AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING
|
|
- Tiffany McDowell
- 8 years ago
- Views:
Transcription
1 AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt Abstract: Web applications are increasing at an enormous speed and its users are increasing at exponential speed. The evolutionary changes in technology have made it possible to capture the user s essence and interactions with web applications through web server log file. Web log file is saved as text (.txt) file. Due to large amount of irrelevant information in the web log, the original log file cannot be directly used in the web usage mining (WUM) procedure. Therefore the preprocessing of web log file becomes imperative. The proper analysis of web log file is beneficial to manage the web sites effectively for administrative and users prospective. Web log preprocessing is initial necessary step to improve the quality and efficiency of the later steps of WUM. There are number of techniques available at preprocessing level of WUM. Different techniques are applied at preprocessing level such as data cleaning, data filtering, and data integration. Web usage mining, a classification of Web mining, is the application of data mining techniques to discover usage patterns from clickstream and associated data stored in one or more Web servers. This paper presents an overview of the various steps involved in the preprocessing stage. Keywords: Web Server, Web Log File, Data Cleaning, User Identification, Session Identification, Path Completion, Web Usage Mining, Clickstream Analysis. 1
2 1. INTRODUCTION Web mining is one of the major and important fields of data mining. Data mining techniques are applied [1] on contents, structures and on log files of web sites to achieve performance, web personalization and schema modifications of web sites. Web mining is divided into three categories [2] such as Web Content Mining, Web Structure Mining and Web Usage Mining. In web content mining, we discover useful information from the contents of web site which may include text, hyperlinks, metadata, images, videos, and audios. Search engines and web spiders are used to gather data for content mining [1]. In web structure mining, we mine the structure of website on the basis of hyperlinks and intra-links inside and outside the web pages. In web usage mining (WUM) or web log mining, user s behavior or interests are revealed by applying data mining techniques on web log file. The ability to know the patterns of user s habits and interests helps the operational strategies of enterprises. Various applications are built efficiently by knowing users navigation through web. Web mining is the application of data mining techniques to automatically retrieve, extract and evaluate information for knowledge discovery from web documents and services. These applications may include: Modification of web site design. Schema modifications. Improve web site and web server performance. Improve web personalization. Recommender Systems. Fraud detection and future prediction. Srivastava et al. [3] proposed A framework for web usage mining. This process consists of four phases: the input stage, the preprocessing stage, the pattern discovery stage, and the pattern analysis stage: 1. Input stage. At the input stage, three types of raw web log files are retrieved access logs, referrer logs, and agent logs as well as 2
3 registration information (if any) and information concerning the site topology. 2. Preprocessing stage. The raw web logs do not arrive in a format conducive to fruitful data mining. Therefore, substantial data preprocessing must be applied. The most common preprocessing tasks are (1) data cleaning and filtering, (2) de-spidering, (3) user identification, (4) session identification, and (5) path completion. 3. Pattern discovery stage. Once these tasks have been accomplished, the web data are ready for the application of statistical and data mining methods for the purpose of discovering patterns. These methods include (1) standard statistical analysis, (2) clustering algorithms, (3) association rules, (4) classification algorithms, and (5) sequential patterns. 4. Pattern analysis stage. Not all of the patterns uncovered in the pattern discovery stage would be considered interesting or useful. For example, an association rule for an online movie database that found If Page = Sound of Music then Section= Musicals would not be useful, even with 100% confidence, since this wonderful movie is, of course, a musical. Hence, in the pattern analysis stage, human analysts examine the output from the pattern discovery stage and glean the most interesting, useful, and actionable patterns. 2. Clickstream Analysis: Web usage mining is sometimes referred to as clickstream analysis. A clickstream is the aggregate sequence of page visits executed by a particular user navigating through a Web site. In addition to page views, clickstream data consist of logs, cookies, metatags, and other data used to transfer web pages from server to browser. When loading a particular web page, the browser also requests all the objects embedded in the page, such as.gif or.jpg graphics files. The problem is that each request is logged separately. All of these separate hits must be aggregated into page views at the preprocessing stage. Then a series of page views can be woven together into a session. Thus, clickstream data require substantial preprocessing before user behavior can be analyzed. 3
4 3. Web Server Log Preprocessing: Preprocessing being preliminary and essential step but rather ignored due to variations and limitations of web log files. A web log file, as an input to the preprocessing phase of WUM, large in size, contains number of raw and irrelevant entries and is basically designed for debugging purpose [4]. Consequently, web log file cannot be directly used in WUM process. Preprocessing of log fie is complex and laborious job and it takes 80% of the total time of web usage mining process as whole [5]. Weighing the pros and cons, we come to the conclusion that, we cannot negate importance of preprocessing step in web usage mining. Paying due attention to preprocessing step, improves the quality of data [6], furthermore, preprocessing improves the efficiency and effectiveness of other two steps of WUM such as pattern discovery and pattern analysis Web Log Files: Web usage information takes the form of web server log files, or web logs. For each request from a user s browser to a web server, a response is generated automatically, called a web log file, log file, or web log. This response takes the form of a simple single-line transaction record that is appended to an ASCII text file on the web server. This text file may be comma-delimited, space-delimited, or tab-delimited. A sample web log is the excerpt, shown in Figure 1, from the venerable EPA web log data available from the Internet Traffic Archive at [7]. Each line in this file represents a particular action requested by a user s browser, received by the EPA web server in Research Triangle Park, North Carolina. Each line (record) contains the fields described below. 4
5 [29:23:53:25] GET /Software.html HTTP/ query2.lycos.cs.cmu.edu [29:23:53:36] GET /Consumer.html HTTP/ tanuki.twics.com [29:23:53:53] GET /News.html HTTP/ wpbfl2-45.gate.net [29:23:54:15] GET /default.htm HTTP/ wpbfl2-45.gate.net [29:23:54:16] GET /icons/circle logo small.gif HTTP/ wpbfl2-45.gate.net [29:23:54:18] GET /logos/small gopher.gif HTTP/ [29:23:54:19] GET /logos/us-flag.gif HTTP/ wpbfl2-45.gate.net [29:23:54:19] GET /logos/small ftp.gif HTTP/ wpbfl2-45.gate.net [29:23:54:19] GET /icons/book.gif HTTP/ wpbfl2-45.gate.net [29:23:54:19] GET /logos/us-flag.gif HTTP/ tanuki.twics.com [29:23:54:19] GET /docs/oswrcra/general/hotline HTTP/ wpbfl2-45.gate.net [29:23:54:20] GET /icons/ok2-0.gif HTTP/ tanuki.twics.com [29:23:54:25] GET /OSWRCRA/general/hotline/ HTTP/ tanuki.twics.com [29:23:54:37] GET /docs/oswrcra/general/hotline/95report HTTP/ wpbfl2-45.gate.net [29:23:54:37] GET /docs/browner/adminbio.html HTTP/ tanuki.twics.com [29:23:54:40] GET /OSWRCRA/general/hotline/95report/ HTTP/ wpbfl2-45.gate.net [29:23:55:01] GET /docs/browner/cbpress.gif HTTP/ dd compuserve.com [29:23:55:21] GET /Access/chapter1/s2-4.html HTTP/ FIGURE 1: Sample Web Log File i. Basic Log Format: Remote Host Field This field consists of the Internet IP address of the remote host making the request, such as If the remote host name is available through a DNS lookup, this name is provided, such as wpbfl2-45.gate.net. To obtain the domain name of the remote host rather than the IP address, the server must submit a request, using the Internet Domain Name System (DNS) to resolve (i.e., translate) the IP address into a host name. Since humans prefer to work with domain names and 5
6 computers are most efficient with IP addresses, the DNS system provides an important interface between humans and computers. For more information about DNS, see the Internet Systems Consortium, [8]. Date/Time Field The EPA web log uses the following specialized date/time field format: [DD:HH:MM:SS], where DD represents the day of the month and HH:MM:SS represents the 24-hour time, given in EDT. In this particular data set, the DD portion represents the day in August, 1995 that the web log entry was made. However, it is more common for the date/time field to follow the following format: DD/Mon/YYYY:HH:MM:SS offset, where the offset is a positive or negative constant indicating in hours how far ahead of or behind the local server is from Greenwich Mean Tim (GMT). For example, a date/time field of 09/Jun/1988:03:27: indicates that a request was made to a server at 3:27 a.m. on June 9, 1988, and the server is 5 hours behind GMT. HTTP Request Field The HTTP request field consists of the information that the client s browser has requested from the web server. The entire HTTP request field is contained within quotation marks. Essentially, this field may be partitioned into four areas: (1) the request method, (2) the uniform resource identifier (URI), (3) the header, and (4) the protocol. The most common request method is GET, which represents a request to retrieve data that are identified by the URI. For example, the request field in the first record in Figure 1 is GET /Software.html HTTP/1.0, representing a request from the client browser for the web server to provide the web page Software.html. Besides GET, other requests include HEAD, PUT, and POST. For more information on the latter request methods, refer to the W3C World Wide Web Consortium at [9]. The uniform resource identifier contains the page or document name and the directory path requested by the client browser. The URI can be used by web usage miners to analyze the frequency of visitor requests for pages and files. The header section contains optional information 6
7 concerning the browser s request. This information can be used by the web usage miner to determine, for example, which keywords are being used by visitors in search engines that point to your site. The HTTP request field also includes the protocol section, which indicates which version of the Hypertext Transfer Protocol (HTTP) is being used by the client s browser. Then, based on the relative frequency of newer protocol versions (e.g., HTTP/1.1), the web developer may decide to take advantage of the greater functionality of the newer versions and provide more online features. Status Code Field Not all browser requests succeed. The status code field provides a three-digit response from the web server to the client s browser, indicating the status of the request, whether or not the request was a success, or if there was an error, which type of error occurred. Codes of the form 2xx indicate a success, and codes of the form 4xx indicate an error. Most of the status codes for the records in Figure 1 are 200, indicating that the request was fulfilled successfully. A sample of the possible status codes that a web server could send follows [9]. Successful transmission (200 series) Indicates that the request from the client was received, understood, and completed. 200: success 201: created 202: accepted 204: no content Redirection (300 series) Indicates that further action is required to complete the client s request. 301: moved permanently 302: moved temporarily 303: not modified 304: use cached document Client error (400 series) Indicates that the client s request cannot be fulfilled, due to incorrect syntax or a missing file. 7
8 400: bad request 401: unauthorized 403: forbidden 404: not found Server error (500 series) Indicates that the web server failed to fulfill what was apparently a valid request. 500: internal server error 501: not implemented 502: bad gateway 503: service unavailable Transfer Volume (Bytes) Field The transfer volume field indicates the size of the file (web page, graphics file, etc.), in bytes, sent by the web server to the client s browser. Only GET requests that have been completed successfully (Status = 200) will have a positive value in the transfer volume field. Otherwise, the field will consist of a hyphen or a value of zero. This field is useful for helping to monitor the network traffic, the load carried by the network throughout the 24-hour cycle. ii. Common Log Format Web logs come in various formats, which vary depending on the configuration of the web server. The common log format (CLF or clog ) is supported by a variety of web server applications and includes the following seven fields: Remote host field Identification field Authuser field Date/time field HTTP request Status code field Transfer volume field Identification Field This field is used to store identity information provided by the client only if the web server is performing an identity check. However, this 8
9 field is seldom used because the identification information is provided in plain text rather than in a securely encrypted form. Therefore, this field usually contains a hyphen, indicating a null value. Authuser Field This field is used to store the authenticated client user name, if it is required. The authuser field was designed to contain the authenticated user name information that a client needs to provide to gain access to directories that are password protected. If no such information is provided, the field defaults to a hyphen. iii. Extended Common Log Format The extended common log format (ECLF) is a variation of the common log format, formed by appending two additional fields onto the end of the record, the referrer field, and the user agent field. Both the common log format and the extended common log format were created by the National Center for Supercomputing Applications [10]. Referrer Field The referrer field lists the URL of the previous site visited by the client, which linked to the current page. For images, the referrer is the web page on which the image is to be displayed. The referrer field contains important information for marketing purposes, since it can track how people found your site. Again, if the information is missing, a hyphen is used. User Agent Field The user agent field provides information about the client s browser, the browser version, and the client s operating system. Importantly, this field can also contain information regarding bots, such as web crawlers. Web developers can use this information to block certain sections of the Web site from these web crawlers, in the interests of preserving bandwidth. Further, this field allows the web usage miner to determine whether a human or a bot has accessed the site, and thereby to omit the bot s visit from analysis, on the assumption that the developers are interested in the behavior of human visitors. 9
10 iv. Microsoft IIS Log Format There are other log file formats besides the common and extended common log file formats. The Microsoft IIS log format includes the following fields [11]: Client IP address User name Date Time Service and instance Server name Server IP Elapsed time Client bytes sent Server bytes sent Service status code Windows status code Request type Target of operation Parameters The IIS format records more fields than the other formats, so that more information can be uncovered. For example, the elapsed processing time is included, along with the bytes sent by the client to the server; also, the time recorded is local time. Note that web server administrators need not choose any of these formats; they are free to specify which fields they believe are most appropriate for their purposes Preprocessing Steps: Data Cleaning The first step of preprocessing is data cleaning. It is usually sitespecific, and involves tasks such as, removing extraneous references to embedded objects that may not be important for the purpose of analysis, including references to style files, graphics, or sound files as shown in Table 1. The cleansing process also may involve the removal of at least some of the data fields (e.g. number of bytes transferred or version of 11
11 protocol used, etc.) that may not provide useful information in the analysis or data mining tasks [12]. No Object Type Unique % of Total Requests Bytes In Users Bytes In 1 *.gif KB 0.50% 2 *.js KB 4.40% 3 *.aspx KB 2.30% 4 *.png KB 0.80% 5 *.jpg KB 1.30% 6 UnKnown KB 0.10% 7 *.ashx KB 0.60% 8 *.axd KB 1.60% 9 *.css KB 0.40% 10 *.dll KB 0.20% 11 *.asp KB 0.00% 12 *.html KB 0.00% 13 *.htm KB 0.40% 14 *.pli KB 0.10% TABLE1: Example of web log with different extensions. User Identification The task of User Identification is, to identify who access web site and which pages are accessed. The analysis of Web usage does not require knowledge about a user s identity. However, it is necessary to distinguish among different users. Since a user may visit a site more than once, the server logs record multiple sessions for each user. The user activity record is used to refer to the sequence of logged activities belonging to the same user. 11
12 FIGURE 2: Example of User Identification Consider, for instance, the example of Figure 2. On the left, depicts a portion of a partly preprocessed log file. Using a combination of IP and URL fields in the log file, one can partition the log into activity records for three separate users (depicted on the right). Session Ordering Sessionization is the process of segmenting the user activity record of each user into sessions, each representing a single visit to the site. Web sites without the benefit of additional authentication information from users and without mechanisms such as embedded session ids must rely on heuristic methods for sessionization [12]. The goal of a sessionization heuristic is to reconstruct, from the click stream data, the actual sequence of actions performed by one user during one visit to the site. 12
13 Generally, sessionization heuristics fall into two basic categories: timeoriented or structure oriented. As an example, time-oriented heuristic, h1: Total session duration may not exceed a threshold θ. Given t0, the timestamp for the first request in a constructed session S, the request with a timestamp t is assigned to S, iff t t0 θ. In Fig 3, the heuristic h1, described above, with θ = 30 minutes has been used to partition a user activity record into two separate sessions. Path Completion FIGURE 3: Example of Sessionization Another potentially important pre-processing task which is usually performed after sessionization is path completion. Path completion is a process of adding the page accesses that are not in the web log but those which is actually occurred. Client or proxy-side caching can often result in missing access references to those pages or objects that have been cached. For instance, if a user returns to a page A during the same session, the second access to A will likely result in viewing the previously downloaded version of A that was cached on the client-side, and therefore, no request is made to the server. This results in the second reference to A not being recorded on the server logs. Missing references due to caching can be heuristically inferred through path completion which relies on the knowledge of site structure and referrer information from server logs. In the case of dynamically generated pages, form-based applications using the HTTP POST method result in all or part of the user input parameter not being appended to the URL accessed by the user. A simple example of missing references is given in Figure 4 [13]. 13
14 FIGURE 4: Identifying missing references in path completion Data Integration The above pre-processing tasks ultimately result in a set of user sessions each corresponding to a delimited sequence of page views. However, in order to provide the most effective framework for pattern discovery, data from a variety of other sources must be integrated with the preprocessed clickstream data. This is particularly the case in e- commerce applications where the integration of both user data (e.g., demographics, ratings, and purchase histories) and product attributes and categories from operational databases is critical. Such data, used in conjunction with usage data, in the mining process can allow for the discovery of important business intelligence metrics such as customer conversion ratios and lifetime values. In addition to user and product data, e-commerce data includes various product-oriented events such as shopping cart changes, order and shipping information, impressions (when the user visits a page containing an item of interest), click through (when the user actually clicks on an item of interest in the current page), and other basic metrics primarily used for data analysis. The successful integration of these types of data requires the creation of a site-specific event model based on which subsets of a user s clickstream are aggregated and mapped to specific events such as the addition of a product to the shopping cart. Generally, the integrated e-commerce data is stored in the final transaction database. To enable full-featured Web analytics applications, this data is usually 14
15 stored in a data warehouse called an e-commerce data mart. The e- commerce data mart is a multi-dimensional database integrating data from various sources, and at different levels of aggregation. It can provide pre-computed e-metrics along multiple dimensions, and is used as the primary data source for OLAP (Online Analytical Processing), for data visualization, and in data selection for a variety of data mining tasks. 4. Conclusion: The data collected in the Web server and other associated data sources do not reflect precisely about the pages visited by the user during his interactions with the Web. Due to the presence of superfluous items, in addition to the inability to identify users and sessions, it is essential that the log files need to be preprocessed initially before the mining tasks can be undertaken. Data preprocessing is a significant and prerequisite phase in Web mining. Various heuristics are employed in each step so as to remove irrelevant items and identify users and sessions along with the browsing information. The output of this phase results in the creation of a user session file. Nevertheless, the user session file may not exist in a suitable format as input data for mining tasks to be performed. This paper has focused on a design that can be adopted for preliminary formatting of a user session file so as to be suited for various mining tasks in the subsequent pattern discovery phase. 5. Future Work: In addition to the above mentioned preprocessing and formatting tasks, the future work involves various data transformation tasks that are likely to influence the quality of the discovered patterns resulting from the mining algorithms. The discovered patterns can then be used for various Web usage applications such as site improvement, business intelligence and recommendations. There are a number of issues in preprocessing of log data. Volume of requests in web log in a single log file is the first challenge. It is important to eliminate the irrelevant data. So cleaning is done to speed up analysis as it reduces the number of records and increases the quality of the results in the analysis stage. 15
16 6. Reference: [1] K. R. Suneetha, and D. R. Krishnamoorthi, Identifying User Behavior by Analyzing Web ServerAccess Log File, International Journal of Computer Science and Network Security (IJCSNS), VOL. 9, No. 4, April [2] S. Alam, G. Dobbie and P. Riddle, Particle Swarm Optimization Based Clustering Of Web Usage Data, IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp , [3] J. Srivastava, R. Cooley, M. Deshpande, and P. N. Tan, Web usage mining: discovery and applications of usage patterns from web data, SIGKDD Explore, VOL. 1, NO. 2, Jan [4] N. Khasawneh and C. C. Chan, Active User-Based and Ontology- Based Web Log Data Preprocessing for Web Usage Mining, Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings) (WI'06) /06, [5] Z. Pabarskaite, Implementing Advanced Cleaning and End-User Interpretability Technologies in Web Log Mining, 24th Int. Conf. information Technology Interfaces /TI 2002, Cavtat, Croatia, June 24-27, [6] J. Han, and M. Kamber, Data Mining: Concepts and Techniques, A. Stephan. San Francisco, Morgan Kaufmann Publishers is an imprint of Elsevier, [7] [8] [9] [10] [11] [12] A. Scime, Wed Mining : Applications and Techniques, Idea Group Publishing, ISBN , [13] M. Géry and H. Haddad, Evaluation of Web Usage Mining Approaches for User s Next Request Prediction, WIDM '03 Proceedings of the 5th ACM international workshop on Web information and data management, New York, NY, USA, pp.74-81,
Survey on web log data in teams of Web Usage Mining
Survey on web log data in teams of Web Usage Mining *Mrudang D. Pandya, **Prof. Kiran R Amin *(U.V.PATEL COLLAGE OF ENGINEERING,GANPAT UNIVERSITY, Ganpat Vidyanagar,Mehsana-Gozaria HighwayMehsana - 384012,
More informationA Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
More informationWeb Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationPre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationData Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationChapter 12: Web Usage Mining
Chapter 12: Web Usage Mining By Bamshad Mobasher With the continued growth and proliferation of e-commerce, Web services, and Web-based information systems, the volumes of clickstream and user data collected
More informationPREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
More informationANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering joshilagracejebin@gmail.com
More informationResearch and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationAn Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationCHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
More informationAn Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
More informationWeb Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
More informationGuide to Analyzing Feedback from Web Trends
Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationWeb Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative
More informationANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
More informationClick stream reporting & analysis for website optimization
Click stream reporting & analysis for website optimization Richard Doherty e-intelligence Program Manager SAS Institute EMEA What is Click Stream Reporting?! Potential customers, or visitors, navigate
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More informationWeb Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher
Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationExploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
More informationDescription of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
More informationGeneralization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
More informationIdentifying User Behavior by Analyzing Web Server Access Log File
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 327 Identifying User Behavior by Analyzing Web Server Access Log File K. R. Suneetha, Dr. R. Krishnamoorthi,
More informationAnalyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
More informationPreprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
More informationData Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over
More informationThe Role of Web Usage Mining in Web Applications Evaluation
Saša Bošnjak Mirjana Marić Zita Bošnjak The Role of Web Usage Mining in Web Applications Evaluation Article Info:, Vol. 5 (2010), No. 1, pp. 031-036 Received 27 Jun 2009 Accepted 21 October 2009 UDC 005.21:004.738.5
More informationAbstract. 2.1 Web log file data
Use Of Web Log File For Web Usage Mining Savita Devidas Patil Assistant Professor Department of Computer Engineering SSVPS s B.S.Deore College of Engineering Dhule, INDIA Abstract Many web page designers
More informationHow To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool
International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 4, Issue 1, 2013, pp1-8 http://bipublication.com ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS
More informationData Mining for Web Personalization
3 Data Mining for Web Personalization Bamshad Mobasher Center for Web Intelligence School of Computer Science, Telecommunication, and Information Systems DePaul University, Chicago, Illinois, USA mobasher@cs.depaul.edu
More information1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
More informationA SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
More informationAnalysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
More informationA Cube Model for Web Access Sessions and Cluster Analysis
A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,dcheung@eti.hku.hk Michael K. Ng,
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More information1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
More informationWeb Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationKey words: web usage mining, clustering, e-marketing and e-business, business intelligence; hybrid soft computing.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
More informationImplementing Advanced Cleaning and End-User Interpretability Technologies in Web Log Mining
109 mplementing Advanced Cleaning and End-User nterpretability Technologies in Web Log Mining Zidrina Pabarskaite School of Computing nformation Systems and Mathematics, South Bank University, 103 Borough
More informationWeb Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
More informationANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationAutomatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
More informationHow To Mine A Web Site For Data Mining
Data Preparation for Mining World Wide Web Browsing Patterns Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava Department of Computer Science and Engineering University of Minnesota 4-192 EECS Bldg.,
More informationPeriodic Web Personalization for Meta Search Engine
ISSN : 0976-8491(Online) ISSN : 2229-4333(Print) Abstract In this paper we propose a unique approach to integrate Meta search engine to build web personalization. Our approach makes the web personalization
More informationA Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com
More informationWeb Mining Techniques in E-Commerce Applications
Web Mining Techniques in E-Commerce Applications Ahmad Tasnim Siddiqui College of Computers and Information Technology Taif University Taif, Kingdom of Saudi Arabia Sultan Aljahdali College of Computers
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationGoogle Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey
1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics
More informationLANCOM Techpaper Content Filter
The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for
More informationGLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
More informationProtocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More informationAn application for clickstream analysis
An application for clickstream analysis C. E. Dinucă Abstract In the Internet age there are stored enormous amounts of data daily. Nowadays, using data mining techniques to extract knowledge from web log
More informationInternet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
More informationANALYZING OF THE EVOLUTION OF WEB PAGES BY USING A DOMAIN BASED WEB CRAWLER
- 151 - Journal of the Technical University Sofia, branch Plovdiv Fundamental Sciences and Applications, Vol. 16, 2011 International Conference Engineering, Technologies and Systems TechSys 2011 BULGARIA
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationWeb. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
More informationAn Overview of Preprocessing on Web Log Data for Web Usage Analysis
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4, March 2013 An Overview of Preprocessing on Web Log Data for Web Usage Analysis Naga
More informationConfiguring the CSS and Cache Engine for Reverse Proxy Caching
Configuring the CSS and Cache Engine for Reverse Proxy Caching Document ID: 12586 Contents Introduction Prerequisites Requirements Components Used Conventions Caching Overview Content Caching Configure
More informationWEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
More informationE-CRM and Web Mining. Objectives, Application Fields and Process of Web Usage Mining for Online Customer Relationship Management.
University of Fribourg, Switzerland Department of Computer Science Information Systems Research Group Seminar Online CRM, 2005 Prof. Dr. Andreas Meier E-CRM and Web Mining. Objectives, Application Fields
More informationDeploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes
Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the
More informationISA Server Plugins Setup Guide
ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationwww.apacheviewer.com Apache Logs Viewer Manual
Apache Logs Viewer Manual Table of Contents 1. Introduction... 3 2. Installation... 3 3. Using Apache Logs Viewer... 4 3.1 Log Files... 4 3.1.1 Open Access Log File... 5 3.1.2 Open Remote Access Log File
More informationgraphical Systems for Website Design
2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,
More informationNetwork Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
More informationInternet Advertising Glossary Internet Advertising Glossary
Internet Advertising Glossary Internet Advertising Glossary The Council Advertising Network bring the benefits of national web advertising to your local community. With more and more members joining the
More informationData Mining of Web Access Logs
Data Mining of Web Access Logs A minor thesis submitted in partial fulfilment of the requirements for the degree of Master of Applied Science in Information Technology Anand S. Lalani School of Computer
More informationEVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA
Articles 37 Econ Lit C8 EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Assoc. prof. Snezhana Sulova, PhD Introduction Today increasing numbers of commercial companies are using the electronic
More informationWeb Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
More informationNAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
More informationWeb usage mining can help improve the scalability, accuracy, and flexibility of recommender systems.
Automatic Personalization Based on Web Usage Mining Web usage mining can help improve the scalability, accuracy, and flexibility of recommender systems. Bamshad Mobasher, Robert Cooley, and Jaideep Srivastava
More informationComputer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
More informationWeb Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
More informationGoogle Analytics Health Check Laying the foundations for successful analytics and optimisation
Google Analytics Health Check Laying the foundations for successful analytics and optimisation Google Analytics Property [UA-1234567-1] Domain [Client URL] Date of Review MMM YYYY Consultant [Consultant
More informationHow People Read Books Online: Mining and Visualizing Web Logs for Use Information
How People Read Books Online: Mining and Visualizing Web Logs for Use Information Rong Chen 1, Anne Rose 2, Benjamin B. Bederson 2 1 Department of Computer Science and Technique College of Computer Science,
More informationSuper Resellers // Getting Started Guide. Getting Started Guide. Super Resellers. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Super Resellers Getting Started Guide Page 1 Getting Started Guide: Super Resellers Version 2.1 (1.6.2012) Copyright 2012 All rights reserved. Distribution of this work or derivative
More informationPrivacy Policy - LuxTNT.com
Privacy Policy - LuxTNT.com Overview TNT Luxury Group Limited (the owner of LuxTNT.com). knows that you care how information about you is used and shared, and we appreciate your trust that we will do so
More informationUser Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
More informationWeb Usage Mining for a Better Web-Based Learning Environment
Web Usage Mining for a Better Web-Based Learning Environment Osmar R. Zaïane Department of Computing Science University of Alberta Edmonton, Alberta, Canada email: zaianecs.ualberta.ca ABSTRACT Web-based
More informationWeb Mining Functions in an Academic Search Application
132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS
More informationA COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationW3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
More informationManual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
More informationContent Manager User Guide Information Technology Web Services
Content Manager User Guide Information Technology Web Services The login information in this guide is for training purposes only in a test environment. The login information will change and be redistributed
More informationUser Behavior Analysis from Web Log using Log Analyzer Tool
User Behavior Analysis from Web Log using Log Analyzer Tool A.Brijesh Bakariya, B.Ghanshyam Singh Thakur Department of Computer Application, Maulana Azad National Institute of Technology, Bhopal, India
More informationMonitoring Pramati Web Server
Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,
More informationUsers Interest Correlation through Web Log Mining
Users Interest Correlation through Web Log Mining F. Tao, P. Contreras, B. Pauer, T. Taskaya and F. Murtagh School of Computer Science, the Queen s University of Belfast; DIW-Berlin Abstract When more
More informationChapter-1 : Introduction 1 CHAPTER - 1. Introduction
Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet
More informationWeb Log Mining: A Study of User Sessions
Web Log Mining: A Study of User Sessions Maristella Agosti and Giorgio Maria Di Nunzio Department of Information Engineering University of Padua Via Gradegnigo /a, Padova, Italy {agosti, dinunzio}@dei.unipd.it
More information