Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By ...
详细信息
作者:
Hao YangHaiyan WangJudith L. MacManus-DriscollQuanxi JiaJiangsu Key Laboratory of Thin Films
School of Physical Science and Technology Soochow University Suzhou 215006 China Department of Electrical and Computer Engineering Texas A&M University College Station Texas 77843-3128 USA Department of Materials Science and Metallurgy University of Cambridge Cambridge CB2 3QZ UK Materials Physics and Applications Division Los Alamos National Laboratory Los Alamos New Mexico 87545 U
In recent years, mobile phones have become very popular due to technology advances. However, unprotected personal photos and videos can easily be leaked when the phone falls into the hands of a malicious user. In this...
详细信息
Looking into the growth of information in the web it is a very tedious process of getting the exact information the user is looking for. Many search engines generate user profile related data listing. This paper invol...
详细信息
This paper presents the evolution and importance of clustering techniques. since clustering is unsupervised learning and there are many clustering methods in practice which results in which clustering scheme to be sel...
详细信息
ISBN:
(纸本)9789380430003
This paper presents the evolution and importance of clustering techniques. since clustering is unsupervised learning and there are many clustering methods in practice which results in which clustering scheme to be selected for our purpose. Here we take four clustering methodologies crisp, fuzzy rough and rough fuzzy. These clustering methods have been implemented and its importance over one another is explained. And the suitable clustering method over these three has been identified for better perspective. The experiment results with the sample dataset illustrate the importance of clustering schemes.
Due to advances of network enabled wireless devices, there is a growing trend of the use of networked and distributed mobile devices. As a result, deployment of day to day applications in MANET for information service...
详细信息
ISBN:
(纸本)9781880843826
Due to advances of network enabled wireless devices, there is a growing trend of the use of networked and distributed mobile devices. As a result, deployment of day to day applications in MANET for information services is also rapidly evolving in ad hoc mobile environments, with the growing number of mobile users. In this paper a distributed broker-based publish/subscribe mechanism for improving the reliability and scalability of the service discovery process is proposed. Nodes in MANET are constrained by limited processing power, battery power, memory etc, so there is a need to find appropriate nodes for service brokering. To select a broker for publishing services, parameters like available battery power, CPU power, memory capacity, node's mobility etc. need to be considered. A broker selection model based on the above mentioned parameters is proposed in this paper. Here, in terms of speed, unlike other mobility prediction algorithms which require devices to be GPS-enabled, mobility in the proposed algorithm is detected using frequent change in neighborhood.
Expert systems are AI's greatest commercial success. It is a research-oriented application area of AI. An expert system uses knowledge specific to a problem domain to provide "expert quality" performance...
详细信息
Rapid growth of technologies provides ample ways and mechanisms to provide information to any person about any entity. Knowing what had happened around an individual is an essential requirement in this modern web era....
详细信息
In this paper, we propose an IDML tools which can provide teachers a humanoid robot to help them for engaging teaching activities in a classroom. Teachers can use this humanoid robot as a teaching assistant for provid...
详细信息
Web mining is an application of data mining technologies for huge data repositories. Before applying web mining techniques, the data in the web log has to be pre-processed, integrated and transformed. As the World Wid...
详细信息
暂无评论