Academic literature on the topic 'Usage pattern mining'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Usage pattern mining.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Usage pattern mining"

1

Patel, Ketul, and Dr A. R. Patel. "Process of Web Usage Mining to find Interesting Patterns from Web Usage Data." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 144–48. http://dx.doi.org/10.24297/ijct.v3i1c.2767.

Full text
Abstract:
The traffic on World Wide Web is increasing rapidly and huge amount of data is generated due to users’ numerous interactions with web sites. Web Usage Mining is the application of data mining techniques to discover the useful and interesting patterns from web usage data. It supports to know frequently accessed pages, predict user navigation, improve web site structure etc. In order to apply Web Usage Mining, various steps are performed. This paper discusses the process of Web Usage Mining consisting steps: Data Collection, Pre-processing, Pattern Discovery and Pattern Analysis. It has also presented Web Usage Mining applications and some Web Mining software.
APA, Harvard, Vancouver, ISO, and other styles
2

Handamari, Endang Wahyu. "Usage Pattern Exploration of Effective Contraception Tool." Journal of Research in Mathematics Trends and Technology 1, no. 1 (February 7, 2019): 1–6. http://dx.doi.org/10.32734/jormtt.v1i1.750.

Full text
Abstract:
Determination of methods or contraception tool used by acceptors to support the Family Planning (“Keluarga Berencana”) is a problematic. In choosing methods or contraception tool, the acceptor must consider several factors, namely health factor, partner factor, and contraceptive method. Each method or contraception tool which is used has its advantages or disadvantages. Although it has been considering the advantages and disadvantages, it is still difficult to control fertility safely and effectively. Consequently acceptor change the method or a contraception tool that is used more than once. In order acceptors get the appropriate contraception tool then the patterns of changing in the usage of effective methods or contraception tool is determined. One of the methods that can be used to look for the patterns of changing in the usage of contraception tool is data mining. Data mining is an interesting pattern extraction of large amounts of data. A pattern is said to be interesting if the pattern is not trivial, implicit, previously unknown, and useful. The patterns presented should be easy to understand, can be applied to data that will be predicted with a certain degree, useful, and new. The early stage before applying data mining is using k nearest neighbors algorithm to determine the factors shortest distance selecting the contraception tool. The next step is applying data mining to usage changing data of method or contraception tool of family planning acceptors which is expected to dig up information related to acceptor behavior pattern in using the method or contraception tool. Furthermore, from the formed pattern, it can be used in decision making regarding the usage of effective contraception tool. The results obtained from this research is the k nearest neighbors by using the Euclidean distance can be used to determine the similarity of attributes owned by the acceptors of Family Planning to the training data is already available. Based on available training data, it can be determined the usage pattern of contraceptiion tool with the concept of data mining, where the acceptors of Family Planning are given a recommendation if the pattern is on the training data pattern. Conversely, if the pattern is none match, then the system does not provide recommendations of contraception tool which should be used.
APA, Harvard, Vancouver, ISO, and other styles
3

Et. al., V. Aruna,. "A Review on Design and Development Of Sequential Patterns Algorithms In Web Usage Mining." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1634–39. http://dx.doi.org/10.17762/turcomat.v12i2.1448.

Full text
Abstract:
In the recent years with the advancement in technology, a lot of information is available in different formats and extracting the knowledge from that data has become a very difficult task. Due to the vast amount of information available on the web, users are finding it difficult to extract relevant information or create new knowledge using information available on the web. To solve this problem Web mining techniques are used to discover the interesting patterns from the hidden data .Web Usage Mining (WUM), which is one of the subset of Web Mining helps in extracting the hidden knowledge present in the Web log files , in recognizing various interests of web users and also in discovering customer behaviours. Web Usage mining includes different phases of data mining techniques called Data Pre-processing, Pattern Discovery & Pattern Analysis. This paper presents an updated focused survey on various sequential pattern mining algorithms like apriori-based algorithm , Breadth First Search-based strategy, Depth First Search strategy, sequential closed-pattern algorithm and Incremental pattern mining algorithm which are used in Pattern Discovery Phase of WUM. At last , a comparison is done based on the important key features present in these algorithms. This study gives us better understanding of the approaches of sequential pattern mining.
APA, Harvard, Vancouver, ISO, and other styles
4

Raman, Gokulapriya, and Ganesh Raj. "Mutual Information Pre-processing Based Broken-stick Linear Regression Technique for Web User Behaviour Pattern Mining." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 244–56. http://dx.doi.org/10.22266/ijies2021.0228.24.

Full text
Abstract:
Web usage behaviour mining is a substantial research problem to be resolved as it identifies different user’s behaviour pattern by analysing web log files. But, accuracy of finding the usage behaviour of users frequently accessed web patterns was limited and also it requires more time. Mutual Information Pre-processing based Broken-Stick Linear Regression (MIP-BSLR) technique is proposed for refining the performance of web user behaviour pattern mining with higher accuracy. Initially, web log files from Apache web log dataset and NASA dataset are considered as input. Then, Mutual Information based Pre-processing (MI-P) method is applied to compute mutual dependence between the two web patterns. Based on the computed value, web access patterns which relevant are taken for further processing and irrelevant patterns are removed. After that, Broken-Stick Linear Regression analysis (BLRA) is performed in MIPBSLR for Web User Behaviour analysis. By applying the BLRA, the frequently visited web patterns are identified. With the identification of frequently visited web patterns, MIP-BSLR technique exactly predicts the usage behaviour of web users, and also increases the performance of web usage behaviour mining. Experimental evaluation of MIPBSLR method is conducted on factors such as pattern mining accuracy, false positives, time requirements and space requirements with respect to number of web patterns. Outcomes show that the proposed technique improves the pattern mining accuracy by 14%, and reduces the false positive rate by 52%, time requirement by 19% and space complexity by 21% using Apache web log dataset as compared to conventional methods. Similarly, the pattern mining accuracy of NASA dataset is increased by 16% with the reduction of false positive rate by 47%, time requirement by 20% and space complexity by 22% as compared to conventional methods.
APA, Harvard, Vancouver, ISO, and other styles
5

Yun, Unil, Gwangbum Pyun, and Eunchul Yoon. "Efficient Mining of Robust Closed Weighted Sequential Patterns Without Information Loss." International Journal on Artificial Intelligence Tools 24, no. 01 (February 2015): 1550007. http://dx.doi.org/10.1142/s0218213015500074.

Full text
Abstract:
Sequential pattern mining has become one of the most important topics in data mining. It has broad applications such as analyzing customer purchase data, Web access patterns, network traffic data, DNA sequencing, and so on. Previous studies have concentrated on reducing redundant patterns among the sequential patterns, and on finding meaningful patterns from huge datasets. In sequential pattern mining, closed sequential pattern mining and weighted sequential pattern mining are the two main approaches to perform mining tasks. This is because closed sequential pattern mining finds representative sequential patterns which show exactly the same knowledge as the complete set of frequent sequential patterns, and weight-based sequential pattern mining discovers important sequential patterns by considering the importance of each sequential pattern. In this paper, we study the problem of mining robust closed weighted sequential patterns by integrating two paradigms from large sequence databases. We first show that the joining order between the weight constraints and the closure property in sequential pattern mining leads to different sets of results. From our analysis of joining orders, we suggest robust closed weighted sequential pattern mining without information loss, and present how to discover representative important sequential patterns without information loss. Through performance tests, we show that our approach gives high performance in terms of efficiency, effectiveness, memory usage, and scalability.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Yu Ke, and Tai Xiang Zhao. "Association Rule Mining Based on Multidimensional Pattern Relations." Advanced Materials Research 918 (April 2014): 243–45. http://dx.doi.org/10.4028/www.scientific.net/amr.918.243.

Full text
Abstract:
Most incremental mining and online mining algorithms concentrate on finding association rules or patterns consistent with entire current sets of data. Users cannot easily obtain results from only interesting portion of data. This may prevent the usage of mining from online decision support for multidimensional data. To provide adhoc, query driven, and online mining support, we first propose a relation called the multidimensional pattern relation to structurally and systematically store context and mining information for later analysis.
APA, Harvard, Vancouver, ISO, and other styles
7

Saied, Mohamed Aymen, Ali Ouni, Houari Sahraoui, Raula Gaikovina Kula, Katsuro Inoue, and David Lo. "Improving reusability of software libraries through usage pattern mining." Journal of Systems and Software 145 (November 2018): 164–79. http://dx.doi.org/10.1016/j.jss.2018.08.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krishna, J., and M. Haritha. "An Efficient Closed Maximal Pattern Sequences Mining on High Dimensional Datasets." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 50–53. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2088.

Full text
Abstract:
Previous methods have presented convincing arguments that mining complete set of patterns is huge for effective usage. A compact but high quality set of patterns, such as closed patterns and maximal patterns is needed. Most of the previously maximal pattern sequences mining algorithms on high dimensional sequence, such as biological data set, work under the same support. In this paper, an efficient algorithm Closed Maximal Pattern Sequences (CMPS-Mine) for mining closed maximal patterns based on multi-support is suggested. Careful exhibitions once Beta-globin gene sequences have exhibited that CMPS-Mine expends less memory utilization and run time over Prefix Span. It generates compacted outcomes and two kinds of interesting patterns.
APA, Harvard, Vancouver, ISO, and other styles
9

PADMAKUMAR, SUJATHA, Dr PUNITHAVALLI Dr.PUNITHAVALLI, and Dr RANJITH Dr.RANJITH. "A Web Usage Mining Approach to User Navigation Pattern and Prediction in Web Log Data." International Journal of Scientific Research 3, no. 4 (June 1, 2012): 92–94. http://dx.doi.org/10.15373/22778179/apr2014/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Djenouri, Youcef, Jerry Chun-Wei Lin, Kjetil Nørvåg, Heri Ramampiaro, and Philip S. Yu. "Exploring Decomposition for Solving Pattern Mining Problems." ACM Transactions on Management Information Systems 12, no. 2 (June 2021): 1–36. http://dx.doi.org/10.1145/3439771.

Full text
Abstract:
This article introduces a highly efficient pattern mining technique called Clustering-based Pattern Mining (CBPM). This technique discovers relevant patterns by studying the correlation between transactions in the transaction database based on clustering techniques. The set of transactions is first clustered, such that highly correlated transactions are grouped together. Next, we derive the relevant patterns by applying a pattern mining algorithm to each cluster. We present two different pattern mining algorithms, one applying an approximation-based strategy and another based on an exact strategy. The approximation-based strategy takes into account only the clusters, whereas the exact strategy takes into account both clusters and shared items between clusters. To boost the performance of the CBPM, a GPU-based implementation is investigated. To evaluate the CBPM framework, we perform extensive experiments on several pattern mining problems. The results from the experimental evaluation show that the CBPM provides a reduction in both the runtime and memory usage. Also, CBPM based on the approximate strategy provides good accuracy, demonstrating its effectiveness and feasibility. Our GPU implementation achieves significant speedup of up to 552× on a single GPU using big transaction databases.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Usage pattern mining"

1

Alshehri, Abdullah. "Keyboard usage recognition : a study in pattern mining and prediction in the context of impersonation." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3022436/.

Full text
Abstract:
The research presented in this thesis is directed at an investigation into the use of keystroke dynamics (typing patterns) for the purpose of impersonation detection, especially in the context of online assessments. More specifically, the aim was to research the nature of time series analysis approaches for the purpose of continuous user authentication. The research question to be answered was "Is it possible to continuously authenticate individuals, according to their keyboard usage patterns; and if so what are the most appropriate mechanisms for achieving this?". The main contribution of the thesis is a collection of three time series analysis approaches to continuous user authentication using keystroke dynamics: (i) Once-only Keystroke Continuous Authentication (OKCA), (ii) Iterative Keystroke Continuous Authentication (IKCA) and (iii) Keystroke Continuous Authentication based Spectral Analysis (KCASA). The OKCA approach was a benchmark, proof-of-concept, approach applicable in the static (as opposed to the continuous) context, and directed at establishing the veracity of the time series approach. The IKCA system was the first of two proposed continuous iterative authentication approaches. The IKCA approach was founded on the OKCA approach. A particular novel aspect of the operation of the IKCA approach was that it used the concept of a bespoke similarity threshold. The KCASA approach was then an improvement on the IKCA approach that operated in the spectral domain rather than the temporal domain used in the case of the OKCA, and IKCA approaches. Two spectral transformations were considered: (i) the Discrete Fourier Transform (DFT) and (ii) the Discrete Wavelet Transform (DWT). All three of the proposed approaches used Dynamic Time Warping (DTW) as the time series similarity determination mechanism because this offered advantages over the more standard Euclidean distance similarity measurement. The systems were evaluated using a dataset collated by the author, and two further datasets taken from the literature. Both Univariate and Multivariate Keystroke Time Series (U-KTS and M-KTS) were considered. The evaluation was conducted to compare the operation of the proposed approaches and to compare the operation of the proposed approaches with the established feature vector-based approach from the literature. All the proposed time series-based approaches were found to be more accurate than the feature vector-based approach. The most accurate of the three proposed time seriesbased approaches was found to be the KCASA approach. More specifically, KCASA with DWT coupled with M-KTS. However, DFT was found to be more efficient in terms of run-time complixity.
APA, Harvard, Vancouver, ISO, and other styles
2

Tanasa, Doru. "Web usage mining : contributions to intersites logs preprocessing and sequential pattern extraction with low support." Nice, 2005. http://www.theses.fr/2005NICE4019.

Full text
Abstract:
Le Web Usage Mining (WUM), domaine de recherche assez récent, correspond au processus d’extraction des connaissances à partir des données (ECD) appliquées aux données d’usage sur le Web. Il comporte trois étapes principales : le prétraitement des données, la découverte des schémas et l’analyse des résultats. La quantité des données d’usage à analyser ainsi que leur faible qualité (en particulier l’absence de structuration) sont les principaux problèmes en WUM. Les algorithmes classiques de fouille de données appliquées sur ces données donnent généralement des résultats décevants en termes de pratiques des internautes. Dans cette thèse, nous apportons deux contributions importantes pour un processus WUM, implémentées dans notre boîte à outils Axislogminer. D’abord, nous proposons une méthodologie générale de prétraitement des logs Web dont l’originalité consiste dans le fait qu’elle prend en compte l’aspect multi-sites du WUM. Nous proposons dans notre méthodologie quatre étapes distinctes : la fusion des fichiers logs, le nettoyage, la structuration et l’agrégation des données. Notre deuxième contribution vise à la découverte à partir d’un fichier log prétraité de grande taille, des comportements minoritaires correspondant à des motifs séquentiels de très faible support. Pour cela, nous proposons une méthodologie générale visant à diviser le fichier log prétraité en sous-logs, se déclinant selon trois approches d’extraction de motifs séquentiels au support faible (séquentielle, itérative et hiérarchique). Celles-ci ont été implémentées dans des méthodes concrètes hybrides mettant en jeu des algorithmes de classification et d’extraction de motifs séquentiels
The Web use mining (WUM) is a rather research field and it corresponds to the process of knowledge discovery from databases (KDD) applied to the Web usage data. It comprises three main stages : the pre-processing of raw data, the discovery of schemas and the analysis (or interpretation) of results. The quantity of the web usage data to be analysed and its low quality (in particular the absence of structure) are the principal problems in WUM. When applied to these data, the classic algorithms of data mining, generally, give disappointing results in terms of behaviours of the Web sites users (E. G. Obvious sequential patterns, stripped of interest). In this thesis, we bring two significant contributions for a WUM process, both implemented in our toolbox, the Axislogminer. First, we propose a complete methodology for pre-processing the Web logs whose originality consists in its intersites aspect. We propose in our methodology four distinct steps : the data fusion, data cleaning, data structuration and data summarization. Our second contribution aims at discovering from a large pre-processed log file the minority behaviours corresponding to the sequential patterns with low support. For that, we propose a general methodology aiming at dividing the pre-processed log file into a series of sub-logs. Based on this methodology, we designed three approaches for extracting sequential patterns with low support (the sequential, iterative and hierarchical approaches). These approaches we implemented in hybrid concrete methods using algorithms of clustering and sequential pattern mining
APA, Harvard, Vancouver, ISO, and other styles
3

Adam, Chloé. "Pattern Recognition in the Usage Sequences of Medical Apps." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC027/document.

Full text
Abstract:
Les radiologues utilisent au quotidien des solutions d'imagerie médicale pour le diagnostic. L'amélioration de l'expérience utilisateur est toujours un axe majeur de l'effort continu visant à améliorer la qualité globale et l'ergonomie des produits logiciels. Les applications de monitoring permettent en particulier d'enregistrer les actions successives effectuées par les utilisateurs dans l'interface du logiciel. Ces interactions peuvent être représentées sous forme de séquences d'actions. Sur la base de ces données, ce travail traite de deux sujets industriels : les pannes logicielles et l'ergonomie des logiciels. Ces deux thèmes impliquent d'une part la compréhension des modes d'utilisation, et d'autre part le développement d'outils de prédiction permettant soit d'anticiper les pannes, soit d'adapter dynamiquement l'interface logicielle en fonction des besoins des utilisateurs. Tout d'abord, nous visons à identifier les origines des crashes du logiciel qui sont essentielles afin de pouvoir les corriger. Pour ce faire, nous proposons d'utiliser un test binomial afin de déterminer quel type de pattern est le plus approprié pour représenter les signatures de crash. L'amélioration de l'expérience utilisateur par la personnalisation et l'adaptation des systèmes aux besoins spécifiques de l'utilisateur exige une très bonne connaissance de la façon dont les utilisateurs utilisent le logiciel. Afin de mettre en évidence les tendances d'utilisation, nous proposons de regrouper les sessions similaires. Nous comparons trois types de représentation de session dans différents algorithmes de clustering. La deuxième contribution de cette thèse concerne le suivi dynamique de l'utilisation du logiciel. Nous proposons deux méthodes -- basées sur des représentations différentes des actions d'entrée -- pour répondre à deux problématiques industrielles distinctes : la prédiction de la prochaine action et la détection du risque de crash logiciel. Les deux méthodologies tirent parti de la structure récurrente des réseaux LSTM pour capturer les dépendances entre nos données séquentielles ainsi que leur capacité à traiter potentiellement différents types de représentations d'entrée pour les mêmes données
Radiologists use medical imaging solutions on a daily basis for diagnosis. Improving user experience is a major line of the continuous effort to enhance the global quality and usability of software products. Monitoring applications enable to record the evolution of various software and system parameters during their use and in particular the successive actions performed by the users in the software interface. These interactions may be represented as sequences of actions. Based on this data, this work deals with two industrial topics: software crashes and software usability. Both topics imply on one hand understanding the patterns of use, and on the other developing prediction tools either to anticipate crashes or to dynamically adapt software interface according to users' needs. First, we aim at identifying crash root causes. It is essential in order to fix the original defects. For this purpose, we propose to use a binomial test to determine which type of patterns is the most appropriate to represent crash signatures. The improvement of software usability through customization and adaptation of systems to each user's specific needs requires a very good knowledge of how users use the software. In order to highlight the trends of use, we propose to group similar sessions into clusters. We compare 3 session representations as inputs of different clustering algorithms. The second contribution of our thesis concerns the dynamical monitoring of software use. We propose two methods -- based on different representations of input actions -- to address two distinct industrial issues: next action prediction and software crash risk detection. Both methodologies take advantage of the recurrent structure of LSTM neural networks to capture dependencies among our sequential data as well as their capacity to potentially handle different types of input representations for the same data
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Shailendra. "Smart Meters Big Data : Behavioral Analytics via Incremental Data Mining and Visualization." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35244.

Full text
Abstract:
The big data framework applied to smart meters offers an exception platform for data-driven forecasting and decision making to achieve sustainable energy efficiency. Buying-in consumer confidence through respecting occupants' energy consumption behavior and preferences towards improved participation in various energy programs is imperative but difficult to obtain. The key elements for understanding and predicting household energy consumption are activities occupants perform, appliances and the times that appliances are used, and inter-appliance dependencies. This information can be extracted from the context rich big data from smart meters, although this is challenging because: (1) it is not trivial to mine complex interdependencies between appliances from multiple concurrent data streams; (2) it is difficult to derive accurate relationships between interval based events, where multiple appliance usage persist; (3) continuous generation of the energy consumption data can trigger changes in appliance associations with time and appliances. To overcome these challenges, we propose an unsupervised progressive incremental data mining technique using frequent pattern mining (appliance-appliance associations) and cluster analysis (appliance-time associations) coupled with a Bayesian network based prediction model. The proposed technique addresses the need to analyze temporal energy consumption patterns at the appliance level, which directly reflect consumers' behaviors and provide a basis for generalizing household energy models. Extensive experiments were performed on the model with real-world datasets and strong associations were discovered. The accuracy of the proposed model for predicting multiple appliances usage outperformed support vector machine during every stage while attaining accuracy of 81.65\%, 85.90\%, 89.58\% for 25\%, 50\% and 75\% of the training dataset size respectively. Moreover, accuracy results of 81.89\%, 75.88\%, 79.23\%, 74.74\%, and 72.81\% were obtained for short-term (hours), and long-term (day, week, month, and season) energy consumption forecasts, respectively.
APA, Harvard, Vancouver, ISO, and other styles
5

Soztutar, Enis. "Mining Frequent Semantic Event Patterns." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611007/index.pdf.

Full text
Abstract:
Especially with the wide use of dynamic page generation, and richer user interaction in Web, traditional web usage mining methods, which are based on the pageview concept are of limited usability. For overcoming the difficulty of capturing usage behaviour, we define the concept of semantic events. Conceptually, events are higher level actions of a user in a web site, that are technically independent of pageviews. Events are modelled as objects in the domain of the web site, with associated properties. A sample event from a video web site is the '
play video event'
with properties '
video'
, '
length of video'
, '
name of video'
, etc. When the event objects belong to the domain model of the web site'
s ontology, they are referred as semantic events. In this work, we propose a new algorithm and associated framework for mining patterns of semantic events from the usage logs. We present a method for tracking and logging domain-level events of a web site, adding semantic information to events, an ordering of events in respect to the genericity of the event, and an algorithm for computing sequences of frequent events.
APA, Harvard, Vancouver, ISO, and other styles
6

Özakar, Belgin Püskülcü Halis. "Finding And Evaluating Patterns In Wes Repository Using Database Technology And Data Mining Algorithms/." [s.l.]: [s.n.], 2002. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000130.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Hoang Viet Tuan. "Prise en compte de la qualité des données lors de l’extraction et de la sélection d’évolutions dans les séries temporelles de champs de déplacements en imagerie satellitaire." Thesis, Université Grenoble Alpes (ComUE), 2018. http://www.theses.fr/2018GREAA011.

Full text
Abstract:
Ce travail de thèse traite de la découverte de connaissances à partir de Séries Temporelles de Champs de Déplacements (STCD) obtenues par imagerie satellitaire. De telles séries occupent aujourd'hui une place centrale dans l'étude et la surveillance de phénomènes naturels tels que les tremblements de terre, les éruptions volcaniques ou bien encore le déplacement des glaciers. En effet, ces séries sont riches d'informations à la fois spatiales et temporelles et peuvent aujourd'hui être produites régulièrement à moindre coût grâce à des programmes spatiaux tels que le programme européen Copernicus et ses satellites phares Sentinel. Nos propositions s'appuient sur l'extraction de motifs Séquentiels Fréquents Groupés (SFG). Ces motifs, à l'origine définis pour l'extraction de connaissances à partir des Séries Temporelles d’Images Satellitaires (STIS), ont montré leur potentiel dans de premiers travaux visant à dépouiller une STCD. Néanmoins, ils ne permettent pas d'utiliser les indices de confiance intrinsèques aux STCD et la méthode de swap randomisation employée pour sélectionner les motifs les plus prometteurs ne tient pas compte de leurs complémentarités spatiotemporelles, chaque motif étant évalué individuellement. Notre contribution est ainsi double. Une première proposition vise tout d'abord à associer une mesure de fiabilité à chaque motif en utilisant les indices de confiance. Cette mesure permet de sélectionner les motifs portés par des données qui sont en moyenne suffisamment fiables. Nous proposons un algorithme correspondant pour réaliser les extractions sous contrainte de fiabilité. Celui-ci s'appuie notamment sur une recherche efficace des occurrences les plus fiables par programmation dynamique et sur un élagage de l'espace de recherche grâce à une stratégie de push partiel, ce qui permet de considérer des STCD conséquentes. Cette nouvelle méthode a été implémentée sur la base du prototype existant SITS-P2miner, développé au sein du LISTIC et du LIRIS pour extraire et classer des motifs SFG. Une deuxième contribution visant à sélectionner les motifs les plus prometteurs est également présentée. Celle-ci, basée sur un critère informationnel, permet de prendre en compte à la fois les indices de confiance et la façon dont les motifs se complètent spatialement et temporellement. Pour ce faire, les indices de confiance sont interprétés comme des probabilités, et les STCD comme des bases de données probabilistes dont les distributions ne sont que partielles. Le gain informationnel associé à un motif est alors défini en fonction de la capacité de ses occurrences à compléter/affiner les distributions caractérisant les données. Sur cette base, une heuristique est proposée afin de sélectionner des motifs informatifs et complémentaires. Cette méthode permet de fournir un ensemble de motifs faiblement redondants et donc plus faciles à interpréter que ceux fournis par swap randomisation. Elle a été implémentée au sein d'un prototype dédié. Les deux propositions sont évaluées à la fois quantitativement et qualitativement en utilisant une STCD de référence couvrant des glaciers du Groenland construite à partir de données optiques Landsat. Une autre STCD que nous avons construite à partir de données radar TerraSAR-X couvrant le massif du Mont-Blanc est également utilisée. Outre le fait d'être construites à partir de données et de techniques de télédétection différentes, ces séries se différencient drastiquement en termes d'indices de confiance, la série couvrant le massif du Mont-Blanc se situant à des niveaux de confiance très faibles. Pour les deux STCD, les méthodes proposées ont été mises en œuvre dans des conditions standards au niveau consommation de ressources (temps, espace), et les connaissances des experts sur les zones étudiées ont été confirmées et complétées
This PhD thesis deals with knowledge discovery from Displacement Field Time Series (DFTS) obtained by satellite imagery. Such series now occupy a central place in the study and monitoring of natural phenomena such as earthquakes, volcanic eruptions and glacier displacements. These series are indeed rich in both spatial and temporal information and can now be produced regularly at a lower cost thanks to spatial programs such as the European Copernicus program and its famous Sentinel satellites. Our proposals are based on the extraction of grouped frequent sequential patterns. These patterns, originally defined for the extraction of knowledge from Satellite Image Time Series (SITS), have shown their potential in early work to analyze a DFTS. Nevertheless, they cannot use the confidence indices coming along with DFTS and the swap method used to select the most promising patterns does not take into account their spatiotemporal complementarities, each pattern being evaluated individually. Our contribution is thus double. A first proposal aims to associate a measure of reliability with each pattern by using the confidence indices. This measure allows to select patterns having occurrences in the data that are on average sufficiently reliable. We propose a corresponding constraint-based extraction algorithm. It relies on an efficient search of the most reliable occurrences by dynamic programming and on a pruning of the search space provided by a partial push strategy. This new method has been implemented on the basis of the existing prototype SITS-P2miner, developed by the LISTIC and LIRIS laboratories to extract and rank grouped frequent sequential patterns. A second contribution for the selection of the most promising patterns is also made. This one, based on an informational criterion, makes it possible to take into account at the same time the confidence indices and the way the patterns complement each other spatially and temporally. For this aim, the confidence indices are interpreted as probabilities, and the DFTS are seen as probabilistic databases whose distributions are only partial. The informational gain associated with a pattern is then defined according to the ability of its occurrences to complete/refine the distributions characterizing the data. On this basis, a heuristic is proposed to select informative and complementary patterns. This method provides a set of weakly redundant patterns and therefore easier to interpret than those provided by swap randomization. It has been implemented in a dedicated prototype. Both proposals are evaluated quantitatively and qualitatively using a reference DFTS covering Greenland glaciers constructed from Landsat optical data. Another DFTS that we built from TerraSAR-X radar data covering the Mont-Blanc massif is also used. In addition to being constructed from different data and remote sensing techniques, these series differ drastically in terms of confidence indices, the series covering the Mont-Blanc massif being at very low levels of confidence. In both cases, the proposed methods operate under standard conditions of resource consumption (time, space), and experts’ knowledge of the studied areas is confirmed and completed
APA, Harvard, Vancouver, ISO, and other styles
8

Vollino, Bruno Winiemko. "Descoberta de perfis de uso de web services." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/83669.

Full text
Abstract:
Durante o ciclo de vida de um web service, diversas mudanças são feitas na sua interface, eventualmente causando incompatibilidades em relação aos seus clientes e ocasionando a quebra de suas aplicações. Os provedores precisam tomar decisões sobre mudanças em seus serviços frequentemente, muitas vezes sem um bom entendimento a respeito do efeito destas mudanças sobre seus clientes. Os trabalhos e ferramentas existentes não fornecem ao provedor um conhecimento adequado a respeito do uso real das funcionalidades da interface de um serviço, considerando os diferentes tipos de consumidores, o que impossibilita avaliar o impacto das mudanças. Este trabalho apresenta um framework para a descoberta de perfis de uso de serviços web, os quais constituem um modelo descritivo dos padrões de uso dos diferentes grupos de clientes do serviço, com relação ao uso das funcionalidades em sua interface. O framework auxilia no processo de descoberta de conhecimento através de tarefas semiautomáticas e parametrizáveis para a preparação e análise de dados de uso, minimizando a necessidade de intervenção do usuário. O framework engloba o monitoramento de interações de web services, a carga de dados de uso pré-processados em uma base de dados unificada, e a geração de perfis de uso. Técnicas de mineração de dados são utilizadas para agrupar clientes de acordo com seus padrões de uso de funcionalidades, e esses grupos são utilizados na construção de perfis de uso de serviços. Todo o processo é configurado através de parâmetros, permitindo que o usuário determine o nível de detalhe das informações sobre o uso incluídas nos perfis e os critérios para avaliar a similaridade entre clientes. A proposta é validada por meio de experimentos com dados sintéticos, simulados de acordo com características esperadas no comportamento de clientes de um serviço real. Os resultados dos experimentos demonstram que o framework proposto permite a descoberta de perfis de uso de serviço úteis, e fornecem evidências a respeito da parametrização adequada do framework.
During the life cycle of a web service, several changes are made in its interface, which possibly are incompatible with regard to current usage and may break client applications. Providers must make decisions about changes on their services, most often without insight on the effect these changes will have over their customers. Existing research and tools fail to input provider with proper knowledge about the actual usage of the service interface’s features, considering the distinct types of customers, making it impossible to assess the actual impact of changes. This work presents a framework for the discovery of web service usage profiles, which constitute a descriptive model of the usage patterns found in distinct groups of clients, concerning the usage of service interface features. The framework supports a user in the process of knowledge discovery over service usage data through semi-automatic and configurable tasks, which assist the preparation and analysis of usage data with the minimum user intervention possible. The framework performs the monitoring of web services interactions, loads pre-processed usage data into a unified database, and supports the generation of usage profiles. Data mining techniques are used to group clients according to their usage patterns of features, and these groups are used to build service usage profiles. The entire process is configured via parameters, which allows the user to determine the level of detail of the usage information included in the profiles, and the criteria for evaluating the similarity between client applications. The proposal is validated through experiments with synthetic data, simulated according to features expected in the use of a real service. The experimental results demonstrate that the proposed framework allows the discovery of useful service usage profiles, and provide evidences about the proper parameterization of the framework.
APA, Harvard, Vancouver, ISO, and other styles
9

Duck, Geraint. "Extraction of database and software usage patterns from the bioinformatics literature." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/extraction-of-database-and-software-usage-patterns-from-the-bioinformatics-literature(fac16cb8-5b5b-4732-b7af-77a41cc64487).html.

Full text
Abstract:
Method forms the basis of scientific research, enabling criticism, selection and extension of current knowledge. However, methods are usually confined to the literature, where they are often difficult to find, understand, compare, or repeat. Bioinformatics and computational biology provide a rich opportunity for resource creation and discovery, with a rapidly expanding "resourceome". Many of these resources are difficult to find due to the large choice available, and there are only a limited number of sufficiently populated lists that can help inform resource selection. Text mining has enabled large scale data analysis and extraction from within the scientific literature, and as such can provide a way to help explore the vast wealth of resources available, which form the basis of bioinformatics methods. As such, this thesis aims to survey the computational biology literature, using text mining to extract database and software resource name mentions. By evaluating the common pairs and patterns of usage of these resources within such articles, an abstract approximation of the in silico methods employed within the target domain is developed. Specifically, this thesis provides an analysis of the difficulties of resource name extraction from the literature, then using this knowledge to develop bioNerDS - a rule-based system that can detect database and software name mentions within full-text documents (with a final F-score of 67%). bioNerDS is then applied to the full-text document corpus from PubMed Central, the results of which are then explored to identify the differences in resource usage between different domains (bioinformatics, biology and medicine) through time, different journals and different document sections. In particular, the well established resources (e.g., BLAST, GO and GenBank) remain pervasive throughout the domains, although they are seeing a slight decline in usage. Statistical programs see high levels of usage, with R in bioinformatics and SPSS in medicine being frequently mentioned throughout the literature. An overview of the common resource pairs has been generated by pairing database and software names which directly co-occur after one another in text. Combining and aggregating these resource pairs together across the literature enables the generation of a network of common resource patterns within computational biology, which provides an abstract representation of the common in silico methods used. For example, sequence alignment tools remain an important part of several computational biology analysis pipelines, and GO is a strong network sink (primarily used for data annotation). The networks also show the emergence of proteomics and next generation sequencing resources, and provide a specialised overview of a typical phylogenetics method. This work performs an analysis of common resource usage patterns, and thus provides an important first step towards in silico method extraction using text-mining. This should have future implications in community best practice, both for resource and method selection.
APA, Harvard, Vancouver, ISO, and other styles
10

Gandikota, Vijai. "Modeling operating system crash behavior through multifractal analysis, long range dependence and mining of memory usage patterns." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4566.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2006.
Title from document title page. Document formatted into pages; contains xii, 102 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 96-99).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Usage pattern mining"

1

Zaïane, Osmar R., Jaideep Srivastava, Myra Spiliopoulou, and Brij Masand, eds. WEBKDD 2002 - Mining Web Data for Discovering Usage Patterns and Profiles. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b11784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Osmar, Zaïane, ed. WEBKDD 2002: Mining Web data for discovering usage patterns and profiles : 4th international workshop, Edmonton, Canada, July 23, 2002 : revised papers. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Internetscale Pattern Recognition New Techniques For Voluminous Data Sets And Data Clouds. Taylor & Francis Inc, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Markov, Zdravko, and Daniel T. Larose. Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Markov, Zdravko, and Daniel T. Larose. Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage. Wiley & Sons, Incorporated, John, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage. Wiley-Interscience, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

(Editor), Osmar R. Zaiane, Jaideep Srivastava (Editor), Myra Spiliopoulou (Editor), and Brij Masand (Editor), eds. WEBKDD 2002 - Mining Web Data for Discovering Usage Patterns and Profiles: 4th International Workshop, Edmonton, Canada, July 23, 2002, Revised Papers (Lecture Notes in Computer Science). Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johansen, Bruce, and Adebowale Akande, eds. Nationalism: Past as Prologue. Nova Science Publishers, Inc., 2021. http://dx.doi.org/10.52305/aief3847.

Full text
Abstract:
Nationalism: Past as Prologue began as a single volume being compiled by Ad Akande, a scholar from South Africa, who proposed it to me as co-author about two years ago. The original idea was to examine how the damaging roots of nationalism have been corroding political systems around the world, and creating dangerous obstacles for necessary international cooperation. Since I (Bruce E. Johansen) has written profusely about climate change (global warming, a.k.a. infrared forcing), I suggested a concerted effort in that direction. This is a worldwide existential threat that affects every living thing on Earth. It often compounds upon itself, so delays in reducing emissions of fossil fuels are shortening the amount of time remaining to eliminate the use of fossil fuels to preserve a livable planet. Nationalism often impedes solutions to this problem (among many others), as nations place their singular needs above the common good. Our initial proposal got around, and abstracts on many subjects arrived. Within a few weeks, we had enough good material for a 100,000-word book. The book then fattened to two moderate volumes and then to four two very hefty tomes. We tried several different titles as good submissions swelled. We also discovered that our best contributors were experts in their fields, which ranged the world. We settled on three stand-alone books:” 1/ nationalism and racial justice. Our first volume grew as the growth of Black Lives Matter following the brutal killing of George Floyd ignited protests over police brutality and other issues during 2020, following the police assassination of Floyd in Minneapolis. It is estimated that more people took part in protests of police brutality during the summer of 2020 than any other series of marches in United States history. This includes upheavals during the 1960s over racial issues and against the war in Southeast Asia (notably Vietnam). We choose a volume on racism because it is one of nationalism’s main motive forces. This volume provides a worldwide array of work on nationalism’s growth in various countries, usually by authors residing in them, or in the United States with ethnic ties to the nation being examined, often recent immigrants to the United States from them. Our roster of contributors comprises a small United Nations of insightful, well-written research and commentary from Indonesia, New Zealand, Australia, China, India, South Africa, France, Portugal, Estonia, Hungary, Russia, Poland, Kazakhstan, Georgia, and the United States. Volume 2 (this one) describes and analyzes nationalism, by country, around the world, except for the United States; and 3/material directly related to President Donald Trump, and the United States. The first volume is under consideration at the Texas A & M University Press. The other two are under contract to Nova Science Publishers (which includes social sciences). These three volumes may be used individually or as a set. Environmental material is taken up in appropriate places in each of the three books. * * * * * What became the United States of America has been strongly nationalist since the English of present-day Massachusetts and Jamestown first hit North America’s eastern shores. The country propelled itself across North America with the self-serving ideology of “manifest destiny” for four centuries before Donald Trump came along. Anyone who believes that a Trumpian affection for deportation of “illegals” is a new thing ought to take a look at immigration and deportation statistics in Adam Goodman’s The Deportation Machine: America’s Long History of Deporting Immigrants (Princeton University Press, 2020). Between 1920 and 2018, the United States deported 56.3 million people, compared with 51.7 million who were granted legal immigration status during the same dates. Nearly nine of ten deportees were Mexican (Nolan, 2020, 83). This kind of nationalism, has become an assassin of democracy as well as an impediment to solving global problems. Paul Krugman wrote in the New York Times (2019:A-25): that “In their 2018 book, How Democracies Die, the political scientists Steven Levitsky and Daniel Ziblatt documented how this process has played out in many countries, from Vladimir Putin’s Russia, to Recep Erdogan’s Turkey, to Viktor Orban’s Hungary. Add to these India’s Narendra Modi, China’s Xi Jinping, and the United States’ Donald Trump, among others. Bit by bit, the guardrails of democracy have been torn down, as institutions meant to serve the public became tools of ruling parties and self-serving ideologies, weaponized to punish and intimidate opposition parties’ opponents. On paper, these countries are still democracies; in practice, they have become one-party regimes….And it’s happening here [the United States] as we speak. If you are not worried about the future of American democracy, you aren’t paying attention” (Krugmam, 2019, A-25). We are reminded continuously that the late Carl Sagan, one of our most insightful scientific public intellectuals, had an interesting theory about highly developed civilizations. Given the number of stars and planets that must exist in the vast reaches of the universe, he said, there must be other highly developed and organized forms of life. Distance may keep us from making physical contact, but Sagan said that another reason we may never be on speaking terms with another intelligent race is (judging from our own example) could be their penchant for destroying themselves in relatively short order after reaching technological complexity. This book’s chapters, introduction, and conclusion examine the worldwide rise of partisan nationalism and the damage it has wrought on the worldwide pursuit of solutions for issues requiring worldwide scope, such scientific co-operation public health and others, mixing analysis of both. We use both historical description and analysis. This analysis concludes with a description of why we must avoid the isolating nature of nationalism that isolates people and encourages separation if we are to deal with issues of world-wide concern, and to maintain a sustainable, survivable Earth, placing the dominant political movement of our time against the Earth’s existential crises. Our contributors, all experts in their fields, each have assumed responsibility for a country, or two if they are related. This work entwines themes of worldwide concern with the political growth of nationalism because leaders with such a worldview are disinclined to co-operate internationally at a time when nations must find ways to solve common problems, such as the climate crisis. Inability to cooperate at this stage may doom everyone, eventually, to an overheated, stormy future plagued by droughts and deluges portending shortages of food and other essential commodities, meanwhile destroying large coastal urban areas because of rising sea levels. Future historians may look back at our time and wonder why as well as how our world succumbed to isolating nationalism at a time when time was so short for cooperative intervention which is crucial for survival of a sustainable earth. Pride in language and culture is salubrious to individuals’ sense of history and identity. Excess nationalism that prevents international co-operation on harmful worldwide maladies is quite another. As Pope Francis has pointed out: For all of our connectivity due to expansion of social media, ability to communicate can breed contempt as well as mutual trust. “For all our hyper-connectivity,” said Francis, “We witnessed a fragmentation that made it more difficult to resolve problems that affect us all” (Horowitz, 2020, A-12). The pope’s encyclical, titled “Brothers All,” also said: “The forces of myopic, extremist, resentful, and aggressive nationalism are on the rise.” The pope’s document also advocates support for migrants, as well as resistance to nationalist and tribal populism. Francis broadened his critique to the role of market capitalism, as well as nationalism has failed the peoples of the world when they need co-operation and solidarity in the face of the world-wide corona virus pandemic. Humankind needs to unite into “a new sense of the human family [Fratelli Tutti, “Brothers All”], that rejects war at all costs” (Pope, 2020, 6-A). Our journey takes us first to Russia, with the able eye and honed expertise of Richard D. Anderson, Jr. who teaches as UCLA and publishes on the subject of his chapter: “Putin, Russian identity, and Russia’s conduct at home and abroad.” Readers should find Dr. Anderson’s analysis fascinating because Vladimir Putin, the singular leader of Russian foreign and domestic policy these days (and perhaps for the rest of his life, given how malleable Russia’s Constitution has become) may be a short man physically, but has high ambitions. One of these involves restoring the old Russian (and Soviet) empire, which would involve re-subjugating a number of nations that broke off as the old order dissolved about 30 years ago. President (shall we say czar?) Putin also has international ambitions, notably by destabilizing the United States, where election meddling has become a specialty. The sight of Putin and U.S. president Donald Trump, two very rich men (Putin $70-$200 billion; Trump $2.5 billion), nuzzling in friendship would probably set Thomas Jefferson and Vladimir Lenin spinning in their graves. The road of history can take some unanticipated twists and turns. Consider Poland, from which we have an expert native analysis in chapter 2, Bartosz Hlebowicz, who is a Polish anthropologist and journalist. His piece is titled “Lawless and Unjust: How to Quickly Make Your Own Country a Puppet State Run by a Group of Hoodlums – the Hopeless Case of Poland (2015–2020).” When I visited Poland to teach and lecture twice between 2006 and 2008, most people seemed to be walking on air induced by freedom to conduct their own affairs to an unusual degree for a state usually squeezed between nationalists in Germany and Russia. What did the Poles then do in a couple of decades? Read Hlebowicz’ chapter and decide. It certainly isn’t soft-bellied liberalism. In Chapter 3, with Bruce E. Johansen, we visit China’s western provinces, the lands of Tibet as well as the Uighurs and other Muslims in the Xinjiang region, who would most assuredly resent being characterized as being possessed by the Chinese of the Han to the east. As a student of Native American history, I had never before thought of the Tibetans and Uighurs as Native peoples struggling against the Independence-minded peoples of a land that is called an adjunct of China on most of our maps. The random act of sitting next to a young woman on an Air India flight out of Hyderabad, bound for New Delhi taught me that the Tibetans had something to share with the Lakota, the Iroquois, and hundreds of other Native American states and nations in North America. Active resistance to Chinese rule lasted into the mid-nineteenth century, and continues today in a subversive manner, even in song, as I learned in 2018 when I acted as a foreign adjudicator on a Ph.D. dissertation by a Tibetan student at the University of Madras (in what is now in a city called Chennai), in southwestern India on resistance in song during Tibet’s recent history. Tibet is one of very few places on Earth where a young dissident can get shot to death for singing a song that troubles China’s Quest for Lebensraum. The situation in Xinjiang region, where close to a million Muslims have been interned in “reeducation” camps surrounded with brick walls and barbed wire. They sing, too. Come with us and hear the music. Back to Europe now, in Chapter 4, to Portugal and Spain, we find a break in the general pattern of nationalism. Portugal has been more progressive governmentally than most. Spain varies from a liberal majority to military coups, a pattern which has been exported to Latin America. A situation such as this can make use of the term “populism” problematic, because general usage in our time usually ties the word into a right-wing connotative straightjacket. “Populism” can be used to describe progressive (left-wing) insurgencies as well. José Pinto, who is native to Portugal and also researches and writes in Spanish as well as English, in “Populism in Portugal and Spain: a Real Neighbourhood?” provides insight into these historical paradoxes. Hungary shares some historical inclinations with Poland (above). Both emerged from Soviet dominance in an air of developing freedom and multicultural diversity after the Berlin Wall fell and the Soviet Union collapsed. Then, gradually at first, right wing-forces began to tighten up, stripping structures supporting popular freedom, from the courts, mass media, and other institutions. In Chapter 5, Bernard Tamas, in “From Youth Movement to Right-Liberal Wing Authoritarianism: The Rise of Fidesz and the Decline of Hungarian Democracy” puts the renewed growth of political and social repression into a context of worldwide nationalism. Tamas, an associate professor of political science at Valdosta State University, has been a postdoctoral fellow at Harvard University and a Fulbright scholar at the Central European University in Budapest, Hungary. His books include From Dissident to Party Politics: The Struggle for Democracy in Post-Communist Hungary (2007). Bear in mind that not everyone shares Orbán’s vision of what will make this nation great, again. On graffiti-covered walls in Budapest, Runes (traditional Hungarian script) has been found that read “Orbán is a motherfucker” (Mikanowski, 2019, 58). Also in Europe, in Chapter 6, Professor Ronan Le Coadic, of the University of Rennes, Rennes, France, in “Is There a Revival of French Nationalism?” Stating this title in the form of a question is quite appropriate because France’s nationalistic shift has built and ebbed several times during the last few decades. For a time after 2000, it came close to assuming the role of a substantial minority, only to ebb after that. In 2017, the candidate of the National Front reached the second round of the French presidential election. This was the second time this nationalist party reached the second round of the presidential election in the history of the Fifth Republic. In 2002, however, Jean-Marie Le Pen had only obtained 17.79% of the votes, while fifteen years later his daughter, Marine Le Pen, almost doubled her father's record, reaching 33.90% of the votes cast. Moreover, in the 2019 European elections, re-named Rassemblement National obtained the largest number of votes of all French political formations and can therefore boast of being "the leading party in France.” The brutality of oppressive nationalism may be expressed in personal relationships, such as child abuse. While Indonesia and Aotearoa [the Maoris’ name for New Zealand] hold very different ranks in the United Nations Human Development Programme assessments, where Indonesia is classified as a medium development country and Aotearoa New Zealand as a very high development country. In Chapter 7, “Domestic Violence Against Women in Indonesia and Aotearoa New Zealand: Making Sense of Differences and Similarities” co-authors, in Chapter 8, Mandy Morgan and Dr. Elli N. Hayati, from New Zealand and Indonesia respectively, found that despite their socio-economic differences, one in three women in each country experience physical or sexual intimate partner violence over their lifetime. In this chapter ther authors aim to deepen understandings of domestic violence through discussion of the socio-economic and demographic characteristics of theit countries to address domestic violence alongside studies of women’s attitudes to gender norms and experiences of intimate partner violence. One of the most surprising and upsetting scholarly journeys that a North American student may take involves Adolf Hitler’s comments on oppression of American Indians and Blacks as he imagined the construction of the Nazi state, a genesis of nationalism that is all but unknown in the United States of America, traced in this volume (Chapter 8) by co-editor Johansen. Beginning in Mein Kampf, during the 1920s, Hitler explicitly used the westward expansion of the United States across North America as a model and justification for Nazi conquest and anticipated colonization by Germans of what the Nazis called the “wild East” – the Slavic nations of Poland, the Baltic states, Ukraine, and Russia, most of which were under control of the Soviet Union. The Volga River (in Russia) was styled by Hitler as the Germans’ Mississippi, and covered wagons were readied for the German “manifest destiny” of imprisoning, eradicating, and replacing peoples the Nazis deemed inferior, all with direct references to events in North America during the previous century. At the same time, with no sense of contradiction, the Nazis partook of a long-standing German romanticism of Native Americans. One of Goebbels’ less propitious schemes was to confer honorary Aryan status on Native American tribes, in the hope that they would rise up against their oppressors. U.S. racial attitudes were “evidence [to the Nazis] that America was evolving in the right direction, despite its specious rhetoric about equality.” Ming Xie, originally from Beijing, in the People’s Republic of China, in Chapter 9, “News Coverage and Public Perceptions of the Social Credit System in China,” writes that The State Council of China in 2014 announced “that a nationwide social credit system would be established” in China. “Under this system, individuals, private companies, social organizations, and governmental agencies are assigned a score which will be calculated based on their trustworthiness and daily actions such as transaction history, professional conduct, obedience to law, corruption, tax evasion, and academic plagiarism.” The “nationalism” in this case is that of the state over the individual. China has 1.4 billion people; this system takes their measure for the purpose of state control. Once fully operational, control will be more subtle. People who are subject to it, through modern technology (most often smart phones) will prompt many people to self-censor. Orwell, modernized, might write: “Your smart phone is watching you.” Ming Xie holds two Ph.Ds, one in Public Administration from University of Nebraska at Omaha and another in Cultural Anthropology from the Chinese Academy of Social Sciences, Beijing, where she also worked for more than 10 years at a national think tank in the same institution. While there she summarized news from non-Chinese sources for senior members of the Chinese Communist Party. Ming is presently an assistant professor at the Department of Political Science and Criminal Justice, West Texas A&M University. In Chapter 10, analyzing native peoples and nationhood, Barbara Alice Mann, Professor of Honours at the University of Toledo, in “Divide, et Impera: The Self-Genocide Game” details ways in which European-American invaders deprive the conquered of their sense of nationhood as part of a subjugation system that amounts to genocide, rubbing out their languages and cultures -- and ultimately forcing the native peoples to assimilate on their own, for survival in a culture that is foreign to them. Mann is one of Native American Studies’ most acute critics of conquests’ contradictions, and an author who retrieves Native history with a powerful sense of voice and purpose, having authored roughly a dozen books and numerous book chapters, among many other works, who has traveled around the world lecturing and publishing on many subjects. Nalanda Roy and S. Mae Pedron in Chapter 11, “Understanding the Face of Humanity: The Rohingya Genocide.” describe one of the largest forced migrations in the history of the human race, the removal of 700,000 to 800,000 Muslims from Buddhist Myanmar to Bangladesh, which itself is already one of the most crowded and impoverished nations on Earth. With about 150 million people packed into an area the size of Nebraska and Iowa (population less than a tenth that of Bangladesh, a country that is losing land steadily to rising sea levels and erosion of the Ganges river delta. The Rohingyas’ refugee camp has been squeezed onto a gigantic, eroding, muddy slope that contains nearly no vegetation. However, Bangladesh is majority Muslim, so while the Rohingya may starve, they won’t be shot to death by marauding armies. Both authors of this exquisite (and excruciating) account teach at Georgia Southern University in Savannah, Georgia, Roy as an associate professor of International Studies and Asian politics, and Pedron as a graduate student; Roy originally hails from very eastern India, close to both Myanmar and Bangladesh, so he has special insight into the context of one of the most brutal genocides of our time, or any other. This is our case describing the problems that nationalism has and will pose for the sustainability of the Earth as our little blue-and-green orb becomes more crowded over time. The old ways, in which national arguments often end in devastating wars, are obsolete, given that the Earth and all the people, plants, and other animals that it sustains are faced with the existential threat of a climate crisis that within two centuries, more or less, will flood large parts of coastal cities, and endanger many species of plants and animals. To survive, we must listen to the Earth, and observe her travails, because they are increasingly our own.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Usage pattern mining"

1

Garg, Ankur, Aman Kharb, Yash H. Malviya, J. P. Sagar, Atanu R. Sinha, Iftikhar Ahamath Burhanuddin, and Sunav Choudhary. "Mentor Pattern Identification from Product Usage Logs." In Advances in Knowledge Discovery and Data Mining, 359–71. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16142-2_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Qiankun, Sourav S. Bhowmick, and Le Gruenwald. "Cleopatra: Evolutionary Pattern-Based Clustering of Web Usage Data." In Advances in Knowledge Discovery and Data Mining, 323–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11731139_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Long, and Christoph Meinel. "Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining." In Lecture Notes in Computer Science, 531–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27834-4_65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tanna, Paresh, and Yogesh Ghodasara. "Exploring the Pattern of Customer Purchase with Web Usage Mining." In Advances in Intelligent Systems and Computing, 935–41. New Delhi: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-0740-5_113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paliwal, Shashank, and Vikram Pudi. "Investigating Usage of Text Segmentation and Inter-passage Similarities to Improve Text Document Clustering." In Machine Learning and Data Mining in Pattern Recognition, 555–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31537-4_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Masseglia, F., D. Tanasa, and B. Trousse. "Web Usage Mining: Sequential Pattern Extraction with a Very Low Support." In Advanced Web Technologies and Applications, 513–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24655-8_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohamad, Saad, Damla Arifoglu, Chemseddine Mansouri, and Abdelhamid Bouchachia. "Deep Online Hierarchical Unsupervised Learning for Pattern Mining from Utility Usage Data." In Advances in Intelligent Systems and Computing, 276–90. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97982-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borges, José, and Mark Levene. "Data Mining of User Navigation Patterns." In Web Usage Analysis and User Profiling, 92–112. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44934-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Castellano, Giovanna, Anna M. Fanelli, and Maria A. Torsello. "Web Usage Mining: Discovering Usage Patterns for Web Applications." In Advanced Techniques in Web Intelligence-2, 75–104. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-33326-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Lin, Margaret Dunham, and Yu Meng. "Mining Significant Usage Patterns from Clickstream Data." In Advances in Web Mining and Web Usage Analysis, 1–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11891321_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Usage pattern mining"

1

Nina, Shahnaz Parvin, Mahmudur Rahman, Khairul Islam Bhuiyan, and Khandakar Entenam Unayes Ahmed. "Pattern Discovery of Web Usage Mining." In 2009 International Conference on Computer Technology and Development. IEEE, 2009. http://dx.doi.org/10.1109/icctd.2009.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Musale, Vinayak, and Devendra Chaudhari. "Web usage mining tool by integrating sequential pattern mining with graph theory." In 2017 1st International Conference on Intelligent Systems and Information Management (ICISIM). IEEE, 2017. http://dx.doi.org/10.1109/icisim.2017.8122167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhargav, Anshul, and Munish Bhargav. "Pattern discovery and users classification through web usage mining." In 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT). IEEE, 2014. http://dx.doi.org/10.1109/iccicct.2014.6993038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Ashika, Rakhi Arora, Ranjana Sikarwar, and Neha Saxena. "Web usage mining using improved Frequent Pattern Tree algorithms." In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). IEEE, 2014. http://dx.doi.org/10.1109/icicict.2014.6781344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aghabozorgi, Saeed R., and Teh Ying Wah. "Using Incremental Fuzzy Clustering to Web Usage Mining." In 2009 International Conference of Soft Computing and Pattern Recognition. IEEE, 2009. http://dx.doi.org/10.1109/socpar.2009.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Murli Manohar, and Anju Bala. "An approach for frequent access pattern identification in web usage mining." In 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2014. http://dx.doi.org/10.1109/icacci.2014.6968481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Hong-Kang, and Xue-Li Yu. "Research on Service Usage Pattern Mining Method in the Distributed Context." In 2009 International Conference on Computational Intelligence and Software Engineering. IEEE, 2009. http://dx.doi.org/10.1109/cise.2009.5362808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohamad, Saad, and Abdelhamid Bouchachia. "Online Gaussian LDA for Unsupervised Pattern Mining from Utility Usage Data." In 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2020. http://dx.doi.org/10.1109/icmla51294.2020.00016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Jianhui, Tianshu Huang, and Chao Yang. "Research on WEB Cache Prediction Recommend Mechanism Based on Usage Pattern." In 2008 Workshop on Knowledge Discovery and Data Mining (WKDD '08). IEEE, 2008. http://dx.doi.org/10.1109/wkdd.2008.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gashaw, Yonas, and Fang Liu. "Performance evaluation of frequent pattern mining algorithms using web log data for web usage mining." In 2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE, 2017. http://dx.doi.org/10.1109/cisp-bmei.2017.8302317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography