Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Null Value Estimation in Web Environment by using Fuzzy Rule based K-Mean Clustering

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 7
Year of Publication: 2013
Swati Agrawal
Kiran Pandey

Swati Agrawal and Kiran Pandey. Article: Null Value Estimation in Web Environment by using Fuzzy Rule based K-Mean Clustering. International Journal of Computer Applications 74(7):24-28, July 2013. Full text available. BibTeX

	author = {Swati Agrawal and Kiran Pandey},
	title = {Article: Null Value Estimation in Web Environment by using Fuzzy Rule based K-Mean Clustering},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {7},
	pages = {24-28},
	month = {July},
	note = {Full text available}


In the Web environment web log file capture operational data generated through internet for analysing user's browsing behaviour and many other security issues. The captured operational data is useful for build use profile, web designing and acts as evidence in web forensic and many other security issues. In real world there are lots systems that participate in web environment having incomplete information because of that web log file affected through noise which lead many of inconvenience. Estimation and handling of these noises in web log is major issue in web forensic and other web related security issue. For evaluating that incomplete information null value estimation is very precious technique. This paper proposed a null value estimation technique based on fuzzy rule based k-means algorithm to deal with that noise. Proposed technique enhances the performance of k-means clustering algorithm by encapsulating advantage of fuzzy rule over that.


  • Ching-Hsue Cheng, Liang-Ying Wei, Tzu-Cheng Lin, "Improving Relational Database Quality Based on Adaptive Learning Method for Estimating Null Value", IEEE Innovative Computing, Information and Control, 2007. ICICIC apos; 07. Second International Conference on Volume, Issue, 5-7 Sept. 2007.
  • S. M. Chen, and H. R. Hsiao, "A new method to estimate null values in relational database systems based on automatic clustering techniques", IEEE Information Sciences: an International Journal, 169, 2005, pp. 47-60.
  • Shin-Jye Lee, Xiaojun Zeng, "A Modular Method for Estimating Null Values in Relational Database Systems" Eighth International Conference on Intelligent Systems Design and Applications, Nov. 2008.
  • Muhammad Nazrul Islam, Pintu Chandra Shill, Muhammad Firoz Mridha, Dewan Muhammad, Sariful Islam and M. M. A Hashem, "Generating Weighted Fuzzy Rules for Estimating Null Values Using an Evolutionary Algorithm" in 4th International Conference on Electrical and Computer Engineering, 19-21 Dec 2006.
  • Claude Rubinson, "Nulls, three-valued logic, and ambiguity in SQL: critiquing date's critique," ACM SIGMOD Record, v. 36 n. 4, p. 13-17, December 2007.
  • WebLogExpert, http://www. weblogexpert. com accessed on 10/10/201
  • Imielinski, T. and W. Lipski, "On Representing Incomplete Information in a Relational Database," Proc. 7th Znt. Conf. on Very Large Data Bases, 1981, pp. 388-397.
  • Nikhil Kumar Singh, Deepak Singh Tomar, Bhola Nath Roy, "An approach tounderstand the end user behavior through log analysis" International Journal of Computer Applications (0975 – 8887), August 2010.
  • Muhammad Kamran Ahmed, Mukhtar Hussain and Asad Raza "An Automated User Transparent Approach to log Web URLs for Forensic Analysis" Fifth International Conference on IT Security Incident Management and IT Forensics 2009.
  • Karen Kent and Murugiah Souppaya, "Guide to Computer Security Log Management", Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, 2006
  • Kavita Pandole and Niket Bhargava, "Comparison and Evaluation for Grouping of Null Data in Database Based on K-Means and Genetic Algorithm", International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 3, June 2012, pp 204-209