|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
March 2015 | Vol. 73 No.2 |
Title: |
AUDIO DATA AS AN ENCODING FOR COLOR QUICK RESPONSE CODE (CQR) 3D BARCODES |
Author: |
JUDE J.L. MARTINEZ |
Abstract: |
The goal of this paper is to discover and implement a method of encoding an
audio data from a MIDI audio file format into a special type of Quick Response (QR)
code 2D barcode called Color Quick Response (CQR) code which is a 2D barcode
that has been extended into a 3D barcode system. The benefit of this research
paper is; to show and explore the potential of using CQR code as a medium to
encode audio files, which open the possibility to encode audio messages into a
2D barcode. By proving that it is possible to encode an audio data into a 2D
barcode, it shows that there are unexplored potential uses for 2D barcodes other
than just for typical Audio ID Date Capture (AIDC) uses or the more current
trend mobile tagging, this research can also be a stepping stone for other
future mass media applications wherein people can embed audio messages into 2D
barcodes for mass media purposes. Utilizing 2D barcodes to encode audio data may
also have the potential to counter audio piracy. |
Keywords: |
2D barcode, Quick Response (QR) code, Auto ID Data Capture (AIDC), Audio
Encoding, Compression |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
INTEGRATED FRAMEWORK OF FEATURE SELECTION FROM MICROARRAY DATA FOR
CLASSIFICATION |
Author: |
AHMED A. ABDULWAHHAB, MAKHFUDZAH MOKHTAR (Dr.) , M. IQBAL B. SARIPAN (Assoc.
Prof Dr.) , MUHAMMAD HAFIZ B. ABU BAKAR (Dr.) |
Abstract: |
A DNA microarray has the ability to record levels of huge number of genes in one
experiment. Previous research has shown that this technology can be helpful in
the classification of cancers and their treatments outcomes. Normally, cancer
microarray data has a limited number of samples which have a tremendous amount
of genes expression levels as features. To specify relevant genes participated
in different kinds of cancer still represents a challenge. For the purpose of
extracting useful genes information from the data of cancer microarray, gene
selection algorithms were examined systematically in this study and an
integrated framework of gene selection was proposed. Using feature ranking based
on absolute value two sample t-test with pooled variance estimate evaluation
criterion combined with sequential forward feature selection, we show that the
performance of classification at least as better as published results can be
obtained on the therapy outcomes regarding breast cancer patients. Also, we
reveal that combined use of different feature selection and classification
approaches makes it feasible to select strongly relevant genes with high
confidence. |
Keywords: |
Microarray, Gene Selection, Classification, Feature Ranking, Sequential Forward
Feature Selection, Breast Cancer, Leukemia. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
NEURAL NETWORK MODEL OF ARTIFICIAL INTELLIGENCE FOR HANDWRITING RECOGNITION |
Author: |
KULIK S.D |
Abstract: |
The problem of handwritten symbols recognition has been investigated in the
paper. The main aim of this paper is to present a new neural network model (NNM)
of artificial intelligence (AI) for handwriting recognition. The handwriting
includes only Cyrillic capital and small letters of the Russian language. The
recognition system consists of two subsystems: first neural network and second
neural network. The neural networks we used for recognition of handwriting and
in particular for gender classification (man or woman). The method (neural
network technologies) has been applied successfully to design biometrical system
for Automated Factographic Information Retrieval System (AFIRS). The neural
network algorithm for handwriting recognition in AFIRS was developed. The
experimental results were obtained. Experimental test of used techniques and the
accuracy of recognition of a sex of the executor of the hand-written text
received as a result of the test are described briefly. |
Keywords: |
Neural Network Model, Handwriting Recognition, Feature Extraction,
Classification, Artificial Intelligence, Writer Verification |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE
FINANCIAL PERFORMANCE OF SMALL ENTERPRISES |
Author: |
JULIA IGOREVNA LARIONOVA, ANNA NIKOLAEVNA TIKHOMIROVA |
Abstract: |
Fluctuations in financial flows of small manufacturing enterprises often have a
certain periodicity, which is associated with the specific production of a
particular type of product. The need to take into account this fact determines
whether a company has enough competent staff to make informed decisions about
the goods production policy. In this regard, the promising areas for financial
analysts within such enterprises are the processes of forecasting and
decision-making. This article describes the existing prediction algorithms,
suitable for use on a consolidated source of data. Particular attention is paid
to the methods of decision-making, allowing for the existing knowledge of
experts to form the solutions, based solely on the logic component. According to
the considered methods agreed on the desirability of the use of joint
forecasting techniques and methods of decision-making to optimise financial
performance of a particular company as well as a group of companies close to it
in terms of key financial and economic indicators. |
Keywords: |
Financial Forecasting, Holt-Winters Method, Method Of Hierarchy Analysis, Small
Manufacturing Business. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFECTIVE FRAMEWORK TO IMPROVE THE EFFICIENCY OF SEMANTIC BASED SEARCH |
Author: |
MERLIN ANN ROY, VIGNESHWARI. S |
Abstract: |
The incredible progress in the size of data and with the great growth of the
amount of web pages, outdated search engines are not suitable and not properly
any longer. The search engine is the best significant device to determine any
information in World Wide Web. Semantic Search Engine is innate of outdated
search engine to solve the above problem. The Semantic Web is a postponement of
the existing web where data is are given in fixed meaning. Semantic web tools
have a vital role in improving web search, because it is functioning to produce
machine readable data and semantic web technologies will not exchange
traditional search engine |
Keywords: |
Semantic,Query,Keyword,Search Engine, Data,Relevant Document |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
A NEW PROPOSED DYNAMIC DUAL PROCESSOR BASED CPU SCHEDULING ALGORITHM |
Author: |
G.SIVA NAGESWARA RAO, DR.S.V.N. SRINIVASU, DR. N SRINIVASU, DR. O NAGA RAJU |
Abstract: |
Selection of appropriate CPU scheduling algorithm is important, because the OS
scheduler has to context-switch the CPU among the various tasks that an
operating system has to execute. Real time systems involve high number of
context switches. Hence, RR scheduling is not suitable, as this can result in a
few particular processes waiting in the pipeline for a long time, to get the CPU
time. This paper proposes a dual-processor based scheduling technique, called as
Dynamic Time Quantum algorithm. Here, one processor handles only
computation-intensive tasks, whereas the other processor handles only I/O tasks.
In this approach, the scheduler intelligently dispatches the process to the
appropriate processor (CPU). After the processes are dispatched to the
respective processors, the time quantum is calculated and the processes are
executed in increasing order of their burst time. Experimental Analysis had
proved that the proposed algorithm viz. Dynamic Time Quantum algorithm had
outperformed the traditional algorithm which used a single CPU. |
Keywords: |
Time Quantum, Scheduling, Round Robin , Context Switches, Waiting Time,
Turnaround Time. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
TEXTURE CLASSIFICATION USING RANDOM FORESTS AND SUPPORT VECTOR MACHINES |
Author: |
MOHAMMED M. AL SAMARRAIE, MD JAN NORDIN, GHASSAN JASIM AL-ANIZY |
Abstract: |
Texture analysis is considered fundamental and important in the fields of
pattern recognition, computer vision and image processing. Texture analysis
mainly aims to computationally represent an intuitive perception of texture and
to facilitate automatic processing of the texture information for artificial
vision systems. In this paper, we have compared between texture classification
methods based on the Random Forest (RF) and Support Vector Machine (SVM)
classifiers by using various extraction feature methods namely bi-orthogonal
wavelet transform, gray level histogram and co-occurrence matrices. Each of
these methods has used to classify the image separately at first, and they have
combined together secondly. Experiments were conducted on two different
databases. The first texture database is CUReT and the second database was
collected from Outex database. The results have revealed that, RF and SVM have
yielded higher classification precision. |
Keywords: |
Supervised Random Forest, Support Vector Machine, Feature Extraction, Texture
classification |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN INVESTIGATION OF THE SECURE DATA COMMUNICATION IN MEDICAL MOBILE APPLICATIONS |
Author: |
ASOU AMINNEZHAD , MOHD TAUFIK ABDULLAH ,POOYA KHANMOHAMADI HEZAVE |
Abstract: |
Nowadays, medical applications (apps) have become a rapidly growing and basic
tool in medical education, patient care and clinical research that are vitally
important to aware people with a health signal. Similar to other sorts of
telecommunication and Internet applications, the medical apps are vulnerable
against attackers or unauthorized interceptions. An encryption is a common way
to provide the privacy of medical application users. In this paper, we examine
ten popular medical applications and analyze the intercepted communication to
determine the encryption of captured packets and text communications based on
obtained results. |
Keywords: |
Medical Applications, Encryption, Data Communication, Mobile Interception |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
THE MODELLING OF INFORMATION DISTRIBUTION SYSTEM ON THE ANDROID-BASED: POWER
OUTAGE APPLICATION |
Author: |
AFAN GALIH SALMAN, SABLIN YUSUF, ADRIANUS, R.TANTIE K |
Abstract: |
Currently, delays in dealing with power outage by Nationl Electricity Company
(PT PLN) largely due to ineffectiveness of information distribution system in
the departement who receive complaints from customer and deliver it to the
repair team in the fields. Therefore we need such a application for distribution
of power outage information based on Android that capable of facilitating power
outage service system in receiving problem report and deliver process of power
outage evaluation which is ongoing or is done. Google Map Usage provides lots of
assistance in mapping the nearest repair team location to where area of the
power outage happened. The application is designed preceded by conducting
analysis method of user requirement including analysis of the ongoing system,
analysis of the findings of interview result as well as indentification of
information necessity and system requirements. Designing focused on the
Interface User Screen Design of mobile device and Web Admin Design. The research
has resulted in a system modelling that capable of supporting the smooth running
of distribution process of information on power outage in National Electricity
Company. |
Keywords: |
Distribution of Electricity Problem Information, Android. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
GROUP FORMATION SCHEME OF CELLS FOR BETTER SPECTRUM EFFICIENCY IN COGNITIVE
RADIO NETWORK |
Author: |
H.VENKATESH KUMAR, DR.M.N.GIRIPRASAD |
Abstract: |
A network is an interconnection of different users where different users
exchange information with each other using transmitters and receivers. When the
information are need to be transmitted automatically then in such cases
cognitive radio network is used. The transmitters in the cognitive networks are
signaled such that they can automatically detect the available channels and pass
signals through them [1]. In such a situation availability of channels plays the
important role. As channels are generally limited so they need to be shared
among the participating users. The users who own channels of their own are named
as Licensed Users (LU), and those does not own channels of their own, need to
use channels owned by the licensed users are called Unlicensed users (UU). The
existing system tells about the contents of information circulated in the
network while the proposed system is all about transferring and gathering
information in the network. The cells undergo a game called groups formation
where they switch from one group to another in search of available channels. |
Keywords: |
Cognitive radio Network, Licensed users, unlicensed users, Group formation. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
DYNAMIC TRAFFIC LIGHT CONTROL FOR INTELLIGENT MOBILITY IN SMART CITIES |
Author: |
BEN AHMED Mohamed, GHADI Abderrahim, BOUDHIR Anouar, BOUHORMA Mohammed, BEN
AHMED Kaoutar |
Abstract: |
Intelligent Mobility is the most important pillar in the approach of the smart
city because the urban road traffic is the heart of many problems in many
fields, such as economics or ecology. Therefore, the Intelligent Transportation
Systems (ITS) have emerged to best optimize the expenditure of the user on often
complex road networks. In this paper, after studying the backgrounds of such
systems, we suggest a dynamic traffic lights control through the use of
statistical multiplexing technique based on V2I in Vanets. We will see that this
architecture can be flexible within the framework of ITS and participate in low
cost to obtain interesting results.
The simulation results prove the efficiency of the dynamic automatic traffic
light control system in an urban area and the comparison of the proposed system
with other systems in the scientific literature improve the effectiveness of our
approach |
Keywords: |
Smart city, Vanet,NS2, ITS, SDTM |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
CLUSTER BASED ANONYMIZATION FOR PRIVACY PRESERVATION IN SOCIAL NETWORK DATA
COMMUNITY |
Author: |
V.VIJEYA KAVERI, Dr.V.MAHESWARI |
Abstract: |
Nowadays, social network data has been made publicly available, analyzed and
utilized in one way or another. Since, social network data are publically
available it leads to an important issue in Privacy preserving. This paper
explores the existing anonymization techniques for privacy preserving publishing
of social network data. The problem formulation is done by considering privacy,
data utility and knowledge as dimensions in this paper. This paper describes
about clustering- based anonymization methods for privacy preservation . |
Keywords: |
Online Social Networks (OSN) , Privacy Preserving, Anonymization, Clustering. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
EMPIRICAL EVALUATION OF COMPLEXITY METRICS FOR COMPONENT BASED SYSTEMS |
Author: |
MWALILI TOBIAS, WAWERU MWANGI, KIMWELE MICHAEL |
Abstract: |
Reuse-based software engineering is gaining currency as an approach for
constructing software applications that are based on existing software
components. Factors that have contributed to increased reliance on software
components include increased dependability, reduced process risk, standards
compliance and reduced time to market. Software components are usually delivered
and handled as “black boxes,” which tremendously increases risks associated
component integration, system testing and deployment. Due to these risks,
metrics for evaluating the quality of component-based systems must be developed
and validated. In this work, we analyze the Interface Complexity Metric for
JavaBeans components and propose an enhanced metric. We also perform validation
of the proposed metric and make recommendations for future research work. |
Keywords: |
CBSD, Component complexity, Complexity metrics, Software complexity, Quality
metrics |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
IS THERE A CORRELATION BETWEEN ERP IMPLEMENTATION, ADHERENCE TO COSO AND GCG
IMPLEMENTATION? |
Author: |
JULISAR, HARJANTO PRABOWO, JAP TJI BENG, SUKRISNO AGOES |
Abstract: |
The objective of this study is to make a conceptual framework the correlation of
ERP implementation, adherence to COSO, and GCG implementation. Based on
literature review, that it needs a paradigm the application of ERP is a business
project. Business project requires the attention of stakeholders, such as
management, information systems professionals, line workers, consultants, and
trading partners. In the development phase of the ERP system is a project, there
must be control. Control is done so that the system is made to achieve the goals
and objectives that have been set previously. Control is done by implementing an
internal control guided by COSO. This research is still a literature study, so
that the concept written here is still a conceptual framework which has to be
tested empirically. |
Keywords: |
ERP Implementation, Adherence To COSO, GCG Implementation |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
BAYESIAN ESTIMATION FOR ASSESSMENT BASED LEARNING ICT |
Author: |
J. ALVAREZ-CEDILLO, J. HERRERA-LOZADA, J. SANDOVAL-GUTIERREZ, , M.
OLGUIN-CARBAJAL, M. HERNANDEZ-BOLAÑOS, I.L RIVERA-ZARATE,
T. ALVAREZ-SANCHEZ, AND R. CADENA-MARTINEZ |
Abstract: |
Incorporating Information Technology and Communication (ICT) in education
improves the level with sophisticated tools to increase a competence system in
education. Bayes theorem is valid in all applications of the probability theory.
In essence, the followers of traditional statistical probabilities only support
repeatable experiments and have empirical confirmation while so-called Bayesian
statistics allow subjective probabilities. The theorem can then serve to
indicate how our subjective probabilities should be modified when receiving
additional information from an experiment. Bayesian statistics prove their
utility in certain estimates based on the subjective prior knowledge and reviews
these estimates based on the empirical evidence. This feature is opening up new
ways of understanding. This situation has had a strong tendency envisioned by
offering new interpersonal communication systems worldwide and obtains and
provides information of all kinds, instantaneously. This paper shows the tests
performed in a study to measure learning under a Bayesian approach. |
Keywords: |
Information Technology and Communication, Bayesian statistics, Bayesian
algorithms, Learning, Education. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
EFFECTIVE EXTRACTION OF SEMANTIC CONTENT IN VIDEOS USING META-ONTOLOGY |
Author: |
K.PRIYA |
Abstract: |
The growth of using videos in different areas like surveillance cameras,
Intruder detection, sports, news, etc., increases the research on utilizing
these videos. Unauthorized persons, thefts and malpractices are detected by
these videos. Large volumes of recorded data through these cameras are stored
but not utilized or processed. Tracking of an objects and extraction of features
from videos are done through several methods. The events and objects can
difficult to detect in populated area. Semantic Content Extraction (SCE) was
proposed to extracting objects and events along with their relations using
ontology. Ontology construction for these videos gives spatial, temporal and
topological relations between different video frames. This results the events or
actions performed in the video which intends to give semantic content from the
video. |
Keywords: |
Semantic content, Ontology, Spatial Relations, Temporal Relations,
Topological Relations, Event Extraction |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
DEVELOP PRACTICAL METHODS OF KNOWLEDGE MEASUREMENT IN UNIVERSITIES |
Author: |
ALI TAHA Al-OQAILY, ZAINUDDIN BIN HASSAN, AHMAD ABEDAL-HAYY AL-DALA’IEN,
ABDULLAH MOHAMMED RASHID |
Abstract: |
The organizations of various fields such as industry and education looking for
manage their knowledge resources in order to provide efficient products
performance. The knowledge measurement is one from the most important success
factors of knowledge management implementations. The dynamic changes of
businesses environments and knowledge levels maximize the difficulty of measure
the efficiency levels of tacit and explicit knowledge. The academic staff in
universities face challenges in retrieve the efficient explicit knowledge i.e.
articles that compatible with their tacit levels in order to develop their tacit
value to support their teaching and researching activities. The main aim of this
research is to develop practical methods to match between the explicit and tacit
knowledge levels inside universities environments in order to retrieve the
suitable explicit knowledge that satisfy the employees needs of knowledge based
on their tacit levels. This research data collected supporting qualitative data
collecting method using interview with four experts of knowledge management. The
knowledge measurement practical specifications and mathematic equations
developed based on the collected data to provide the matching between the tacit
levels of academic staff and retrieved explicit knowledge levels inside
universities environments. |
Keywords: |
Knowledge management, knowledge measurement, knowledge matching, success
factors, universities environments. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
A FRAMEWORK FOR ONTOLOGY BASED LINK ANALYSIS FOR WEB MINING |
Author: |
S.MONISHA, S.VIGNESHWARI |
Abstract: |
User defined keyword search have limitation in their results and deliverance
based on first indications. They face a challenge against social media analysis.
Searches based on user defined keyword results in poor quality and consumes more
time. All relevant and irrelevant information present in a link becomes
difficult for the users to extract. So, ontology is used for effective
monitoring analysis. The main challenge is to create domain-specific ontology in
social media analysis. The earlier heuristic algorithm, HITS(Hyperlink Induced
Topic Search) was proposed for analyzing authority and hubs of pages, but since
each site had extra hyperlinks like navigation panels, HITS failed in providing
good precision.To overcome this difficulty, LAMIS(Link Analysis on Mining Web
Informative Structures). LAMIS uses information entropy to give a higher
precision from 133% to 232% and recall gets improved between 0.5 and 1 while
retrieving the documents form online social media. |
Keywords: |
Ontology, Leads,Web- mining,LAMIS, Customer Relationship Management. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
HYBRID GENETIC ALGORITHM AND GREEDY RANDOMIZED ADAPTIVE SEARCH PROCEDURE FOR
SOLVING A NURSE SCHEDULING PROBLEM |
Author: |
CHEBIHI FAYCAL, MOHAMMED ESSAID RIFFI, BELAID AHIOD |
Abstract: |
In this research, we will address a new hybrid approach to solve a Nurse
Scheduling Problem (NSP) at a hospital. This is an NP-hard scheduling problem as
it aims to find a satisfactory schedule for nurses, while taking into account a
variety of interfering objectives between hospital constraints and nurse
preferences. Although classical genetic algorithms (GAs) have been successfully
used for similar problems, the main objective of this research is to investigate
a new combined method between GA and Greedy Randomized Adaptive Search Procedure
(GRASP) to significant better result, not only compared to a classical genetic
algorithm but also to all other metaheuristic methods. This study is based on a
real benchmark dataset and a multi-objective programming model with binary
variables, while the objective function is represented by a vector of soft
constraints. |
Keywords: |
Nurse Scheduling Problem, NP-hard, genetic algorithms, Greedy Randomized
Adaptive Search, Metaheuristics |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT AND NOVEL APPROACH FOR WEB SEARCH PERSONALIZATION USING WEB USAGE
MINING |
Author: |
KRISHNAKANT P. ADHIYA, SATISH R. KOLHE |
Abstract: |
Generally each user has a different background and different needs when he/she
searches for any information on the web. For the same query issued by different
users, most of the search engines return the same results to all users, without
considering the individuals need. This problem is solved using personalized web
search. In this paper, we propose the architecture for web search
personalization using web usage mining without user’s explicit feedback. The
proposed architecture uses an efficient sequential access pattern mining
algorithm based on CSB-mine algorithm, a new approach for sessionization and
modified user profile. The proposed mining algorithm does not generate any
costlier tree and it avoids construction of projected database at any stage. Our
experimental results on synthetic data set show that proposed algorithm performs
better than the CSB-mine algorithm in terms of run time and average memory
usage. Then experiments are carried out on proxy server logs for personalized
recommendations, using the proposed architecture. The experimental results
indicate that the system generates accurate sequential access patterns and
improved recommendation of web pages. |
Keywords: |
Web Search Personalization, Web Usage Mining, Sequential Access Pattern. |
Source: |
Journal of Theoretical and Applied Information Technology
20th March 2015 -- Vol. 73. No. 2 -- 2015 |
Full
Text |
|
|
|