Web Usage Mining. discovery of user access (usage) patterns from Web logs What s the big deal? Build a better site: Know your visitors better:
|
|
- Lorin Jacobs
- 7 years ago
- Views:
Transcription
1 Web Usage Mining
2 Web Usage Mining Web Usage Mining discovery of user access (usage) patterns from Web logs What s the big deal? Build a better site: For everybody system improvement (caching & web design) For individuals personalization For search engines SEO Know your visitors better: Customer behavior Be a better business
3 Web Usage Mining Applications Personalization Improve structure of a site s Web pages Aid in caching and prediction of future page references, Pre fetch of Proxy server ) Improve design of individual pages Improve effectiveness of e commerce (sales and advertising, Marketing decisions, Target Marketing )
4 Web Usage Mining: Data Source Typical data sources for web usage mining are: Web structure data (site map, links, etc.) Web content data User profile (may not be available) Web log Server access logs Server Referrer logs Agent logs Client side cookies User profiles Search engine logs Database logs
5 Transfer / Access Log The transfer/access log contains detailed information about each request that the server receives from user s web browsers. SERVER REQUEST REPLY CLIENT Time Date Hostname File Requested Amount of data transferred Status of the request
6 Agent Log The agent log lists the browsers (including version number and the platform) that people are using to connect to your server. SERVER REQUEST REPLY CLIENT Hostname Version Number Platform
7 Referrer Log The referrer log contains the URLs of pages on other sites that link to your pages. That is, if a user gets to one of the server s pages by clicking on a link from another site, that URL of that site will appear in this log. Page A B SERVER REQUEST REPLY CLIENT Page B URL REFERRER URL Note: Referrer logging is used to allow web servers to identify where people are visiting them from.
8 Error Log The error log keeps a record of errors and failed requests. A request may fail if the page contains links to a file that does not exist or if the user is not authorized to access a specific page or file. SERVER REQUEST REPLY CLIENT
9 Web Usage Mining Phases
10 Preprocessing: Challenges WHO are the users? IP vs. real people HOW LONG did the users stay? Measuring session time (L. Catledge and J. Pitkow. Characterizing browsing behaviors on the world wide web. Computer Networks and ISDN Systems, 27(6), 1995) (Berendt, B. Mobasher, M. Nakagawa, and M. Spiliopoulou. The impact of site structure and user environment on session reconstruction in web usage analysis. In Proceedings of the 4 th WebKDD 2002 Workshop, at the ACM SIGKDD Conference on Knowledge Discovery in Databases (KDD 2002), Edmonton, Alberta, Canada, July WHERE did the users go? Server side vs. Client side WHAT did the users view? Content processing Moe, Wendy W Buying, searching, or browsing: Differentiating between online shoppers using in store navigational click stream. J. Consumer Psych. 13(1, 2) For the best review on preprocessing methods, refer to: R. Cooley, B. Mobasher, J. Srivastava, Data preparation for mining world wide web browsing patterns, Knowledge and Information Systems 1 (1) (1999) 5 32
11 Data Preprocessing Steps To data mining algorithm
12 Data Preprocessing Steps Preprocessing includes four steps: Data Cleaning removes log entries that are not needed for the mining process User Identification associates page references with different users Session Identification groups user s page references into user sessions Path Completion fills in page references missing due to browser and proxy caching
13 Data Cleaning There are a variety of files accessed as a result of a request by a client to view a particular Web page. These include image, sound and video files, executable cgi files, coordinates of clickable regions in image map files and HTML files. Thus the server logs contain many entries that are redundant or irrelevant for the data mining tasks 1. User Request : Page1.html 2. Browser Request : Page1.html, a.gif, b.gif =>3 Entries for same user request in the Server Log redundancy Page1.html a.gif b.gif
14 Data Cleaning Hostnam e Date : Time Request SOLUTION: All the log entries with certain filename suffixes, such as gif, jpeg, GIF, JPEG, JPG, and map, are removed from the log.
15 Issues in User Session Identification A single IP address is used by many users different users Proxy server Web server Different IP addresses in a single session ISP server Single user Missing cache hits in the server logs Web server
16 User Identification Heuristics IP/Agent: Each different agent type for an IP address represents a different sessions Referring page: Uses site topology (web page linkage) If the referring page file for a request is not directly reachable by a hyperlink from any of the pages visited by the user, then is it a new user Combination with other information, such as machine name, temporal information,
17 IP/Agent Heuristic Two Users: - A-B-L-F-R-O-G-A-D - A-B-C-J
18 Example Referring page Heuristic Two Users: - A-B-L-F-R-O-G-A-D - A-B-C-J Three Users: -A-B-F-O-G-A-D -L-R -A-B-C-J
19 Session Identification Heuristics Timeout if the time between pages requests exceeds a certain limit, it is assumed that the user is starting a new session IP/Agent Each different agent type for an IP address represents a different sessions Referring page filed If the referring page file for a request is not part of an open session, it is assumed that the request is coming from a different session Same IP-Agent/different sessions (Closest): Assigns the request to the session that is closest to the referring page at the time of the request Same IP-Agent/different sessions (Recent) In the case where multiple sessions are same distance from a page request, assigns the request to the session with the most recent referrer access in terms of time
20 Session Identification Use timeout Three Users: -A-B-F-O-G-A-D -L-R -A-B-C-J Four Sessions: -A-B-F-O-G -A-D -L-R -A-B-C-J
21 Path Completion Refers to the problem of inferring missing user references due to caching Effective path completion requires extensive knowledge of the link structure within the site Referrer information in server logs can also be used in disambiguating the inferred paths Problem gets much more complicated in framebased sites
22 Path Completion Example Four Sessions: -A-B-F-O-G -A-D -L-R -A-B-C-J Four Sessions: -A-B-F-O-F-B-G -A-D -L-R -A-B-A-C-J
23 From Sessions to Knowledge What are the set of pages frequently accessed together by Web users? What page will be fetched next? What are paths frequently accessed by Web users? What is the page mostly used as entry point to the web? What is the average view length per page category? Is the user likely to buy or just navigating?
24 Web Mining System Architecture Data Cleaning Transaction Identification Data Integration Data Cleaning Pattern Discovery Pattern Analysis ===== Add Home Name Registration Data Clean log Document and Usage Transaction Data Integrated Data Database Query Language Formatted Data Path Analysis Association Rules Sequential Patterns Clusters & Classification Rules OLAP/ Visualization Tools Knowledge Query Mechanism Intelligent Agents Attributes
25 Usage Pattern Discovery Techniques statistics analysis path analysis association rules sequential patterns clustering and classification
26 Statistics Analysis A summary report of hits and bytes transferred A list of top requested URLs A list of top referrers A list of most common browsers used Hits per hour/day/week/month reports Hits per domain reports
27 Association Analysis Association analysis discovery correlation among references Examples 40% of clients who accessed /company/product1 also accessed /company/product2 30% of clients who accessed /company/special1 placed an online order in /company/product1
28 Classification and Clustering Classification and clustering similar to collaborative filtering approaches User user Item item develop a profile of items belonging to a particular group according to their common attributes Examples clients from state or government agencies who visit the site tend to be interested in the page /company/product1 50% of clients who placed an online order in /company/product2 were in the age group and lived on the West Coast
29 Sequential Patterns Sequential patterns find inter transaction patterns such that the presence of a set of items is followed by another item in the time stamp ordered transaction set. Examples 30% of clients who visited /company/products had done a search in Google, within the past week on keyword w 60% of clients who placed an online order in /company/product1 also placed an online order in /company/product4 within 15 days.
30 Path Analysis Examples 70% of clients who accessed /company/product2 did so by starting at /company and proceeding through /company/new, /company/products and /company/product1 80% of clients who accessed the site started from /company/products 65% of clients left the site after 4 or less page references
31 Data Structures Keep track of patterns identified during Web usage mining process Common techniques: Trie Suffix Tree Generalized Suffix Tree WAP Tree
32 Trie vs. Suffix Tree Trie: Rooted tree Edges labeled which character (page) from pattern Path from root to leaf represents pattern. Suffix Tree: Single child collapsed with parent. Edge contains labels of both prior edges.
33 Trie and Suffix Tree
34 Generalized Suffix Tree & WAP Tree Generalized Suffix Tree: Suffix tree for multiple sessions. Contains patterns from all sessions. Maintains count of frequency of occurrence of a pattern in the node. WAP Tree: Compressed version of generalized suffix tree
35 Types of Patterns Algorithms have been developed to discover different types of patterns. Properties: Ordered Characters (pages) must occur in the exact order in the original session. Duplicates Duplicate characters are allowed in the pattern. Consecutive All characters in pattern must occur consecutive in given session. Maximal Not subsequence of another pattern.
36 Pattern Types Association Rules None of the properties hold Episodes Only ordering holds Sequential Patterns Ordered and maximal Forward Sequences Ordered, consecutive, and maximal Maximal Frequent Sequences All properties hold
37 Episodes Partially ordered set of pages Serial episode totally ordered with time constraint Parallel episode partial ordered with time constraint General episode partial ordered with no time constraint
38 Build a Better Site: System Improvement Server side caching of web pages Y. H. Wu, A.L.P. Chen, Prediction of web page accesses by proxy server log, World Wide Web 5 (1) (2002) Preprocessing: No IP discussion, sessions split by time based heuristics Method: Sequential pattern mining Data: Usage Contribution: Use frequent sequence to predict candidate page, personalize based on user maturity
39 Build a Better Site: System Improvement Improvement of general web design Fang, X. and O. R. L. Sheng (2004). Link Selector: A web mining approach to hyperlink selection for web portals. ACM Transactions on Internet Technology 4, Preprocessing: No IP distinguished, sessions split by 25.5 minutes Method: Association mining Data: Usage & Structure Contribution: Combine structure info. and usage info. to optimize portal page design
40 Build a Better Site: Personalization Personalize the web site based on usage patterns A key research domain: recommender systems* Content clustering vs. users clustering vs. hybrid approach C. Shahabi and F. Banaei Kashani. Ecient and anonymous web usage mining for web personalization. INFORMS Journal on Computing, Special Issue on Data Mining, 2002 Method: Clustering of sessions Data: Client side usage data
41 Build a Better Site: SEO (Search Engine Optimization) Adding usage information into PageRank patterns Kalyan Beemanapalli, Ramya Rangarajan, Jaideep Srivastava, Usage Aware Average Clicks, In Proc. Of WebKDD 2006: KDD Workshop on Web Mining and Web Usage Analysis, in conjunction with the 12 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2006), August Method: Association rule in spirit
42 Know your visitors better: : Customer behavior A favorite research stream by marketers and MIS researchers Statistical models are used most of the time Macro level behavior is often the focus Interesting questions related to firm performance and profitability
43 Know your visitors better: Customer behavior Johnson, E. J., Wendy Moe, Peter S. Fader, Steven Bellman, and Jerry Lohse. "On the Depth and Dynamics of Online Search Behavior," Management Science, Vol. 50, No. 3, March 2004, pp model an individual s tendency to search as a logarithmic process hierarchical Bayesian model with Depth of Search, dynamics of search and activity of search interested in the number of unique sites searched by each household within a given product category Preprocessing: Households identified by client side programs, session is month based Method: Statistical Modeling (log model) Data: Usage (search)
44 Know your visitors better: Customer behavior Moe, Wendy W Buying, searching, or browsing: Differentiating between online shoppers using in store navigational clickstream. J. Consumer Psych. 13(1, 2) WHY do the customers visit? Preprocessing: Content Processing Method: Clustering of sessions by visiting behavior parameters and content parameters Data: Usage & Content Conclusion:
45 Know your visitors better: Customer behavior Sismeiro, Catarina, Randolph E. Bucklin Modeling Purchase Behavior at an E Commerce Web Site: A Task Completing Approach. Journal of Marketing Research. 41 (3), How do the customers visit? Predicts online buying by linking the purchase decision to what visitors do and to what they are exposed while at the site. Preprocessing: Content Processing Method: Statistical Modeling Data: Usage & Content Conclusion:
46 Know your visitors better: Customer behavior Sismeiro, Catarina, Randolph E. Bucklin Modeling Purchase Behavior at an E Commerce Web Site: A Task Completing Approach. Journal of Marketing Research. 41 (3), browsing behavior (i.e., time and page views) repeat visitation to the site (return and total number of sessions) use of interactive decision aids Data input effort and information gathering and processing a series of page specific characteristics
Research and Development of Data Preprocessing in Web Usage Mining
Research and Development of Data Preprocessing in Web Usage Mining Li Chaofeng School of Management, South-Central University for Nationalities,Wuhan 430074, P.R. China Abstract Web Usage Mining is the
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationPREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationAN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 princemary26@gmail.com E. Baburaj Department of omputer Science & Engineering, Sun Engineering
More informationAdvanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
More informationAn Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
More informationData Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
More informationWeb Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
More informationPre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering joshilagracejebin@gmail.com
More informationWEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
More informationHow To Mine A Web Site For Data Mining
Data Preparation for Mining World Wide Web Browsing Patterns Robert Cooley, Bamshad Mobasher, and Jaideep Srivastava Department of Computer Science and Engineering University of Minnesota 4-192 EECS Bldg.,
More informationWeb Usage Mining. from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher
Web Usage Mining from Bing Liu. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher,
More informationWebAdaptor: Designing Adaptive Web Sites Using Data Mining Techniques
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. WebAdaptor: Designing Adaptive Web Sites Using Data Mining Techniques Howard J. Hamilton, Xuewei Wang, and Y.Y. Yao
More informationCHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
More informationClick stream reporting & analysis for website optimization
Click stream reporting & analysis for website optimization Richard Doherty e-intelligence Program Manager SAS Institute EMEA What is Click Stream Reporting?! Potential customers, or visitors, navigate
More informationArti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
More informationAn Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
More informationA COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
More informationA SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
More informationV.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu, India vchit2003@yahoo.co.in
(IJCSIS) International Journal of Computer Science and Information Security, A Survey on Preprocessing Methods for Web Usage Data V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu,
More informationImproving Privacy in Web Mining by eliminating Noisy data & Sessionization
Improving Privacy in Web Mining by eliminating Noisy data & Sessionization Rekha Garhwal Computer Science Department Om Institute of Technology & Management, Hisar, Haryana, India Abstract: data mining
More informationEffective User Navigation in Dynamic Website
Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya
More informationAbstract. 2.1 Web log file data
Use Of Web Log File For Web Usage Mining Savita Devidas Patil Assistant Professor Department of Computer Engineering SSVPS s B.S.Deore College of Engineering Dhule, INDIA Abstract Many web page designers
More informationA Tool for Web Usage Mining
8th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'07), 16-19 December, 2007, Birmingham, UK. A Tool for Web Usage Mining Jose M. Domenech 1 and Javier Lorenzo 2
More informationAnalysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
More informationA Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationChapter 12: Web Usage Mining
Chapter 12: Web Usage Mining By Bamshad Mobasher With the continued growth and proliferation of e-commerce, Web services, and Web-based information systems, the volumes of clickstream and user data collected
More informationAutomatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
More informationA Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
More informationA Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
More informationWeb Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari berardi@di.uniba.it Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
More informationA Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com
More informationPeriodic Web Personalization for Meta Search Engine
ISSN : 0976-8491(Online) ISSN : 2229-4333(Print) Abstract In this paper we propose a unique approach to integrate Meta search engine to build web personalization. Our approach makes the web personalization
More informationWeb Mining Functions in an Academic Search Application
132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS
More informationInternet Advertising Glossary Internet Advertising Glossary
Internet Advertising Glossary Internet Advertising Glossary The Council Advertising Network bring the benefits of national web advertising to your local community. With more and more members joining the
More informationWhy Google Analytics Cannot Be Used For Educational Web Content
Why Google Analytics Cannot Be Used For Educational Web Content Sanda-Maria Dragoş Chair of Computer Systems, Department of Computer Science Faculty of Mathematics and Computer Science Babes-Bolyai University
More informationAnalyzing the footsteps of your customers
Analyzing the footsteps of your customers - A case study by ASK net and SAS Institute GmbH - Christiane Theusinger 1 Klaus-Peter Huber 2 Abstract As on-line presence becomes very important in today s e-commerce
More informationWeb Mining as a Tool for Understanding Online Learning
Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA jadb3@mizzou.edu James Laffey University of Missouri Columbia Columbia, MO USA LaffeyJ@missouri.edu
More informationIntroduction. A. Bellaachia Page: 1
Introduction 1. Objectives... 3 2. What is Data Mining?... 4 3. Knowledge Discovery Process... 5 4. KD Process Example... 7 5. Typical Data Mining Architecture... 8 6. Database vs. Data Mining... 9 7.
More informationMining Web Access Logs of an On-line Newspaper
Mining Web Access Logs of an On-line Newspaper Paulo Batista and Mário J. Silva Departamento de Informática, aculdade de Ciências Universidade de Lisboa Campo Grande 749-06 Lisboa Portugal {pb,mjs}@di.fc.ul.pt
More informationIdentifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
More informationWeb Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
More informationOptimizing Web Sites for Customer Retention*
Optimizing Web Sites for Customer Retention* Michael Hahsler Department of Information Systems and Operations Vienna University of Economics and Business Administration Abstract With customer relationship
More informationKOINOTITES: A Web Usage Mining Tool for Personalization
KOINOTITES: A Web Usage Mining Tool for Personalization Dimitrios Pierrakos Inst. of Informatics and Telecommunications, dpie@iit.demokritos.gr Georgios Paliouras Inst. of Informatics and Telecommunications,
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationBisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationA Cube Model for Web Access Sessions and Cluster Analysis
A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,dcheung@eti.hku.hk Michael K. Ng,
More informationImportance of Domain Knowledge in Web Recommender Systems
Importance of Domain Knowledge in Web Recommender Systems Saloni Aggarwal Student UIET, Panjab University Chandigarh, India Veenu Mangat Assistant Professor UIET, Panjab University Chandigarh, India ABSTRACT
More informationABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information
SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT
More informationContext Aware Predictive Analytics: Motivation, Potential, Challenges
Context Aware Predictive Analytics: Motivation, Potential, Challenges Mykola Pechenizkiy Seminar 31 October 2011 University of Bournemouth, England http://www.win.tue.nl/~mpechen/projects/capa Outline
More informationWeb Log Mining: A Study of User Sessions
Web Log Mining: A Study of User Sessions Maristella Agosti and Giorgio Maria Di Nunzio Department of Information Engineering University of Padua Via Gradegnigo /a, Padova, Italy {agosti, dinunzio}@dei.unipd.it
More informationANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
More informationWeb Log Data Sparsity Analysis and Performance Evaluation for OLAP
Web Log Data Sparsity Analysis and Performance Evaluation for OLAP Ji-Hyun Kim, Hwan-Seung Yong Department of Computer Science and Engineering Ewha Womans University 11-1 Daehyun-dong, Seodaemun-gu, Seoul,
More informationProfile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,
More informationWeb Mining in E-Commerce: Pattern Discovery, Issues and Applications
Web Mining in E-Commerce: Pattern Discovery, Issues and Applications Ketul B. Patel 1, Jignesh A. Chauhan 2, Jigar D. Patel 3 Acharya Motibhai Patel Institute of Computer Studies Ganpat University, Kherva,
More informationBinary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi
More informationData Mining of Web Access Logs
Data Mining of Web Access Logs A minor thesis submitted in partial fulfilment of the requirements for the degree of Master of Applied Science in Information Technology Anand S. Lalani School of Computer
More informationAn application for clickstream analysis
An application for clickstream analysis C. E. Dinucă Abstract In the Internet age there are stored enormous amounts of data daily. Nowadays, using data mining techniques to extract knowledge from web log
More informationWeb usage mining can help improve the scalability, accuracy, and flexibility of recommender systems.
Automatic Personalization Based on Web Usage Mining Web usage mining can help improve the scalability, accuracy, and flexibility of recommender systems. Bamshad Mobasher, Robert Cooley, and Jaideep Srivastava
More informationUrchin Demo (12/14/05)
Urchin Demo (12/14/05) General Info / FAQs 1. What is Urchin? Regent has purchased a license for Urchin 5 Web Analytics Software. This software is used to analyze web traffic and produce reports on website
More informationWeb Usage Mining for a Better Web-Based Learning Environment
Web Usage Mining for a Better Web-Based Learning Environment Osmar R. Zaïane Department of Computing Science University of Alberta Edmonton, Alberta, Canada email: zaianecs.ualberta.ca ABSTRACT Web-based
More informationWeb Crawlers Detection
American University In Cairo Seminar Report Web Crawlers Detection Author: Yomna ElRashidy Supervisor: Ahmed Rafea A report submitted in fulfilment of the requirements of Seminar 1 course for the degree
More informationGuide to Analyzing Feedback from Web Trends
Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?
More informationAN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt no3man_mohamed@himc.psu.edu.eg
More informationLANCOM Techpaper Content Filter
The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for
More informationGeneralization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
More informationAnalysis of Requirement & Performance Factors of Business Intelligence Through Web Mining
Analysis of Requirement & Performance Factors of Business Intelligence Through Web Mining Abstract: The world wide web is a popular and interactive medium to distribute information in the era. The web
More informationThe Data Webhouse. Toolkit. Building the Web-Enabled Data Warehouse WILEY COMPUTER PUBLISHING
The Data Webhouse Toolkit Building the Web-Enabled Data Warehouse Ralph Kimball Richard Merz WILEY COMPUTER PUBLISHING John Wiley & Sons, Inc. New York Chichester Weinheim Brisbane Singapore Toronto Contents
More informationKey words: web usage mining, clustering, e-marketing and e-business, business intelligence; hybrid soft computing.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue:
More informationWEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION CONSTRUCTION
WEB LOG PREPROCESSING BASED ON PARTIAL ANCESTRAL GRAPH TECHNIQUE FOR SESSION CONSTRUCTION S.Chitra 1, Dr.B.Kalpana 2 1 Assistant Professor, Postgraduate and Research Department of Computer Science, Government
More informationOutline. Data mining in the Web
Web Mining Outline Data mining in the Web Web access pattern collection Web user pattern mining Mining for Web transaction patterns Web data manipulation and query 2 Capture Web User Behavior Understanding
More informationHP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
More informationExploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
More informationExtending a Web Browser with Client-Side Mining
Extending a Web Browser with Client-Side Mining Hongjun Lu, Qiong Luo, Yeuk Kiu Shun Hong Kong University of Science and Technology Department of Computer Science Clear Water Bay, Kowloon Hong Kong, China
More informationAssociation rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, dimitrijevic@vtsns.edu.rs Tanja Krunić, The
More informationANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
More informationConcept of Cache in web proxies
Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,
More informationFRAMEWORK FOR WEB PERSONALIZATION USING WEB MINING
FRAMEWORK FOR WEB PERSONALIZATION USING WEB MINING Monika Soni 1, Rahul Sharma 2, Vishal Shrivastava 3 1 M. Tech. Scholar, Arya College of Engineering and IT, Rajasthan, India, 12.monika@gmail.com 2 M.
More informationWeb Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
More informationCombining Usage, Content, and Structure Data to Improve Web Site Recommendation
Combining Usage, Content, and Structure Data to Improve Web Site Recommendation JiaLiandOsmarR.Zaïane Department of Computing Science, University of Alberta Edmonton AB, Canada {jial, zaiane}@cs.ualberta.ca
More informationWeb Mining Techniques in E-Commerce Applications
Web Mining Techniques in E-Commerce Applications Ahmad Tasnim Siddiqui College of Computers and Information Technology Taif University Taif, Kingdom of Saudi Arabia Sultan Aljahdali College of Computers
More informationPreprocessing and Content/Navigational Pages Identification as Premises for an Extended Web Usage Mining Model Development
Informatica Economică vol. 13, no. 4/2009 168 Preprocessing and Content/Navigational Pages Identification as Premises for an Extended Web Usage Mining Model Development Daniel MICAN, Dan-Andrei SITAR-TAUT
More informationNOVEL APPROCH FOR OFT BASED WEB DOMAIN PREDICTION
Volume 3, No. 7, July 2012 Journal of Global Research in Computer Science RESEARCH ARTICAL Available Online at www.jgrcs.info NOVEL APPROCH FOR OFT BASED WEB DOMAIN PREDICTION A. Niky Singhai 1, B. Prof
More informationIdentifying User Behavior by Analyzing Web Server Access Log File
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 327 Identifying User Behavior by Analyzing Web Server Access Log File K. R. Suneetha, Dr. R. Krishnamoorthi,
More informationBuilding a Recommender Agent for e-learning Systems
Building a Recommender Agent for e-learning Systems Osmar R. Zaïane University of Alberta, Edmonton, Alberta, Canada zaiane@cs.ualberta.ca Abstract A recommender system in an e-learning context is a software
More informationA UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More informationWeb Personalization based on Usage Mining
Web Personalization based on Usage Mining Sharhida Zawani Saad School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex, CO4 3SQ, UK szsaad@essex.ac.uk
More informationWeb Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationWeb-usage mining has become the subject of intensive research, as its potential for
A Framework for the Evaluation of Session Reconstruction Heuristics in Web-Usage Analysis Myra Spiliopoulou Bamshad Mobasher Bettina Berendt Miki Nakagawa Research Group Knowledge Management and Discovery,
More informationInformation Management course
Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)
More informationA Survey on Web Mining Tools and Techniques
A Survey on Web Mining Tools and Techniques 1 Sujith Jayaprakash and 2 Balamurugan E. Sujith 1,2 Koforidua Polytechnic, Abstract The ineorable growth on internet in today s world has not only paved way
More information1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
More informationApplying Web Mining Application for User Behavior Understanding
Applying Web Mining Application for User Behavior Understanding ZAKARIA SULIMAN ZUBI Computer Science Department Faculty of Science Sirte University P.O Box 727 Sirte, Libya Email: zszubi@yahoo.com MUSSAB
More information