A prominently discussed use of national ID cards is immigration and border control. Another important use of national ID cards is to authenticate a person's entitlement to government services. Services such as welfare payments and health could be made dependent on the presentation of an ID card. In addition, voter registries could be based on national ID cards. In line with the a fore mentioned synergy effect, a national ID card could also replace identification documents that are currently used in the private sector, but that are issued by the government for other purposes - e.g., driver's licenses, health cards, and social insurance numbers. It is likely that private entities would switch to asking customers for their national ID card for identification and age verification, rather than dealing with a multitude of different identification documents such as driver's licenses, health cards or birth certificates. A citizen card helps in having all the utilities and services under one unique Id. This system not only helps us to know the information about the services or utilities but also it gives the information about the character of the citizen in credit rating while He/she performing the transactions like banking, Electricity, Banking, Insurance, Tax, Provident Fund, Telephone Municipality, Credit rating etc. Credit rating tells the behavior of the person whether citizen’s character is good or bad The notion of the above stated idea is in itself an exciting prospect. The Ministry of Home Affairs has commissioned TCS, a MNC software consultancy based in India, to do a feasibility study for the National ID card scheme. This complete system gets the request from the many real time departments like banking, Electricity, Banking, Insurance, Tax, Provident Fund, Telephone Municipality, Credit rating etc through the web portal and these all web portal may perform slow in the high peak hours or on high load in the day to day life. But all of this is implicitly traced in the web log file of the web server so that mining on these log file and by applying Bayesian Network we can distinguish these incoming request based on the priority so that complete system work smoothly and even we will get better performance of complete system. Moreover in this proposed system we designed and embedded complete system so that all the real time departments and Citizen identity card department also on the same web application and by applying Bayesian result we succeed to simulate the result on the same platform. The rest of the paper is organized as follows: section 2 will introduce about related work done so far. Section 3 will give proposed work; section 4 will explain expected results. Section5 will conclude this paper. 10
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.8, 2012 2. Related Work As mentioned earlier some work has been done on this topic. We now review important literature on BN learning. A BN is a probabilistic graphical model that represents uncertain knowledge (Jensen, 1996). Spiegelhalter and Lauritzen (1990) and Buntine (1991) discuss parameter learning of a BN from complete data, whereas Binder, Koller, Russel and Kanazawa (1997) and Thiesson (1995) discuss parameter learning from incomplete data using gradient method. Lauritzen (1995) has proposed an EM algorithm to learn Bayesian network parameters, whereas Bauer, Koller and Singer (1997) describe methods for accelerating convergence of the EM algorithm. (1998) have used BNs for speech recognition, whereas Breese, Heckerman and Kadie (1998) have discussed collaborative filtering methods that use BN learning algorithms. Applications to causal learning in social sciences has been presented by Spirtes et al. (1993) An important problem is how to learn the Bayesian network from data in dis tributed sites. The centralized solution to this problem is to download all datasets from distributed sites. Kenji (1997) has worked on the homogeneous distributed learning scenario. In this case, every distributed site has the same feature but different observations. In this paper, we address the heterogeneous case, where each site has data about only a subset of the features. To our knowledge, there is no significant work that addresses the heterogeneous case. Learning using Gibbs sampling has been proposed by Thomas, Spiegelhalter and Gilks (1992) and Gilks, Richardson and Spiegelhalter (1996). The Bayesian score to learn the structure of a BN is discussed by Cooper and Herskovits (1992), Buntine (1991), and Heck erman, Geiger and Chickering (1995). Learning the structure of a BN based on the Minimal Description Length (MDL) principle has been presented by Bouck aert (1994), Lam and Bacchus (1994), and Suzuki (1993). Learning BN structure using greedy hillclimbing and other variants was introduced by Heckerman and Gieger (1995), whereas Chickering (1996) introduced a method based on search over equivalence network classes. Methods for approximating full Bayesian model averaging were presented by Buntine(1991), Heckerman and Gieger (1995), and Madigan and Raftery (1994).Learning the structure of BN from incomplete data was considered by Chick-ering and Heckerman (1997), Cheeseman and Stutz (1996), Friedman (1998), Meila and Jordan (1998), and Singh (1997). The relationship between causality and Bayesian networks has been discussed by Heckerman and Gieger (1995), Pearl (1993), and Spirtes, Glymour and Scheines (1993). Buntine (1991), Fried- man and Goldszmidt (1997), and Lam and Bacchus (1994) discuss how to sequentially update the structure of a BN based on additional data. Applications of Bayesian network to clustering (Auto Class) and classification has been presented in (Cheeseman and Stutz, 1996; Ezawa and T, 1995; Friedman, Geiger and Goldszmidt, 1997; Singh and Provan, 1995). Zweig and Russel. 3. Proposed Method In this approach, we used data from real world domain a web server log data. This approach illustrates the ability of the proposed collective learning approach to learn the parameters of a Bayesian Network from the real world web log data. Web Server log contains records of user interactions when request for the resources in the servers is received. Web log mining can provide useful information about different user profiles. This in turn can be used to offer personalized services as well as to better design and organize the web resources based on usage history. In our application, the raw web log file was obtained from the web server, in which we hosted Our Application Named Unique Identity Number (UIN) (Whose Description is given in Introduction) in LAN. There are mainly three steps in our process. First we preprocess the raw web log file to transform it to a session form, which is amendable to our application. This actually Involves identifying a sequence of logs as a single session. Based on the IP address (or Cookies if available) and time of access. Each session corresponds to the logs from a single user in a single web session. We consider each session as data sample. These things can be performed by the Using concepts of Java Sessions, RMI, and Cookies. In our second step we categorize the resource (Jsp, Video, Audio, text etc) requested from the server into different categories. For our Example, Based on the different resources on the UIN Web Server, We consider mainly eight categories. They are U-Unique identity Number, T-Telephone, E-Electrical, G- Gas, R-RTO, B-Bank, I-Insurance, P-Pass Port. These categories are our main features in our implementation, In general, we would have several tens (or perhaps a couple of hundred) of categories, Depending on the web server. This categorization has to be done carefully, and would have to be automated for a large web server. Finally, each feature value in a session is set to one or zero, depending on whether the user requested resources corresponding to the category. An 8-feature, Binary dataset was thus obtained, which was used to learn a Bayesian Network. A central Bayesian Network was first obtained using the whole dataset. We then split these features into two sets corresponding to the respective scenario in the web server. And then by applying Bayesian Network theorem we will get the mining result. 11
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.8, 2012 4. Bayesian Network Bayesian network is a complete model for the variables and their relationships; it can be used to answer probabilistic queries about them. For example, the network can be used to find out updated knowledge of the state of a subset of variables when other variables (the evidence variables) are observed. This process of computing the posterior distribution of variables given evidence is called probabilistic inference. The posterior gives a universal sufficient statistic for detection applications, when one wants to choose values for the variable subset which minimize some expected loss function, for instance the probability of decision error. A Bayesian network can thus be considered a mechanism for automatically applying Bayesian theorem to complex problems. The most common exact inference methods are: variable elimination, which eliminates (by integration or summation) the non-observed ,non-query variables one by one by distributing the sum over the product; clique tree propagation, which caches the computation so that many variables can be queried at one time and new evidence can be propagated quickly; and recursive conditioning and AND/OR search, which allow for a space-time tradeoff and match the efficiency of variable elimination when enough space is used. All of these methods have complexity that is exponential in the network's tree width. The most common approximate inference algorithms are importance sampling, stochastic MCMC simulation, mini-bucketelimination, loopybeliefpropagation, generalized belief propagation, and variation methods. A Bayesian network (BN) is a probabilistic graph model. It can be defined as a pair (G, p), where G = (V; E) is a directed acyclic graph (DAG) (Jensen, 1996; Heckerman, 1998). Here, V is the vertex set which represents variables in the problem and E is the edge set which denotes probabilistic relationships among the variables For a variable X 2 V, a parent of X is a node from which there is a directed link to X. Let pa(X) denotes the set of parents of X, and then the conditional independence property can be represented as follows: This property can simplify the computations in a Bayesian network model. For example, the joint distribution of the set of all variables in V can be written as a product of conditional probabilities as follows: Then by ASIA model we will get a graph for all the departments that we taken in our scenario which helps to route the end users request through the web server seamlessly. A graph for our proposed system is shown below. Fig 1: A Proposed Graph System for Bayesian System. 5. Result Analysis In our proposed system the end result will yields the lesser time for getting the response from the web server for the request raised by the end-user. This exponentially decrease in response time is due to the Bayesian Networks as this theorem will create a graph for the so called departments hits at the web server log data. So the System 12
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.8, 2012 will implement this predefined generated graph to re-route the request of the end user to the appropriate departments or server directly without consuming much more time. 6. Conclusion In this paper problem of enforcing delay in response from the web server on high pay load scenario is successfully handled by using Bayesian networks on collected web log mined data from the real web server. Here Bayesian network creates a graph based on the priority of the hits collected by the different server or different department on a centralized system. This graph implicitly provides a route or artificial intelligence to the system to re-route the request in busy load timings directly for desired pages .This drastically decreases the response time for the end users based on his/ her request history. This will be useful approach for minimizing the server crash problems or server delay problems in the dominated web word. References Abe, N., Takeuchi, J. and Warmuth, M. (1991), Polynomial learnability of probabilistic concepts with respect to the Kullback-Leibler divergence, in `Proceedings of the 1991Workshop on Computational Learning Theory', pp. 277-289. Bauer, E., Koller, D. and Singer, Y. (1997), Update rules for parameter estimation in Bayesian networks, in D. Geiger and P. Shanoy, eds, `Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence', Morgan Kaufmann, pp. 3-13. Beinlich, I., Suermondt, H., Chavez, R. and Cooper, G. (1989), The alarm monitoring system: A case study with two probabilistic inference techniques for belief networks, in `Proceedings of the Second European Conference on Artificial Intelligence in Medical Care', Springer Verlag, pp. 247-256. Binder, J., Koller, D., Russel, S. and Kanazawa, K. (1997), `Adaptive probabilistic networks with hidden variables', Machine Learning 29, 213-244. Bouckaert, R. R. (1994), Properties of Bayesian network learning algorithms, in R. L. De Mantaras and D. Poole, eds, `Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence', Morgan Kaufmann, pp. 102-109. Chen, R., Sivakumar, K. and Kargupta, H. (2001a), An approach to online Bayesian learning from multiple data streams, in H. Hargupta, K. Sivakumar and R. Wirth, eds, `Proceedings of the Workshop on Ubiquitous Data Mining: Technology for Mobile and Distributed KDD (In the 5th European Conference, PKDD 2001)', Freiburg, Germany, pp. 31-45. Zweig, G. and Russel, S. J. (1998), Speech recognition with dynamic Bayesian networks, in `Proceedings of the Fifteenth National Conference on Artificial Intelligence'. Suzuki, J. (1993), A construction of Bayesian networks from databases based on an MDL scheme, in D. Heckerman and A. Mamdani, eds, `Proceedings of the Ninth Conference on Uncertainty in Artificial Intelligence', Morgam Kaufmann, pp. 266-273. 13
  • 5. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar