We a good story
Quick delivery in the UK

Books by Jeeva Jose

Filter
Filter
Sort bySort Popular
  • by Jeeva Jose
    £52.49

    With the opening of the Indian economy, many multinational corporations are shifting their manufacturing base to India. This includes setting up green field projects or acquiring established business firms of India. The region of this business unit is expanding globally. The variety and size of the customer base is expanding and the business risk related to bad debts is increasing. Close monitoring and analysis of payment trends helps to predict customer behavior and predict the chances of customer financial strength. The present manufacturing companies generate and store tremendous amount of data. The amount of data is so huge that manual analysis of the data is difficult. This creates a great demand for data mining to extract useful information buried within these data sets. One of the major concerns that affect companies' investments and profitability is bad debts; this can be reduced by identifying past customer behavior and reaching the suitable payment terms. The Clustering and Prediction module was implemented in WEKA - a free open source software written in Java. This study model can be extended to the development of a general purpose software package to predict payment trends of customers in any organisation.

  • by Jeeva Jose & P. Sojan Lal
    £106.49

    Web Usage Mining, also known as Web Log Mining, is the result of user interaction with a Web server including Web logs, click streams and database transaction or the visits of search engine crawlers at a Website. Log files provide an immense source of information about the behavior of users as well as search engine crawlers. Web Usage Mining concerns the usage of common browsing patterns, i.e. pages requested in sequence from Web logs. These patterns can be utilized to enhance the design and modification of a Website. Analyzing and discovering user behavior is helpful for understanding what online information users inquire and how they behave. The analyzed result can be used in intelligent online applications, refining Websites, improving search accuracy when seeking information and lead decision makers towards better decisions in changing markets, for instance by putting advertisements in ideal places. Similarly, the crawlers or spiders are accessing the Websites to index new and updated pages. These traces help to analyze the behavior of search engine crawlers. The log files are unstructured files and of huge size. These files need to be extracted and pre-processed before any data mining functionality to follow. Pre-processing is done in unique ways for each application. Two pre-processing algorithms are proposed based on indiscernibility relations in rough set theory which generates Equivalence Classes. The first algorithm generates a pre-processed file with successful user requests while the second one generates a pre-processed file for pre-fetching and caching purposes. Two algorithms are proposed to extract usage analytics. The first algorithm identifies the origin of visits, the top referring sites and the most popular keywords used by the visitor to arrive at a Website. The second algorithm extracts user agents like browsers and operating systems used by a visitor to access a Website. In this study, clustering of users based on Entry Pages to a Website is done to analyze the deep linked traffic at a Website. The Top Ten Entry Pages, the traffic and the temporal information of the Top Ten Entry Pages are also studied.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.