2018
DOI: 10.14419/ijet.v7i1.9.9736
|View full text |Cite
|
Sign up to set email alerts
|

Efficient data cleaning algorithm using decision tree classification model approach and modified new unique user identification algorithm using hashing techniques with a new error factor

Abstract: The study focuses on preprocessing techniques of web mining. Considering this scope, the study has proposed and implemented an efficient data cleaning and unique user identification algorithms. Previously proposed data cleaning algorithm is a generalized approach and lacked transparency. An appropriate model has to be used to implement the new data cleaning algorithm. Over analysis of various related studies and suggestions made by eminent experts, the study finalized decision tree classification model, and ap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…The hash function compresses any size message into information known as a hash-value whose its size is always fixed and shorter than the message itself, usually 128-512 bits [2]. Besides easy to calculate, the hash functions are very sensitive to changes in input messages although only one bit changes, and is resistant to collision events [3]. Therefore, the hash function is suitable for checking the integrity of messages sent over an unsecured communication network.…”
Section: Introductionmentioning
confidence: 99%
“…The hash function compresses any size message into information known as a hash-value whose its size is always fixed and shorter than the message itself, usually 128-512 bits [2]. Besides easy to calculate, the hash functions are very sensitive to changes in input messages although only one bit changes, and is resistant to collision events [3]. Therefore, the hash function is suitable for checking the integrity of messages sent over an unsecured communication network.…”
Section: Introductionmentioning
confidence: 99%