SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
48
AN ENHANCED ALGORITHM FOR CLASSIFICATION OF WEB DATA
FOR WEB USAGE MINING USING SUPERVISED NEURAL NETWORK
ALGORITHMS
Jaykumar Jagani1
, Prof. Kamlesh Patel2
1, 2
(Computer Engineering, R.K. University, Kasturbadham, Near Tramba, Rajkot, Gujarat)
ABSTRACT
The usage of data on the web is growing with a speed of light; huge amount of data is present
on web. To extract useful information from such huge web data efficient data extraction or mining
methods are required to achieve a variety of functionalities such a as Web AD market change
analysis, web profile analysis, user trend analysis, Session Tracking, Cyber crime Detection etc. The
idea behind using the concepts of neural network learning algorithms to classify the large amount of
web data for Web Usage Mining are to provide accuracy and speed by the diverse characteristics of
neural networks. A number of Neural Network learning algorithms provide better supervised
learning. They are proficient to handle massive dynamic data. LVQ (Learning Vector Quantization)
algorithms are very useful for supervised learning, dynamic labeling or post-training map labeling
and supervised version of SOM through that the one can able to approximate the distribution of class
with a lesser amount of codebook vectors and capable to minimize classification errors respectively.
HLVQ (Hierarchical Learning Vector Quantization) is the technique that follows a concept of tree
hierarchy generation in which more than one level of classification can be performed on the same
dataset to check the accuracy of the classification. In this paper, the discussion is to define a new
technique that will work on hierarchical as well as multi pass approach where during the
classification each hierarchy is generated using Multi pass LVQ (MLVQ) algorithms. As a result of
that HLVQ becomes more accurate and as MLVQ is used with many passes it will take lesser time.
The basic HLVQ approach will follow the basic LVQ algorithms for hierarchy generation of all
phases. In addition to that this new Improved HLVQ provides better accuracy through ornamental
advantages of Multi pass LVQs and Optimized LVQ algorithms to classify and handle large volume
of data.
Keywords: Hierarchical LVQ, Multi pass LVQ, Neural Networks, Classification, Web Log Data and
Web Usage Mining.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 4, April (2014), pp. 48-56
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
49
1. INTRODUCTION
Web users are growing day by day so the data on the web is on the rise [6]. If any mega firms
or IT companies want to continue to exist in the market, they need to analyze the recent web data and
past web data as well as the current trends of new generation users and calculation of upcoming
trends of market. All these are possible only through the analysis of web data. Various data mining
techniques are applied on large amount web data to extract useful knowledge and useful usage
patterns for decision making to their IT sectors or any other mega firms by business Analysts [3].
As there are many web scaling problems such as user trend analysis of surfing, traffic flow
analysis, distributed control handling, web traffic management and many more. Session tracking and
website reorganization, distributed traffic sharing on distributed servers can be identified and
analysis based on web data can be possible through Web Usage Mining. But for that the very
important process in any mining technique is classification. Classification is the process of classify
the data according to the class labels. But generally web data is not as much good to classify easily,
because of many tricky reasons, web data becomes noisy. Web data can be gathered by web log files
that are generated by user interactions to the web and stored on the web server. E.g. user interacts
with some CGI based website, then the interaction of user is not been added to the log files. And
many times some special entries are hidden by some users intentionally. So at later, Classification
results will not be accurate. And traditional classification algorithms are not so accurate to classify
the web log data, such as Bayes classification. So, the concept of Neural Network learning
algorithms is very useful for handling large dynamic data. Neural Network learning algorithms are
very accurate for classification. For large amount of rough data, the accurate classification is required
and that classification can be possible using concepts of neural network [1] [4] [6] [2].
In this Paper, the discussion is based on a variety of neural network learning algorithms that
help to handle huge web data as well as improved classification and clustering of data with less
number of errors. Learning Vector Quantization (LVQ) algorithms are very constructive learning
algorithms that classify the web data successfully [9]. Learning vector quantization is handy to
approximate of allocation of class with fewer number of codebook vectors and capable to minimize
classification errors [9]. HLVQ technique is following a concept of hierarchy generation in multi
pass in which more than one pass can be performed on the same model using diverse algorithms and
is very useful for achieving best chosen results. So in this paper, the discussion is based on a new
technique that will work on multi pass as well as on hierarchical approach. So the advantages of both
techniques will be achieved in single algorithm and algorithm is improved in classification with more
accuracy and takes less time.
2. WEB USAGE MINING
Web Usage Mining in a simple term is to extract the usage knowledge about the web users
through various data mining techniques from web data is web usage mining [4]. Web Usage Mining
is going to prove more useful method in current and next generation’s web exploring people world
[6]. So, there is a huge research scope available in this area to develop and implement new ideas that
how Usage Mining can be more effective and as a result of that end user is able to get better facilities
as developer firms will able to identify user’s interest and will able to deliver the products likewise.
2.1 SOURCES OF DATA FOR WEB USAGE MINING
The input data for the various classification algorithms for Web Usage Mining can be found
from (1) Web servers (2) Proxy Servers (3) Web Clients [3]. The data is stored on the web in web
log files. Each and every user activity is stored in respective server. The data is fetched from that
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
50
server for analysis. The web data available on the server is in a specific format known as extended
common log format (ECLF) [5].
ECLF Format
I/P Address Rfc 931 Auth User Req. Time Stamp Req. Format
Status Bytes Referrer User Agent
Important terms
Ipaddress- network address of user machine
Rfc 931- remote login name of user
Status- as success / page not found like errors
User agent- software or browser (web client)
Authuser – original user name
Bytes – size of transferred information [6]
Figure-1: Web Usage Mining process
As per Figure 1, it is clear that process of web usage mining is much similar to data mining
process. The Only difference in data mining and web mining is that at the Starting level in data will
come from various data bases, warehouses, and flat files and in web mining data will come from
server log files. In this Paper, We are focused on initial phase of web usage mining process where
clustering and classification process are done to provide better extraction and stability of data.
Pattern Analysis
Usage Path
Analysis
Sequence
Matching
Association
Rules
Classification
& Clustering
Converted Data
Integrated Data
Filtered Data
Clean Log
Web Log data
Pre-processing
Transaction Filtering
Data integration
Query process
FormationUsage functions
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
51
3. APPLYING NEURAL NETWORKS
Neural network provides many supervised learning algorithms that can be helpful in mining
process, especially to give class labels to uncategorized data i.e. classification. Here is some brief
about neural networks and its useful characteristics. The network of highly connected, self-intelligent
neurons (Nodes) to do any task with once training is neural network.
3.1 NEURAL NETWORKS AT A GLANCE
Artificial neural network (ANN) is a knowledge processing paradigm that inspired from
biological nervous system. This technology is more useful because of its unique structure of system.
ANN is the arrangement of large number of highly connected processing elements, called neurons in
medical science as in brain, working together to solve a particular problem [1]. ANN is configured
i.e. initializes with training or testing data to solve a particular problem such as, clustering or
classification. Neural networks are highly capable to do the things such as meaning derivation from
complex data. It is mostly used in finding usage trends that are sometimes very common but complex
and even not carried out by machines.
Neural network has many advantages as follows:
• Self-adaptive learning
How to deal with problems based on initial training or experience from the network.
• Self-organization
Artificial neural network creates its own organization and behavior and representation of
knowledge it accepts while learning.
• Real time operations
Neural network computation may carry out parallel but for that special hardware are required to
design.
• Fault tolerance via multiple information copies
Partial destroys or failure of network cannot affect the performance of the network [6].
Figure-2: Processing Architecture of Neural Network
As figure 2, shows the recurrent network of ANN map nodes with its all three layers.
4. BRIEF ABOUT NEURAL NETWORK SUPERVISED LEARNING ALGORITHMS
The list of such algorithm is big, but in this paper, we are discussing on some of the best
classifiers among them, described in following sections.
Z2Z1
X1 X2 X3 X4 X5
Output layer
Hidden Layer
Input layer
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
52
4.1 LEARNING VECTOR QUANTIZATION (LVQ)
It is a machine learning algorithm and supervised version of SOM Algorithm. Through LVQ
the approximation of distribution of class with less number of codebook vectors and is able to
minimize classification errors. Codebook vectors are considered as class boundary representations.
The algorithm is associated with neural network of class learning algorithms [8].
4.1.1 ADVANTAGES OF LVQ
LVQ is capable to summarize large datasets to smaller number of codebook vectors that are
useful for visualization and classification. Training rate is so fast compare to any other network like
back propagation. The Generated model updated incrementally. Here some LVQ versions are
available.
4.2 VERSIONS OF LVQ
They are denoted as LVQ1, LVQ2, LVQ3, OLVQ1, OLVQ3, MLVQ and hierarchical
LVQ [11].
4.3 LVQ ALGORITHM COMPARISON
Table 1: All LVQ algorithm comparison with respect to various fields
Fields LVQ OLVQ MLVQ HLVQ
Version Beginner Optimized Multiple passes Hierarchical
Accuracy Less More than LVQ More than OLVQ More than MLVQ
Time High Less than LVQ Less than OLVQ Less than MLVQ
Efficiency Low Moderate High High
Codebooks More Moderate Less Less
Capacity Low Moderate High High
4.4 WORKING OF HLVQ
Here defined the steps for basics HLVQ. HLVQ is divided into two Stages like P is 1st
and Q
is 2nd
[10].
Table 2: Basic HLVQ Steps
1. Initialize the codebook vectors and the learning rate α for P.
2. Randomly select an input vector I1
3.
Find the winner unit closest to I1 by considering Euclidian Distance Cc to I. i.e. Step
3.1
3.1 Modify the weights of the winner unit:
If and I belong to the same class,
If C and I belong to different classes,
4.
Repeat from step 2 until the neural network A is stabilized or until a fixed number of
iterations have been carried out.
5. Initialize the codebook vectors for Q.
6. Randomly select an input vector I2.
7. Repeat Step 3 and 3.1
8. Reduce learning Rate of & repeat step 5 until fixed steps.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
53
5. PROPOSED APPROACH
As it is obvious that multi pass and hierarchical LVQs are having advantages such as multi
pass LVQ is a hybrid of basic and optimized LVQ so it has advantages of all basic LVQs and it
works in the pass, so speed achieved for even more learning data is more and Hierarchical LVQ
gives accuracy as it works in detail with domains and sub domains i.e. hierarchy levels also.
Now if any technique has the advantages of both multi pass LVQ and Hierarchical LVQ, then
it would be very good to classify with it any large data within efficient time. Such method is
proposed as Hierarchical Multi pass LVQ. It has advantage of both multi pass and hierarchical
technique that is speed and accuracy both. So, classification errors are reduced and process speed is
also increased that means the large raw data can be classified in sufficient amount of time with more
accuracy.
5.1 STEPS FOR IMPROVED HIERARCHICAL LVQ
Here we are proposing the steps for Improved HLVQ:
Here is an input vector, C is codebook vector, and is learning rate and N is neural Network.
Table 3: Proposed Improved HLVQ algorithm
1. Initialize the codebook vectors C with fixed learning rate α for first stage.
2.
Initialize and trigger the neural network with Bipolar Sigmoid function as an
activation function as it works in a fixed range of values. So Classification errors can
be removed. As it convergence is fast it will train Network rapidly.
3.
Give an input vector I and find the closest unit nearby vector C using Euclidian
distance between them.
4. Update the weights of closest unit
4.1
If they are in same class then unit weight is added in classification results and result is
correct.
If they are not in same class then unit weight is subtracted and result is not accurate.
5.
Repeat from step 3 until the neural network N is stabilized with fixed number of
iterations.
6. Reduce learning rate at end of each level.
7.
Repeat the same procedure for Second Stage by considering the best result amongst
the current stage and all previous stage.
8. Select most accurate unit and discard all rest.
9. Repeat the procedure until the whole dataset is classified.
5.1.1 WORKING OF IMPROVED LVQ
For Improved HLVQ, an LVQ model is constructed using multi pass and each codebook
vector is treated as a cluster centroid. All codebook vectors are evaluated and numbers are selected
as candidates for sub-models. Sub models are also constructed using multi pass for all candidate
codebook vectors and those sub models that do not perform well (in terms of classification
accuracy), their parent codebook vector are kept as participant of the model. During test phase a data
instance is first mapped to its BMU, if that BMU has a sub-model (that was not pruned during
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
54
training), the sub model is used for classification, if that was pruned during training; the class value
in the BMU is used for classification.
So In short at each level the model is constructed using multi pass LVQ and codebook
vectors are evaluated and given numbers as candidate for sub model. The sub model is also
constructed using multi pass LVQ specially OLVQ1. So, at each and every hierarchy level the sub
models are constructed using multi pass LVQ if sub model is more inaccurate then it is rejected and
parent node is considered as an element in model. By using this approach accuracy maintains at each
and every level and construction of sub models are also fast and accurate.
5.1.2 ROLE OF ACTIVATION FUNCTION IN PERFORMANCE OF ANN
Activation function plays a great role in triggering the Neural Networks. Activation
Functions makes the convergence fast. So that neural networks can be trained accurately and rapidly.
There are many activation functions used in supervised learning algorithms, they are nothing
but mathematical functions used to initiate the neural network. The activation functions are chosen
from their convergence and initialization time. The general comparison of various Activation
functions is given below.
From Table 4, it is quite clear to use sigmoid or hyperbolic tangent function as a activation
function to trigger ANN.
Table 4: General comparison of various Activation functions
Functions Sigmoid Hyperbolic
Tangent
Neuronal Logarithmic Sine Exp
Hidden Nodes 10 20 9 29 7 23
Training Accuracy 89.3 95.8 94.9 90.7 94 76.7
Testing Accuracy 84 92 94 86 93 63
5.2 COMPARISON OF BOTH HLVQ AND IMPROVED HLVQ
Table 5: HLVQ vs Improved HLVQ
Basic Approach My approach IMPROVED HLVQ
It is basic hierarchical approach with one
algorithms for all time i.e. lvq3
Hierarchical approach with different
algorithms for all stage classification
Parameters: Accuracy, Time Parameters: Accuracy, Time
Available Algorithms
For Initial Time: LVQ1,LVQ2, LVQ3, OLVQ1,OLVQ3
For Next Rounds (if exists): MLVQ, OLVQ1,OLVQ3
For first stage generation For first stage generation
Take Any one Approach Take the Same Approach
e.g. OLVQ1 e.g. OLVQ1
For Second stage generation For Second stage generation
Took the same Approach Here I changed Approach I took
e.g. OLVQ1 MLVQ
Continues same for rest of stages Continues same for rest of stages
Reduce learning Rate
Result is benefit in accuracy and Time
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
55
6. ANALYSIS OF RESULTS
Here I have tried some simulation and Implementation of both approaches and made
comparative study of the results of both algorithms and based on my approach and I have found the
new results comparatively better than old approach with increase in accuracy with less execution
time.
I have taken sample data and compare both the approaches.
Results are as follows gives the clear cut idea of it.
Data samples are Breast Cancer (BC), Super Market (SM), Log data (LOG), Segment-
Challenge (SC) Classification results are derived based on two parameters as accuracy and Time.
Table 6: Simulation HLVQ vs. Improved HLVQ
Field Datasets
Algorithm Params LOG SM SC BC
HLVQ Accuracy 79.95 48.8 86.86 89.51
Time 34ms 64ms 12ms 5ms
Vs
Improved Accuracy 81,94 58.2 89.51 95.10
HLVQ Time 19ms 63ms 11ms 4ms
7. CONCLUSION
At the end, after studying, learning and comparing a lot, to handle the large volume of web
data, there would be a distinct need of neural network concept, because only through neural network
learning algorithms, such huge volume of web data can be handled and applied to any application for
knowledge extraction. All neural network learning algorithms have their own advantages and
disadvantages. LVQ is a supervised model of SOM and used for giving class label to data. LVQ is
capable to summarize large datasets to smaller number of codebook vectors that are useful for
visualization and classification. Training rate is so fast compare to any other network like back
propagation. The Generated model updated incrementally. Various versions of LVQ are having one
or more disadvantage such as LVQ need to be able to generate useful distance measures for all
attributes. They are highly dependent on initialization parameters and training. So by using more
than one LVQ approach together will give benefits in recovering from demerits of LVQ. Improved
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME
56
HLVQ is one such technique that provides fast and accurate classification with reduced size of
codebooks. So, in short, by using Improved HLVQ, the classification of large web data will become
easy. The basic HLVQ algorithm works on the same approach in all hierarchy generation that will
give the same static classification results. When Improved HLVQ uses more than one approach to
classify the data, so the disadvantages of the same method will excluded and only merits of both
approaches are enlighten for accurate classification. So, Improved HLVQ will be proved as a great
classification technique and will be useful for huge datasets as well.
8. REFERENCES
[1] Sonali muddalwar, Shashank Kawan, “Applying artificial neural networks in web usage
mining”, international journal of computer science and management research, vol. 1, issue 4,
[Nov-12].
[2] Anshuman Sharma, “Web usage mining neural network”, international journal of reviews in
computing, vol. 9, [10th
april, 2012].
[3] Valishali A. Zilpe, Dr. Mohammad Atique, “Neural network approach for web usage
mining”, ETCSIT, published in IJCA [2011].
[4] Jaydeep Srivastava, “Web Mining: Accomplishments and future directions”,
http://www.cs.unm.edu/faculty/srivastava.html.
[5] John R. Punin, Mukkai S. Krishnamoorthy, Mohammed J. Zaki, “Web usage mining-
language and algorithms”, rensseluer polytechnic institute, troy NY 12180.
[6] Jaykumar Jagani, Prof. Kamlesh Patel, “An Enhanced Approach for Classification in Web
Usage Mining using Neural Network Learning Algorithms for Supervised Learning”, IJCA
(0975-8887), Volume-90, No-17, March 2014.
[7] Jaykumar Jagani, Prof. Kamlesh Patel, “A survey of web usage mining with neural network
and proposed solutions on several issues”, ISSN: 0975–6760, Nov 12 To Oct 13, Volume –
02, Issue [02].
[8] Renata M. C. R. de Souza, Telmo de M. Silva Filho,” Optimized Learning Vector
Quantization Classifier with an Adaptive Euclidean Distance”, 19th International Conference,
Limassol, Cyprus, September 14-17, 2009, volume 5768.
[9] Diamantini, Claudia , Spalvieri, A. “Certain facts about Kohonen's LVQ1 algorithm”,
Circuits and Systems, 1994. ISCAS '94., 1994 IEEE International Symposium on, Volume:6.
[10] Sang-Woon Kimy and B. J. Oommenz, “Enhancing Prototype Reduction Schemes with
LVQ3-Type Algorithms”, Natural Sciences and Engineering Research Council of Canada,
and Myongji University, Korea, kimsw@mju.ac.kr, oommen@scs.carleton.ca.
[11] R. R. Janghel, Ritu Tiwari, Anupam Shukla, “Breast Cancer Diagnostic System using Hierarchical
Learning Vector Quantization”, IJCA Proceedings on National Seminar on Application of
Artificial Intelligence in Life Sciences 2013.
[12] Mahesh kumar, Uday Kumar,” Classification of Parkinson’s disease using Lvq, Logistic
Model Tree, K-star for Audioset”, Hogskolan Darlana University, 2011, roda wagen
3s-781 88.
[13] Suitable MLP Network Activation Functions for Breast Cancer and Thyroid Disease
Detection, Second International Conference on Computational Intelligence, Modeling and
Simulation, 2010, IEEE, http://eprints.usm.my/20282/1/4262a039.pdf.
[14] Ravita Mishra, “Web Usage Mining Contextual Factor: Human Information Behavior”,
International Journal of Information Technology and Management Information Systems
(IJITMIS), Volume 5, Issue 1, 2014, pp. 12 - 29, ISSN Print: 0976 – 6405, ISSN Online:
0976 – 6413.

Weitere ähnliche Inhalte

Was ist angesagt?

SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEMSEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEMijiert bestjournal
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachAIRCC Publishing Corporation
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingTELKOMNIKA JOURNAL
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET Journal
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismIRJET Journal
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a reviewTELKOMNIKA JOURNAL
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 

Was ist angesagt? (18)

SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEMSEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
SEARCHING DISTRIBUTED DATA WITH MULTI AGENT SYSTEM
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
Classifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processingClassifying confidential data using SVM for efficient cloud query processing
Classifying confidential data using SVM for efficient cloud query processing
 
An4201262267
An4201262267An4201262267
An4201262267
 
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 
Data stream mining techniques: a review
Data stream mining techniques: a reviewData stream mining techniques: a review
Data stream mining techniques: a review
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 

Andere mochten auch

Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences forIAEME Publication
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingIAEME Publication
 
Investigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensatedInvestigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensatedIAEME Publication
 
Bases socioculturais 2 história grêmio futebol clube
Bases socioculturais 2   história grêmio futebol clubeBases socioculturais 2   história grêmio futebol clube
Bases socioculturais 2 história grêmio futebol clubeAlexsandro Medeiros
 
Nociones gestion-talento-humano
Nociones gestion-talento-humanoNociones gestion-talento-humano
Nociones gestion-talento-humanoBelen Rojas
 
El refranero español
El refranero españolEl refranero español
El refranero españolAlba Degege
 
Formulario proyecto tic 2015
Formulario proyecto tic 2015Formulario proyecto tic 2015
Formulario proyecto tic 2015gisecastilla
 
Jump - Programa de Estágio DOW
Jump - Programa de Estágio DOWJump - Programa de Estágio DOW
Jump - Programa de Estágio DOWTM Jr. UFBA
 
Pics of jess_..._blog
Pics of jess_..._blogPics of jess_..._blog
Pics of jess_..._blogstoliros
 

Andere mochten auch (20)

10120140504006 2-3
10120140504006 2-310120140504006 2-3
10120140504006 2-3
 
30120140504013
3012014050401330120140504013
30120140504013
 
20320140502004
2032014050200420320140502004
20320140502004
 
30120140502012
3012014050201230120140502012
30120140502012
 
30120140505001 2
30120140505001 230120140505001 2
30120140505001 2
 
30420140502003
3042014050200330420140502003
30420140502003
 
Implementation of maximal length sequences for
Implementation of maximal length sequences forImplementation of maximal length sequences for
Implementation of maximal length sequences for
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
Kernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of movingKernel based similarity estimation and real time tracking of moving
Kernel based similarity estimation and real time tracking of moving
 
Investigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensatedInvestigation of optimal duty cycle for gvd undercompensated
Investigation of optimal duty cycle for gvd undercompensated
 
Bases socioculturais 2 história grêmio futebol clube
Bases socioculturais 2   história grêmio futebol clubeBases socioculturais 2   história grêmio futebol clube
Bases socioculturais 2 história grêmio futebol clube
 
O process
O processO process
O process
 
George pólya
George pólyaGeorge pólya
George pólya
 
La artesanía
La artesaníaLa artesanía
La artesanía
 
Nociones gestion-talento-humano
Nociones gestion-talento-humanoNociones gestion-talento-humano
Nociones gestion-talento-humano
 
El refranero español
El refranero españolEl refranero español
El refranero español
 
Formulario proyecto tic 2015
Formulario proyecto tic 2015Formulario proyecto tic 2015
Formulario proyecto tic 2015
 
Bondia Lleida 19072012
Bondia Lleida 19072012Bondia Lleida 19072012
Bondia Lleida 19072012
 
Jump - Programa de Estágio DOW
Jump - Programa de Estágio DOWJump - Programa de Estágio DOW
Jump - Programa de Estágio DOW
 
Pics of jess_..._blog
Pics of jess_..._blogPics of jess_..._blog
Pics of jess_..._blog
 

Ähnlich wie 50120140504006

AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...James Heller
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...IRJET Journal
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cijcsa
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...paperpublications3
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage dataijfcstjournal
 
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity StructureA Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structureiosrjce
 
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET Journal
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningIAEME Publication
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...ijwscjournal
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentijdpsjournal
 

Ähnlich wie 50120140504006 (20)

AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...Review on an automatic extraction of educational digital objects and metadata...
Review on an automatic extraction of educational digital objects and metadata...
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
50120140505007
5012014050500750120140505007
50120140505007
 
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
Web personalization using clustering of web usage data
Web personalization using clustering of web usage dataWeb personalization using clustering of web usage data
Web personalization using clustering of web usage data
 
20120140504021
2012014050402120120140504021
20120140504021
 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
 
G017334248
G017334248G017334248
G017334248
 
A Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity StructureA Web Extraction Using Soft Algorithm for Trinity Structure
A Web Extraction Using Soft Algorithm for Trinity Structure
 
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on CloudsIRJET- A Workflow Management System for Scalable Data Mining on Clouds
IRJET- A Workflow Management System for Scalable Data Mining on Clouds
 
Research on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web miningResearch on classification algorithms and its impact on web mining
Research on classification algorithms and its impact on web mining
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALI...
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

50120140504006

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 48 AN ENHANCED ALGORITHM FOR CLASSIFICATION OF WEB DATA FOR WEB USAGE MINING USING SUPERVISED NEURAL NETWORK ALGORITHMS Jaykumar Jagani1 , Prof. Kamlesh Patel2 1, 2 (Computer Engineering, R.K. University, Kasturbadham, Near Tramba, Rajkot, Gujarat) ABSTRACT The usage of data on the web is growing with a speed of light; huge amount of data is present on web. To extract useful information from such huge web data efficient data extraction or mining methods are required to achieve a variety of functionalities such a as Web AD market change analysis, web profile analysis, user trend analysis, Session Tracking, Cyber crime Detection etc. The idea behind using the concepts of neural network learning algorithms to classify the large amount of web data for Web Usage Mining are to provide accuracy and speed by the diverse characteristics of neural networks. A number of Neural Network learning algorithms provide better supervised learning. They are proficient to handle massive dynamic data. LVQ (Learning Vector Quantization) algorithms are very useful for supervised learning, dynamic labeling or post-training map labeling and supervised version of SOM through that the one can able to approximate the distribution of class with a lesser amount of codebook vectors and capable to minimize classification errors respectively. HLVQ (Hierarchical Learning Vector Quantization) is the technique that follows a concept of tree hierarchy generation in which more than one level of classification can be performed on the same dataset to check the accuracy of the classification. In this paper, the discussion is to define a new technique that will work on hierarchical as well as multi pass approach where during the classification each hierarchy is generated using Multi pass LVQ (MLVQ) algorithms. As a result of that HLVQ becomes more accurate and as MLVQ is used with many passes it will take lesser time. The basic HLVQ approach will follow the basic LVQ algorithms for hierarchy generation of all phases. In addition to that this new Improved HLVQ provides better accuracy through ornamental advantages of Multi pass LVQs and Optimized LVQ algorithms to classify and handle large volume of data. Keywords: Hierarchical LVQ, Multi pass LVQ, Neural Networks, Classification, Web Log Data and Web Usage Mining. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 49 1. INTRODUCTION Web users are growing day by day so the data on the web is on the rise [6]. If any mega firms or IT companies want to continue to exist in the market, they need to analyze the recent web data and past web data as well as the current trends of new generation users and calculation of upcoming trends of market. All these are possible only through the analysis of web data. Various data mining techniques are applied on large amount web data to extract useful knowledge and useful usage patterns for decision making to their IT sectors or any other mega firms by business Analysts [3]. As there are many web scaling problems such as user trend analysis of surfing, traffic flow analysis, distributed control handling, web traffic management and many more. Session tracking and website reorganization, distributed traffic sharing on distributed servers can be identified and analysis based on web data can be possible through Web Usage Mining. But for that the very important process in any mining technique is classification. Classification is the process of classify the data according to the class labels. But generally web data is not as much good to classify easily, because of many tricky reasons, web data becomes noisy. Web data can be gathered by web log files that are generated by user interactions to the web and stored on the web server. E.g. user interacts with some CGI based website, then the interaction of user is not been added to the log files. And many times some special entries are hidden by some users intentionally. So at later, Classification results will not be accurate. And traditional classification algorithms are not so accurate to classify the web log data, such as Bayes classification. So, the concept of Neural Network learning algorithms is very useful for handling large dynamic data. Neural Network learning algorithms are very accurate for classification. For large amount of rough data, the accurate classification is required and that classification can be possible using concepts of neural network [1] [4] [6] [2]. In this Paper, the discussion is based on a variety of neural network learning algorithms that help to handle huge web data as well as improved classification and clustering of data with less number of errors. Learning Vector Quantization (LVQ) algorithms are very constructive learning algorithms that classify the web data successfully [9]. Learning vector quantization is handy to approximate of allocation of class with fewer number of codebook vectors and capable to minimize classification errors [9]. HLVQ technique is following a concept of hierarchy generation in multi pass in which more than one pass can be performed on the same model using diverse algorithms and is very useful for achieving best chosen results. So in this paper, the discussion is based on a new technique that will work on multi pass as well as on hierarchical approach. So the advantages of both techniques will be achieved in single algorithm and algorithm is improved in classification with more accuracy and takes less time. 2. WEB USAGE MINING Web Usage Mining in a simple term is to extract the usage knowledge about the web users through various data mining techniques from web data is web usage mining [4]. Web Usage Mining is going to prove more useful method in current and next generation’s web exploring people world [6]. So, there is a huge research scope available in this area to develop and implement new ideas that how Usage Mining can be more effective and as a result of that end user is able to get better facilities as developer firms will able to identify user’s interest and will able to deliver the products likewise. 2.1 SOURCES OF DATA FOR WEB USAGE MINING The input data for the various classification algorithms for Web Usage Mining can be found from (1) Web servers (2) Proxy Servers (3) Web Clients [3]. The data is stored on the web in web log files. Each and every user activity is stored in respective server. The data is fetched from that
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 50 server for analysis. The web data available on the server is in a specific format known as extended common log format (ECLF) [5]. ECLF Format I/P Address Rfc 931 Auth User Req. Time Stamp Req. Format Status Bytes Referrer User Agent Important terms Ipaddress- network address of user machine Rfc 931- remote login name of user Status- as success / page not found like errors User agent- software or browser (web client) Authuser – original user name Bytes – size of transferred information [6] Figure-1: Web Usage Mining process As per Figure 1, it is clear that process of web usage mining is much similar to data mining process. The Only difference in data mining and web mining is that at the Starting level in data will come from various data bases, warehouses, and flat files and in web mining data will come from server log files. In this Paper, We are focused on initial phase of web usage mining process where clustering and classification process are done to provide better extraction and stability of data. Pattern Analysis Usage Path Analysis Sequence Matching Association Rules Classification & Clustering Converted Data Integrated Data Filtered Data Clean Log Web Log data Pre-processing Transaction Filtering Data integration Query process FormationUsage functions
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 51 3. APPLYING NEURAL NETWORKS Neural network provides many supervised learning algorithms that can be helpful in mining process, especially to give class labels to uncategorized data i.e. classification. Here is some brief about neural networks and its useful characteristics. The network of highly connected, self-intelligent neurons (Nodes) to do any task with once training is neural network. 3.1 NEURAL NETWORKS AT A GLANCE Artificial neural network (ANN) is a knowledge processing paradigm that inspired from biological nervous system. This technology is more useful because of its unique structure of system. ANN is the arrangement of large number of highly connected processing elements, called neurons in medical science as in brain, working together to solve a particular problem [1]. ANN is configured i.e. initializes with training or testing data to solve a particular problem such as, clustering or classification. Neural networks are highly capable to do the things such as meaning derivation from complex data. It is mostly used in finding usage trends that are sometimes very common but complex and even not carried out by machines. Neural network has many advantages as follows: • Self-adaptive learning How to deal with problems based on initial training or experience from the network. • Self-organization Artificial neural network creates its own organization and behavior and representation of knowledge it accepts while learning. • Real time operations Neural network computation may carry out parallel but for that special hardware are required to design. • Fault tolerance via multiple information copies Partial destroys or failure of network cannot affect the performance of the network [6]. Figure-2: Processing Architecture of Neural Network As figure 2, shows the recurrent network of ANN map nodes with its all three layers. 4. BRIEF ABOUT NEURAL NETWORK SUPERVISED LEARNING ALGORITHMS The list of such algorithm is big, but in this paper, we are discussing on some of the best classifiers among them, described in following sections. Z2Z1 X1 X2 X3 X4 X5 Output layer Hidden Layer Input layer
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 52 4.1 LEARNING VECTOR QUANTIZATION (LVQ) It is a machine learning algorithm and supervised version of SOM Algorithm. Through LVQ the approximation of distribution of class with less number of codebook vectors and is able to minimize classification errors. Codebook vectors are considered as class boundary representations. The algorithm is associated with neural network of class learning algorithms [8]. 4.1.1 ADVANTAGES OF LVQ LVQ is capable to summarize large datasets to smaller number of codebook vectors that are useful for visualization and classification. Training rate is so fast compare to any other network like back propagation. The Generated model updated incrementally. Here some LVQ versions are available. 4.2 VERSIONS OF LVQ They are denoted as LVQ1, LVQ2, LVQ3, OLVQ1, OLVQ3, MLVQ and hierarchical LVQ [11]. 4.3 LVQ ALGORITHM COMPARISON Table 1: All LVQ algorithm comparison with respect to various fields Fields LVQ OLVQ MLVQ HLVQ Version Beginner Optimized Multiple passes Hierarchical Accuracy Less More than LVQ More than OLVQ More than MLVQ Time High Less than LVQ Less than OLVQ Less than MLVQ Efficiency Low Moderate High High Codebooks More Moderate Less Less Capacity Low Moderate High High 4.4 WORKING OF HLVQ Here defined the steps for basics HLVQ. HLVQ is divided into two Stages like P is 1st and Q is 2nd [10]. Table 2: Basic HLVQ Steps 1. Initialize the codebook vectors and the learning rate α for P. 2. Randomly select an input vector I1 3. Find the winner unit closest to I1 by considering Euclidian Distance Cc to I. i.e. Step 3.1 3.1 Modify the weights of the winner unit: If and I belong to the same class, If C and I belong to different classes, 4. Repeat from step 2 until the neural network A is stabilized or until a fixed number of iterations have been carried out. 5. Initialize the codebook vectors for Q. 6. Randomly select an input vector I2. 7. Repeat Step 3 and 3.1 8. Reduce learning Rate of & repeat step 5 until fixed steps.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 53 5. PROPOSED APPROACH As it is obvious that multi pass and hierarchical LVQs are having advantages such as multi pass LVQ is a hybrid of basic and optimized LVQ so it has advantages of all basic LVQs and it works in the pass, so speed achieved for even more learning data is more and Hierarchical LVQ gives accuracy as it works in detail with domains and sub domains i.e. hierarchy levels also. Now if any technique has the advantages of both multi pass LVQ and Hierarchical LVQ, then it would be very good to classify with it any large data within efficient time. Such method is proposed as Hierarchical Multi pass LVQ. It has advantage of both multi pass and hierarchical technique that is speed and accuracy both. So, classification errors are reduced and process speed is also increased that means the large raw data can be classified in sufficient amount of time with more accuracy. 5.1 STEPS FOR IMPROVED HIERARCHICAL LVQ Here we are proposing the steps for Improved HLVQ: Here is an input vector, C is codebook vector, and is learning rate and N is neural Network. Table 3: Proposed Improved HLVQ algorithm 1. Initialize the codebook vectors C with fixed learning rate α for first stage. 2. Initialize and trigger the neural network with Bipolar Sigmoid function as an activation function as it works in a fixed range of values. So Classification errors can be removed. As it convergence is fast it will train Network rapidly. 3. Give an input vector I and find the closest unit nearby vector C using Euclidian distance between them. 4. Update the weights of closest unit 4.1 If they are in same class then unit weight is added in classification results and result is correct. If they are not in same class then unit weight is subtracted and result is not accurate. 5. Repeat from step 3 until the neural network N is stabilized with fixed number of iterations. 6. Reduce learning rate at end of each level. 7. Repeat the same procedure for Second Stage by considering the best result amongst the current stage and all previous stage. 8. Select most accurate unit and discard all rest. 9. Repeat the procedure until the whole dataset is classified. 5.1.1 WORKING OF IMPROVED LVQ For Improved HLVQ, an LVQ model is constructed using multi pass and each codebook vector is treated as a cluster centroid. All codebook vectors are evaluated and numbers are selected as candidates for sub-models. Sub models are also constructed using multi pass for all candidate codebook vectors and those sub models that do not perform well (in terms of classification accuracy), their parent codebook vector are kept as participant of the model. During test phase a data instance is first mapped to its BMU, if that BMU has a sub-model (that was not pruned during
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 54 training), the sub model is used for classification, if that was pruned during training; the class value in the BMU is used for classification. So In short at each level the model is constructed using multi pass LVQ and codebook vectors are evaluated and given numbers as candidate for sub model. The sub model is also constructed using multi pass LVQ specially OLVQ1. So, at each and every hierarchy level the sub models are constructed using multi pass LVQ if sub model is more inaccurate then it is rejected and parent node is considered as an element in model. By using this approach accuracy maintains at each and every level and construction of sub models are also fast and accurate. 5.1.2 ROLE OF ACTIVATION FUNCTION IN PERFORMANCE OF ANN Activation function plays a great role in triggering the Neural Networks. Activation Functions makes the convergence fast. So that neural networks can be trained accurately and rapidly. There are many activation functions used in supervised learning algorithms, they are nothing but mathematical functions used to initiate the neural network. The activation functions are chosen from their convergence and initialization time. The general comparison of various Activation functions is given below. From Table 4, it is quite clear to use sigmoid or hyperbolic tangent function as a activation function to trigger ANN. Table 4: General comparison of various Activation functions Functions Sigmoid Hyperbolic Tangent Neuronal Logarithmic Sine Exp Hidden Nodes 10 20 9 29 7 23 Training Accuracy 89.3 95.8 94.9 90.7 94 76.7 Testing Accuracy 84 92 94 86 93 63 5.2 COMPARISON OF BOTH HLVQ AND IMPROVED HLVQ Table 5: HLVQ vs Improved HLVQ Basic Approach My approach IMPROVED HLVQ It is basic hierarchical approach with one algorithms for all time i.e. lvq3 Hierarchical approach with different algorithms for all stage classification Parameters: Accuracy, Time Parameters: Accuracy, Time Available Algorithms For Initial Time: LVQ1,LVQ2, LVQ3, OLVQ1,OLVQ3 For Next Rounds (if exists): MLVQ, OLVQ1,OLVQ3 For first stage generation For first stage generation Take Any one Approach Take the Same Approach e.g. OLVQ1 e.g. OLVQ1 For Second stage generation For Second stage generation Took the same Approach Here I changed Approach I took e.g. OLVQ1 MLVQ Continues same for rest of stages Continues same for rest of stages Reduce learning Rate Result is benefit in accuracy and Time
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 55 6. ANALYSIS OF RESULTS Here I have tried some simulation and Implementation of both approaches and made comparative study of the results of both algorithms and based on my approach and I have found the new results comparatively better than old approach with increase in accuracy with less execution time. I have taken sample data and compare both the approaches. Results are as follows gives the clear cut idea of it. Data samples are Breast Cancer (BC), Super Market (SM), Log data (LOG), Segment- Challenge (SC) Classification results are derived based on two parameters as accuracy and Time. Table 6: Simulation HLVQ vs. Improved HLVQ Field Datasets Algorithm Params LOG SM SC BC HLVQ Accuracy 79.95 48.8 86.86 89.51 Time 34ms 64ms 12ms 5ms Vs Improved Accuracy 81,94 58.2 89.51 95.10 HLVQ Time 19ms 63ms 11ms 4ms 7. CONCLUSION At the end, after studying, learning and comparing a lot, to handle the large volume of web data, there would be a distinct need of neural network concept, because only through neural network learning algorithms, such huge volume of web data can be handled and applied to any application for knowledge extraction. All neural network learning algorithms have their own advantages and disadvantages. LVQ is a supervised model of SOM and used for giving class label to data. LVQ is capable to summarize large datasets to smaller number of codebook vectors that are useful for visualization and classification. Training rate is so fast compare to any other network like back propagation. The Generated model updated incrementally. Various versions of LVQ are having one or more disadvantage such as LVQ need to be able to generate useful distance measures for all attributes. They are highly dependent on initialization parameters and training. So by using more than one LVQ approach together will give benefits in recovering from demerits of LVQ. Improved
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 48-56 © IAEME 56 HLVQ is one such technique that provides fast and accurate classification with reduced size of codebooks. So, in short, by using Improved HLVQ, the classification of large web data will become easy. The basic HLVQ algorithm works on the same approach in all hierarchy generation that will give the same static classification results. When Improved HLVQ uses more than one approach to classify the data, so the disadvantages of the same method will excluded and only merits of both approaches are enlighten for accurate classification. So, Improved HLVQ will be proved as a great classification technique and will be useful for huge datasets as well. 8. REFERENCES [1] Sonali muddalwar, Shashank Kawan, “Applying artificial neural networks in web usage mining”, international journal of computer science and management research, vol. 1, issue 4, [Nov-12]. [2] Anshuman Sharma, “Web usage mining neural network”, international journal of reviews in computing, vol. 9, [10th april, 2012]. [3] Valishali A. Zilpe, Dr. Mohammad Atique, “Neural network approach for web usage mining”, ETCSIT, published in IJCA [2011]. [4] Jaydeep Srivastava, “Web Mining: Accomplishments and future directions”, http://www.cs.unm.edu/faculty/srivastava.html. [5] John R. Punin, Mukkai S. Krishnamoorthy, Mohammed J. Zaki, “Web usage mining- language and algorithms”, rensseluer polytechnic institute, troy NY 12180. [6] Jaykumar Jagani, Prof. Kamlesh Patel, “An Enhanced Approach for Classification in Web Usage Mining using Neural Network Learning Algorithms for Supervised Learning”, IJCA (0975-8887), Volume-90, No-17, March 2014. [7] Jaykumar Jagani, Prof. Kamlesh Patel, “A survey of web usage mining with neural network and proposed solutions on several issues”, ISSN: 0975–6760, Nov 12 To Oct 13, Volume – 02, Issue [02]. [8] Renata M. C. R. de Souza, Telmo de M. Silva Filho,” Optimized Learning Vector Quantization Classifier with an Adaptive Euclidean Distance”, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, volume 5768. [9] Diamantini, Claudia , Spalvieri, A. “Certain facts about Kohonen's LVQ1 algorithm”, Circuits and Systems, 1994. ISCAS '94., 1994 IEEE International Symposium on, Volume:6. [10] Sang-Woon Kimy and B. J. Oommenz, “Enhancing Prototype Reduction Schemes with LVQ3-Type Algorithms”, Natural Sciences and Engineering Research Council of Canada, and Myongji University, Korea, kimsw@mju.ac.kr, oommen@scs.carleton.ca. [11] R. R. Janghel, Ritu Tiwari, Anupam Shukla, “Breast Cancer Diagnostic System using Hierarchical Learning Vector Quantization”, IJCA Proceedings on National Seminar on Application of Artificial Intelligence in Life Sciences 2013. [12] Mahesh kumar, Uday Kumar,” Classification of Parkinson’s disease using Lvq, Logistic Model Tree, K-star for Audioset”, Hogskolan Darlana University, 2011, roda wagen 3s-781 88. [13] Suitable MLP Network Activation Functions for Breast Cancer and Thyroid Disease Detection, Second International Conference on Computational Intelligence, Modeling and Simulation, 2010, IEEE, http://eprints.usm.my/20282/1/4262a039.pdf. [14] Ravita Mishra, “Web Usage Mining Contextual Factor: Human Information Behavior”, International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 5, Issue 1, 2014, pp. 12 - 29, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.