24Dec 2019

COMPARISON OF WEB - MINING TECHNIQUES - A SURVEY PAPER

  • Maharaja Surajmal Institute of Technology, IT Department, New Delhi - 110058
  • HMR Institute of Technology and Management, CSE Department, New Delhi - 110036
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Mining is a technique of extracting actionable information from the big pile of data. This paper surveys and compares the various web mining techniques which is an emerging field of data mining.


  1. Xingquan Zhu, Ian Davidson, Knowledge Discovery and Data Mining: Challenges and Realities, ISBN 978-1-59904-252, Hershey, New York, 2007.
  2. Joseph, Zernik, Data Mining as a Civic Duty Online Public Prisoners Registration Systems, International Journal on Social Media: Monitor- ing, Measurement, Mining, vol. - 1, no.-1, pp. 84-96, September2010.
  3. Ailun Yi, Stock Market Prediction Based on Public Attentions: a Social Web Mining Approach-Univ of Edinburgh (2009).
  4. Sadegh Bafandeh Imandoust And Mohammad Bolandraftar, Applica- tion of K-Nearest Neighbor (KNN) Approach for Predicting Economic Events: Theoretical Background- S B Imandoust et al. Int. Journal of Engineering Research and Applications Vol. 3, Issue 5, Sep- Oct 2013, pp.605-610
  5. Romil.V.Patel, Dheeraj Kumar Singh, Mr.Ankur.N.Shah, Introduc- tion to Integrating Web Mining With Neural Network , IRACST - In- ternational Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555 Vol. 2, No.6, December 2012
  6. Vaishali A.Zilpe, Dr. Mohammad Atique, WEB USAGE MINING USING NEURAL NETWORK APPROACH: A CRITICAL REVIEW , Vaishali A.Zilpe et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (1) , 2012, 3073 3077
  7. Jagan, Dr.S.P.Rajagopalan, A Survey on Web Personalization of Web Usage Mining, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 02 Issue: 01 ? March-2015 ISSN: 2395-0072
  8. Raymond Kosala and Hendrik Blockeel, Web mining research: A survey, SIGKDD Explorations, pages 95-104, July 2000.
  9. Jaideep Srivastava, Robert Cooley, Mukund Deshpande, and Pangning Tan, Web usage mining: Discovery and applicationsof usage patterns from web data, ACM SIGKDD Explorations, 01(03):187-192, January 2000.
  10. Mobasher B., Cooley R., and Srivastava J, Automatic personalization based on web usage mining, ACM Communication, 43(08):142-151, August 2000.
  11. Srivastava, A., Sural, S. and Majumdar, A.K., 2006. Database intrusion detection using weighted sequence mining.?Journal of Computers,?1(4), pp.8-17.
  12. Huang, C.C., Chuang, S.L. and Chien, L.F., 2004, April. Mining the Web for generating thematic metadata from textual data. In? 20th International Conference on Data Engineering(p. 834). IEEE.
  13. Dhanalakshmi, Dr.I. Ramesh Babu, Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms, IJCSNS Inter- national Journal of Computer Science and Network Security, VOL.8 No.2, February 2008.
  14. Fang-Yie Leu, Kai-Wei Hu, A Real-Time Intrusion Detection System using Data Mining Technique
  15. Chitrakala , P.Shamini, Dr.D.Manjula, Multi-class Enhanced Image Mining of Heterogeneous Textual Images Using Multiple Image Features , 2009 IEEE International dvance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  16. Si Jie Phua, Wee Keong Ng, Haifeng Liu, Xiang Li, Bin Song, Customer Information System for Product and Service Management: Towards Knowledge Extraction from Textual and Mixed-Format Data
  17. Antonio Alexandre Mello Ticom, Beatriz de Souza Leite P. de Lima, Text Mining and Expert Systems applied in Labor Laws, Seventh Inter- national Conference on Intelligent Systems Design and Applications.
  18. Campos, M.M. and Milenova, B.L., 2005, December. Creation and deployment of data mining-based intrusion detection systems in oracle database l0g. In?Fourth International Conference on Machine Learning and Applications (ICMLA'05)(pp. 8-pp). IEEE.
  19. Barbar?, D., Couto, J., Jajodia, S. and Wu, N., 2001. ADAM: a testbed for exploring the use of data mining in intrusion detection.?ACM Sigmod Record,?30(4), pp.15-24.
  20. Lappas, T. and Pelechrinis, K., 2007. Data mining techniques for (network) intrusion detection systems.?Department of Computer Science and Engineering UC Riverside, Riverside CA,?92521.

[Surender Singh and Rajinder Singh (2019); COMPARISON OF WEB - MINING TECHNIQUES - A SURVEY PAPER Int. J. of Adv. Res. 7 (Dec). 646-651] (ISSN 2320-5407). www.journalijar.com


Surender Singh
Maharaja Surajmal Institute of Technology, IT Department, New Delhi-110058

DOI:


Article DOI: 10.21474/IJAR01/10193      
DOI URL: https://dx.doi.org/10.21474/IJAR01/10193