Performance Evaluation of Clustering in Web-Log Analysis Based on Agent
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 0
Abstract
Web mining is the use of data mining Technique to automatically discover & extract information from web documents. When user searches for goods the management agent receives order from graphical user interface .Management agent receives information, update agent information store house and feedback the mining result to user. Intelligent agent can help making computer system easier to use, enable finding & filtering information. The mining agent is the analytical center of whole agent system.It mainly adopts two kind of analytical method: related rule mining and cluster analysis. Cluster of objects are formed so that objects with in a cluster have high similarity. The aim of this paper is to analyze the web log data .To achieve this clustering tool is used. It performs in two phases. First it captures the web-log data. Then it analyzes the data& discovers the hidden pattern. Agent requires an agent communication language to describe & process agent request. The future internet will use PERL to encode information with meaningful structure & semantics.
Authors and Affiliations
Himani , Gaurav Arora , Sunita Sangwan
Design of Model for Component Based System
This paper is based on designing such kind of model that will enhance the reusability of software modules, while component based software development approach is used to develop software. It is widely growing engineering...
Recognition of Expressions on Human Face using AI Techniques
Facial expressions convey non-verbal cues, which play an important role in interpersonal relations. Facial expressions recognition technology helps in designing an intelligent human computer interfaces. This paper discus...
ATTACKS ON WIRELESS SENSOR NETWORK: A SURVEY
Security is a crucial service in wireless sensor networks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible host...
A Handoff Mechanism in VANET Using Mobile Agent A HANDOFF MECHANISM IN VANET USING MOBILE AGENT A HANDOFF MECHANISM IN VANET USING MOBILE AGENT
Nowadays, everything is moving towards the infrastructure less wireless environment to bring the smartness of the society. In this situation, it is necessary to bring the smart technologies in the adhoc network environ...
A Survey on Security Issues in Mobile Ad-hoc Networks
Current technologies and security advances have made networks systems and applications very popular and widely used. The pervasive and practical aspects of wireless Mobile Ad Hoc Networks (MANET) made them very popular a...