Article Fingerprint
ReserarchID
CSTNWSQ115W
The growth of World Wide Web is incredible as it can be seen in present days. Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining techniques to discover Web access patterns from Web log data. In order to discover access patterns, Web log data should be reconstructed into sessions. This paper provides a novel approach for session identification.
Neha Sharma. 2015. \u201cWeb Usage Mining:A Novel Approach for Web User Session Construction\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E3): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 102
Country: India
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Neha Sharma, Pawan Makhija (PhD/Dr. count: 0)
View Count (all-time): 249
Total Views (Real + Logic): 7918
Total Downloads (simulated): 2180
Publish Date: 2015 06, Mon
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
The growth of World Wide Web is incredible as it can be seen in present days. Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining techniques to discover Web access patterns from Web log data. In order to discover access patterns, Web log data should be reconstructed into sessions. This paper provides a novel approach for session identification.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.