SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 171
Enhancing Prediction of User Behavior on the basic of Web Logs
Ms. Mrunmayee R. Joshi1, Dr. Prakash S. Prasad2
1M.Tech Scholar, Dept. of CSE, PIET College, Nagpur, India
2Head of Department, Dept. of CSE, PIET College, Nagpur, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - As an important part of discovering association
rules, frequent item sets data mining plays an important role
in mining associations, correlations and other importantdata
mining tasks. Some traditional frequent item sets mining
algorithms are unabletohandlemassivesmallfiles. FP-growth
algorithm recursively generates large amounts of conditional
pattern bases and conditional FP-trees when the dataset is
large. In such a case, both the memory usage and
computational cost are high; the FP-tree can’t meet the
memory requirement leading to low efficiency and high cost.
We propose an improved Parallel FP-Growth algorithm. In
particular, we introduce a small files processing strategy for
massive small files datasets to compensate defects of low R/W
speed and low processing efficiency in Hadoop. We use
MapReduce to implement the parallelization of FP-Growth,
thereby improving the overall performance of frequent item
sets mining. The experimental results show that the IPFP
algorithm is feasible and a higher mining efficiency, and can
meet the rapidly growing needs of frequent item sets mining
for massive small files datasets.
Key Words: Weblogs Dataset, User Behavior, Apriori
Algorithm, KNN Algorithm, FP-Growth Algorithm, IPFP
(Improved Parallel FP-Growth algorithm).
1. INTRODUCTION
Un-stoppable growth of knowledge available on Internet
makes the users to access the information day by day. It
becomes much more difficult for users to accessappropriate
information efficiently. Analyzing and modeling web
navigation behavior is helpful inunderstandingdemandsfor
online users. To predict User behavior, require relevant
weblog data for processing. Web mining technique is use to
extract the relevant data from the vast weblog data. Web
mining is one of the techniques of data mining, whichisused
to extract and analyze useful informationfromwebdata. The
categories of web mining are webcontentmining, webusage
mining and web structure mining. Web contentminingisthe
discovery of contents from web documents such as image,
text, audio, video etc. Web structure mining focus on
detecting the physical link structure of websites. Web usage
mining examines the browsing activity.
The user accessing information from the websites is stored
as diary of information also called as logs. The log contains
series of user transactions which are often updated
whenever the user accesses the website. The prediction of
user behavior can be identified only through logs. The
weblog contains unstructured format, so convert to raw
weblog to processed weblog using data preprocessing, the
data preprocessing includes Data Cleaning, User
identification, Session Identification, content retrieval and
path completion to get user navigation pattern.
Prediction of logs is the main activity. The prediction is
analyzed by using the attributes and categories in weblog,
which is based on user preference. The two types of
prediction process one is online and another is offline with
respect to web server activity. Offline data analyzehistorical
data, such as log file or weblogs, which are captured from
server. Weblog used in online whenever that user comes
online for next time. Based on previous user navigation we
can identify user behavior that is taken from weblogs.
1.1 Objectives
 We will collect the web logs of the user from
browser history.
 Predicting frequency pattern of user related to its
web behavior.
 We can recommend user products and services on
the basis of that.
 High chances of conversion as we able to predict
what he want.
2. RELATED WORK
• In 1997, M. Perkowitz and O. Etzioni [1] suggested
that the user would visit the web server by current
and past sessions. The algorithm suggest that first
top m pages based on user’s most visited current
sessions, the system should analyze the max-path
and min-path of navigated sessions, then only the
visitor should easily navigate the path from the list
of max list of path, by selecting min path, the
algorithm select the best path from the list of
frequent path.
• In 1999, M. J. Pazzani and D. Billsus [2] showed the
examples of visitors suggest links of each user. The
user visit the web server based on user interest, by
the next time the browser will show the user
suggest website based on user interest. The
browser will follow the frequent viewed items,
whenever the user will visit some other pages that
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 172
will show frequently of webserver links, and then
only user can follow the frequently visited links.
 In 2001, Adomavicius and Tuzhilin[3] usedthedata
mining method to mine the access records of the
individual users, excavate the association rules and
the user registration of the personal information
constitute the user model. Sofia Stamou and
Alexandros Ntoulas proposed a method of user
interest modeling by analyzing query terms and
web page subject information. Researchers such as
Paul conducted userinterest modelingthroughODP
classification system and data information.
• In 2011, D. Kerana Hanirex and Dr. M. A. Dorai
Rangaswamy [4] showed classification of frequent
item sets, semi-frequent item sets and In-frequent
item sets and database transactions into clusters.
Clusters are grouped based on the similar traversal
pattern. Then it finds the frequent item set. Semi-
frequent item sets and In-frequent item sets, the
clusters reduce the number of transaction in the
database and efficiency is improved.
• In 2012, Dr. A. R. Patel and Renata Ivancsy [5] Web
usage mining predict the user navigation behavior
based on the preferences in website, User
navigation technique uses data preprocessing
suggested that the weblog contains raw log format,
so convert to unprocessed weblog to processed
weblog using data preprocessing, the data
preprocessing technique contains Data Cleaning,
User identification, Session Identification, content
retrieval and path completiontogetuser navigation
pattern. After getting the processed log, the given
log is converted in to sequence of patterns basedon
user’s pattern.
 In 2012, Mishra R. and Choubey R. [6] describe the
FP-growth algorithm is obtaining a most frequently
access paths and pages from the web log data and
providing valuable information to user behavior.
 In 2014, Anand N. [7] describes an Internet usage
details and provides them with the tools to
understand the online behavior of their teenage
children.
 In 2014, Singh A.P. and Jain R.C. [8] Different kinds
of web usage mining techniques with their basic
models and concepts are provided.
 In 2014, Parvatikar S. and Joshi B. [9] this paper
focused on Web Usage Mining is the user navigation
patterns and their use of web resources. The
different stages involved in this mining processand
with the comparative analysis between the pattern
discovery algorithms Apriori and FP-growth
algorithm.
 In 2015, S.Jagan, and S.P. Rajagopalan [10] describe
the web usage mining and algorithms used for
providing personalization on the web. In this paper
focused the data preprocessingandpatternanalysis
on the web and using the association rule mining
algorithms.
 In 2015, Ladekar A. Pawar A. et al. [11] describe a
web-mining algorithm that aims at amending the
interpretations of the draft’s output of association
rule mining. This algorithm is being extremely used
in web mining. The results obtained prove the
robustness of the algorithm proposed in this paper.
 In 2015, Deepa and Raajan [12] implemented the
preprocessing techniques to convertthelogfileinto
user sessions, which are suitable for mining and
reduce the size of the session file by filtering the
least requested pages using the preprocessing
technique.
 In 2015, Avneet Saluja et al. [13] in their work is
user futurerequest predictionusingweblogrecords
and user information. The purpose of the effort is to
provide a benchmark for evaluating a various
methods used in the past, a present and which can
be used in a future to reduce the search time of a
user on the network.
3. PROPOSED WORK FLOW
1. Web-log data.
2. Data Preprocessing
a. Data Cleaning
b. User Identification
c. Session Identification
3. Apriori Algorithm
4. KNN Algorithm
5. FP-Growth (FP) algorithm
6. Improved Parallel FP-Growth Algorithm (IPFP)
7. Result
4. PROPOSED METHODOLOGY
1. Weblog Data
A Weblog is a Web site that consists of a series of
entries arranged in reverse chronological order,
repeatedly updatedonfrequentlywithnewinformation
about particular topics.
2. Data Preprocessing
This technique involves removing of the unwanted data
and splitting of data into a structured file format. All
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 173
server log files do not have the right format, so there is a
essential for preprocessing technique.
a. Data Cleaning - It is the method of
recognizing and correcting imprecise
records from tables, datasets.
b. User Identification - The user gets identified
on the basis of client IP address, user name,
requested URL, date, time,serverIPaddress
etc. Log file format- Internet Information
Service (IIS) records the data.
c. Session Identification - The important
operation of navigation patternminingisto
cluster the session. The navigation pattern
mining arranges the user based on the
session.
Fig -1: Flow of Design Mode
3. Apriori Algorithm
Apriori algorithm developed by Agrawal and Srikand is
the first algorithm to create all frequent item sets and
confident association rules. Presently after that, the
method was corrected and retiled Apriori by Agrawal.
Apriori algorithm follows a “Bottom-Up Approach”
where frequent item subset are extended one item at a
time.
Apriori is designed to operate on database containing
transaction (For ex. Collections of items bought by
customer or details of website frequentation).
The algorithm is a supervised influential approach for
mining frequent item set for Boolean associationrules.It
takes weblog file of visited and minimum visitor page
characterized as segment of input. Apriori algorithm
creates all maximum frequent item set F1, F2, F3…Fk as
output. The algorithm identifies and the repeateddataset
and are considered for creating frequent IP set in the
first pass. In the subsequent passes frequent IP sets
accepted in the previous pass are extendedwithanother
IP to generate frequent item sets. After k passes if no
frequent k- item set is found, the algorithm is ended.
4. KNN Algorithm
K-Nearest Neighbors is one of the most basic yet
important classificationalgorithmsinMachineLearning.
It belongs to the supervised learning domain and finds
powerful application in pattern detection, data mining
and intrusion recognition. It is commonly disposable in
real-life scenarios since it is non-parametric.
Its purpose is to use a database in which the data points
are separated into some classes to predict the
classification of a new data points.
5. FP-Growth Algorithm
The FP-growth algorithm creates numerous data sets
from FP Tree by navigating in a bottom up approach.
The algorithm finds frequent item sets that can be used
to extract association rules. This is done using
the support count of an item set. This frequent
information allows for the effective discovery of
numerous data sets.
The main idea behind the algorithm is follows a divide
and conquer strategy such as it compress the database
which provides the frequent sets and then divide this
compressed database intoa setofconditional databases,
each associated with a often set and apply data mining
on every database.
5. PROPOSED SYSTEM
IPFP ALGORITHM
IPFP algorithm for mining numerous itemsets in
enormous small files datasets.
1) Write a small files processing program—
Sequence File. The Sequence File is used to
merge all enormous small files, which are
composed of a large amount of transaction
datasets stored in HDFS, into a large
transaction data file (transaction database).
2) Similarly divide the transaction database into
several sub transaction databases and then
assign them to different nodes in Hadoop
cluster. This step is automatically divided by
HDFS, when necessary we can use the balance
command enabling its file system to achieve
load balancing.
3) Calculate support count of each item in the
transaction database by MapReduce, and then
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 174
obtain the set of I_list from support count in
descending order.
4) Divide I_list into M groups, denoted as
Group_list (abbreviated as G_list), and assign
group_id for each group successively and each
G_list contains a set of items.
5) Complete the parallel calculating of FP-Growth
algorithm by MapReduce. The Map function
relates the item of each transaction in the sub-
transaction database with the item in G_list. If
they are same, then distribute the
corresponding transaction to the machine
associated with G_list. Otherwise, compares
with the next item in G_list. Finally, the
independent sub-transaction databases
corresponded to G list will be produced. The
Reduce function recursively calculates the
independent sub-transaction databases
generated in step , and then constructs the FP-
tree. This step is like the process of traditional
FP-tree generation, but the differenceisa sizeK
maxheap HP that stores frequent pattern of
each item.
6) Aggregate the local numerous itemsets
generated from each node in the cluster by
MapReduce, and finally get theglobalnumerous
itemsets.
6. CONCLUSIONS
• In this paper, owing to the small files processing
strategy, the IPFP algorithm can reduce memory
cost greatly and improve the productivity of data
access, thus avoids memory overflow and reduces
I/O overhead.
• Meanwhile, the IPFP algorithm is migrated to the
MapReduce environment, which can complete
frequent item sets mining efficiently and thus
enhance the overall performance of FP-Growth
algorithm.
IPFP algorithm can make a breakthrough where PFP
algorithm has its shortcomings in handling massive small
files datasets, and has a good speed up and a higher mining
efficiency.
REFERENCES
1) M. Perkowitz and O. Etzioni. Adaptive websites: an AI
challenge. In Proc. 15th Intl. Joint Conf. onArt.Int.,1997.
2) M. J. Pazzani and D. Billsus. Adaptive web site agentsIn
Proc. 3rd Intl. Conf. on Autonomous Agents, 1999.
3) Adomavicius G and Tuzhilin A. Using Data Mining
Methods to Build Customer Profiles, IEEE Feb 2001.
4) D. Kerana Hanirex, Dr. M. A. Dorai Rangaswamy
International Journal on Computer Science and
Engineering, “Efficient Algorithm for Mining Frequent
Itemsets Using Clustering Technique, ”vol. 3, no. 3,
March 2011.
5) Ketul B. Patel, Dr. A. R. Patel, “Process of web usage
mining to find interesting patternsfromwebusagedata,
”www. Ijctonline.com vol. 3, no. 1, Aug 2012.
6) R. Mishra, A. Choubey, “Discovery of Frequent Patterns
from Web Log Data by using FP-Growth algorithm for
Web Usage Mining”, International Journal of Advanced
Research in Computer Science and Software
Engineering, Vol 2, 2012.
7) N. Anand, “Effective prediction of kid’s behavior based
on internet use”, International Journal of Information
and Computation Technology, 2014.
8) A.P. Singh, R. C. Jain, “A Survey on Different Phases of
Web Usage Mining for Anomaly User Behavior
Investigation”, IJETTCS - International Journal of
Emerging Trends & Technology in Computer Science,
Vol 3, 2014.
9) S. Parvatikar and B. Joshi, “Analysis of User Behavior
through Web Usage Mining”, ICAST - International
Conference on Advances in Science and Technology,
2014.
10) S. Jagan, and S.P. Rajagopalan, “A survey on web
personalization of web usage mining”,
IRJETInternational Research Journal ofEngineeringand
Technology, 2015.
11) A. Ladekar, P. Pawar, D. Raikar and J. Chaudhari, “Web
Log Based Analysis of User’s Browsing Behavior”,IJCSIT
- International Journal of Computer Science and
Information Technologies, Vol. 6 (2) , 2015.
12) A. Deepa, and P. Raajan, “An efficient preprocessing
methodology of log file for Web usage mining”,
NCRIIAMI - National Conference on Research Issues in
Image Analysis and Mining Intelligence, 2015.
13) A. Saluja, B. Gour, and L. Singh., “Web Usage Mining
Approaches for User’s Request Prediction: A Survey”,
IJCSIT-International Journal of Computer Science and
Information Technologies, Vol. 6 (3), 2015.
14) “An Introduction to Real TimeProcessingandStreaming
of Wireless Network Data”, IJARCCE,
International Journal ofAdvancedResearchinComputer
and Communication Engineering, Vol. 4, Issue 1, ISSN
2319-5940, Jan 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 175
15) “Strategies in Traffic Controlling Operations in India”,
International Journal ofAdvancedResearchinComputer
and Communication Engineering, Vol. 6, Issue 8, August
2017, ISSN (Online) 2278-1021,ISSN (Print) 2319
5940,pp.210-213.
16) “Energy Optimization Factors for the Embedded Mobile
Processors”,International Journal ofAdvancedResearch
in Computer and Communication Engineering, Vol. 6,
Issue 3, March 2017, ISSN (Online) 2278-1021, ISSN
(Print) 2319 5940,pp.397-399.
BIOGRAPHIES
Miss. Mrunmayee R. Joshi is a
M.Tech Student in the Department
of Computer Science &
Engineering, Priyadarshini
Institute of Engineering and
Technology, Rashtrasant Tukadoji
Maharaj Nagpur University,
Nagpur.
Dr. Prakash S. Prasad is workingas
Professor and Head of Computer
Science and Engineering at
Priyadarshini Institute of
Engineering and Technology,
Nagpur . He is having 20 Years of
experience in the field of teaching
to engineering students. He
completed his engineering in the
year 1997, master of engineering
in 2006 and PhD in 2014.

More Related Content

What's hot

A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesijctet
 
Classification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A SurveyClassification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A SurveyIRJET Journal
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgeRishikesh Pathak
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET Journal
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web dataeSAT Publishing House
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningIJERA Editor
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...IJSRD
 
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...ijdkp
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueIOSR Journals
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Journals
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Publishing House
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 

What's hot (16)

A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 
Classification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A SurveyClassification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A Survey
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
 
A comprehensive study of mining web data
A comprehensive study of mining web dataA comprehensive study of mining web data
A comprehensive study of mining web data
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
 
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...Integrated Web Recommendation Model with Improved Weighted Association Rule M...
Integrated Web Recommendation Model with Improved Weighted Association Rule M...
 
Dm4
Dm4Dm4
Dm4
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
 
Ab03401550159
Ab03401550159Ab03401550159
Ab03401550159
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
H0314450
H0314450H0314450
H0314450
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 

Similar to IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs

MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...ijcsa
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...ijcsa
 
Predicting the user navigation pattern from web logs using weighted support ...
Predicting the user navigation pattern from web logs using  weighted support ...Predicting the user navigation pattern from web logs using  weighted support ...
Predicting the user navigation pattern from web logs using weighted support ...nooriasukmaningtyas
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine ScrapperIRJET Journal
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
 
A Survey of Issues and Techniques of Web Usage Mining
A Survey of Issues and Techniques of Web Usage MiningA Survey of Issues and Techniques of Web Usage Mining
A Survey of Issues and Techniques of Web Usage MiningIRJET Journal
 
A Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionA Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionEditor IJMTER
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...IOSR Journals
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET Journal
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining Editor IJMTER
 
Automatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningAutomatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningIJMIT JOURNAL
 
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining IJMIT JOURNAL
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A SurveyIJMER
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningIOSR Journals
 
A Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web UsageA Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web Usageijbuiiir1
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine LearningIRJET Journal
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...ijdkp
 

Similar to IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs (20)

MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 
Predicting the user navigation pattern from web logs using weighted support ...
Predicting the user navigation pattern from web logs using  weighted support ...Predicting the user navigation pattern from web logs using  weighted support ...
Predicting the user navigation pattern from web logs using weighted support ...
 
Search Engine Scrapper
Search Engine ScrapperSearch Engine Scrapper
Search Engine Scrapper
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
A Survey of Issues and Techniques of Web Usage Mining
A Survey of Issues and Techniques of Web Usage MiningA Survey of Issues and Techniques of Web Usage Mining
A Survey of Issues and Techniques of Web Usage Mining
 
A Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionA Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior Prediction
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
Pf3426712675
Pf3426712675Pf3426712675
Pf3426712675
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
 
Automatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningAutomatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage mining
 
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining
 
625 634
625 634625 634
625 634
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A Survey
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
 
A Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web UsageA Study of Pattern Analysis Techniques of Web Usage
A Study of Pattern Analysis Techniques of Web Usage
 
a novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studioa novel technique to pre-process web log data using sql server management studio
a novel technique to pre-process web log data using sql server management studio
 
Detection of Behavior using Machine Learning
Detection of Behavior using Machine LearningDetection of Behavior using Machine Learning
Detection of Behavior using Machine Learning
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

IRJET- Enhancing Prediction of User Behavior on the Basic of Web Logs

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 171 Enhancing Prediction of User Behavior on the basic of Web Logs Ms. Mrunmayee R. Joshi1, Dr. Prakash S. Prasad2 1M.Tech Scholar, Dept. of CSE, PIET College, Nagpur, India 2Head of Department, Dept. of CSE, PIET College, Nagpur, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - As an important part of discovering association rules, frequent item sets data mining plays an important role in mining associations, correlations and other importantdata mining tasks. Some traditional frequent item sets mining algorithms are unabletohandlemassivesmallfiles. FP-growth algorithm recursively generates large amounts of conditional pattern bases and conditional FP-trees when the dataset is large. In such a case, both the memory usage and computational cost are high; the FP-tree can’t meet the memory requirement leading to low efficiency and high cost. We propose an improved Parallel FP-Growth algorithm. In particular, we introduce a small files processing strategy for massive small files datasets to compensate defects of low R/W speed and low processing efficiency in Hadoop. We use MapReduce to implement the parallelization of FP-Growth, thereby improving the overall performance of frequent item sets mining. The experimental results show that the IPFP algorithm is feasible and a higher mining efficiency, and can meet the rapidly growing needs of frequent item sets mining for massive small files datasets. Key Words: Weblogs Dataset, User Behavior, Apriori Algorithm, KNN Algorithm, FP-Growth Algorithm, IPFP (Improved Parallel FP-Growth algorithm). 1. INTRODUCTION Un-stoppable growth of knowledge available on Internet makes the users to access the information day by day. It becomes much more difficult for users to accessappropriate information efficiently. Analyzing and modeling web navigation behavior is helpful inunderstandingdemandsfor online users. To predict User behavior, require relevant weblog data for processing. Web mining technique is use to extract the relevant data from the vast weblog data. Web mining is one of the techniques of data mining, whichisused to extract and analyze useful informationfromwebdata. The categories of web mining are webcontentmining, webusage mining and web structure mining. Web contentminingisthe discovery of contents from web documents such as image, text, audio, video etc. Web structure mining focus on detecting the physical link structure of websites. Web usage mining examines the browsing activity. The user accessing information from the websites is stored as diary of information also called as logs. The log contains series of user transactions which are often updated whenever the user accesses the website. The prediction of user behavior can be identified only through logs. The weblog contains unstructured format, so convert to raw weblog to processed weblog using data preprocessing, the data preprocessing includes Data Cleaning, User identification, Session Identification, content retrieval and path completion to get user navigation pattern. Prediction of logs is the main activity. The prediction is analyzed by using the attributes and categories in weblog, which is based on user preference. The two types of prediction process one is online and another is offline with respect to web server activity. Offline data analyzehistorical data, such as log file or weblogs, which are captured from server. Weblog used in online whenever that user comes online for next time. Based on previous user navigation we can identify user behavior that is taken from weblogs. 1.1 Objectives  We will collect the web logs of the user from browser history.  Predicting frequency pattern of user related to its web behavior.  We can recommend user products and services on the basis of that.  High chances of conversion as we able to predict what he want. 2. RELATED WORK • In 1997, M. Perkowitz and O. Etzioni [1] suggested that the user would visit the web server by current and past sessions. The algorithm suggest that first top m pages based on user’s most visited current sessions, the system should analyze the max-path and min-path of navigated sessions, then only the visitor should easily navigate the path from the list of max list of path, by selecting min path, the algorithm select the best path from the list of frequent path. • In 1999, M. J. Pazzani and D. Billsus [2] showed the examples of visitors suggest links of each user. The user visit the web server based on user interest, by the next time the browser will show the user suggest website based on user interest. The browser will follow the frequent viewed items, whenever the user will visit some other pages that
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 172 will show frequently of webserver links, and then only user can follow the frequently visited links.  In 2001, Adomavicius and Tuzhilin[3] usedthedata mining method to mine the access records of the individual users, excavate the association rules and the user registration of the personal information constitute the user model. Sofia Stamou and Alexandros Ntoulas proposed a method of user interest modeling by analyzing query terms and web page subject information. Researchers such as Paul conducted userinterest modelingthroughODP classification system and data information. • In 2011, D. Kerana Hanirex and Dr. M. A. Dorai Rangaswamy [4] showed classification of frequent item sets, semi-frequent item sets and In-frequent item sets and database transactions into clusters. Clusters are grouped based on the similar traversal pattern. Then it finds the frequent item set. Semi- frequent item sets and In-frequent item sets, the clusters reduce the number of transaction in the database and efficiency is improved. • In 2012, Dr. A. R. Patel and Renata Ivancsy [5] Web usage mining predict the user navigation behavior based on the preferences in website, User navigation technique uses data preprocessing suggested that the weblog contains raw log format, so convert to unprocessed weblog to processed weblog using data preprocessing, the data preprocessing technique contains Data Cleaning, User identification, Session Identification, content retrieval and path completiontogetuser navigation pattern. After getting the processed log, the given log is converted in to sequence of patterns basedon user’s pattern.  In 2012, Mishra R. and Choubey R. [6] describe the FP-growth algorithm is obtaining a most frequently access paths and pages from the web log data and providing valuable information to user behavior.  In 2014, Anand N. [7] describes an Internet usage details and provides them with the tools to understand the online behavior of their teenage children.  In 2014, Singh A.P. and Jain R.C. [8] Different kinds of web usage mining techniques with their basic models and concepts are provided.  In 2014, Parvatikar S. and Joshi B. [9] this paper focused on Web Usage Mining is the user navigation patterns and their use of web resources. The different stages involved in this mining processand with the comparative analysis between the pattern discovery algorithms Apriori and FP-growth algorithm.  In 2015, S.Jagan, and S.P. Rajagopalan [10] describe the web usage mining and algorithms used for providing personalization on the web. In this paper focused the data preprocessingandpatternanalysis on the web and using the association rule mining algorithms.  In 2015, Ladekar A. Pawar A. et al. [11] describe a web-mining algorithm that aims at amending the interpretations of the draft’s output of association rule mining. This algorithm is being extremely used in web mining. The results obtained prove the robustness of the algorithm proposed in this paper.  In 2015, Deepa and Raajan [12] implemented the preprocessing techniques to convertthelogfileinto user sessions, which are suitable for mining and reduce the size of the session file by filtering the least requested pages using the preprocessing technique.  In 2015, Avneet Saluja et al. [13] in their work is user futurerequest predictionusingweblogrecords and user information. The purpose of the effort is to provide a benchmark for evaluating a various methods used in the past, a present and which can be used in a future to reduce the search time of a user on the network. 3. PROPOSED WORK FLOW 1. Web-log data. 2. Data Preprocessing a. Data Cleaning b. User Identification c. Session Identification 3. Apriori Algorithm 4. KNN Algorithm 5. FP-Growth (FP) algorithm 6. Improved Parallel FP-Growth Algorithm (IPFP) 7. Result 4. PROPOSED METHODOLOGY 1. Weblog Data A Weblog is a Web site that consists of a series of entries arranged in reverse chronological order, repeatedly updatedonfrequentlywithnewinformation about particular topics. 2. Data Preprocessing This technique involves removing of the unwanted data and splitting of data into a structured file format. All
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 173 server log files do not have the right format, so there is a essential for preprocessing technique. a. Data Cleaning - It is the method of recognizing and correcting imprecise records from tables, datasets. b. User Identification - The user gets identified on the basis of client IP address, user name, requested URL, date, time,serverIPaddress etc. Log file format- Internet Information Service (IIS) records the data. c. Session Identification - The important operation of navigation patternminingisto cluster the session. The navigation pattern mining arranges the user based on the session. Fig -1: Flow of Design Mode 3. Apriori Algorithm Apriori algorithm developed by Agrawal and Srikand is the first algorithm to create all frequent item sets and confident association rules. Presently after that, the method was corrected and retiled Apriori by Agrawal. Apriori algorithm follows a “Bottom-Up Approach” where frequent item subset are extended one item at a time. Apriori is designed to operate on database containing transaction (For ex. Collections of items bought by customer or details of website frequentation). The algorithm is a supervised influential approach for mining frequent item set for Boolean associationrules.It takes weblog file of visited and minimum visitor page characterized as segment of input. Apriori algorithm creates all maximum frequent item set F1, F2, F3…Fk as output. The algorithm identifies and the repeateddataset and are considered for creating frequent IP set in the first pass. In the subsequent passes frequent IP sets accepted in the previous pass are extendedwithanother IP to generate frequent item sets. After k passes if no frequent k- item set is found, the algorithm is ended. 4. KNN Algorithm K-Nearest Neighbors is one of the most basic yet important classificationalgorithmsinMachineLearning. It belongs to the supervised learning domain and finds powerful application in pattern detection, data mining and intrusion recognition. It is commonly disposable in real-life scenarios since it is non-parametric. Its purpose is to use a database in which the data points are separated into some classes to predict the classification of a new data points. 5. FP-Growth Algorithm The FP-growth algorithm creates numerous data sets from FP Tree by navigating in a bottom up approach. The algorithm finds frequent item sets that can be used to extract association rules. This is done using the support count of an item set. This frequent information allows for the effective discovery of numerous data sets. The main idea behind the algorithm is follows a divide and conquer strategy such as it compress the database which provides the frequent sets and then divide this compressed database intoa setofconditional databases, each associated with a often set and apply data mining on every database. 5. PROPOSED SYSTEM IPFP ALGORITHM IPFP algorithm for mining numerous itemsets in enormous small files datasets. 1) Write a small files processing program— Sequence File. The Sequence File is used to merge all enormous small files, which are composed of a large amount of transaction datasets stored in HDFS, into a large transaction data file (transaction database). 2) Similarly divide the transaction database into several sub transaction databases and then assign them to different nodes in Hadoop cluster. This step is automatically divided by HDFS, when necessary we can use the balance command enabling its file system to achieve load balancing. 3) Calculate support count of each item in the transaction database by MapReduce, and then
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 174 obtain the set of I_list from support count in descending order. 4) Divide I_list into M groups, denoted as Group_list (abbreviated as G_list), and assign group_id for each group successively and each G_list contains a set of items. 5) Complete the parallel calculating of FP-Growth algorithm by MapReduce. The Map function relates the item of each transaction in the sub- transaction database with the item in G_list. If they are same, then distribute the corresponding transaction to the machine associated with G_list. Otherwise, compares with the next item in G_list. Finally, the independent sub-transaction databases corresponded to G list will be produced. The Reduce function recursively calculates the independent sub-transaction databases generated in step , and then constructs the FP- tree. This step is like the process of traditional FP-tree generation, but the differenceisa sizeK maxheap HP that stores frequent pattern of each item. 6) Aggregate the local numerous itemsets generated from each node in the cluster by MapReduce, and finally get theglobalnumerous itemsets. 6. CONCLUSIONS • In this paper, owing to the small files processing strategy, the IPFP algorithm can reduce memory cost greatly and improve the productivity of data access, thus avoids memory overflow and reduces I/O overhead. • Meanwhile, the IPFP algorithm is migrated to the MapReduce environment, which can complete frequent item sets mining efficiently and thus enhance the overall performance of FP-Growth algorithm. IPFP algorithm can make a breakthrough where PFP algorithm has its shortcomings in handling massive small files datasets, and has a good speed up and a higher mining efficiency. REFERENCES 1) M. Perkowitz and O. Etzioni. Adaptive websites: an AI challenge. In Proc. 15th Intl. Joint Conf. onArt.Int.,1997. 2) M. J. Pazzani and D. Billsus. Adaptive web site agentsIn Proc. 3rd Intl. Conf. on Autonomous Agents, 1999. 3) Adomavicius G and Tuzhilin A. Using Data Mining Methods to Build Customer Profiles, IEEE Feb 2001. 4) D. Kerana Hanirex, Dr. M. A. Dorai Rangaswamy International Journal on Computer Science and Engineering, “Efficient Algorithm for Mining Frequent Itemsets Using Clustering Technique, ”vol. 3, no. 3, March 2011. 5) Ketul B. Patel, Dr. A. R. Patel, “Process of web usage mining to find interesting patternsfromwebusagedata, ”www. Ijctonline.com vol. 3, no. 1, Aug 2012. 6) R. Mishra, A. Choubey, “Discovery of Frequent Patterns from Web Log Data by using FP-Growth algorithm for Web Usage Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, 2012. 7) N. Anand, “Effective prediction of kid’s behavior based on internet use”, International Journal of Information and Computation Technology, 2014. 8) A.P. Singh, R. C. Jain, “A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation”, IJETTCS - International Journal of Emerging Trends & Technology in Computer Science, Vol 3, 2014. 9) S. Parvatikar and B. Joshi, “Analysis of User Behavior through Web Usage Mining”, ICAST - International Conference on Advances in Science and Technology, 2014. 10) S. Jagan, and S.P. Rajagopalan, “A survey on web personalization of web usage mining”, IRJETInternational Research Journal ofEngineeringand Technology, 2015. 11) A. Ladekar, P. Pawar, D. Raikar and J. Chaudhari, “Web Log Based Analysis of User’s Browsing Behavior”,IJCSIT - International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015. 12) A. Deepa, and P. Raajan, “An efficient preprocessing methodology of log file for Web usage mining”, NCRIIAMI - National Conference on Research Issues in Image Analysis and Mining Intelligence, 2015. 13) A. Saluja, B. Gour, and L. Singh., “Web Usage Mining Approaches for User’s Request Prediction: A Survey”, IJCSIT-International Journal of Computer Science and Information Technologies, Vol. 6 (3), 2015. 14) “An Introduction to Real TimeProcessingandStreaming of Wireless Network Data”, IJARCCE, International Journal ofAdvancedResearchinComputer and Communication Engineering, Vol. 4, Issue 1, ISSN 2319-5940, Jan 2015.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 175 15) “Strategies in Traffic Controlling Operations in India”, International Journal ofAdvancedResearchinComputer and Communication Engineering, Vol. 6, Issue 8, August 2017, ISSN (Online) 2278-1021,ISSN (Print) 2319 5940,pp.210-213. 16) “Energy Optimization Factors for the Embedded Mobile Processors”,International Journal ofAdvancedResearch in Computer and Communication Engineering, Vol. 6, Issue 3, March 2017, ISSN (Online) 2278-1021, ISSN (Print) 2319 5940,pp.397-399. BIOGRAPHIES Miss. Mrunmayee R. Joshi is a M.Tech Student in the Department of Computer Science & Engineering, Priyadarshini Institute of Engineering and Technology, Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur. Dr. Prakash S. Prasad is workingas Professor and Head of Computer Science and Engineering at Priyadarshini Institute of Engineering and Technology, Nagpur . He is having 20 Years of experience in the field of teaching to engineering students. He completed his engineering in the year 1997, master of engineering in 2006 and PhD in 2014.