Downloads: 128 | Views: 309
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.9 / 10
Design and Implementation of k-most Library Users Mining
Shaik Mahaboob Basha, Pilli Dharmendra Kumar
Abstract: Since library storage has been increasing day by day, it is difficult for readers to find the books which interest them as well as representative booklists. How to utilize meaningful information effectively to improve the service quality of the digital library appears to be very important. The process considered not only the relationship of a cluster of users but also the associations among the information accessed. This paper not only constructs a recommendation service for readers to search books from the web but takes the initiative in finding the most suitable books for readers as well. Furthermore, library managers are expected to purchase core and hot books from a limited budget to maintain and satisfy the requirements of readers along with promoting digital library services. The experimental results of association rule mining in academic libraries revealed interesting rules with respect to users interest in usage of books. The rules also help the institutions for arriving decision related to investment of budget for specific books titles.
Keywords: data mining, knowledge management, association rule mining, library circulation data, hidden patterns, library
Edition: Volume 4 Issue 11, November 2015
Pages: 146 - 148
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 1998
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 714
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 693
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 683
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera