• No results found

user's Web behavior

Enhancing Prediction of User Behavior on the Basic of Web Logs

Enhancing Prediction of User Behavior on the Basic of Web Logs

... a web-mining algorithm that aims at amending the interpretations of the draft’s output of association rule ...into user sessions, which are suitable for mining and reduce the size of the session file by ...

5

Semantic Information and Web based Product Recommendation System – A Novel Approach

Semantic Information and Web based Product Recommendation System – A Novel Approach

... user’s behavior is recorded in web server ...the user such as client id ,address, request time ,requested URL,HTTP etc are recorded in web ...through web log preprocessing. The main aim ...

5

Prediction of User Browsing Behavior Using Web Log Data

Prediction of User Browsing Behavior Using Web Log Data

... from web log ...about user browsing behavior or we can say that it is the process of finding out what users are looking for on ...the user accesses to any websites, all the user’s browsing ...

5

Title: Intrusion Detection System for Multitier Web Based Application

Title: Intrusion Detection System for Multitier Web Based Application

... physical web server runs many containers, each one an exact copy of the original web ...dedicated web server and isolated from other ...clean web server instance at ...single user ...

9

Intrusion Detection Using Double Guard In Multi-Tier Web Applications”: A Survey

Intrusion Detection Using Double Guard In Multi-Tier Web Applications”: A Survey

... from web server and database server are prone to be hacked easily which relies to provide more security to web ...prevents user account from intruder from hacking ...both web server and ...

6

Performance Analysis of User Behavior Across a Web for User Location Tracking

Performance Analysis of User Behavior Across a Web for User Location Tracking

... the web traffic pattern mining. So, the performance of web traffic pattern prediction in proposed MPC-FLDC technique is efficiently made by the implementation of Map Reduce framework based preprocessing, ...

13

Efficient Approach for Web Search Personalization in User Behavior Supported Web Server Log Files Using Web Usage Mining

Efficient Approach for Web Search Personalization in User Behavior Supported Web Server Log Files Using Web Usage Mining

... In the system, the timeout limit of twenty seven (average of 25.5 and thirty minutes) minutes is eliminated. within the experiments, it's found that once session timeout price of 27+ X, wherever X = some constant price ...

8

User Data Classification with Web Access Behavior Analysis Using Wi-Fi History

User Data Classification with Web Access Behavior Analysis Using Wi-Fi History

... and user preference and interest detectingon are very new and ...and user preferences by using Wi-Fi logs from mobile ...of user behavior from Wi-Fi logs are much complicated because the Wi-Fi ...

7

Exploring Smartphone Users’ Social Information Behavior

Exploring Smartphone Users’ Social Information Behavior

... Since the rise of smartphones, numerous studies have investigated online information behavior. In recent years, the impact of the online community has continued to rise, and the use of social networking services ...

7

SURVEY ON USER BEHAVIOR

SURVEY ON USER BEHAVIOR

... affecting our way of life, our economy and our general perspective of the world. Most research on informal organization mining centers around finding the information behind the information for enhancing people groups ...

5

An Implementation for User Behavioral Model of a Website

An Implementation for User Behavioral Model of a Website

... User behavior is the normal actions performed by web users when surfing and searching, like selecting text, bookmarking, clicking links, printing, ...When user login to the website, he is ...

12

SURVEY ON AUTOMATIC CLUSTERING BASED UPDATION OF USER BEHAVIORAL PROFILES FOR PERSONALIZED SEARCH RE

SURVEY ON AUTOMATIC CLUSTERING BASED UPDATION OF USER BEHAVIORAL PROFILES FOR PERSONALIZED SEARCH RE

... various web resources to support an individual or a company to develop the business, recognizing the marketing dynamics, ...etc. Web data mining is the method of extracting the knowledge from web ...

10

Web User Categorization and Behavior Study Based on Refreshing

Web User Categorization and Behavior Study Based on Refreshing

... Wide Web and people’s reliance on it in society today, ensuring satisfactory performance and reliability of web servers and web sites is becoming increasingly ...between web applications and ...

9

An Improved User Browsing Behavior Prediction Using Web Log Analysis

An Improved User Browsing Behavior Prediction Using Web Log Analysis

... - Web usage mining is widely used to discover the usage patterns from web log ...with web log data which are taken from web servers, proxy server or client’s ...browsing behavior, next ...

5

Enhancing User Navigation Using Web Transformation

Enhancing User Navigation Using Web Transformation

... the user behaviour and time which user spent on pages both are consider for finding the target ...means user are on page for more time as well as it access frequently then, it will check it for ...

8

A Neoteric Web Recommender System based on Approach of Mining Frequent Sequential Pattern from Customized Web Log Preprocessing

A Neoteric Web Recommender System based on Approach of Mining Frequent Sequential Pattern from Customized Web Log Preprocessing

... of web logs (one access record) includes the following key information: date-timestamp, client IP address, user ID, requested URL, and HTTP status ...a user-specified minimum support, which is ...

6

Title: Adaptive User-Device Interface Generation for Websites

Title: Adaptive User-Device Interface Generation for Websites

... our web site on the go, some of these devises make use of processor speeds higher than that of some of our computers, Samsung S4 and HTC One smartphones for example makes use of a ...current Web document ...

8

The Basics of Web Hacking   Tools and Techniques to Attack the Web(2013) pdf

The Basics of Web Hacking Tools and Techniques to Attack the Web(2013) pdf

... XS S and CS RF vulnerabilities are ge ing harder to find because of several client-side technologies in the browser that are responsible for key components of the page’s ...and S ilverlight are used more and ...

179

Elasticity Analysis of Web Browsing Behavior of Users

Elasticity Analysis of Web Browsing Behavior of Users

... --------------------------------------------------------------------ABSTRACT------------------------------------------------------------- There are many browsers available in the market but only a few are liked and used ...

7

A Comparative Analysis of Web Search Query: Informational Vs. Navigational Queries

A Comparative Analysis of Web Search Query: Informational Vs. Navigational Queries

... shown effective for describing the keyword search. In addition to that, Ioannis et al. [22] suggest the use of SPARQ to represent the search query. This technique utilizes various unary operators that are based on the ...

6

Show all 10000 documents...

Related subjects