Due to the increased of information existing on the World Wide Web (WWW), the subject of how to extract new and useful knowledge from the log file has gained big interest among researchers in data mining and knowledge discovery topics.
Web miming, which is a subset of data mining divided into three particular ways, web content mining, web structure mining, web usage mining. This paper is interested in server log file, which is belonging to the third category (web usage mining). This file will be analyzed according to the suggested algorithm to extract the behavior of the user. Knowing the behavior is coming from knowing the complete path which is taken from the specific user.
Extracting these types of knowledge required many of KDD (Knowledge Discovery in Database) steps such as preprocessing, pattern discovery, and pattern analysis. After that, the complete graph of the visited web will be drawn. The knowledge discussed in this paper, helps the web designers to improve their web site design and helps to improve their website usability and visitor’s browsing experience by determining related link connections in the website.
With the explosive growth of data, it has become very difficult for a person to process the data and find the right information from it. So, to discover the right information from the colossal amount of data that is available online, we need information filtering systems. Recommendation systems (RS) help users find the most interesting information among the options that are available. Ratings given by the users play a vital role in determining the purposes of recommendations. Earlier, researchers used a user’s rating history to predict unknown ratings, but recently a user’s review has gained a lot of attention as it contains a lot of relevant information about a user’s decision. The proposed system makes an attempt to deal w
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreDisequilibrium compaction, sometimes referred to as under compaction, has been identified as a major mechanism of abnormal pore pressure buildup in sedimentary basins. This is attributed to the interplay between the rate at which sediments are deposited and the rate at which fluids associated with the sediments are expelled with respect to burial depth. The purpose of this research is to analyze the mechanisms associated with abnormal pore pressure regime in the sedimentary formation. The study area “Jay field†is an offshore Niger Delta susceptible to abnormal pore pressure regime in the Agbada –Akata formations of the basin. Well log analysis and cross plots were applied to determine the unde
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show MoreA Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe research seeks to identify the factors affecting the monopoly and the possibility of measuring the phenomenon of economic ( monopolistic profit) accounted for and that the importance of research topic arising from the transformation of the majority of developing countries to the market economy, which represents the image of the capitalist economy, which is a monopoly, a stages that economy in its various forms, whether Market Worldwide sales monopoly or monopoly, which generates absolute monopolistic profits, which more or less affect on the overall economy of those countries than they should study the phenomenon of monopoly and its impact on the economies of those countries that still love to find her site reinforces its pos
... Show MoreThe quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA
Teachers should have acceptable ratios of multiple intelligences. Knowing their most dominate intelligence, teachers will be capable of understanding and considering the multiple intelligences of their students. Accordingly, they will be able to use Gardner’s theory as an effective approach of teaching for all kinds of learners and not limited to a specific type of students especially those who have high ratios of verbal-linguistic and logic-mathematical intelligences
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More