• No results found

Web access log files

Fault Identification from Web Log Files by Pattern Discovery

Fault Identification from Web Log Files by Pattern Discovery

... The web log data used in FIWLFPD system experiments are collected from Apache web access log ...The web log files have different levels of faults including error, ...

5

Analysis of Web Log Files Integrating Hadoop MapReduce with Naive Bayes Algorithm

Analysis of Web Log Files Integrating Hadoop MapReduce with Naive Bayes Algorithm

... Analysing Web Server Access Log File” describes a method to improve the performance of application with the help of system administrator of web based ...the web log data of the ...

7

1.
													Performance improvement of web server through log files cleaning

1. Performance improvement of web server through log files cleaning

... server log file is a simple plain text file which record information about each ...user. Log file contain information about user name, IP address, date, time, bytes transferred, access ...A ...

6

Preprocessing of Web Usage Data for Application in Prefetching to Reduce Web Latency

Preprocessing of Web Usage Data for Application in Prefetching to Reduce Web Latency

... of Web resulted in heavy traffic in the ...a Web site; he/she generally browses around for several pages before leaving for another ...from access log files recorded by the Web ...

8

Customizable Web Log Mining from Web Server Log

Customizable Web Log Mining from Web Server Log

... Abstract— Web Log file contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes transferred, Result Status, URL that Referred and User Agent as per user ...The ...

5

A COMPARATIVE STUDY OF  WUM TOOLS TO ANALYZE USER BEHAVIOUR PATTERN FROM WEB LOG DATA

A COMPARATIVE STUDY OF WUM TOOLS TO ANALYZE USER BEHAVIOUR PATTERN FROM WEB LOG DATA

... tools. Log data is the public details of visitors stored in log file in some ...deep log analyzer user just needs to install this software on computer and process their existing log ...

16

IJCSMC, Vol. 3, Issue. 6, June 2014, pg.256 – 265 RESEARCH ARTICLE An Elegant Draw Near to Improve the Design of an E-commerce Website Using Web Usage Mining and K-Means Clustering

IJCSMC, Vol. 3, Issue. 6, June 2014, pg.256 – 265 RESEARCH ARTICLE An Elegant Draw Near to Improve the Design of an E-commerce Website Using Web Usage Mining and K-Means Clustering

... in web mining is to find out and retrieve useful and interesting patterns from a large ...a Web site and its information access tools is through the mining of web log ...the web ...

10

Putting Web Server Log Files to Work in Special Collections

Putting Web Server Log Files to Work in Special Collections

... of files that define content presentation for all or many pages in a given directory, such as document type definition files (dtds), server-side includes, and cascading style sheet (CSS) ...These ...

64

Online Full Text

Online Full Text

... (IIS) log file ...the web log file to obtain information on any activities carried out ...the log files, it is really a daunting task and time consuming to analyse these log ...

6

Group Movement Pattern Mining in Web Access Log for Navigation Behavior

Group Movement Pattern Mining in Web Access Log for Navigation Behavior

... a web site user accesses are to be evaluated by web usage ...applications. Log files are the best source to know user ...raw log files contains unnecessary details like image ...

7

Efficient Approach for Web Search Personalization in User Behavior Supported Web Server Log Files Using Web Usage Mining

Efficient Approach for Web Search Personalization in User Behavior Supported Web Server Log Files Using Web Usage Mining

... for web content ...clients, web world is painted to offer astounding redid benefits all through their association with the ...basic access to required information in a basic graspable organization. ...

8

A Framework To Integrate Feature Selection Algorithm For Classification Of  High Dimensional Data

A Framework To Integrate Feature Selection Algorithm For Classification Of High Dimensional Data

... Usually web servers have also the capability of logging some detailed information, about client requests and server responses, to log files; this allows the webmaster to collect statistics by running ...

7

Analyzing Prediction Accuracy for Small Scale Log Files Using Web Usage Mining Approaches

Analyzing Prediction Accuracy for Small Scale Log Files Using Web Usage Mining Approaches

... previous log files without affecting the prediction accuracy level. The web usage mining techniques are used to analyze the web usage patterns for a web ...user access log ...

7

Efficient Extraction for Mobile Web Access Log with Caching Strategy

Efficient Extraction for Mobile Web Access Log with Caching Strategy

... Mobile web access log file plays an important role in the analysis about demand of mobile terminal market or user ...the log file data is highly dimensional, disorganized and semi-structured, ...

10

Model Survey on Web Usage Mining and Web Log Mining

Model Survey on Web Usage Mining and Web Log Mining

... 1) Web Server Logs: History of web page requests is maintained as a log ...file. Web servers are the costly and the most common data ...like access log, referrer log, or ...

7

Analysis of Web Log Server Files of E Commerce Websites to Study Customer Behavior Pattern

Analysis of Web Log Server Files of E Commerce Websites to Study Customer Behavior Pattern

... Abstract: web usage mining refers to the automatic discovery and analysis of patterns in click stream and related data collected or generated as a result of user interactions with web resources on one or ...

10

Geolocalization Techniques using Log Files in Android

Geolocalization Techniques using Log Files in Android

... radio log in the below image, it showing a logcat with the radio log in Verbose modem to show the time -v , and –s is to set a filter on the ...the log files from the RIL (Radio Interface ...

6

Websheltz SQL Injection, and cross-site scripting is boring-Gimme a command prompt - Joe McCray.pdf

Websheltz SQL Injection, and cross-site scripting is boring-Gimme a command prompt - Joe McCray.pdf

... This means either storing the files outside of the web root or creating a directory under the web root and blocking web access to it in the Apache configuration or in a .htaccess file.[r] ...

20

A Framework for Analyzing Software System Log Files.

A Framework for Analyzing Software System Log Files.

... the log file is compared against each of the regular expressions to find the best ...need access to the source ...have access to the source code. Even when we access to the source code there ...

91

Performance Analysis Of RMT Weblog Analyzer Using WUM Technique

Performance Analysis Of RMT Weblog Analyzer Using WUM Technique

... project, web pages can be pre-fetched depending on the usage ...the web performance at a great ...of Web log access, use of different similarity Association Rules and conclude about the ...

8

Show all 10000 documents...

Related subjects