Abstract: In many fields, such as industry, commerce, government, and education, knowledge discovery and data
mining can be immensely valuable to the subject of Artificial Intelligence. Because of the recent increase in
demand for KDD techniques, such as those used in machine learning, databases, statistics, knowledge acquisition,
data visualisation, and high performance computing, knowledge discovery and data mining have grown in
importance. By employing standard formulas for computational correlations, we hope to create an integrated
technique that can be used to filter web world social information and find parallels between similar tastes of
diverse user information in a variety of settings
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Semantic Web Mining of Un-structured Data: Challenges and OpportunitiesCSCJournals
The management of unstructured data is acknowledged as one of the most critical unsolved problems in data management and business intelligence fields in current times. The major reason for this unresolved problem is primarily because of the actuality that the methods, systems and related tools that have established themselves so successfully converting structured information into business intelligence, simply are ineffective when we try to implement the same on unstructured information. New methods and approaches are very much necessary. It is a known realism that huge amount of information is shared by the organizations across the world over the web. It is, however, significant to observe that this information explosion across the globe has resulted in opening a lot of new avenues to create tools for data management and business intelligence primarily focusing on unstructured data. In this paper, we explore the challenges being faced by information system developers during mining of unstructured data in the context of semantic web and web mining. Opportunities in the wake of these challenges are discussed towards the end of the paper.
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...IAEME Publication
In today ’s global business, the web has been the most important means of communication. Clients and customers may find their products online, which is a benefit of doing business online. Web mining is the process of using data mining tools to analyse and extract the information from a Web pages and applications autonomously. Many firms use web structure mining to generate suitable predictions and judgments for business growth, productivity, manufacturing techniques, and more utilizing data mining business strategies. In the online booking domain, optimum web data mining analysis of web structure is a crucial component that gives a systematic manner of new application towards real-time data with various levels of implications. Web structure mining emphases on the construction of the web's hyperlinks. Linkage administration that is done correctly can lead to future connections, which can therefore increase the prediction performance of learnt models. A increased interest in Web mining, structural analysis research has expanded, resulting in a new research area that sits at the crossroads of work in the network analysis, hyperlink and the web mining, structural training, and empirical software design techniques, as well as graph mining. Web structure mining is the development of determining structure data from the web. The proposed WSM approach is a system of finding the structure of data stored over the Web. Web structure mining can encourage the clients to recover the significant records by breaking down the connection situated structure of Web content. Web structure mining has been one of the most important resources for information extraction and the knowledge discovery as the amount of data available online has increased.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Semantic Web Mining of Un-structured Data: Challenges and OpportunitiesCSCJournals
The management of unstructured data is acknowledged as one of the most critical unsolved problems in data management and business intelligence fields in current times. The major reason for this unresolved problem is primarily because of the actuality that the methods, systems and related tools that have established themselves so successfully converting structured information into business intelligence, simply are ineffective when we try to implement the same on unstructured information. New methods and approaches are very much necessary. It is a known realism that huge amount of information is shared by the organizations across the world over the web. It is, however, significant to observe that this information explosion across the globe has resulted in opening a lot of new avenues to create tools for data management and business intelligence primarily focusing on unstructured data. In this paper, we explore the challenges being faced by information system developers during mining of unstructured data in the context of semantic web and web mining. Opportunities in the wake of these challenges are discussed towards the end of the paper.
ANALYTICAL IMPLEMENTATION OF WEB STRUCTURE MINING USING DATA ANALYSIS IN ONLI...IAEME Publication
In today ’s global business, the web has been the most important means of communication. Clients and customers may find their products online, which is a benefit of doing business online. Web mining is the process of using data mining tools to analyse and extract the information from a Web pages and applications autonomously. Many firms use web structure mining to generate suitable predictions and judgments for business growth, productivity, manufacturing techniques, and more utilizing data mining business strategies. In the online booking domain, optimum web data mining analysis of web structure is a crucial component that gives a systematic manner of new application towards real-time data with various levels of implications. Web structure mining emphases on the construction of the web's hyperlinks. Linkage administration that is done correctly can lead to future connections, which can therefore increase the prediction performance of learnt models. A increased interest in Web mining, structural analysis research has expanded, resulting in a new research area that sits at the crossroads of work in the network analysis, hyperlink and the web mining, structural training, and empirical software design techniques, as well as graph mining. Web structure mining is the development of determining structure data from the web. The proposed WSM approach is a system of finding the structure of data stored over the Web. Web structure mining can encourage the clients to recover the significant records by breaking down the connection situated structure of Web content. Web structure mining has been one of the most important resources for information extraction and the knowledge discovery as the amount of data available online has increased.
In this world of information technology, everyone has the tendency to do business electronically. Today
lot of businesses are happening on World Wide Web (WWW), it is very important for the website owner to
provide a better platform to attract more customers for their site. Providing information in a better way is
the solution to bring more customers or users. Customer is the end-user, who accessing the information
in a way it yields some credit to the web site owners. In this paper we define web mining and present a
method to utilize web mining in a better way to know the users and website behaviour which in turn
enhance the web site information to attract more users. This paper also presents an overview of the
various researches done on pattern extraction, web content mining and how it can be taken as a catalyst
for E-business.
We have concentrated on a range of strategies, methodologies, and distinct fields of research in this article, all of which are useful and relevant in the field of data mining technologies. As we all know, numerous multinational corporations and major corporations operate in various parts of the world. Each location of business may create significant amounts of data. Corporate decision-makers need access to all of these data sources in order to make strategic decisions.
Classification-based Retrieval Methods to Enhance Information Discovery on th...IJMIT JOURNAL
The widespread adoption of the World-Wide Web (the Web) has created challenges both for society as a whole and for the technology used to build and maintain the Web. The ongoing struggle of information retrieval systems is to wade through this vast pile of data and satisfy users by presenting them with information that most adequately it’s their needs. On a societal level, the Web is expanding faster than we can comprehend its implications or develop rules for its use. The ubiquitous use of the Web has raised important social concerns in the areas of privacy, censorship, and access to information. On a technical level, the novelty of the Web and the pace of its growth have created challenges not only in the development of new applications that realize the power of the Web, but also in the technology needed to scale applications to accommodate the resulting large data sets and heavy loads. This thesis presents searching algorithms and hierarchical classification techniques for increasing a search service's understanding of web queries. Existing search services rely solely on a query's occurrence in the document collection to locate relevant documents. They typically do not perform any task or topic-based analysis of queries using other available resources, and do not leverage changes in user query patterns over time. Provided within are a set of techniques and metrics for performing temporal analysis on query logs. Our log analyses are shown to be reasonable and informative, and can be used to detect changing trends and patterns in the query stream, thus providing valuable data to a search service.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
In the information age, data turns to be the vital. Hence it is important to understand the data in order to face the future information challenges. This paper deals with the importance of data mining while explaining the concepts and life cycle involved. It extracts the basic gist of the topic presented in a user-friendly way. Further, in developing different stages of data mining followed by its extended application usage in practical business platform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Effective Performance of Information Retrieval on Web by Using Web Crawling dannyijwest
World Wide Web consists of more than 50 billion pages online. It is highly dynamic [6] i.e. the web
continuously introduces new capabilities and attracts many people. Due to this explosion in size, the
effective information retrieval system or search engine can be used to access the information. In this paper
we have proposed the EPOW (Effective Performance of WebCrawler) architecture. It is a software agent
whose main objective is to minimize the overload of a user locating needed information. We have designed
the web crawler by considering the parallelization policy. Since our EPOW crawler has a highly optimized
system it can download a large number of pages per second while being robust against crashes. We have
also proposed to use the data structure concepts for implementation of scheduler & circular Queue to
improve the performance of our web crawler. (Abstract)
Web personalization using clustering of web usage dataijfcstjournal
The exponential growth in the number and the complexity of information resources and services on the Web
has made log data an indispensable resource to characterize the users for Web-based environment. It
creates information of related web data in the form of hierarchy structure through approximation. This
hierarchy structure can be used as the input for a variety of data mining tasks such as clustering,
association rule mining, sequence mining etc.
In this paper, we present an approach for personalizing web user environment dynamically when he
interacting with web by clustering of web usage data using concept hierarchy. The system is inferred from
the web server’s access logs by means of data and web usage mining techniques to extract the information
about users. The extracted knowledge is used for the purpose of offering a personalized view of the
services to users.
A Study of Pattern Analysis Techniques of Web Usageijbuiiir1
Web mining is the most important application of data mining techniques to extract knowledge from web data including web document, hyperlinks between documents, usage logs of web sites etc. Web mining has been explored to a vast degree and different techniques have been proposed for a huge variety of applications that includes search engine enhancement, optimization of web services, Business Intelligence, B2B and B2C business etc. Most research on web mining has been from a �process-centric� point of view which defined web mining as a sequence of tasks. In this paper, we highlight the significance of studying the evolving nature of the web pattern analysis (WPA). Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving web sites/pages. A Web usage mining system performs five major tasks: i) data collection ii) information filtering iii) pattern discovery iv) pattern analysis and visualization techniques, and v) Knowledge Query Mechanism (KQM). Each task is explained in detail and its related technologies are introduced. The web mining research is a converging research area from several research communities, such as database system, information retrieval, information extraction and artificial intelligence. In this paper we implement how web usage mining techniques can be applied for the customization i.e. web visualization
Abstract : Fire incident is a disaster that results in the loss of life, damage to the property and endless disaster
to the victim. Fire extinguishing is an exceptionally unsafe undertaking and it might likewise include death risk.
Robotics is the answer to ensure the safeguarding of the surroundings and also the life of firefighters. Fire sensing
and extinguishing robot is a model which can be used in extinguishing the fire with minimum human intervention.
There is a threat to the life of the fire fighters in extinguishing the fire and there are some difficult areas where
they cannot reach like that in the tunnels. At similar kind of places this automatic robot is veritably useful to
perform the task. This robot can be controlled remotely by mobile phone using Bluetooth module. The robot is
equipped with the flame sensors that automatically detects the fire and gives the further signal to the extinguisher
units to start the pump and extinguish the fire by spraying water. Arduino uno is used as the microcontroller to
operate the whole operation. The proposed robot has been used for various trials and proper evaluation has been
done to check the proper functioning and to get the desired result
Abstract: Detection of fake news based on deep learning techniques is a major issue used to mislead people. For
the experiments, several types of datasets, models, and methodologies have been used to detect fake news. Also,
most of the datasets contain text id, tweets id, and user-based id and user-based features. To get the proper results
and accuracy various models like CNN (Convolution neural network), DEEP CNN, and LSTM (Long short-term
memory) are used
More Related Content
Similar to A Clustering Based Approach for knowledge discovery on web.
In this world of information technology, everyone has the tendency to do business electronically. Today
lot of businesses are happening on World Wide Web (WWW), it is very important for the website owner to
provide a better platform to attract more customers for their site. Providing information in a better way is
the solution to bring more customers or users. Customer is the end-user, who accessing the information
in a way it yields some credit to the web site owners. In this paper we define web mining and present a
method to utilize web mining in a better way to know the users and website behaviour which in turn
enhance the web site information to attract more users. This paper also presents an overview of the
various researches done on pattern extraction, web content mining and how it can be taken as a catalyst
for E-business.
We have concentrated on a range of strategies, methodologies, and distinct fields of research in this article, all of which are useful and relevant in the field of data mining technologies. As we all know, numerous multinational corporations and major corporations operate in various parts of the world. Each location of business may create significant amounts of data. Corporate decision-makers need access to all of these data sources in order to make strategic decisions.
Classification-based Retrieval Methods to Enhance Information Discovery on th...IJMIT JOURNAL
The widespread adoption of the World-Wide Web (the Web) has created challenges both for society as a whole and for the technology used to build and maintain the Web. The ongoing struggle of information retrieval systems is to wade through this vast pile of data and satisfy users by presenting them with information that most adequately it’s their needs. On a societal level, the Web is expanding faster than we can comprehend its implications or develop rules for its use. The ubiquitous use of the Web has raised important social concerns in the areas of privacy, censorship, and access to information. On a technical level, the novelty of the Web and the pace of its growth have created challenges not only in the development of new applications that realize the power of the Web, but also in the technology needed to scale applications to accommodate the resulting large data sets and heavy loads. This thesis presents searching algorithms and hierarchical classification techniques for increasing a search service's understanding of web queries. Existing search services rely solely on a query's occurrence in the document collection to locate relevant documents. They typically do not perform any task or topic-based analysis of queries using other available resources, and do not leverage changes in user query patterns over time. Provided within are a set of techniques and metrics for performing temporal analysis on query logs. Our log analyses are shown to be reasonable and informative, and can be used to detect changing trends and patterns in the query stream, thus providing valuable data to a search service.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
In the information age, data turns to be the vital. Hence it is important to understand the data in order to face the future information challenges. This paper deals with the importance of data mining while explaining the concepts and life cycle involved. It extracts the basic gist of the topic presented in a user-friendly way. Further, in developing different stages of data mining followed by its extended application usage in practical business platform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Effective Performance of Information Retrieval on Web by Using Web Crawling dannyijwest
World Wide Web consists of more than 50 billion pages online. It is highly dynamic [6] i.e. the web
continuously introduces new capabilities and attracts many people. Due to this explosion in size, the
effective information retrieval system or search engine can be used to access the information. In this paper
we have proposed the EPOW (Effective Performance of WebCrawler) architecture. It is a software agent
whose main objective is to minimize the overload of a user locating needed information. We have designed
the web crawler by considering the parallelization policy. Since our EPOW crawler has a highly optimized
system it can download a large number of pages per second while being robust against crashes. We have
also proposed to use the data structure concepts for implementation of scheduler & circular Queue to
improve the performance of our web crawler. (Abstract)
Web personalization using clustering of web usage dataijfcstjournal
The exponential growth in the number and the complexity of information resources and services on the Web
has made log data an indispensable resource to characterize the users for Web-based environment. It
creates information of related web data in the form of hierarchy structure through approximation. This
hierarchy structure can be used as the input for a variety of data mining tasks such as clustering,
association rule mining, sequence mining etc.
In this paper, we present an approach for personalizing web user environment dynamically when he
interacting with web by clustering of web usage data using concept hierarchy. The system is inferred from
the web server’s access logs by means of data and web usage mining techniques to extract the information
about users. The extracted knowledge is used for the purpose of offering a personalized view of the
services to users.
A Study of Pattern Analysis Techniques of Web Usageijbuiiir1
Web mining is the most important application of data mining techniques to extract knowledge from web data including web document, hyperlinks between documents, usage logs of web sites etc. Web mining has been explored to a vast degree and different techniques have been proposed for a huge variety of applications that includes search engine enhancement, optimization of web services, Business Intelligence, B2B and B2C business etc. Most research on web mining has been from a �process-centric� point of view which defined web mining as a sequence of tasks. In this paper, we highlight the significance of studying the evolving nature of the web pattern analysis (WPA). Web usage mining is used to discover interesting user navigation patterns and can be applied to many real-world problems, such as improving web sites/pages. A Web usage mining system performs five major tasks: i) data collection ii) information filtering iii) pattern discovery iv) pattern analysis and visualization techniques, and v) Knowledge Query Mechanism (KQM). Each task is explained in detail and its related technologies are introduced. The web mining research is a converging research area from several research communities, such as database system, information retrieval, information extraction and artificial intelligence. In this paper we implement how web usage mining techniques can be applied for the customization i.e. web visualization
Abstract : Fire incident is a disaster that results in the loss of life, damage to the property and endless disaster
to the victim. Fire extinguishing is an exceptionally unsafe undertaking and it might likewise include death risk.
Robotics is the answer to ensure the safeguarding of the surroundings and also the life of firefighters. Fire sensing
and extinguishing robot is a model which can be used in extinguishing the fire with minimum human intervention.
There is a threat to the life of the fire fighters in extinguishing the fire and there are some difficult areas where
they cannot reach like that in the tunnels. At similar kind of places this automatic robot is veritably useful to
perform the task. This robot can be controlled remotely by mobile phone using Bluetooth module. The robot is
equipped with the flame sensors that automatically detects the fire and gives the further signal to the extinguisher
units to start the pump and extinguish the fire by spraying water. Arduino uno is used as the microcontroller to
operate the whole operation. The proposed robot has been used for various trials and proper evaluation has been
done to check the proper functioning and to get the desired result
Abstract: Detection of fake news based on deep learning techniques is a major issue used to mislead people. For
the experiments, several types of datasets, models, and methodologies have been used to detect fake news. Also,
most of the datasets contain text id, tweets id, and user-based id and user-based features. To get the proper results
and accuracy various models like CNN (Convolution neural network), DEEP CNN, and LSTM (Long short-term
memory) are used
Abstract : The project’s major goal is to create an intelligent trash can that would aid in maintaining a clean
and environmentally friendly environment. The Swachh Bharat Mission motivates us. Since technology is
becoming increasingly intelligent, we are utilising Arduino nano to develop an intelligent dustbin to help clean
the environment. The ultrasonic sensors on the trashcan are part of the dustbin control and management system,
which happens to be designed with a microcontroller-based platform. In the suggested method, we used an
ARDUINO NANO, an ultrasonic sensor, a Mini servo motor, and jumper wire linked to a charger to construct an
intelligent trash can. The Smart Dustbin application will launch when all hardware and software connections
have been made. Dustbin lid will wait for the person to pass by at a distance of 60 cm.
Abstract: A technology called Quantum Dot Cellular Automata (QCA) offers a far more effective computational
platform than CMOS. Through the polarization of electrons, digital information is represented. In comparison to
CMOS technology, it is more attractive because to its size, faster speed, feature, high degree of scalability, greater
switching frequency, and low power consumption. This paper suggests structures of basic logic gates in the QCA
technology. For the aim of verification, the produced circuits aresimulated, and their results are then compared
to those of their published counterparts. The comparison outcomes provide hope for adding the suggested
structures to the collection of QCA gates.
ABSTRACT: In the field of computer science known as "machine learning," a computer makes predictions about
the tasks it will perform next by examining the data that has been given to it. The computer can access data via
interacting with the environment or by using digitalized training sets. In contrast to static programming
algorithms, which require explicit human guidance, machine learning algorithms may learn from data and
generate predictions on their own. Various supervised and unsupervised strategies, including rule-based
techniques, logic-based techniques, instance-based techniques, and stochastic techniques, have been presented in
order to solve problems. Our paper's main goal is to present a comprehensive comparison of various cutting-edge
supervised machine learning techniques.
Abstract—This paper provides a brief overview of the Intelligent Traffic Management System based on Artificial
Neural Networks (ANN). It is being utilized to enhance the present traffic management system and human resource
reliance. The most basic problem with the current traffic lights is their dependency on humans for their working.
The technologies used in the making of this automated traffic lights are Internet of Things, Machine Learning and
Artificial Intelligence. The basic steps used in Internet of Things are reported along with different ANN trainings.
This ANN model can be used for the minimization of traffic on roads and less waiting time at traffic lights. As a
result, we can make traffic lights more automated which in turn eventually deceases our dependency on human
resources
MANET Mutual Authentication System (IMMAS) provides an implied mutual authentication or all routing and data traffic with in a Mobile Ad-hoc Network (MANET) by combining Elliptic Curve Crypt-ography a public- key crypto-system, with the MANETs Routing Protocol. IMMAS provides security by effectively hiding network topology from adver-saries while reducing the potential for, among other things, traffic analysis and data tampering, all while providing a graceful degradation for each of the authentication components. Current research in MANET's tends to focus primarily on routing issue leaving topics such as security and authentication for future research. IMMAS focuses on achieving a higher level of security with the potential for substantial increases in efficiency of processing power and bandwidth compared to alternative exterior mechanism tacked on after protocol development and Standardization.
Cloud computing makes the dream ofcomputing real as a tool and in the form of service. This internet based ongoing technology which has brought flexibility, capacity and power of processing has realized service- oriented idea and has created a new ecosystem in the computing world with its great power and benefits. Cloud capabilities have been able to move IT industry one step forward. Nowadays, large and famous enterprise has resorted to cloud computing and have transferred their processing and storage to it. Due to popularity and progress of cloud in different organizations, cloud performance evaluation is of special importance and this evaluation can help users make right decisions. In this paper we define the cloud perfor-mance issues which are cause for quality of any cloud or database. In the cloud we can improve the performance by the reducing these issues. We also provide a large view of latency which is a hot topic in the research field for improving the performance of cloud.
This paper considers the waiting of students in colleges at the time of admissions at fee counter as a single-channel queuing system with Poisson arrivals and exponential service rate where service discipline is first come first serve. Queue is a common phenom-enon which has seen usually in colleges at the time of fee submission. Hence queuing theory which is the mathematical study of waiting lines or queue is suitable to be applied in the fee counter because it is associated with queue and waiting line where students who cannot be served immediately have to queue for service
In the present work, a dynamic model is developed for the Multi-effect evaporator (MEE) to study the transient behavior of the system. Each effect in the process is represented by some variables which are related to the energy and material balance equ-ations for the feed, product and liquor flow. Backward feed is used for the development of the model for six effect evaporator system. For the steady state and dynamic simulation, the 'fsolve' and 'ODE45' solvers in MATLAB source code is used respectively.
This paper analyzes a bi-directional DC-DC converter having four active switches for higher transformation ratio. The converter steps up the DC voltage in forward direction and steps down in reverse direction and various modes of operation are possible. To investigate the performance of converter, simulations are performed on MATLAB/ Simpower system platform. To study reverse power flow capability, PMBLDC motor is connected as load andregeneration is carried out.
This paper presents decentralized control scheme for Load Frequency Control in a Power System by appreciating the performance of the methods in a two area hybrid interconnected powersystem. This project analysis is done with the use of Autonmatic Generation Control of Interconnected using Load Frequency control. The Power system whole system is tuned with the help of integral controller to reduce area control error and error in tieline which may cause impr-ovement in the steady state output of inter-connected hybrid system. Load freq-uency control (LFC)including PI controller is proposed in order to suppress frequency deviations for a power system involving gas, hydro and thermal plants owing to load and generating power fluctuations caused by penetration of renewable resources. Restructuring of whole power system is done by dividing it into GENCO, TRANSCO, DISCO and ISO which has been explained in detail in the report. The power generated by the GENCO has to be sold to DISCO at optimum rates. DISCO and GENCO will have contracts within its own area or with intercon-nected area and thus the power is exchanged between their interconnected area according to the contracts scheduled between them.ln this system there are four GENCOs namely, steam, hydro and gas and four DISCO interconnected using bilateral contract and the modeling of the system is done using MAT LAB simulation. It employs Synchronous static series compensator.. The robustness and reliability of the various control schemes is examined through simulations. The significant improvement of optimal transient performance is observed with the addition of a these controllers.
A reduced size slotted rectangular micro strip patch antenna is introduced which exploits RT DUROID 5880 substrate from Rogers-Corp with dielectric constant of 2.2 and thickness of 0.76mm. The proposed antenna uses a finite ground plane with slotted rectangular patch to achieve an excellent impedance matching, high gain, along with operating frequency range of 3.06-3.145GHz and a radiation efficiency of 95.524%. The various simulations are provided to evaluate its performance parameters. This antenna is highly efficient for S-band (3.1-10 GHz) applications.
Due to demand of voice, data and multimedia, the services in telecommunications are increasing day by day. The wireless network providers are facing so many problems and it is difficult to provide cost effective and reliable service to each consumer. To deal with these problems, optical fiber communication system was introduced. But when a signal of combined order is transmitted through optical fiber a large amount of distortion is received. The motivation of this work was non-linearity present in the fiber communication that can be compensated by dispersion. So the higher order study needed typical values of parameters of fiber core radius, length of fiber and power attenuation constant. Moreover the study of higher order dispersion for the fiber optic communication system becomes important.
In the microwave field, Gunn diode oscillators have important role in the development of commutnication systems because of its low noise behavior and medium power. The primary application of Gunn diode is as a local oscillator in microwave receivers. At higher microwave frequencies, transistors cannot generate required low noise power, suitable for receivers. The Gunn diode is two-terminal solid-state negative impedance device, where the real part of the impedance is negative over a range of frequencies. This paper introduces Design Philosophy of high-frequency Gunn Oscillators and discusses the design and implementation steps to produce the oscillator. For example the Waveguide Cavity Gunn Oscillator at 94 GHz frequency, which consists of a packaged Gunn device mounted in WR-IO waveguide, and tuning plunger is used to tune the desired frequency. The matching circuit is a post mounting network and a waveguide — height transformer.
Radio-frequency identification technology, based on the reader/tag paradigm, is quickly permeating several aspects of everyday life. To allow optimum impedance matching with enhanced CP bandwidth, the microstrip feed technique is employed in this design. The design of a simple UHF (ultrahigh frequency) RFID (radio frequency identification) reader antenna that operates within the 900 MHz band (902—928 MHz) is studied. To allow optimum impedance matching with enhanced CP bandwidth, the proposed antenna can also yield an impedance bandwidth (10-dB return loss) from 880 to 1100 MHz, while good CP performances between 901 to 930 MHz are exhibited.
Sign language recognition will be a boost to the hard hearing and deaf people. It is a topic of current research in Computer Science and Engineering field. Deaf people are not able to use the computers and other hand held devices as it is very difficult for them to interact with such devices. So, a lot of research is going on to help them in this area. Either no standard database or no system is available to carry research in this area in India for them. In this research paper we developed a system for hard hearing and physically impaired persons. Here we presented a framework about Indian Sign Language (ISL) with international standards.Planned Outline For Indian Sign Language Recognition
Sign language recognition will be a boost to the hard hearing and deaf people. It is a topic of current research in Computer Science and Engineering field. Deaf people are not able to use the computers and other hand held devices as it is very difficult for them to interact with such devices. So, a lot of research is going on to help them in this area. Either no standard database or no system is available to carry research in this area in India for them. In this research paper we developed a system for hard hearing and physically impaired persons. Here we presented a framework about Indian Sign Language (ISL) with international standards.
MANETs can manage dynamic infrastructure and can stay active rapid changes in the network topology. The one of the key challenges in deploying Mobile Ad-Hoc Networks is routing with scalable and robustness. The objective of this paper is to create of the different mobile ad-hoc routing protocols, and to survey and compare representative examples for every classification of protocols. In this paper we compared three types of routing protocols i.e. pro-active, reactive and hybrid. In order to operate the Ad-hoc Networks as efficiently as possible, appropriate on-demand routing protocols have to be incorporated, to find best effective routes between source to destination. In this paper we provide an overview of a wide range of the existing routing protocols with focused on their characteristics and functionality. This paper focus on the survey of re-active (on-demand), proactive (table-driven) and hybrid routing protocols like AODV, DSDV and ZRP. Further this paper will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.
Bug report is a report which contains the information about the defects in the system or in the software. Generally, bug report contains the issues written by the wide variety of reporters, with different levels of training and knowledge about the system being discussed. Bug tracking systems are made to manage bug reports, which are collected from various sources. These bug reports are needed to be labeled as security bug reports or non security bug reports, since security bug reports (SBRs) contain more risk than non-security bug reports (NSBRs). In this paper we are using Naive Bayes classifier to classify the bug reports. With naive bayes classifier, feature subset selection method such as Gain Ratio is applied to rank the attributes of the dataset. Gain Ratio is utilized as an iterative process where we select smaller sets of features in incremental manner. Result prove that the classification accuracy is high for attributes having high gain ratio and low for attributes having low gain ratio.
In the present investigation, a steady-state mathematical model is developed for a typical four stage Industry. Each stage of the sequence is composed of chemical additions and mixing, reaction in a reten-tion tower, and washing. Unit operation models were formulated using mass balances on liquor, fibres, kappa number, chemicals and COD based on the assumption of perfect mixing and quasi steady-state. The COD is used in this paper as an indication of the amount of effluent coming out from four bleaching stages. COD measurement of bleach plant effluent separately is not a routine mill measure-ment; so COD is calculated in the basis of correlation of COD given by Anjana . In order to validate the model, the simulated results were compared the literature data; a good agreement between the simulation results with the literature data is achieved. In the case studies, the optimization of the process variables are performed in which the effects of operating temperature, residence time, consistency, bleaching liquor flow rate and the wash water flow rates in the washers are studied.
More from NIET Journal of Engineering & Technology (NIETJET) (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
A Clustering Based Approach for knowledge discovery on web.
1. NIET Journal of Engineering & Technology (NIETJET)
Volume 10, Issue summer 2022 ISSN: 2229-5828 (Print)
1 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
Abstract: In many fields, such as industry, commerce, government, and education, knowledge discovery and data
mining can be immensely valuable to the subject of Artificial Intelligence. Because of the recent increase in
demand for KDD techniques, such as those used in machine learning, databases, statistics, knowledge acquisition,
data visualisation, and high performance computing, knowledge discovery and data mining have grown in
importance. By employing standard formulas for computational correlations, we hope to create an integrated
technique that can be used to filter web world social information and find parallels between similar tastes of
diverse user information in a variety of settings
.
1. Introduction
Late advances in PC innovation has made it conceivable to get to and cooperate information or data universally
that is disseminated in internet with the assistance of different heterogeneous PC arranged instructing and learning
environment. WWW can give information/data in spite of any spot, time in a medium and in any request in any
organization, regarding any matter. Internet gives a huge wellspring of data. Contrast and customary information
bases, dynamic Web data, partially -organized together intertwined for many hyperlinks [1]. Likewise, this tends
to be spoken to in various structures is globally mutual more over different destinations and stages. Information
has developed as a freshly discovered wellspring of upper hand at a time where conventional bases of rivalry have
generally vanished. This upper hand depends on the information picked up from examination of information and
has shot to the front line, spaces same information with mining including information revelation, that offer
methods and cycles for removing this information [2][3]. Given the acknowledgment that information should be
first gathered before it very well may be dug for information has brought about hazardous development in the size
of data sets. Greater part of information on the planet is extending irrefutably quickly than our ability to handling
and supervise. We are having assumed the assumption of being overwhelmed to particular no. of new books,
articles, journals, &gathering strategies, and disseminations looking for every months and year. Development is
been essentially minimised limits to appropriate with disperse more data to its customers. By and by it is an ideal
chance to develop the advancement which may help us with traveling through all the available information to look
through what is commonly noteworthy and pertinent to us. Data/information consistently plays an amazing role.
The world has been captivated by the force which the Web, the universe of available data, provides for individuals
and to networks working and playing together.
Fig1 Web Mining
A Clustering Based Approach for
knowledge discovery on web.
Dr. Mohammad Shahid1
, Dr. Sunil Gupta2
1
Associate Professor, School of Computer Science & Engineering and IT, Noida Institute of Engineering and
Technology, Greater, Noida 201306, India.
1
Associate Professor, Department of Computer Science & Engineering, Chitkara University Institute of Engineering &
Technology, Chitkara University, Punjab,India.
2. NIET Journal of Engineering & Technology (NIETJET)
Volume 10, Issue summer 2022 ISSN: 2229-5828 (Print)
2 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
Getting Appropriate Knowledge(Information)
To find the particular information on www, we use the web. We generally write a easy query or keyword and
inform of response, from the search engine we use to get list of pages as a response with rank based on their
similarity to the query [4][5]. Likewise, most of the time we are getting irrelevant information with less precision
because many searches are irrelevant and they might get more irrelevant data(information)and not enough recall
that due to irrelevance data(information)to our generated query which is because the inability to index all www
data (information. Because of this, some more applicable sheets are not usually indexed [6][7].
Finding Latest Understanding from the World Wide Web (www)
This is termed as query – (retrieval oriented) triggered process as simple we can say this problem. Basically we
are having data-triggered process that presumes on the other hand by which we already have a set (collection) of
internet data so we want to extract powerfully key (useful) information(knowledge) out of it that is data mining –
oriented
Character of World wide web Page and Delighted Action
Basically, the Data on the Internet based on various domains centred on the internet programmes like electronic
commerce (personalised) self-marketing makes an individual special. The development of suggestions for www
users at runtime depends largely on the nature of the user as well as the nature of the application and application
they are most interested with, such as marketing sales, trade via the internet. At the current suggestion system, the
efficient technique to attain the aim is Web usage mining as described above., that’s why for data mining the
current suggestion for available information is not used. The website observer and the web aid is a kind of proposal
from mobasher and others, therefore and yan et al. have all the data we emphasise in publishing the character of
the Www website. Offline software is recommended for clustering, thorough analytics and on-site working,
including the creation of references to runtime web pages. Based on an existing newly built pattern, the website
of the browser creates a top tier. Data supported by runtime references rely largely on the web pages given in the
same Group to other browsers [8][9].
Studying regarding Independent End Users
The demand and the concern of user who is very nearly experiencing that given task, as matter of fact various
small- Mass customization of roles information to the intended clients and characterising it to single user tasks
perturbed to excellent web site design and direction issues related to e-marketing or marketing etc.,
To solve the above problem a set of techniques can be used provided by the Network Excavation
Approaches(NEA). To handle these troubles, the web mining techniques are not only the tools available. Where
as to deal these troubles, the NEA that is the network excavation approaches are not only just the tools. The various
fields consisting Data Recovery, Databases, Machine Memorizing and Innate Technology Treating are integrated
from network excavation [10] [11].
An Approach for www(web) content mining:
In essence, the content of www (internet) documents uses the Web content mining technique for obtaining or
extracting useful knowledge. The information on the content is a compilation of information in the form of tables
and lists on the www (web). Text mining is used mostly in research and development for the content of web
mining. Traditional www(internet) searching and indexing of tools like Lycos, web crawls etc., Alta Vista meta
crawel and many gives some comfort to users or clients, we are not getting any structured data(information) not
even filter,interpret documents and categorise. For information retrieval numbers of tools have been designed in
recent years which can give the example of intelligent web agents with the help of using various techniques and
tools with more extended DB for assisting Quite high -level semi-structured data variables organisation Internet
[13].
Data Processing
In web log mining the first stage is either data pre-processing or data preparation.
Data is converted by row data by pattern discovery could handle. That contains user recognition, data cleaning,
path supplement, session recognition, No, ID is not one of the transactions. The direct (exact) effect on model
correctness or pattern rules discovered in the next section is the pre-processing of web log data.
3. NIET Journal of Engineering & Technology (NIETJET)
Volume 10, Issue summer 2022 ISSN: 2229-5828 (Print)
3 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
Pattern Finding
At the stage of Pattern Finding by using different method we used to find pattern rules and models of client’s
taking nature (behaviour). The most general (common) technologies are association rules clustering, sequential
patterns and classification and so no [14].
Analysis of Pattern
All the models and rules can be found by the web usage mining in more or less all cases. The extraction of valuable
interesting patterns are used by Pattern analysis for all these models and rules as shown in figure
Clustering
It is a most fundamental explanatory task where one hopes to perceive a restricted course of action of groupings
or then again gatherings to portray the data. The classes can be generally specific and careful or contain a more
lavish depiction, for instance, different leveled or covering classes. Examples of collection applications in a data
disclosure setting consolidate finding homogeneous subpopulations for clients in displaying information bases
what's more, perceiving subcategories of spectra from infrared sky assessments. Figure 1.2 shows a potential
grouping of the credit enlightening record into three bundles.
Fig 1.2. Three Different Clusters Shown Based on Dataset
The first class marks (indicated by x's and o's in the past figures) have been supplanted by a + to show that the
class enrollment is never again expected or known. The task of estimating probabilities is quite closely linked to
bundling, involving a large number of variables or fields in a database in order to calculate the multivariate
probability thickness capacity joint.
Using clustering approach collection of Data Set for Information filtration versus relevant information on web
taking relevant product from online shopping by some people small dataset with 2 cluster of person and 2 online
shopping outlets, Data set for fitting cloths (upper and lower) on the basis of their height and weight using any
shopping portals
We will use K-mean clustering Algorithm
2. Conclusions
Web log files are frequently used in the Web Usage Mining process. The navigation pattern of the user is an
important piece of information that may be learned from web log files. The problem in obtaining such knowledge
is that users' attention is constantly shifting, and different users have different navigational behaviours and needs.
We used an unsupervised artificial neural network to construct a Web service discovery tool based on the
suggested technique, and we empirically assessed the proposed approach and tool using genuine Web service
descriptions collected from operational Web service registries. We present preliminary findings demonstrating
the efficacy of the proposed method.
4. NIET Journal of Engineering & Technology (NIETJET)
Volume 10, Issue summer 2022 ISSN: 2229-5828 (Print)
4 | Page
Publisher: Noida Institute of Engineering & Technology,
19, Knowledge Park-II, Institutional Area, Greater Noida (UP), India.
References
[1] RAYMOND KOSALA, HENDRIK BLOCKEEL, Web Mining Research: A Survey, Sigkdd Expirations,
AcmSigkdd, July2000.
[2] M. KOSHER. ALIKE - Archie-Like Indexing In The Web. In Proc. 1st International Conference On The
World Wide Web, Pages 91--100, May 1994.
[3] R. COOLEY, B. MOBASHER, AND J. SRIVASTAVA. Web Mining: Information And Pattern Discovery
On The World Wide Web. In Proceedings Of The 9th Ieee International Conference On Tools With Artificial
Intelligence (Ictai’97), 1997
[4] R. KOSALA, H. BLOCKEEL. Web Mining Research: A Survey Data & Knowledge Engineering, Volume
53, Issue 3, June 2005, Pages 225-241
[5] NASRAOUI, O. ET AL. , A Web Usage Mining Framework For Mining Evolving User Profiles In Dynamic
Web Sites, IeeeTransactions On Knowledge And Data Engineering, Volume: 20 Issue:2 On Page(S): 202 –
215, 2008.
[6] F. MASSEGLIA, ET AL. Web Usage Mining: Extracting Unexpected Periods From Web Logs, Data Mining
And Knowledge Discovery Volume 16, Number 1, 39-65, 2007.
[7] NAVEENA DEVI ET AL. Design And Implementation Of Web Usage Mining Intelligent System In The
Field Of E-Commerce, Procedia Engineering Volume 30, 2012, Elsevier , Pp 20–27
[8] MALIK, S.K. ET AL., Information Extraction Using Web Usage Mining, Web Scrapping And Semantic
Annotation, In Procd. Of IeeeCicn, 2011 Pp-465 – 469
[9] neuroph.sourceforge.net.[Online].Available:http://neuroph.sourceforge.net/tutorials/wines1/WineClassifica
tionUsingNeuralNetworks.html.
[10] "en.climate-data.org.," [Online]. Available:https://en.climate-data.org/location/909/ . [Accessed 2612
2016].[22] "en.climate-data.org.," [Online]. Available: https://en.climate-
data.org/location/764256/ . [Accessed26 12 2016].
[11] "fon.hum.uva.nl.,"[Online].Available:http://www.fon.hum.uva.nl/praat/manual/Feedforward_neural_netwo
rks_1__What_is_a_feedforward_ne.html .
[12] Gupta S.L, Gupta, S, Khandelwal G,,”A Case Study of Data Mining used for Quality Enhancement in
Manufacturing Industry”National Conference on Renewable Energy & Digitalization Resources for the
Development of Rural Areas,February 2020.
[13] Anurag Kumar and Kumar Ravi Singh, "A Study on Web Structure Mining," International Research
Journal of Engineering and Technology (IRJET), vol. 04, no. 1, pp. 715-720, January 2017.
[14] Fayyad, U., Piatetsky-Shapiro, G., and Smyth, R (1996). "The KDD Process for Extracting Useful
Knowledge from Volumes of Data," Communications of the ACM, (39:11), pp.27-34
[15] Fayyad, U., (2001), “The Digital Physics of Data Mining”, Communications of the ACM,March, (44:3), 62-
65.
[16] Han, J., Kamber, M. (2001), Data Mining: Concepts and Techniques, Morgan-KaufmannAcademic Press,
San Francisco
[17] Mohammed Shahid, Dr. KotadiChinnaiah “A Dynamic Approach for information retrieval & Knowledge
discovery on web” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-
8727, Volume 23, Issue 3, Ser. II (May – June 2021), PP 14-17 www.iosrjournals.org(DOI: 10.9790/0661-
2303021417)
[18] MOHAMMAD SHAHID “Analysis of Sensors to detecting Nickel, Lead in Milk Product and avoiding from
mysterious Diseases” ICICSE 2021 (9th International Conference on Innovations in Computer Science and
Engineering (ICICSE 2021))
[19] MOHAMMAD SHAHID” Efficient and Reliable Packet Routing Solutions for Wireless Sensor Networks”
3RD INTERNATIONAL CONFERENCE (ONLINE) ON INNOVATIONS IN COMMUNICATION
COMPUTING AND SCIENCES (ICCS-2021)
[20] Kosala, R., Blockeel, H. (2000), “Web Mining Research: A Survey”, ACM SIGKDD(Special Interest Group
on Knowledge Discovery and Data Mining) Explorations, June, (2:1), 1-10