Web mining plays vital role in day-to-day
applications to improve intelligence of web in the context of
business must be able to identify useful business intelligence.
To achieve our model in web engineering, we are using mining
techniques for next generation business intelligence
development. In this research our approach identifies the
weblogs error reports using comprehensive algorithms, applies
the mining techniques to detect noisy and integrates the
different models, finally our information patterns satisfies the
need of client inputs. For web engineering retrieval system,
list of web log bugs and web architecture, the system uses
mining techniques to explore valuable web data patterns in
order to meet better projects inputs and higher quality web
systems that delivered on time. Our research uses association
and machine learning applied to web architecture model
pertaining to source code mining implementation tools
improves software debugging business rules for novel projects
and also presents strategies for efficient study text, graph
mining. Presents the Geo Tracking system to identify messages
from terrorist or threat persons and also from hackers detects
the negative rates and improves the high positive which
increases the quality of Government Private and Public sectors.
M Vijaya Kamal : Asst. Professor, University of Petroleum & Energy Studies, Research Scholar in JNTUH
Dehradun, Uttarakhand, India
P Srikanth : Asst. Professor, University of Petroleum & Energy Studies, Dehradun, Uttarakhand, India
Dr. D Vasumathi : Professor, Jawaharlal Nehru Technological University , Dehradun, Uttarakhand Hyderabad
Business Intelligence
Web mining
Geo-Tracking
Text Mining
Pattern Analysis
Aassociation and machine learning applied to web
architecture model pertaining to source code mining
implementation tools improves software debugging
business rules for novel projects and also presents strategies for efficient study text, graph mining. Capture
the information available in mobile calls internet and
call conversations from all the networks availability
apply the data mining technique to track the alerts or
attacks. We implements the system ”Geo Tracking” to
identify messages from terrorist or threat persons which
only finds the alert messages or misuse conversations at
time Geo Tracking not expose to capture the confidential
information is advantage and also from hackers detects
the negative rates and improves the high positive which
increases the quality of Government Private and Public
sectors.
[1] K. Bollacker, S. Lawrence, and C.L. Giles. CiteSeer:
An autonomous web agent for automatic retrieval and
identification of interesting publications. In Katia P.
Sycara and Michael Wooldridge, editors, Proceedings
of the Second International Conference on
Autonomous Agents, pages 116–123, New York,
1998. ACM Press.
[2] J. Borges and M. Levene. Mining Association Rules
in Hypertext Databases. In Knowledge Discovery and
Data Mining, pages 149–153, 1998.
[3] S. Brin and L. Page. The anatomy of a large-scale
hypertextual Web search engine. Computer Networks
and ISDN Systems, 30(1-7):107–117, 1998.
[4] Ananiadou, S. and McNaught, J. (Editors) (2006).
Text Mining for Biology and Biomedicine. Artech
House Books. ISBN 978-1-58053-984-5
[5] Bilisoly, R. (2008). Practical Text Mining with Perl.
New York: John Wiley & Sons.
[6] Feldman, R., and Sanger, J. (2006). The Text Mining
Handbook. New York: Cambridge University Press.
ISBN 9780521836579