This document summarizes previous work on data preprocessing for web usage mining. It discusses how web server log files contain raw data that needs preprocessing before analysis. The preprocessing steps commonly used are data cleaning, user identification, session identification, and path completion. Several papers are reviewed that discuss different techniques for preprocessing web server log files, including custom preprocessing steps, algorithms for reading logs and transferring data to a database, and the outputs of preprocessed data. The goal of the literature review is to study and compare various techniques for the important preprocessing phase of web usage mining.
This document summarizes a research paper on web usage mining and sequential pattern mining from web logs. It discusses how web usage mining involves preprocessing raw web log data, discovering patterns in the data, and analyzing the patterns. The preprocessing steps include data cleaning, user identification, session identification, and path completion. Pattern discovery methods mentioned are statistical analysis, association rules, clustering, classification, and sequential pattern mining. The goal of the research is to understand users' navigational behaviors by applying sequential pattern mining techniques to discover frequent sequential access patterns in web logs.
Message Oriented Middleware for Libraryโs Metadata ExchangeTELKOMNIKA JOURNAL
ย
Library is one of the important tools in the development of science to store various intellectual properties. Currently most libraries are managed by standalone systems and are not equipped with data exchange facilities with other libraries for sharing information. Sharing of information between libraries can be done with integration metadata owned library. In this research, the integration architecture of metadata exchange is done with Message Oriented Middleware (MOM) technology. This MOM redeems the collection metadata that matches the standard Dublin Core format. In this research, database structure, MOM structure and set of rules to perform data sharing process. With the proposed MOM architectural design is expected to search process information between libraries will become easier and cheaper.
Similarity based Dynamic Web Data Extraction and Integration System from Sear...IDES Editor
ย
There is an explosive growth of information in
the World Wide Web thus posing a challenge to Web users
to extract essential knowledge from the Web. Search
engines help us to narrow down the search in the form of
Search Engine Result Pages (SERP). Web Content Mining
is one of the techniques that help users to extract useful
information from these SERPs. In this paper, we propose
two similarity based mechanisms; WDES, to extract desired
SERPs and store them in the local depository for offline
browsing and WDICS, to integrate the requested contents
and enable the user to perform the intended analysis and
extract the desired information. Our experimental results
show that WDES and WDICS outperform DEPTA [1] in
terms of Precision and Recall.
This document summarizes research on developing an online model-based control system for a photovoltaic (PV) converter unit to track the maximum power point under varying conditions like partial shading. It presents a new model that uses a logarithmic equation to predict the maximum power point voltage based on irradiance and temperature measurements. The model was tested in simulations where it accurately adjusted the PV voltage to match the predicted maximum power point voltage in response to changes in irradiance and temperature. This online model-based approach shows potential for improving PV power extraction under non-uniform conditions like partial shading.
This document summarizes a research paper that proposes a new vibration propulsion system for powering a small mobile robot. The system uses two counter-rotating eccentric masses, similar to the Dean drive, to excite an oscillating inner frame attached to an outer frame by springs. Wheels on the outer frame can be driven forward due to inertial and friction forces generated by the oscillating system. The document presents the dynamic model of the system and derives the governing differential equation. Experimental testing showed the system could successfully propel a robot vehicle and generate a maximum towing force of 8.5N while weighing 25N itself. Further improvements to increase propulsion are recommended.
1) The document reviews cross-platform mobile application development and IDEs. It discusses tools like PhoneGap and Titanium that allow developing applications using a single codebase that can be deployed to multiple platforms like Android and iOS.
2) It proposes developing an IDE that allows coding an app once in a language like Java or Objective-C, then deploying it to other platforms through automated code translation. A mathematical model is presented to conceptualize the system.
3) The review finds that tools like PhoneGap based on technologies like HTML5, CSS, and jQuery offer a way to build cross-platform web apps, but generator-based tools producing native apps from a common codebase are not yet mature.
This document discusses using particle swarm optimization to improve the k-prototype clustering algorithm. The k-prototype algorithm clusters data with both numeric and categorical attributes but can get stuck in local optima. The proposed method uses particle swarm optimization, a global optimization technique, to guide the k-prototype algorithm towards better clusterings. Particle swarm optimization models potential solutions as particles that explore the search space. It is integrated with k-prototype clustering to avoid locally optimal solutions and produce better clusterings. The method is tested on standard benchmark datasets and shown to outperform traditional k-modes and k-prototype clustering algorithms.
This document describes a PIC microcontroller and PC-based system using multiple gas sensors and artificial intelligence techniques for gas identification. Five commercial gas sensors are used to detect methane, carbon monoxide, and LPG at different concentrations and temperatures. The microcontroller collects analog voltage output from the sensors. Artificial neural networks are trained on the sensor data to identify gases based on patterns in responses to varying parameters like concentration, temperature, and load resistance. Experimental results show the sensors have different sensitivities to different gases and temperatures. The neural network approach can accurately predict gas concentrations online based on the sensor behavior patterns extracted during experiments. This system improves gas detection sensitivity and selectivity with high accuracy.
This document summarizes a research paper on web usage mining and sequential pattern mining from web logs. It discusses how web usage mining involves preprocessing raw web log data, discovering patterns in the data, and analyzing the patterns. The preprocessing steps include data cleaning, user identification, session identification, and path completion. Pattern discovery methods mentioned are statistical analysis, association rules, clustering, classification, and sequential pattern mining. The goal of the research is to understand users' navigational behaviors by applying sequential pattern mining techniques to discover frequent sequential access patterns in web logs.
Message Oriented Middleware for Libraryโs Metadata ExchangeTELKOMNIKA JOURNAL
ย
Library is one of the important tools in the development of science to store various intellectual properties. Currently most libraries are managed by standalone systems and are not equipped with data exchange facilities with other libraries for sharing information. Sharing of information between libraries can be done with integration metadata owned library. In this research, the integration architecture of metadata exchange is done with Message Oriented Middleware (MOM) technology. This MOM redeems the collection metadata that matches the standard Dublin Core format. In this research, database structure, MOM structure and set of rules to perform data sharing process. With the proposed MOM architectural design is expected to search process information between libraries will become easier and cheaper.
Similarity based Dynamic Web Data Extraction and Integration System from Sear...IDES Editor
ย
There is an explosive growth of information in
the World Wide Web thus posing a challenge to Web users
to extract essential knowledge from the Web. Search
engines help us to narrow down the search in the form of
Search Engine Result Pages (SERP). Web Content Mining
is one of the techniques that help users to extract useful
information from these SERPs. In this paper, we propose
two similarity based mechanisms; WDES, to extract desired
SERPs and store them in the local depository for offline
browsing and WDICS, to integrate the requested contents
and enable the user to perform the intended analysis and
extract the desired information. Our experimental results
show that WDES and WDICS outperform DEPTA [1] in
terms of Precision and Recall.
This document summarizes research on developing an online model-based control system for a photovoltaic (PV) converter unit to track the maximum power point under varying conditions like partial shading. It presents a new model that uses a logarithmic equation to predict the maximum power point voltage based on irradiance and temperature measurements. The model was tested in simulations where it accurately adjusted the PV voltage to match the predicted maximum power point voltage in response to changes in irradiance and temperature. This online model-based approach shows potential for improving PV power extraction under non-uniform conditions like partial shading.
This document summarizes a research paper that proposes a new vibration propulsion system for powering a small mobile robot. The system uses two counter-rotating eccentric masses, similar to the Dean drive, to excite an oscillating inner frame attached to an outer frame by springs. Wheels on the outer frame can be driven forward due to inertial and friction forces generated by the oscillating system. The document presents the dynamic model of the system and derives the governing differential equation. Experimental testing showed the system could successfully propel a robot vehicle and generate a maximum towing force of 8.5N while weighing 25N itself. Further improvements to increase propulsion are recommended.
1) The document reviews cross-platform mobile application development and IDEs. It discusses tools like PhoneGap and Titanium that allow developing applications using a single codebase that can be deployed to multiple platforms like Android and iOS.
2) It proposes developing an IDE that allows coding an app once in a language like Java or Objective-C, then deploying it to other platforms through automated code translation. A mathematical model is presented to conceptualize the system.
3) The review finds that tools like PhoneGap based on technologies like HTML5, CSS, and jQuery offer a way to build cross-platform web apps, but generator-based tools producing native apps from a common codebase are not yet mature.
This document discusses using particle swarm optimization to improve the k-prototype clustering algorithm. The k-prototype algorithm clusters data with both numeric and categorical attributes but can get stuck in local optima. The proposed method uses particle swarm optimization, a global optimization technique, to guide the k-prototype algorithm towards better clusterings. Particle swarm optimization models potential solutions as particles that explore the search space. It is integrated with k-prototype clustering to avoid locally optimal solutions and produce better clusterings. The method is tested on standard benchmark datasets and shown to outperform traditional k-modes and k-prototype clustering algorithms.
This document describes a PIC microcontroller and PC-based system using multiple gas sensors and artificial intelligence techniques for gas identification. Five commercial gas sensors are used to detect methane, carbon monoxide, and LPG at different concentrations and temperatures. The microcontroller collects analog voltage output from the sensors. Artificial neural networks are trained on the sensor data to identify gases based on patterns in responses to varying parameters like concentration, temperature, and load resistance. Experimental results show the sensors have different sensitivities to different gases and temperatures. The neural network approach can accurately predict gas concentrations online based on the sensor behavior patterns extracted during experiments. This system improves gas detection sensitivity and selectivity with high accuracy.
The document summarizes a reversible data hiding method for encrypted images using a rhombus method. The proposed method has four stages: 1) generating an encrypted image by partitioning the original image, reversibly embedding pixel LSBs, and encrypting, 2) hiding data in the encrypted image LSBs, 3) decrypting and extracting the hidden data independently from recovering the original image, 4) recovering the original image by reversing the rhombus method after data extraction. The method ensures error-free extraction and recovery by reserving space before encryption and separating the extraction and recovery processes.
1) The document presents the results of a linear and non-linear analysis of reinforced concrete frames with members of varying inertia (non-prismatic beams) for buildings ranging from G+2 to G+10 storeys.
2) Both bare frames and frames with infill walls were analyzed considering different beam cross-sections - prismatic, linear haunch, parabolic haunch, and stepped haunch.
3) The linear analysis was performed using ETABS and considered parameters like fundamental time period, base shear, and top storey displacement. The non-linear analysis used pushover analysis in SAP2000 to determine effective time period, effective stiffness, and hinge formation patterns.
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...IOSR Journals
ย
This document presents an integrated e-health approach for early detection of human body disorders in real-time. It monitors heart rate, respiration, and body temperature using sensors and transfers the data wirelessly via ZigBee to a PC. The values are tested against a reference database to detect any abnormalities. Simulations were performed using LabVIEW to acquire, monitor, and synthesize the vital sign data in real-time. This non-invasive method allows for early diagnosis and prevention of cardiovascular diseases and respiratory issues.
This document describes the design and fabrication of a solar powered lithium bromide vapor absorption refrigeration system. It uses lithium bromide and water as the working fluids, with solar energy powering the generator to separate the water vapor from the lithium bromide solution. The water vapor then condenses and evaporates to provide cooling, while the strong lithium bromide solution absorbs the water vapor back into a weak solution to complete the cycle. The document provides details on the system components, operating principles, and achievable COP between 0.7-0.8 using this environmentally friendly solar powered system.
This document summarizes an FPGA implementation of a trained neural network. It describes implementing a 3-2-1 multilayer perceptron network on an FPGA for a fault identification application. The key modules implemented include multiply-accumulate, truncation, sigmoid and linear activation functions. Resource utilization is low, with the entire integrated network using only 2.2% of FPGA slices. Simulation results match manual calculations, demonstrating the network accurately classifies faults.
This document describes a technique for human iris recognition for biometric identification. It involves 6 major steps: image acquisition, localization, isolation, normalization, feature extraction, and matching. The iris is localized by detecting the pupil and outer iris boundaries using techniques like Canny edge detection and Hough transforms. The iris region is then isolated using masking. It is normalized and represented as a fixed-sized block. Features are extracted using techniques like Gabor filters and Haar wavelets to generate biometric templates. Templates are matched using Hamming distance to identify individuals in applications like border control, computer login, and financial transactions. The iris has properties that make it suitable and accurate for identification compared to other biometrics.
This document summarizes spatial scalable video compression using H.264. It discusses previous video compression standards like H.261 and H.263. It then describes the key components of the H.264 encoder and decoder, including prediction models, spatial models and entropy encoding. Simulation results comparing parameters like PSNR, CSNR and MSE between encoded and decoded video using H.264 are presented. The paper concludes that H.264 provides 31-35% improved efficiency and bit rate reduction over previous standards.
Investigation of Reducing Process of Uneven Shade Problem In Case Of Compact ...IOSR Journals
ย
This document investigates reducing uneven shade problems in compact single jersey cotton knit fabrics dyed with turquoise reactive dyes. Scanning electron microscopy shows that stripping and scouring combined increases fabric porosity compared to scouring alone, allowing better dye penetration. Color measurement testing finds that combining stripping and scouring results in more consistent dye absorption and less uneven shading than separate processes, with CMC ฮE values below 1 indicating acceptable color matches. In conclusion, performing stripping and scouring simultaneously on compact single jersey fabrics before dyeing with turquoise reduces uneven dyeing compared to conventional pretreatment methods.
The document experimentally investigates enhancing the performance of a domestic refrigerator by adding a shell and tube heat exchanger after the condenser. Ammonia is used as the cooling fluid in the heat exchanger to further subcool the refrigerant. Testing showed the coefficient of performance increased 18.4% with the additional heat exchanger due to increased refrigeration effect and lower operating pressures and temperatures. Graphs compare the heat rejection, refrigeration effect, power input, and COP between the original and modified systems.
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure CommunicationIOSR Journals
ย
This document summarizes a research paper on using vehicle-to-infrastructure communication to avoid obstacles in vehicle-to-vehicle communication. The proposed model introduces infrastructure like base stations that vehicles can communicate with if a vehicle obstacle prevents direct vehicle-to-vehicle communication. When a vehicle moves out of range of other vehicles, it searches for the nearest base station to relay messages. The model analyzes factors like spacing between vehicles, vehicle speed and dimensions, infrastructure location, and uses a geocast routing protocol to transmit messages through vehicles and infrastructure. This approach provides an alternative communication method when vehicle obstacles block line-of-sight between vehicles.
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...IOSR Journals
ย
The document summarizes a study on model-based controller design for a first-order plus time delay (FOPTD) system. The study identifies the process model of a level control system using process reaction curve methods. Various tuning rules for internal model control-proportional integral derivative (IMC-PID) controllers from literature are applied to the system, including rules from Rivera, Chien, Lee, Skogestad, and Panda. The performance of each controller is evaluated based on rise time, settling time, percentage overshoot, integral absolute error, and integral of time multiplied absolute error. The study finds that the Panda tuning rule has the smallest percentage overshoot and integral absolute error, while the Chien rule has
The document discusses optimizing surface roughness values in hard turning of AISI 52100 steel through experimentation using tribological (speed, feed, depth of cut) parameters. Experiments were conducted on a CNC lathe using cBN inserts to machine AISI 52100 steel hardened to 60 HRC. A Taguchi L9 orthogonal array was used as the experimental design to study the effects of cutting parameters on roughness. Regression analysis was performed to develop relationships between parameters and roughness to optimize values with 98.27% accuracy and 4.69% error.
This document discusses the future scope of wind energy in India. It begins by providing background on India's growing population and economy, and increasing energy demands. Wind energy provides an opportunity to meet these demands through a renewable source. The document then discusses current sources of wind energy production in India, including coastal regions and large wind farms. It explores future opportunities for offshore wind turbines and wind turbines placed along highways. Overall the document argues that wind energy will play a major role in India's energy future by providing a sustainable and domestic source of power.
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
ย
The document presents a proposed error detection method using majority logic decoding with difference set cyclic codes. The proposed method can detect up to five bit errors in the first three decoding cycles, improving performance over traditional majority logic decoding approaches. It uses a control unit to evaluate parity check sums over the first three cycles, and can detect errors without fully decoding the codeword when no errors are found. This reduces decoding time compared to approaches that fully decode each codeword. The proposed method is also less complex than alternatives using syndrome calculation for error detection. Simulation results showed the proposed method can detect errors faster while using less memory and power than traditional approaches.
1) The study assessed the perceived effects of Facebook usage on the academic activities of 80 agricultural students at the University of Port Harcourt in Nigeria.
2) It found that the most frequently used social media by students were Facebook (94%), Blackberry Messenger (90%), and WhatsApp (72.5%). Most students visited Facebook once every 3 days and spent 1 hour or less on the site daily, mainly for chatting.
3) Students agreed that Facebook had positive effects by facilitating networking with other agricultural students, encouraging collaboration, and easing information flow. However, it was also found to distract students from academic assignments. The overall rating showed Facebook had a positive effect on students' academic activities.
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...IOSR Journals
ย
The concept of mouth dissolving tablets known as MDTs has emerged with an objective to improve patientโs compliance. Methods to improve patientโs compliance have always attracted scientists towards the development of fancy oral drug delivery systems. Among them, mouth dissolving drug delivery systems (MDDDS) have obtained an important position in the market by overcoming previously encountered administration problems and contributing to extension of patent life. These dosage forms rapidly disintegrate in contact with saliva even within <60 seconds, an attribute that makes them highly attractive for paediatric, geriatric, bedridden patients and for active patients who are busy and in travelling may not have access to water. This special dosage form has some prerequisite criteria for formulation and this also involves the use of special techniques for large scale industrial production. The aim of this article is to review the advantages and disadvantages of MDTs, common excipients used in the formulation especially highlighting the use of superdisintegrating agents and taste masking agents in formulation and finally the popular methods used to produce large scale tablets for commercial purpose.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...IOSR Journals
ย
1) The document describes a modified distributive arithmetic based discrete wavelet transform (DWT) processor architecture and its FPGA implementation for image compression.
2) The proposed architecture uses four lookup tables to store pre-computed partial products of filter coefficients, achieving a latency of 44 clock cycles and throughput of 4 clock cycles.
3) A software reference model is developed in Matlab to analyze the performance of various wavelets for image compression using the distributive arithmetic based DWT approach. The input image is resized and decomposed into sub-bands using DWT and reconstructed using IDWT.
This document summarizes a study on material management techniques for construction projects. The study aimed to develop a material management scheme for a construction site and analyze the effects of inventory control techniques. Key findings include:
1) S-curve analysis showed actual material costs were higher than planned costs, likely due to issues with planning, purchasing, and procurement. Inventory control techniques like EOQ analysis reduced total inventory costs.
2) EOQ analysis determined optimal order quantities and frequencies to minimize ordering and carrying costs for materials like cement, steel, bricks, sand and aggregate. This helped avoid stockouts.
3) While EOQ worked well for cement, materials like sand and aggregate were ordered based on daily site
Causes of Delay in Construction of Bridge GirdersIOSR Journals
ย
The document discusses causes of delay in the construction of bridge girders for a three-span bridge over the Sabarmati River in Gandhinagar, Gujarat, India. It analyzes the planned versus actual construction schedules, finding total delays of 75 days. Major causes of delay included insufficient equipment capacity, lack of materials and skilled labor, delays in design approvals, labor issues, and use of conventional construction methods. The document categorizes common causes of construction delays and identifies responsible parties.
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
ย
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
ย
This document summarizes a research paper that proposes a novel technique for pre-processing web log data using SQL Server Management Studio. The paper first discusses how web log data contains irrelevant information that needs to be cleaned through pre-processing before analysis. It then describes the contents of a typical web log file and provides a sample of raw web log data. The paper presents an algorithm for data cleaning and implements it using SQL queries to clean the web log data by removing records with certain file extensions and incomplete URLs. It shows that the data was reduced from over 200,000 records to around 25,000 after pre-processing. The paper concludes that pre-processing is an important step for filtering and organizing data before applying data mining techniques.
The document summarizes a reversible data hiding method for encrypted images using a rhombus method. The proposed method has four stages: 1) generating an encrypted image by partitioning the original image, reversibly embedding pixel LSBs, and encrypting, 2) hiding data in the encrypted image LSBs, 3) decrypting and extracting the hidden data independently from recovering the original image, 4) recovering the original image by reversing the rhombus method after data extraction. The method ensures error-free extraction and recovery by reserving space before encryption and separating the extraction and recovery processes.
1) The document presents the results of a linear and non-linear analysis of reinforced concrete frames with members of varying inertia (non-prismatic beams) for buildings ranging from G+2 to G+10 storeys.
2) Both bare frames and frames with infill walls were analyzed considering different beam cross-sections - prismatic, linear haunch, parabolic haunch, and stepped haunch.
3) The linear analysis was performed using ETABS and considered parameters like fundamental time period, base shear, and top storey displacement. The non-linear analysis used pushover analysis in SAP2000 to determine effective time period, effective stiffness, and hinge formation patterns.
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...IOSR Journals
ย
This document presents an integrated e-health approach for early detection of human body disorders in real-time. It monitors heart rate, respiration, and body temperature using sensors and transfers the data wirelessly via ZigBee to a PC. The values are tested against a reference database to detect any abnormalities. Simulations were performed using LabVIEW to acquire, monitor, and synthesize the vital sign data in real-time. This non-invasive method allows for early diagnosis and prevention of cardiovascular diseases and respiratory issues.
This document describes the design and fabrication of a solar powered lithium bromide vapor absorption refrigeration system. It uses lithium bromide and water as the working fluids, with solar energy powering the generator to separate the water vapor from the lithium bromide solution. The water vapor then condenses and evaporates to provide cooling, while the strong lithium bromide solution absorbs the water vapor back into a weak solution to complete the cycle. The document provides details on the system components, operating principles, and achievable COP between 0.7-0.8 using this environmentally friendly solar powered system.
This document summarizes an FPGA implementation of a trained neural network. It describes implementing a 3-2-1 multilayer perceptron network on an FPGA for a fault identification application. The key modules implemented include multiply-accumulate, truncation, sigmoid and linear activation functions. Resource utilization is low, with the entire integrated network using only 2.2% of FPGA slices. Simulation results match manual calculations, demonstrating the network accurately classifies faults.
This document describes a technique for human iris recognition for biometric identification. It involves 6 major steps: image acquisition, localization, isolation, normalization, feature extraction, and matching. The iris is localized by detecting the pupil and outer iris boundaries using techniques like Canny edge detection and Hough transforms. The iris region is then isolated using masking. It is normalized and represented as a fixed-sized block. Features are extracted using techniques like Gabor filters and Haar wavelets to generate biometric templates. Templates are matched using Hamming distance to identify individuals in applications like border control, computer login, and financial transactions. The iris has properties that make it suitable and accurate for identification compared to other biometrics.
This document summarizes spatial scalable video compression using H.264. It discusses previous video compression standards like H.261 and H.263. It then describes the key components of the H.264 encoder and decoder, including prediction models, spatial models and entropy encoding. Simulation results comparing parameters like PSNR, CSNR and MSE between encoded and decoded video using H.264 are presented. The paper concludes that H.264 provides 31-35% improved efficiency and bit rate reduction over previous standards.
Investigation of Reducing Process of Uneven Shade Problem In Case Of Compact ...IOSR Journals
ย
This document investigates reducing uneven shade problems in compact single jersey cotton knit fabrics dyed with turquoise reactive dyes. Scanning electron microscopy shows that stripping and scouring combined increases fabric porosity compared to scouring alone, allowing better dye penetration. Color measurement testing finds that combining stripping and scouring results in more consistent dye absorption and less uneven shading than separate processes, with CMC ฮE values below 1 indicating acceptable color matches. In conclusion, performing stripping and scouring simultaneously on compact single jersey fabrics before dyeing with turquoise reduces uneven dyeing compared to conventional pretreatment methods.
The document experimentally investigates enhancing the performance of a domestic refrigerator by adding a shell and tube heat exchanger after the condenser. Ammonia is used as the cooling fluid in the heat exchanger to further subcool the refrigerant. Testing showed the coefficient of performance increased 18.4% with the additional heat exchanger due to increased refrigeration effect and lower operating pressures and temperatures. Graphs compare the heat rejection, refrigeration effect, power input, and COP between the original and modified systems.
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure CommunicationIOSR Journals
ย
This document summarizes a research paper on using vehicle-to-infrastructure communication to avoid obstacles in vehicle-to-vehicle communication. The proposed model introduces infrastructure like base stations that vehicles can communicate with if a vehicle obstacle prevents direct vehicle-to-vehicle communication. When a vehicle moves out of range of other vehicles, it searches for the nearest base station to relay messages. The model analyzes factors like spacing between vehicles, vehicle speed and dimensions, infrastructure location, and uses a geocast routing protocol to transmit messages through vehicles and infrastructure. This approach provides an alternative communication method when vehicle obstacles block line-of-sight between vehicles.
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...IOSR Journals
ย
The document summarizes a study on model-based controller design for a first-order plus time delay (FOPTD) system. The study identifies the process model of a level control system using process reaction curve methods. Various tuning rules for internal model control-proportional integral derivative (IMC-PID) controllers from literature are applied to the system, including rules from Rivera, Chien, Lee, Skogestad, and Panda. The performance of each controller is evaluated based on rise time, settling time, percentage overshoot, integral absolute error, and integral of time multiplied absolute error. The study finds that the Panda tuning rule has the smallest percentage overshoot and integral absolute error, while the Chien rule has
The document discusses optimizing surface roughness values in hard turning of AISI 52100 steel through experimentation using tribological (speed, feed, depth of cut) parameters. Experiments were conducted on a CNC lathe using cBN inserts to machine AISI 52100 steel hardened to 60 HRC. A Taguchi L9 orthogonal array was used as the experimental design to study the effects of cutting parameters on roughness. Regression analysis was performed to develop relationships between parameters and roughness to optimize values with 98.27% accuracy and 4.69% error.
This document discusses the future scope of wind energy in India. It begins by providing background on India's growing population and economy, and increasing energy demands. Wind energy provides an opportunity to meet these demands through a renewable source. The document then discusses current sources of wind energy production in India, including coastal regions and large wind farms. It explores future opportunities for offshore wind turbines and wind turbines placed along highways. Overall the document argues that wind energy will play a major role in India's energy future by providing a sustainable and domestic source of power.
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
ย
The document presents a proposed error detection method using majority logic decoding with difference set cyclic codes. The proposed method can detect up to five bit errors in the first three decoding cycles, improving performance over traditional majority logic decoding approaches. It uses a control unit to evaluate parity check sums over the first three cycles, and can detect errors without fully decoding the codeword when no errors are found. This reduces decoding time compared to approaches that fully decode each codeword. The proposed method is also less complex than alternatives using syndrome calculation for error detection. Simulation results showed the proposed method can detect errors faster while using less memory and power than traditional approaches.
1) The study assessed the perceived effects of Facebook usage on the academic activities of 80 agricultural students at the University of Port Harcourt in Nigeria.
2) It found that the most frequently used social media by students were Facebook (94%), Blackberry Messenger (90%), and WhatsApp (72.5%). Most students visited Facebook once every 3 days and spent 1 hour or less on the site daily, mainly for chatting.
3) Students agreed that Facebook had positive effects by facilitating networking with other agricultural students, encouraging collaboration, and easing information flow. However, it was also found to distract students from academic assignments. The overall rating showed Facebook had a positive effect on students' academic activities.
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...IOSR Journals
ย
The concept of mouth dissolving tablets known as MDTs has emerged with an objective to improve patientโs compliance. Methods to improve patientโs compliance have always attracted scientists towards the development of fancy oral drug delivery systems. Among them, mouth dissolving drug delivery systems (MDDDS) have obtained an important position in the market by overcoming previously encountered administration problems and contributing to extension of patent life. These dosage forms rapidly disintegrate in contact with saliva even within <60 seconds, an attribute that makes them highly attractive for paediatric, geriatric, bedridden patients and for active patients who are busy and in travelling may not have access to water. This special dosage form has some prerequisite criteria for formulation and this also involves the use of special techniques for large scale industrial production. The aim of this article is to review the advantages and disadvantages of MDTs, common excipients used in the formulation especially highlighting the use of superdisintegrating agents and taste masking agents in formulation and finally the popular methods used to produce large scale tablets for commercial purpose.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...IOSR Journals
ย
1) The document describes a modified distributive arithmetic based discrete wavelet transform (DWT) processor architecture and its FPGA implementation for image compression.
2) The proposed architecture uses four lookup tables to store pre-computed partial products of filter coefficients, achieving a latency of 44 clock cycles and throughput of 4 clock cycles.
3) A software reference model is developed in Matlab to analyze the performance of various wavelets for image compression using the distributive arithmetic based DWT approach. The input image is resized and decomposed into sub-bands using DWT and reconstructed using IDWT.
This document summarizes a study on material management techniques for construction projects. The study aimed to develop a material management scheme for a construction site and analyze the effects of inventory control techniques. Key findings include:
1) S-curve analysis showed actual material costs were higher than planned costs, likely due to issues with planning, purchasing, and procurement. Inventory control techniques like EOQ analysis reduced total inventory costs.
2) EOQ analysis determined optimal order quantities and frequencies to minimize ordering and carrying costs for materials like cement, steel, bricks, sand and aggregate. This helped avoid stockouts.
3) While EOQ worked well for cement, materials like sand and aggregate were ordered based on daily site
Causes of Delay in Construction of Bridge GirdersIOSR Journals
ย
The document discusses causes of delay in the construction of bridge girders for a three-span bridge over the Sabarmati River in Gandhinagar, Gujarat, India. It analyzes the planned versus actual construction schedules, finding total delays of 75 days. Major causes of delay included insufficient equipment capacity, lack of materials and skilled labor, delays in design approvals, labor issues, and use of conventional construction methods. The document categorizes common causes of construction delays and identifies responsible parties.
A Novel Method for Data Cleaning and User- Session Identification for Web MiningIJMER
ย
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
ย
This document summarizes a research paper that proposes a novel technique for pre-processing web log data using SQL Server Management Studio. The paper first discusses how web log data contains irrelevant information that needs to be cleaned through pre-processing before analysis. It then describes the contents of a typical web log file and provides a sample of raw web log data. The paper presents an algorithm for data cleaning and implements it using SQL queries to clean the web log data by removing records with certain file extensions and incomplete URLs. It shows that the data was reduced from over 200,000 records to around 25,000 after pre-processing. The paper concludes that pre-processing is an important step for filtering and organizing data before applying data mining techniques.
A Survey of Issues and Techniques of Web Usage MiningIRJET Journal
ย
This document summarizes a survey paper on the issues and techniques of web usage mining. It begins with defining web usage mining as the application of data mining techniques to analyze server log files and discover patterns in how users browse websites. The document then outlines the three main phases of web usage mining: pre-processing and cleaning log file data, pattern discovery through statistical analysis and data mining algorithms, and pattern analysis. Key issues discussed include data sources for web usage mining like server logs and proxy logs, as well as common pre-processing tasks like session identification and user identification. The document concludes with a literature review of related work on web usage mining techniques.
Web Data mining-A Research area in Web usage miningIOSR Journals
ย
This document provides a summary and analysis of web usage mining systems and technologies. It begins with an introduction to web mining and discusses the three main categories: web content mining, web structure mining, and web usage mining. The majority of the document then focuses on web usage mining, covering the concepts, typical data sources, log formats, preprocessing approaches including data cleaning, user/session identification and path completion, knowledge discovery methods, and pattern analysis. It also provides details on an online web personalization system called SUGGEST that utilizes these techniques to provide personalized recommendations to users.
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUESIJDKP
ย
This document summarizes a research paper that analyzes web usage mining using pattern recognition techniques. It discusses how web logs from the NASA website were preprocessed and then analyzed using a web log exploration tool. Key patterns discovered include determining most visitors were from the US/Canada based on IP addresses, most common file type accessed was images (especially GIF files), and GIF files were most popular on Thursdays at noon. The paper concludes the techniques help understand user behavior and improve website performance and organization strategies.
This document discusses pre-processing of server log files to improve security in distributed database systems. It proposes storing the MAC address in server log files along with the IP address to better identify unauthorized users. It provides background on distributed databases and security issues when data is accessed over a network. The document also reviews related work on pre-processing log files and using data mining techniques like the Apriori algorithm and decision trees. The proposed method applies these techniques to optimize log file data, recognize patterns, and display clean log files with MAC addresses to help verify unauthorized clients.
This document discusses the process of web usage mining and data preprocessing. It begins with an introduction to web mining and data collection. The main tasks of data preprocessing are then outlined, including data fusion, data cleaning, user identification, session identification, and path completion. Several related works applying different techniques like automatic pattern discovery, co-occurrence pattern mining, and particle swarm optimization are also summarized. The goal of preprocessing is to clean noisy and irrelevant data to reduce volume and improve quality for pattern discovery. The document focuses on preprocessing techniques like data cleaning, user identification, and fuzzy c-means clustering to more accurately extract patterns from web log files.
This document discusses the process of web usage mining and data preprocessing. It begins with an introduction to web mining and data collection. The main tasks of data preprocessing are then outlined, including data fusion, data cleaning, user identification, session identification, and path completion. Several related works applying different techniques like automatic pattern discovery, co-occurrence pattern mining, and particle swarm optimization are also summarized. The goal of preprocessing is to clean noisy and irrelevant data to reduce volume and improve quality for pattern discovery. The document focuses on preprocessing techniques like data cleaning, user identification, and fuzzy c-means clustering to more accurately extract patterns from web log files.
Identifying the Number of Visitors to improve Website Usability from Educatio...Editor IJCATR
ย
Web usage mining deals with understanding the Visitorโs behaviour with a Website. It helps in understanding the concerns
such as present and future probability of every website user, relationship between behaviour and website usability. It has different
branches such as web content mining, web structure and web usage mining. The focus of this paper is on web mining usage patterns of
an educational institution web log data. There are three types of web related log data namely web access log, error log and proxy log
data. In this paper web access log data has been used as dataset because the web access log data is the typical source of navigational
behaviour of the website visitor. The study of web server log analysis is helpful in applying the web mining techniques.
IRJET- Enhancing Prediction of User Behavior on the Basic of Web LogsIRJET Journal
ย
The document discusses predicting user behavior based on web logs. It proposes using several algorithms to analyze web log data, including Apriori, KNN, FP-Growth, and an Improved Parallel FP-Growth algorithm. The algorithms are applied to preprocessed web log data to identify frequent patterns and items that provide insights into user behavior. Experimental results show the Improved Parallel FP-Growth algorithm provides higher mining efficiency and can handle large, growing datasets.
This document discusses improving web performance through prefetching frequently accessed pages. It begins by introducing the concept of prefetching web pages to reduce latency. Next, it reviews related work on predictive prefetching using techniques like Markov models and association rules to predict future page access. Finally, it proposes an approach to increase web performance by analyzing user access logs and website structure to predict pages for prefetching. The goal is to reduce latency and improve user experience by prefetching relevant pages in the background.
Web personalization using clustering of web usage dataijfcstjournal
ย
The exponential growth in the number and the complexity of information resources and services on the Web
has made log data an indispensable resource to characterize the users for Web-based environment. It
creates information of related web data in the form of hierarchy structure through approximation. This
hierarchy structure can be used as the input for a variety of data mining tasks such as clustering,
association rule mining, sequence mining etc.
In this paper, we present an approach for personalizing web user environment dynamically when he
interacting with web by clustering of web usage data using concept hierarchy. The system is inferred from
the web serverโs access logs by means of data and web usage mining techniques to extract the information
about users. The extracted knowledge is used for the purpose of offering a personalized view of the
services to users.
Applying web mining application for user behavior understandingZakaria Zubi
ย
This document discusses applying web mining techniques to understand user behavior by analyzing server log files. It describes how web usage mining involves three phases: data preprocessing, pattern discovery, and pattern analysis. In data preprocessing, log files are cleaned and parsed to identify users, sessions, and page views. Pattern discovery applies techniques like association rule mining and classification to find relationships between frequently accessed page types and predict future page views. Pattern analysis validates and interprets the discovered patterns to model user behavior and create visualizations. The document provides an example of using association rule mining on a transactional database of user sessions to find patterns in user behavior.
A Comparative Study of Recommendation System Using Web Usage Mining Editor IJMTER
ย
Web Mining is one of the Developing field in research. Exact custom of the Web is to get the
beneficial material in the sites. To reduce the work time of user the Web Usage Mining (WUM) technique
is introduced. In this Technique use Web Page recommendation for the Web request from the user. For
the recommendation system in Web Usage Mining (WUM) variousauthor has introduce different
Algorithm and technique to improve the user interest in surfing the Web. Web log files are used todefine
the user interest and there next recommend page to view.The data stored in the web log file consist of
large amount oferoded, incomplete, and unnecessary information. So, the Web log files have to preprocess, customize, and to clean the data. In this paper we will survey different recommendation technique
to identify the issues in web surfing and to improve web usagemining (WUM) pre-processing for pattern
mining and analysis.
The document describes a proposed algorithm called Visitors' Online Behavior (VOB) for tracing visitors' online behaviors to effectively mine web usage data. The VOB algorithm identifies user behavior, creates user and page clusters, and determines the most and least popular web pages. It discusses how web usage mining analyzes user behavior logs to discover patterns. Preprocessing techniques like data cleaning, user/session identification, and path completion are applied to web server logs to maximize accurate pattern mining. Existing algorithms are described that apply preprocessing concepts to calculate unique user counts, minimize log file sizes, and identify user sessions.
A new approach for user identification in web usage mining preprocessingIOSR Journals
ย
This document presents a new approach for user identification in web usage mining preprocessing. It proposes a three-phase method: 1) Select websites and access them from different locations to find the IP address, session usage time, and navigations. 2) Apply Java tools and methods to identify the IP address, session usage, and visited web links. 3) Combine the web link navigation, IP address, and session usage to efficiently investigate web user behavior. The key steps in preprocessing include data cleaning, IP address identification, session identification, data integration, transformation, reduction, and usage mining. The proposed approach aims to improve performance and data quality for identifying unique users and sessions.
Classification of User & Pattern discovery in WUM: A SurveyIRJET Journal
ย
This document summarizes research on web usage mining techniques. It discusses how web usage mining involves discovering patterns from web server logs to understand how users interact with websites. The document reviews several papers on preprocessing log data, pattern discovery methods like clustering and classification, and classifying users based on patterns. It also provides an overview of the web usage mining process, which typically involves preprocessing, pattern discovery from cleaned logs, and using patterns to classify users. The goal is to help website administrators better understand users and personalize websites.
WEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION ...cscpconf
ย
Web access log analysis is to analyze the patterns of web site usage and the features of users behavior. It is
the fact that the normal Log data is very noisy and unclear and it is vital to preprocess the log data for
efficient web usage mining process. Preprocessing comprises of three phases which includes data cleaning,
user identification and session construction. Session construction is very vital and numerous real world
problems can be modeled as traversals on graph and mining from these traversals would provide the
requirement for preprocessing phase. On the other hand, the traversals on unweighted graph have been
taken into consideration in existing works. This paper oversimplifies this to the case where vertices of
graph are given weights to reflect their significance. The proposed method constructs sessions as a Partial
Ancestral Graph which contains pages with calculated weights. This will help site administrators to find
the interesting pages for users and to redesign their web pages. After weighting each page according to
browsing time a PAG structure is constructed for each user session. Existing system in which there is a
problem of learning with the latent variables of the data and the problem can be overcome by the proposed
method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...ijdkp
ย
Web sequential patterns are important for analyzing and understanding usersโ behaviour to improve the
quality of service offered by the World Wide Web. Web Prefetching is one such technique that utilizes
prefetching rules derived through Cyclic Model Analysis of the mined Web sequential patterns. The more
accurate the prediction and more satisfying the results of prefetching if we use a highly efficient and
scalable mining technique such as the Bidirectional Growth based Directed Acyclic Graph. In this paper,
we propose a novel algorithm called Bidirectional Growth based mining Cyclic behavior Analysis of web
sequential Patterns (BGCAP) that effectively combines these strategies to generate prefetching rules in the
form of 2-sequence patterns with Periodicity and threshold of Cyclic Behaviour that can be utilized to
effectively prefetch Web pages, thus reducing the usersโ perceived latency. As BGCAP is based on
Bidirectional pattern growth, it performs only (log n+1) levels of recursion for mining n Web sequential
patterns. Our experimental results show that prefetching rules generated using BGCAP is 5-10% faster for
different data sizes and 10-15% faster for a fixed data size than TD-Mine. In addition, BGCAP generates
about 5-15% more prefetching rules than TD-Mine.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
ย
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
ย
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
ย
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
ย
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
ย
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
ย
Ivรกn Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
ย
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 76-79
www.iosrjournals.org
A Survey on Data Preprocessing in Web Usage Mining
Murti Punjani1, Mr.Vinitkumar Gupta2
1
(Department of Computer Engineering,Hasmukh Goswami College of Engineering, India
2
(Department of Computer Engineering,Hasmukh Goswami College of Engineering, India
Abstract : With the abundant use of Internet and constant growth of users, the World Wide Web has a huge
storage of data and these data serves as an important medium for the getting information of the users access to
web sites which are data stored in Web server Logs. Today people are interested in analyzing logs file as they
show actual usage of web site. But the data is not accurate so preprocessing of Web log files are essential then
after that data are suitable for knowledge discovery or mining tasks. Web Usage Mining, a part of Web mining
and application of data mining is used for automatic discovery of patterns in clickstreams and associated data
collected or generated as a result of user interactions with one or more Web Sites. This survey paper gives the
literature review and also overview of various steps needed for preprocessing phase.
Keywords โ Data Fusion, Path Completion, Pre processing, Session Identification, Web usage, Web Server
Log file.
I. INTRODUCTION
With the fast growth of Internet technology, preprocessing is necessary to get useful information about
user access and is of the most important research topics. With the explosive use of growth of information
available on WWW (World Wide Web), discovery and analysis ofuseful information has become necessity. The
Web has become an important medium to communicate ideas, transact business and promote entertainment. The
discovery and analysis of useful information from the Web documents is referred to as Web mining [1].The data
is stored in web server log and it is in heterogeneous form. So we need to preprocess these data to extract useful
information. Web Mining is divided into three categories [11]1.Web Content Mining 2.Web Structure Mining
3.Web Usage Mining. Web Content Mining is process to extract useful information from the contents of web
documents. Web Structure Mining is the process of discovering structure information from the web. Structure
represents hyperlinks and document structure. Web Usage Mining is application of data mining used to extract
user access from web server log files.
A. Web Usage Mining
Also known as Web Log Mining is used to discover patterns from web server logs. The primary source of data
for web usage mining consists of textual logs collected from several web servers all around the world. There are
four phases in web usage mining. [4]
1. Data Collection- User Logs are collected from client and server side servers, proxy servers, application
servers etc.
2. Data Preprocessing- Consists phases like data fusion and cleaning, user identification, session
identification, path completion
3. Pattern Discovery- Discovering patterns from preprocessed data using various data mining techniques like
statistical analysis, association, clustering, and pattern matching and so on.
4. Pattern Analysis-Once patterns are discovered, analysis is done using knowledge query mechanism such as
SQL or data cubes to perform OLAP operations.
Fig. 1 Phases of Web Usage Mining
1.1 Motivation
Thousands of users access multiple web sites all over the world. When the different users access the
websites, huge amount of data is gathered in the web log files which is very much useful many times as we can
know how many times user access the same page frequently. These data can be further used to get user access
www.iosrjournals.org 76 | Page
2. A Survey on Data Preprocessing in Web Usage Mining
pattern and user behavior. As the data cannot be directly used in WUM, Preprocessing is necessary.
Preprocessing of the web log file is tedious job and it takes 80% of total time of web usage mining process as
whole [12].Seeing the advantages and disadvantages, we conclude that preprocessing is significant phase and
which also improves quality of the data [13].
II. Literature Review
The aim of literature review is to study and compare the various available techniques for preprocessing.
Due to huge amount of extraneous and inaccurate entries in web log file, log file cannot be directly used in
WUM process so preprocessing is must.
According to Ravindra Gupta and Prateek Gupta [17], in which two main tasks are done which are
customized web log preprocessing and improved FP Tree algorithm. Raw web log file was taken as input. The
authors modified the algorithm FP tree and proposed improved FP tree algorithm. The proposed algorithm was
divided into two main processes: creation of modified FP tree and mining. In modified FP tree algorithm,
structure items were stored in descending order of their frequency. Customized preprocessing steps were
Customization in which log cleaning was performed on basis of user requirement, next steps were Data
Cleaning, User Identification, Session Identification and last step was database of cleaned log.After applying
these steps compressed log file having user access behaviour in numeric form was generated and which can be
further sent for mining using modified FP tree algorithm.
According to Wahab, et al, [16] discussed different types of log files in detail. Also discussed all the 19
attributes of web log file as well as different log file formats in detail. They proposed an algorithm for reading
server logs and also algorithm for transferring the log file to database was proposed. After reading the log web
files of any one type out of three formats, various attributes were ignored because they were considered not
significant for the analysis. Data filtering was performed to remove unwanted attributes of web log file. The web
server log file was containing 18 attributes, out of which 17 attributes were removed considering them as
unwanted and only one attribute was known i.e. โURLโ and was stored in the database. Some important
attributes were not considered, so reliability was not maintained. So seeing the pros and cons, the proposed
algorithms need to be modified.
According to Raju and Satyanarayana,[6], input was raw web log file collected from NASA Web site
during July 1995. Customized preprocessing steps generated compressed log file having user behavior in
numeric form which was further given for mining process using modified FP tree algorithm. It outputs complete
relational database model for storing the structured information about the Web site, its usage and its users.
As web log file contains important data related to website, Suneetha and Krishnamoorthi[15], the input was the
web log data of NASA website. Here the authors discussed the sources of web logs, web log structure and status
codes of HTTP in detail. They performed preprocessing techniques on web server log file and first step was
Data cleaning in which the irrelevant entries were removed like the entries that having status error or failure and
images pages were removed next step was user identification in which three attributes were used from log file
which are IP Address, Operating System, and User Agent. The output which can be further used to increase the
effectiveness of the website. The authors did not apply session identification phase.
Preprocessing Algorithm
Author Name Source of log file Technique applied
Ravindra Gupta, Prateek Gupta Raw web Data Cleaning Improved
log file User Identification FP Tree
Session Algorithm
Identification
Formatting
Mohd Helmy Abd Wahab, Mohd Server Log File File Reading Proposed
Norzali Haji Mohd Data Cleaning
and Mohamad Farhan Mohamad Data Filtering
Mohsin
Raju and Satyanarayana Server Log File Data Merging NA
Data Cleaning
User Identification
Session
Identification
Suneetha, K. R. and D. R. Server Log File Data Cleaning NA
Krishnamoorthi User Identification
TABLE 1 Summary of Literature Review
www.iosrjournals.org 77 | Page
3. A Survey on Data Preprocessing in Web Usage Mining
III. Data Preprocessing Tasks
Fig 2 shows the phases of Data Preprocessing in Web Usage Mining. The goal of preprocessing is to
transform the raw click stream data into a set of user profiles [5]. Data preprocessing presents a number of
unique challenges which led to a variety of algorithms and heuristic techniques for preprocessing tasks such as
merging and cleaning, user and session identification etc [6]. Input to the preprocessing stage is web server log
file. Web Server Log contains 19 attributes such as Date, Time, Client IP, AuthUser, ServerName, ServerIP,
ServerPort, Request Method, URI-Stem, URI-Query, Protocol Status, Time Taken, Bytes Sent, Bytes Received,
Protocol Version, Host, User Agent, Cookies, Referer.
Fig 2: Phases of Data Preprocessing in Web Usage Mining[3]
Sample Log file is given below [3]:
2007-12-06 05:22:16 ::1 GET /iisstart.htm - 80 - ::1
Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+6.0;+SLCC1;+.NET+CLR+2.0.50727;+Media+Center+P
C+5.0;+InfoPath.1;+.NET+CLR+1.1.4322;+.NET+CLR+3.5.21022;+.NET+CLR+3.0.04506) 200 0 0 296 336
3.1 Data Fusion and Cleaning
Merging of the log files from various Web and application servers is done at the Data Fusion phase.
Fig. 3 Web Log File in Text format [2]
The goal of data cleaning phase is to remove the extraneous and redundant log entries. Important fields like
date, time, Client IP, User Agent, URL requested, URL referred, time taken, Referrer or browser used are
considered for further processing. Extraneous or redundant data is to be removed which are[2] i)As we want
only the log information related to user access so as HTTP is stateless protocol, graphics and scripts are also
recorded. So extensions of the files are checked and files having extensions like .css, .gif, .jpeg, .gif, .jpg etc
files are eliminated. ii) Removal of Robots request iii) some entries will be having errors. Eliminate the entries
having status code less than 200 and greater than 299 as they are failure entries.
www.iosrjournals.org 78 | Page
4. A Survey on Data Preprocessing in Web Usage Mining
3.2 User Identification
This phase identifies individual user by using their Client IP address. If new IP address, there is new
user. If IP address is same but browser version or operating system is different then it represents different user.
[7]
3.3 Session Identification
Session of a particular user means how much time the user is connected to particular website. It tells us
total page accesses of particular user. The following rules we use to identify user session in our experiment: [3]
1) If there is a new user, there is a new session;
2) In one user session, if the refer page is null, there is a new session;
3) If the time between page requests exceeds a certain limit (30 or 25.5mintes), it is assumed that the user is
starting a new session.
3.4 Path Completion
After session identification, path completion comes. As the client uses proxy servers and cache version
of the pages using โBackโ, the sessions which are identified have many lost pages. So this phase is used to
identify lost pages.
IV. Conclusion And Future Work
Preprocessing of web log file is mandatory step for web usage mining. After data cleaning step, we can
go for preprocessing step by which we can extract user access pattern and also can be used further for pattern
analysis. In this paper, various current preprocessing techniques are outlined. In this paper also I have explained
the various tasks needed for preprocessing of the data in web usage mining. My future work is to increase the
performance of the web server by getting meaningful and useful information quickly. Analyzing web server log
files, we can easily understand the user behaviors in web structure to get better design of web components and
web applications.
References
[1] O.Etzioni, The World Wide Web: Quagmire or gold mine.Communications of the ACM, 39(11):65โ68, 1996.
[2] Vijayashri Losarwar, Dr. Madhuri Joshi,Data Preprocessing in Web Usage Mining, International Conference on Artificial
Intelligence and Embedded Systems (ICAIES'2012) July 15-16, 2012 Singapore
[3] Li Chaofeng,Research and Development of Data Preprocessing in Web Usage Mining, School of Management, South-Central
University for Nationalities, Wuhan 430074, P.R. China
[4] V.Chitraa, Dr. Antony Selvdoss Davamani, A Survey on Preprocessing Methods for Web Usage Data, (IJCSIS) International
Journal of Computer Science and Information Security,Vol. 7, No. 3, 2010,p.78-83
[5] Demin Dong,Exploration on Web Usage Mining and its Application, IEEE, 2009.
[6] Raju G.T. and Sathyanarayana P. Knowledge discovery from Web Usage Data : Complete Preprocessing Methodology, โ, IJCSNS
2008
[7] Priyanka Patil,Ujwala Patil, Preprocessing of web server log file for web mining ,World Journal of Science and Technology 2012,
2(3):14-18 ISSN: 2231 โ 2587
[8] Marathe Dagadu Mitharam ,Preprocessing in Web Usage mining, International Journal of Scientific & Engineering Research,
Volume 3, Issue 2, February -2012 1 ISSN 2229-5518
[9] C.P. Sumathi, R. Padmaja Valli , T. Santhanam, โAn Overview of Preprocessing of Web Log Files for Web Usage Miningโ, Journal
Of Theoretical And Applied Information Technology 31st December 2011. Vol. 34 No.2,P.178-185
[10] Jaideep Srivastava, Robert Cooley, Mukund Deshpande, and Pang-Ning Tan Web usage mining: Discovery and applications of
usage patterns from web data.SIGKDD Explorations, 1(2):12โ23, 2000
[11] Alam, S., G. Dobbie, et al. (2008). Particle Swarm Optimization Based Clustering Of Web Usage Data. 2008 IEEE/WIC/ACM
International Conference on Web Intelligence and Intelligent Agent Technology 978-0-7695-3496-1/08 DOI
10.1109/WIIAT.2008.292 IEEE/WIC/ACM International Conference on Web.
[12] Pabarskaite, Z. (2002). Implementing Advanced Cleaning and End-User Interpretability Technologies in Web Log Mining. 24th Int.
Conf. information Technology Interfaces /TI 2002, June 24-27, 2002, Cavtat, Croatia
[13] Han, J. and M. Kamber (2006). Data Mining: Concepts and Techniques. A. Stephan. San Francisco,, Morgan Kaufmann Publishers
is an imprint of Elsevier.
[14] Yuan, F., L.-J. Wang, et al. (2003). Study on Data Preprocessing Algorithm in Web Log Mining. Proceedings of the Second
International Conference on Machine Learning and Cybernetics, Wan, 2-5 November 2003.
[15] Suneetha, K. R. and D. R. Krishnamoorthi (2009)."Identifying User Behavior by Analyzing Web Server Access Log File." IJCSNS
International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009.
[16] Wahab, M. H. A., M. N. H. Mohd, et al. (2008). Data Preprocessing on Web Server Logs for Generalized Association Rules Mining
Algorithm. World Academy of Science, Engineering and Technology 48 2008.
[17] Ravindra Gupta and Prateek Gupta,Application Oriented Web Usage Mining with Customized Web Log Preprocessing & Frequent
Pattern Tree, International Journal of Engineering Research and Applications, ISSN: 2248-9622,Vol. 2, Issue 1,Jan-Feb 2012,
pp.596-598
www.iosrjournals.org 79 | Page