Rough Sets Clustering and Markov model for Web Access Prediction
Discovering user access patterns from web access log is increasing the importance of information to build up adaptive web server according to the individual user’s behavior. The variety of user behaviors on accessing information also grows, which has a great impact on the network utilization. In thi...
| Main Authors: | Chimphlee, Siriporn, Salim, Naomie, Ngadiman, Mohd. Salihin, Chimphlee, Witcha, Srinoy, Surat |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3370/ http://eprints.utm.my/3370/1/Rough_Sets_Clustering_and_Markov_model_for_Web.pdf |
Similar Items
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Using Markov Model and Association Rules for Web Access Prediction
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Independent Component Analysis And Rough Fuzzy Based
Approach To Web Usage Mining
by: Chimphlee, Siriporn, et al.
Published: (2006)
by: Chimphlee, Siriporn, et al.
Published: (2006)
Mining Usage Web Log Via Independent Component Analysis And Rough Fuzzy
by: Siriporn, Chimphlee, et al.
Published: (2006)
by: Siriporn, Chimphlee, et al.
Published: (2006)
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)
by: Chimphlee, S., et al.
Published: (2006)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
To identify suspicious activity in anomaly detection based on soft computing
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Integrating genetic algorithms and fuzzy c-means for anomaly detection
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
Rough clustering for web transactions
by: Yanto, Iwan Tri Riyadi
Published: (2011)
by: Yanto, Iwan Tri Riyadi
Published: (2011)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Rough web caching
by: Sulaiman, Sarina, et al.
Published: (2009)
by: Sulaiman, Sarina, et al.
Published: (2009)
Empirical analysis of rough set categorical clustering techniques based on rough purity and value set
by: Uddin, Jamal
Published: (2017)
by: Uddin, Jamal
Published: (2017)
Fuzzy clustering algorithms and their applications to chemical datasets
by: Shah, Jehan Zeb, et al.
Published: (2005)
by: Shah, Jehan Zeb, et al.
Published: (2005)
A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds
by: Salim, Naomie, et al.
Published: (2007)
by: Salim, Naomie, et al.
Published: (2007)
Clustering of Chemical Compounds using Unsupervised Neural Networks Algorithms: a comparison
by: Zeb Shah, Jehan, et al.
Published: (2006)
by: Zeb Shah, Jehan, et al.
Published: (2006)
Clustering of chemical compounds using unsupervised neural networks algorithms : a comparison
by: Zeb Shah, Jehan, et al.
Published: (2006)
by: Zeb Shah, Jehan, et al.
Published: (2006)
Behavious based computer user clustering using rough set theory
by: Wang , Le Wei
Published: (2013)
by: Wang , Le Wei
Published: (2013)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Fuzzy rules reduction using rough set approach
by: Yusof, Norazah, et al.
Published: (2003)
by: Yusof, Norazah, et al.
Published: (2003)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Rough sets theory for travel demand analysis in Malaysia
by: Wong, Jenn Hwee
Published: (2008)
by: Wong, Jenn Hwee
Published: (2008)
Application of kohonen neural network and rough approximation for overlapping clusters optimization
by: Mohebi, E., et al.
Published: (2008)
by: Mohebi, E., et al.
Published: (2008)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Generation of rough set (RS) significant reducts and rules for cardiac dataset classification
by: Sulaiman, Noor Suhana
Published: (2007)
by: Sulaiman, Noor Suhana
Published: (2007)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Simulation of Dengue Outbreak Prediction
by: Husin, Nor Azura, et al.
Published: (2006)
by: Husin, Nor Azura, et al.
Published: (2006)
Customer churn classification in telecommunication company using rough set theory
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
by: Nur Syafiqah, Mohd Nafis
Published: (2016)
Arabic language script and encoding identification with support vector machines and rough set theory
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
by: Mohamed Sidya, Mohamed Ould
Published: (2007)
A Novel Soft Set Approach in Selecting Clustering Attribute
by: Qin, Hongwu, et al.
Published: (2012)
by: Qin, Hongwu, et al.
Published: (2012)
Clustering of Expressed Sequence Tag (EST) with Markov Models and Self-Organizing Maps: An Exploratory Study
by: Ng, Keng Hoong, et al.
Published: (2008)
by: Ng, Keng Hoong, et al.
Published: (2008)
High reliability replication technique for web-server cluster systems
by: Deris, Mustafa Mat, et al.
Published: (2005)
by: Deris, Mustafa Mat, et al.
Published: (2005)
Quantum Markov fields on graphs
by: Accardi, Luigi, et al.
Published: (2010)
by: Accardi, Luigi, et al.
Published: (2010)
A static jobs scheduling for independent jobs in Grid Environment by using Fuzzy C-Mean and Genetic algorithms
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
by: Lorpunmanee, Siriluck, et al.
Published: (2006)
A web based survey using fuzzy set model
by: Ayu, Media Anugerah, et al.
Published: (2010)
by: Ayu, Media Anugerah, et al.
Published: (2010)
Similar Items
-
Rough fuzzy approach for web usage mining
by: Chimphlee, Siriporn, et al.
Published: (2006) -
Using Markov Model and Association Rules for Web Access Prediction
by: Siriporn, Chimphlee, et al.
Published: (2006) -
Independent Component Analysis And Rough Fuzzy Based
Approach To Web Usage Mining
by: Chimphlee, Siriporn, et al.
Published: (2006) -
Mining Usage Web Log Via Independent Component Analysis And Rough Fuzzy
by: Siriporn, Chimphlee, et al.
Published: (2006) -
Predicting next page access by Markov models and association rules on web log data
by: Chimphlee, S., et al.
Published: (2006)