Rolysent Paredes | Misamis University (original) (raw)

Papers by Rolysent Paredes

Research paper thumbnail of Designing an Adaptive Bandwidth Management for Higher Education Institutions

Purpose: This study proposes an adaptive bandwidth management system which can be explicitly used... more Purpose: This study proposes an adaptive bandwidth management system which can be explicitly used by educational institutions. The primary goal of the system is to increase the bandwidth of the users who access more on educational websites. Through this proposed bandwidth management, the users of the campus networks is encouraged to utilize the internet for educational purposes. Method: The weblog from a university's pfSense proxy server was utilized and undergo Web Usage Mining (WUM) to determine the number of educational and non-educational websites accessed by the users. Certain formulas were used in the computation of the bandwidth which was dynamically assigned to the users. A prototyping technique was applied in developing adaptive bandwidth management system. The prototype was simulated and evaluated by experts in compliance with ISO/IEC 14598-6 and ISO/IEC 9126-1 standards. Results: This study found that the prototype is capable of adjusting the bandwidth of the network ...

Research paper thumbnail of Measuring the quality of user experience on web services: A case of university in the Philippines

2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)

User Experience (UX) is getting popular as a vital success factor across many sectors and industr... more User Experience (UX) is getting popular as a vital success factor across many sectors and industries, including educational institutions. It is the result of the interaction of the user, system, and context. Measuring UX is important for the purpose of having a good product or service. User Experience Questionnaire (UEQ) is one of the tools in measuring UX. It has six scales or attributes to be measured namely: attractiveness, perspicuity, efficiency, dependability, stimulation, and novelty with twenty six (26) items in total. The goal of the study is to determine the UX of the web services for the students using UEQ. In the study, the researcher used the Misamis University Online Learning Environment (MUOLE) and My Misamis University (MyMU). There were 300 respondents who rated the two websites. It was found out that both web services gained positive UX scores on attractiveness, efficiency, perspicuity, dependability, and stimulation. However, novelty is neutral. Moreover, the results of the study provide additional ideas to the future development of the two systems.

Research paper thumbnail of District Emergency Preparedness and Response Unit: A Data Mining and Visualization Study Utilizing Self-Organizing Map

Social Science Research Network, 2021

Nationwide emergency alert number and dispatch center raises safety and security response for the... more Nationwide emergency alert number and dispatch center raises safety and security response for the people of Philippines. It all started with a vision – to improve the daily lives of every Philippine citizen for a safer and more secure community. In this study, data mining technique and data visualization were utilized to determine the incident reports in District Emergency Preparedness and Response Unit (DEPRU) of Misamis Occidental. Thus, self-organizing map (SOM) was used to cluster and visualize the patterns. The results showed that data pertaining to medical services or assistance, fire incidents, police assistance, and other citizens’ concerns are not related to each other or exhibit similar patterns. However, the results might change when there is a sufficient data to be trained during the process of clustering because in this study, the data is only from the few months when DEPRU started their operations. Moreover, the model is significant in relating incidences.

Research paper thumbnail of Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks

Int. J. Commun. Networks Inf. Secur., 2018

Managing the bandwidth in campus networks becomes a challenge in recent years. The limited bandwi... more Managing the bandwidth in campus networks becomes a challenge in recent years. The limited bandwidth resource and continuous growth of users make the IT managers think on the strategies concerning bandwidth allocation. This paper introduces a mechanism for allocating bandwidth based on the users’ web usage patterns. The main purpose is to set a higher bandwidth to the users who are inclined to browsing educational websites compared to those who are not. In attaining this proposed technique, some stages need to be done. These are the preprocessing of the weblogs, class labeling of the dataset, computation of the feature subspaces, training for the development of the ANN for LDA/GSVD algorithm, visualization, and bandwidth allocation. The proposed method was applied to real weblogs from university’s proxy servers. The results indicate that the proposed method is useful in classifying those users who used the internet in an educational way and those who are not. Thus, the developed ANN...

Research paper thumbnail of A Fuzzy-Based Dynamic Bandwidth Allocation Approach for Campus Area Networks

2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 2018

A robust campus area network (CAN) with excellent connectivity to the internet is no longer a lux... more A robust campus area network (CAN) with excellent connectivity to the internet is no longer a luxury to the educational institutions since the internet plays a vital role in education. With that, proper bandwidth allocation is needed so that the internet will be utilized for educational purposes. This study proposes a fuzzy based dynamic bandwidth allocation approach which can be used in CAN. The Mamdani fuzzy inference system was utilized along with the enhanced web usage mining (WUM) algorithm to achieve the proposed method. The improved WUM was employed to the weblog, captive portal log, and Shallalist file of the proxy server to identify the network users and the websites they accessed together with the website categories. Whereas the Mamdani FIS was used to decide the bandwidth that will be allocated to the users based on the rules provided. A prototype was developed and installed in a pfSense proxy server. The prototype was tested with several users connected to the proxy. The...

Research paper thumbnail of Network Security Policy for Higher Education Institutions based on ISO Standards

Computer networks have become necessary tools, useful for communications and can be utilized in s... more Computer networks have become necessary tools, useful for communications and can be utilized in storing data in various forms and at various locations [1]. However, computer network systems have been shown in various studies to be characteristically susceptible to breaches from many attacks [2] and network security is one of the most volatile and dynamic entities for enterprises, influenced by technology change trends and with the shifting threat vectors and more sophisticated application level advanced threats [3].

Research paper thumbnail of Allocating Bandwidth Based on Users' Web Usage Patterns for University Networks: A Hybrid Data Mining Approach

Due to the limited bandwidth and continuous growth of users make the IT managers focus on the str... more Due to the limited bandwidth and continuous growth of users make the IT managers focus on the strategies concerning bandwidth allocation. Thus, managing the bandwidth in campus networks has become one of the challenges in recent years. This paper introduces a mechanism for bandwidth allocation based on the users' web usage patterns. The main purpose is to set a higher bandwidth to the users who are inclined to browsing educational websites compared to those who are not. In attaining this proposed technique, a hybrid data mining approach were done which composed of preprocessing of the weblogs, class labeling of the dataset, computation of the feature subspaces, training for the development of the ANN for LDA/GSVD algorithm, and visualization. The proposed method was applied to real weblogs from university's proxy servers which include 104 active users. The results indicate that the proposed method is useful in classifying those users who used the internet in an educational way and those who are not. Thus, the developed ANN for LDA/GSVD algorithm outperformed the existing algorithm up to 50% which indicates that this approach is efficient. Based on the results, 35.06% of the users browsed educational contents. Through this technique, users will be encouraged by using the internet for educational purposes. Moreover, IT managers can make better decisions to optimize the allocation of bandwidth resources.

Research paper thumbnail of Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm

ISSN: 2582-0974 [10] www.mejast.com Country: Philippines Analyzing Logs from Proxy Server and Cap... more ISSN: 2582-0974 [10] www.mejast.com Country: Philippines Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm Rolysent K. Paredes, Alberto L. Yoldan Jr. & Jonard B. Bolanio College of Computer Studies, Misamis University, Ozamiz City, Philippines. Management Information Systems, Misamis University, Ozamiz City, Philippines. Management Information Systems, Misamis University, Ozamiz City, Philippines.

Research paper thumbnail of Rules for Orthographic Word Parsing of the Philippines' Cebuano-Visayan Language Using Context-Free Grammars

International Journal of Software Science and Computational Intelligence

Syllabication is essential in the preprocessing stage of speech systems. In the context of the Ph... more Syllabication is essential in the preprocessing stage of speech systems. In the context of the Philippines' Cebuano-Visayan language's syllabication rules, the existing rules do not include hyphenated words although the hyphen defines the syllable boundary in a word. Hence, this study created grammar rules for hyphenated words which include sequences of a hyphen between vowel-consonant, consonant-consonant, vowel-vowel, and consonant-vowel. The test was done for the enhanced grammar rules for Cebuano-Visayan syllabication with 1,465 representative hyphenated and non-hyphenated words of varying lengths. The result further implies that the syllabication analysis for hyphenated words showed that hyphens improve the naturalness and intelligibility in the utterance of the words, thereby enhancing the understanding and comprehension of the Cebuano-Visayan discourse.

Research paper thumbnail of Rules for Orthographic Word Parsing of the Philippines' Cebuano-Visayan Language Using Context-Free Grammars

International Journal of Software Science and Computational Intelligence

Syllabication is essential in the preprocessing stage of speech systems. In the context of the Ph... more Syllabication is essential in the preprocessing stage of speech systems. In the context of the Philippines' Cebuano-Visayan language's syllabication rules, the existing rules do not include hyphenated words although the hyphen defines the syllable boundary in a word. Hence, this study created grammar rules for hyphenated words which include sequences of a hyphen between vowel-consonant, consonant-consonant, vowel-vowel, and consonant-vowel. The test was done for the enhanced grammar rules for Cebuano-Visayan syllabication with 1,465 representative hyphenated and non-hyphenated words of varying lengths. The result further implies that the syllabication analysis for hyphenated words showed that hyphens improve the naturalness and intelligibility in the utterance of the words, thereby enhancing the understanding and comprehension of the Cebuano-Visayan discourse.

Research paper thumbnail of Designing an Adaptive Bandwidth Management for Higher Education Institutions

International Journal of Computing Sciences Research

Research paper thumbnail of Forecasting Dengue Incidence Utilizing Geographic Information System and Autoregressive Integrated Moving Average Models

Journal of Multidisciplinary Studies

Research paper thumbnail of Developing an Artificial Neural Network Algorithm for Generalized Singular Value Decomposition-based Linear Discriminant Analysis

International Journal on Advanced Science, Engineering and Information Technology

Artificial Neural Networks (ANN) form a dynamic architecture for machine learning and have attain... more Artificial Neural Networks (ANN) form a dynamic architecture for machine learning and have attained significant capabilities in various fields. It is a combination of interrelated calculation elements and derives outputs for new inputs after being trained. This study introduced a new mechanism utilizing ANN which was trained using Bayesian Regularization Back Propagation (BRBP) to improve the computational cost problem of the existing algorithm of the Generalized Singular Value Decomposition-based Linear Discriminant Analysis (LDA/GSVD). The proposed approach can minimize the number of iterations and mathematical processes of the existing LDA/GSVD algorithm which suffers time complexity. Through simulation using BLE RSSI Dataset from UCI which has 105 classes and 13 dimensions with 1420 instances, it was found out that ANN improved the computational cost during the classification of the data up to 57.14% while maintaining its accuracy. This new technique is recommended when classifying big data, and for pattern analysis as well.

Research paper thumbnail of District Emergency Preparedness and Response Unit: A Data Mining and Visualization Study Utilizing Self-Organizing Map

Middle East Journal of Applied Science & Technology, 2020

Nationwide emergency alert number and dispatch center raises safety and security response for the... more Nationwide emergency alert number and dispatch center raises safety and security response for the people of Philippines. It all started with a vision – to improve the daily lives of every Philippine citizen for a safer and more secure community. In this study, data mining technique and data visualization were utilized to determine the incident reports in District Emergency Preparedness and Response Unit (DEPRU) of Misamis Occidental. Thus, self-organizing map (SOM) was used to cluster and visualize the patterns. The results showed that data pertaining to medical services or assistance, fire incidents, police assistance, and other citizens’ concerns are not related to each other or exhibit similar patterns. However, the results might change when there is a sufficient data to be trained during the process of clustering because in this study, the data is only from the few months when DEPRU started their operations. Moreover, the model is significant in relating incidences.

Research paper thumbnail of Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm

Middle East Journal of Applied Science & Technology, 2020

The traffic on World Wide Web is rapidly increasing, and an enormous amount of generated data due... more The traffic on World Wide Web is rapidly increasing, and an enormous amount of generated data due to users’ various interactions with websites. Thus, web data becomes one of the most valuable resources for information retrievals and knowledge discoveries. The study utilized the logs from the Proxy Server and Captive Portal database and used Web Usage Mining to discover useful and exciting patterns from the web data. Moreover, k-means clustering algorithm was used to provide specific groups of the user access patterns specifically for the number of user sessions and websites accessed by the network users. Based on the results, it had been found out that most of the time, users are more engage in utilizing the internet.

Research paper thumbnail of Designing an Adaptive Bandwidth Management for Higher Education Institutions

Purpose: This study proposes an adaptive bandwidth management system which can be explicitly used... more Purpose: This study proposes an adaptive bandwidth management system which can be explicitly used by educational institutions. The primary goal of the system is to increase the bandwidth of the users who access more on educational websites. Through this proposed bandwidth management, the users of the campus networks is encouraged to utilize the internet for educational purposes. Method: The weblog from a university's pfSense proxy server was utilized and undergo Web Usage Mining (WUM) to determine the number of educational and non-educational websites accessed by the users. Certain formulas were used in the computation of the bandwidth which was dynamically assigned to the users. A prototyping technique was applied in developing adaptive bandwidth management system. The prototype was simulated and evaluated by experts in compliance with ISO/IEC 14598-6 and ISO/IEC 9126-1 standards. Results: This study found that the prototype is capable of adjusting the bandwidth of the network ...

Research paper thumbnail of Measuring the quality of user experience on web services: A case of university in the Philippines

2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)

User Experience (UX) is getting popular as a vital success factor across many sectors and industr... more User Experience (UX) is getting popular as a vital success factor across many sectors and industries, including educational institutions. It is the result of the interaction of the user, system, and context. Measuring UX is important for the purpose of having a good product or service. User Experience Questionnaire (UEQ) is one of the tools in measuring UX. It has six scales or attributes to be measured namely: attractiveness, perspicuity, efficiency, dependability, stimulation, and novelty with twenty six (26) items in total. The goal of the study is to determine the UX of the web services for the students using UEQ. In the study, the researcher used the Misamis University Online Learning Environment (MUOLE) and My Misamis University (MyMU). There were 300 respondents who rated the two websites. It was found out that both web services gained positive UX scores on attractiveness, efficiency, perspicuity, dependability, and stimulation. However, novelty is neutral. Moreover, the results of the study provide additional ideas to the future development of the two systems.

Research paper thumbnail of District Emergency Preparedness and Response Unit: A Data Mining and Visualization Study Utilizing Self-Organizing Map

Social Science Research Network, 2021

Nationwide emergency alert number and dispatch center raises safety and security response for the... more Nationwide emergency alert number and dispatch center raises safety and security response for the people of Philippines. It all started with a vision – to improve the daily lives of every Philippine citizen for a safer and more secure community. In this study, data mining technique and data visualization were utilized to determine the incident reports in District Emergency Preparedness and Response Unit (DEPRU) of Misamis Occidental. Thus, self-organizing map (SOM) was used to cluster and visualize the patterns. The results showed that data pertaining to medical services or assistance, fire incidents, police assistance, and other citizens’ concerns are not related to each other or exhibit similar patterns. However, the results might change when there is a sufficient data to be trained during the process of clustering because in this study, the data is only from the few months when DEPRU started their operations. Moreover, the model is significant in relating incidences.

Research paper thumbnail of Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks

Int. J. Commun. Networks Inf. Secur., 2018

Managing the bandwidth in campus networks becomes a challenge in recent years. The limited bandwi... more Managing the bandwidth in campus networks becomes a challenge in recent years. The limited bandwidth resource and continuous growth of users make the IT managers think on the strategies concerning bandwidth allocation. This paper introduces a mechanism for allocating bandwidth based on the users’ web usage patterns. The main purpose is to set a higher bandwidth to the users who are inclined to browsing educational websites compared to those who are not. In attaining this proposed technique, some stages need to be done. These are the preprocessing of the weblogs, class labeling of the dataset, computation of the feature subspaces, training for the development of the ANN for LDA/GSVD algorithm, visualization, and bandwidth allocation. The proposed method was applied to real weblogs from university’s proxy servers. The results indicate that the proposed method is useful in classifying those users who used the internet in an educational way and those who are not. Thus, the developed ANN...

Research paper thumbnail of A Fuzzy-Based Dynamic Bandwidth Allocation Approach for Campus Area Networks

2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 2018

A robust campus area network (CAN) with excellent connectivity to the internet is no longer a lux... more A robust campus area network (CAN) with excellent connectivity to the internet is no longer a luxury to the educational institutions since the internet plays a vital role in education. With that, proper bandwidth allocation is needed so that the internet will be utilized for educational purposes. This study proposes a fuzzy based dynamic bandwidth allocation approach which can be used in CAN. The Mamdani fuzzy inference system was utilized along with the enhanced web usage mining (WUM) algorithm to achieve the proposed method. The improved WUM was employed to the weblog, captive portal log, and Shallalist file of the proxy server to identify the network users and the websites they accessed together with the website categories. Whereas the Mamdani FIS was used to decide the bandwidth that will be allocated to the users based on the rules provided. A prototype was developed and installed in a pfSense proxy server. The prototype was tested with several users connected to the proxy. The...

Research paper thumbnail of Network Security Policy for Higher Education Institutions based on ISO Standards

Computer networks have become necessary tools, useful for communications and can be utilized in s... more Computer networks have become necessary tools, useful for communications and can be utilized in storing data in various forms and at various locations [1]. However, computer network systems have been shown in various studies to be characteristically susceptible to breaches from many attacks [2] and network security is one of the most volatile and dynamic entities for enterprises, influenced by technology change trends and with the shifting threat vectors and more sophisticated application level advanced threats [3].

Research paper thumbnail of Allocating Bandwidth Based on Users' Web Usage Patterns for University Networks: A Hybrid Data Mining Approach

Due to the limited bandwidth and continuous growth of users make the IT managers focus on the str... more Due to the limited bandwidth and continuous growth of users make the IT managers focus on the strategies concerning bandwidth allocation. Thus, managing the bandwidth in campus networks has become one of the challenges in recent years. This paper introduces a mechanism for bandwidth allocation based on the users' web usage patterns. The main purpose is to set a higher bandwidth to the users who are inclined to browsing educational websites compared to those who are not. In attaining this proposed technique, a hybrid data mining approach were done which composed of preprocessing of the weblogs, class labeling of the dataset, computation of the feature subspaces, training for the development of the ANN for LDA/GSVD algorithm, and visualization. The proposed method was applied to real weblogs from university's proxy servers which include 104 active users. The results indicate that the proposed method is useful in classifying those users who used the internet in an educational way and those who are not. Thus, the developed ANN for LDA/GSVD algorithm outperformed the existing algorithm up to 50% which indicates that this approach is efficient. Based on the results, 35.06% of the users browsed educational contents. Through this technique, users will be encouraged by using the internet for educational purposes. Moreover, IT managers can make better decisions to optimize the allocation of bandwidth resources.

Research paper thumbnail of Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm

ISSN: 2582-0974 [10] www.mejast.com Country: Philippines Analyzing Logs from Proxy Server and Cap... more ISSN: 2582-0974 [10] www.mejast.com Country: Philippines Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm Rolysent K. Paredes, Alberto L. Yoldan Jr. & Jonard B. Bolanio College of Computer Studies, Misamis University, Ozamiz City, Philippines. Management Information Systems, Misamis University, Ozamiz City, Philippines. Management Information Systems, Misamis University, Ozamiz City, Philippines.

Research paper thumbnail of Rules for Orthographic Word Parsing of the Philippines' Cebuano-Visayan Language Using Context-Free Grammars

International Journal of Software Science and Computational Intelligence

Syllabication is essential in the preprocessing stage of speech systems. In the context of the Ph... more Syllabication is essential in the preprocessing stage of speech systems. In the context of the Philippines' Cebuano-Visayan language's syllabication rules, the existing rules do not include hyphenated words although the hyphen defines the syllable boundary in a word. Hence, this study created grammar rules for hyphenated words which include sequences of a hyphen between vowel-consonant, consonant-consonant, vowel-vowel, and consonant-vowel. The test was done for the enhanced grammar rules for Cebuano-Visayan syllabication with 1,465 representative hyphenated and non-hyphenated words of varying lengths. The result further implies that the syllabication analysis for hyphenated words showed that hyphens improve the naturalness and intelligibility in the utterance of the words, thereby enhancing the understanding and comprehension of the Cebuano-Visayan discourse.

Research paper thumbnail of Rules for Orthographic Word Parsing of the Philippines' Cebuano-Visayan Language Using Context-Free Grammars

International Journal of Software Science and Computational Intelligence

Syllabication is essential in the preprocessing stage of speech systems. In the context of the Ph... more Syllabication is essential in the preprocessing stage of speech systems. In the context of the Philippines' Cebuano-Visayan language's syllabication rules, the existing rules do not include hyphenated words although the hyphen defines the syllable boundary in a word. Hence, this study created grammar rules for hyphenated words which include sequences of a hyphen between vowel-consonant, consonant-consonant, vowel-vowel, and consonant-vowel. The test was done for the enhanced grammar rules for Cebuano-Visayan syllabication with 1,465 representative hyphenated and non-hyphenated words of varying lengths. The result further implies that the syllabication analysis for hyphenated words showed that hyphens improve the naturalness and intelligibility in the utterance of the words, thereby enhancing the understanding and comprehension of the Cebuano-Visayan discourse.

Research paper thumbnail of Designing an Adaptive Bandwidth Management for Higher Education Institutions

International Journal of Computing Sciences Research

Research paper thumbnail of Forecasting Dengue Incidence Utilizing Geographic Information System and Autoregressive Integrated Moving Average Models

Journal of Multidisciplinary Studies

Research paper thumbnail of Developing an Artificial Neural Network Algorithm for Generalized Singular Value Decomposition-based Linear Discriminant Analysis

International Journal on Advanced Science, Engineering and Information Technology

Artificial Neural Networks (ANN) form a dynamic architecture for machine learning and have attain... more Artificial Neural Networks (ANN) form a dynamic architecture for machine learning and have attained significant capabilities in various fields. It is a combination of interrelated calculation elements and derives outputs for new inputs after being trained. This study introduced a new mechanism utilizing ANN which was trained using Bayesian Regularization Back Propagation (BRBP) to improve the computational cost problem of the existing algorithm of the Generalized Singular Value Decomposition-based Linear Discriminant Analysis (LDA/GSVD). The proposed approach can minimize the number of iterations and mathematical processes of the existing LDA/GSVD algorithm which suffers time complexity. Through simulation using BLE RSSI Dataset from UCI which has 105 classes and 13 dimensions with 1420 instances, it was found out that ANN improved the computational cost during the classification of the data up to 57.14% while maintaining its accuracy. This new technique is recommended when classifying big data, and for pattern analysis as well.

Research paper thumbnail of District Emergency Preparedness and Response Unit: A Data Mining and Visualization Study Utilizing Self-Organizing Map

Middle East Journal of Applied Science & Technology, 2020

Nationwide emergency alert number and dispatch center raises safety and security response for the... more Nationwide emergency alert number and dispatch center raises safety and security response for the people of Philippines. It all started with a vision – to improve the daily lives of every Philippine citizen for a safer and more secure community. In this study, data mining technique and data visualization were utilized to determine the incident reports in District Emergency Preparedness and Response Unit (DEPRU) of Misamis Occidental. Thus, self-organizing map (SOM) was used to cluster and visualize the patterns. The results showed that data pertaining to medical services or assistance, fire incidents, police assistance, and other citizens’ concerns are not related to each other or exhibit similar patterns. However, the results might change when there is a sufficient data to be trained during the process of clustering because in this study, the data is only from the few months when DEPRU started their operations. Moreover, the model is significant in relating incidences.

Research paper thumbnail of Analyzing Logs from Proxy Server and Captive Portal Using K-Means Clustering Algorithm

Middle East Journal of Applied Science & Technology, 2020

The traffic on World Wide Web is rapidly increasing, and an enormous amount of generated data due... more The traffic on World Wide Web is rapidly increasing, and an enormous amount of generated data due to users’ various interactions with websites. Thus, web data becomes one of the most valuable resources for information retrievals and knowledge discoveries. The study utilized the logs from the Proxy Server and Captive Portal database and used Web Usage Mining to discover useful and exciting patterns from the web data. Moreover, k-means clustering algorithm was used to provide specific groups of the user access patterns specifically for the number of user sessions and websites accessed by the network users. Based on the results, it had been found out that most of the time, users are more engage in utilizing the internet.