How To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool
|
|
|
- Gavin Harrison
- 5 years ago
- Views:
Transcription
1 International Journal of Advanced Computer and Mathematical Sciences ISSN Vol 4, Issue 1, 2013, pp1-8 ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS OF THE WEBSITE USING WEB MINING TOOL Arvind K. Sharma 1 and P.C. Gupta 2 1 School of Computer and System Sciences Jaipur National University, Jaipur, Rajasthan-India 2 Department of Computer Science University of Kota, Kota, Rajasthan-India * Corresponding author: [email protected] [Received-24/10/2012, Accepted-30/11/2012] ABSTRACT: The fundamental role of Web usage mining is to capture, analyze, and model the Web server logs. Usually it automatically discovers the usage behaviour of the Website users. In this paper, we have been implemented a Web mining tool to analyze the Web server log files of the Website. It evaluates the important information about visitors, top errors, web browsers and different platforms used by the Website users mostly. The obtained information shall definitely increase the effectiveness of the Website. Keywords: Web Usage Mining, Web Server Log Files, WebLog Expert [I] NTRODUCTION Due to the volatile growth of information available over the Internet during the past few years, the World Wide Web has become most popular and powerful platform to store, propagate and retrieve information as well as mine useful knowledge. It is a way of communication and information dissemination and it serves as a platform for exchanging various kinds of information. The volume of information available on the internet has been increasing rapidly with the explosive growth of the World Wide Web. While users are provided with more information and service options, it has become more difficult for them to find the right or interesting information, the problem commonly known as information overload. The primary goal of web usage mining is to find out the useful information from web data or web log files. To do this task, web usage mining focuses on investigating the potential knowledge from browsing patterns of the users and to find the correlation between the pages on analysis. The rest of paper is organized as follows: Section- II explains web usage mining. Section-III discusses about web server log files. Section-IV summaries related works. Section-V demonstrates Web Log Expert tool. Section-VI contains experimental results. Conclusion is shown in section-vii while references are mentioned in the last section. [II] WEB USAGE MINING Web usage mining is the application of data mining techniques to discover the knowledge
2 hidden in the web server log file, such as user access patterns from web data and for analyzing users behaviour patterns. Web mining deals with the data related to the web, which may be the data actually present in web pages or the data concerning the web activities. Web mining refers to overall process of discovering potentially useful and previously unknown information from web documents and services[1]. This is to ensure an improved service of web-based applications. The user access log files present very significant information about a web server. It is applied to fix several world problems by discovering the interesting user navigational patterns. The web information is categorized into two categories: deep web and shallow web. The deep web includes information stored in searchable databases often inaccessible to search engines and it is accessed only by Website s interface. In other hand, the shallow web information can be accessed by search engines without accessing the web databases[2]. [III] WEB SERVER LOG FILES The server log files are simple text files which records activity of the users on the server. These files reside on the server. If user visits many times on the Website then it creates entry many times on the Server. The main source of raw data is the web access logs which are known as web server log files. The log files can be analyzed over a time period. The time period can be specified on hourly, daily, weekly and monthly basis. The typical web server log files contain such type of information: IP address, request time, method (e.g. GET), URL of the requested files, HTTP version, return codes, the number of bytes transferred, the referrer s URL and user agents. 3.1 Taxonomy of Web Server Logs Web server logs are plain texts i.e. ASCII files which are independent from the server[11]. There are some distinctions between server softwares but traditionally there are four categories of web server logs, which are shown in fig.1. Transfer Log Agent Log Web Server Logs Error Log Fig.1: Taxonomy of Web Server Logs Referrer Log The first two web logs such as Transfer Log and Agent Log are standard. The Referrer and Agent Logs may or may not be Turned On at the Server or may be added to the Transfer Log file to create an Extended log file format. 3.2 Sample of Web Server Log Files We have been shown a sample of web log data in table-1 below. A user Id is the unique name that uses to identify. User Id is displayed when the user would like to make any transactions on the website or any other means. Table-1: Sample of Web Server Log Files Host User URL Id /images/pic010.jpg images/chemlab_d.jpg /images/pic8.jpg /images/result_scan.jpg However, other users could not see the real name and other personal information. Each row of web log file represents the URLs that user visits. Attributes of the web log file include Visit Time, Host, URL and other miscellaneous information about user s activity. [IV] RELATED WORKS In recent years, web usage mining is one of the favourite area of many researchers. In one of the work a novel approach was introduced for classifying user navigation patterns and predicting user s future request[3]. In another work a methodology was proposed and web log data was used to improve marketing activities[4]. Valter Cumbi et al. have done a case study of e- Arvind K. Sharma and P.C. Gupta 2
3 government portal initiative in Mozambique for visitor analysis[5]. A work is done on mining interesting knowledge from web logs which presented in[6]. Ramya et al. have proposed a methodology for discovering patterns in usage mining to improve the quality of data by reducing the quantity of data[7]. Maheswara Rao et al. have introduced a research frame work capable of preprocessing web log data completely and efficiently. This framework helps to mine usage behavior of the users[8]. One work specifies a recommender system that was able to online personalization for user patterns[9]. In one more work, a methodology was proposed for interesting knowledge mining through web access logs[10]. [V] WEB LOG EXPERT TOOL WebLog Expert is a fast and powerful Apache log file analyzer and IIS log analyzer tool. WebLog Expert is a freeware web mining tool[12]. It helps reveal important statistics about the Website usage like: activity of visitors, access statistics, paths through the site, visitors' browsers, and much more. This software tool can read log files of the most popular Web servers such as: Apache (Combined and common log formats) and IIS 4/5/6/7. It can also read ZIP, GZ and BZ2 compressed log files so won't need to unpack the logs manually before analyzing. The GUI Interface of WebLog Expert tool contains menu, toolbar and the list of profiles which is shown in fig.2 below. 5.1 Information Collected by WebLog Expert Number of Hits This number usually signifies the number of times any resource is accessed in a Website. A hit is a request to a web server for a file i.e. web page, image, JavaScript, Cascading Style Sheet, etc. Number of Visitors A visitor is exactly what it sounds like. It is a human who navigates to the website and browses one or more pages on the website. Visitor Referring Website The referring website gives the information or URL of the website which referred the particular website in consideration. Visitor Referral Website The referral website gives the information or URL of the website which is being referred to the particular website in consideration. Time and Duration This information in the web server logs give the time and duration for how long the website was accessed by the particular user. Path Analysis Path analysis gives the analysis of the path to a particular user has followed in accessing contents of a website. Visitor IP Address This information gives the IP address of the visitors who visited the website. Browser Type This information gives the information of the type of web browser that was used for accessing the website. Platform This information provides the type of operating systems or platforms etc. which has been used to access the website. Cookies A message given to a web browser by a web server. The browser stores the message in a text file called cookie. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized web pages for them. Fig.2: GUI Interface of WebLog Expert Arvind K. Sharma and P.C. Gupta 3
4 5.2 Hits, Visits & Page Views Hit Each file sent to a web browser by a server is known as an individual hit. Visit A visit happens when someone visits the website. It contains one or more page views/hits. One visitor can have many visits to the website. A unique visitor is determined by the IP address or cookie. By default, a visit session is terminated when a user falls on inactive state for more than 30 minutes. If the visitor left the website and came back 30 minutes later, then WebLog Expert will report 2 visits. If the visitor came back within 30 minutes, then WebLog Expert will still report 1 visit. Page View A page view is each time a visitor views a web page on the website, irrespective of how many hits are generated. Pages are comprised of files. Every image in a page is a separate file. When a visitor looks at a page i.e. a page view, they may see numerous images, graphics, pictures etc. and generate multiple hits. For example if a web page contains 5 images, a hit on that page will generate 6 hits on the web server, one page view for the web page, 5 hits for the images. 5.3 HTTP Status Codes The several status codes of hypertext transfer protocol are shown in table-1 below. Table-2: HTTP Status Codes Status Code Description 101 Switching Protocols 200 OK 201 Created 202 Accepted 203 Non-Authoritative Information 204 No Content 205 Reset Content 206 Partial Content 300 Multiple Choices 302 Found 303 See Other 304 Not Modified 305 Use Proxy 306 (Unused) 307 Temporary Redirect 400 Bad Request 401 Unauthorized 402 Payment Required 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 408 Request Timeout 409 Conflict 410 Gone 411 Length Required 412 Precondition Failed 413 Request Entity Too Large 414 Request-URI Too Long 415 Unsupported Media Type 416 Requested Range Not Satisfiable 417 Expectation Failed 500 Internal Server Error 501 Not Implemented 502 Bad Gateway 503 Service Unavailable 504 Gateway Timeout 505 HTTP Version Not Supported 101 Switching Protocols [VI] EXPERIMENTAL RESULTS In this work we have been analyzed the web server log files of an Educational Institution s Website i.e. with the help of WebLog Expert tool. Statistical/text log file data have been used for experimentation provided by WebLog Expert. Various analysis have been carried out to identify the behavior of the Website users. 6.1 Experiment-1 The log files contain the data from October 8, 2012 to October 14, 2012 (Time range: 10/8/ :03:08-10/14/ :29:07). In this duration log files have been stored 25 MB data and we have got 3.4 MB data after the preprocessing task for this work. The web log data received after preprocessing has been implemented through WebLog Expert and the complete analysis has been done. Fig.3 shows that Website is accessed every day, it receives far more visits from Monday to Saturday. The increased visits received by the Website on Monday to Saturday, reinforces the Arvind K. Sharma and P.C. Gupta 4
5 earlier finding that the Website is mainly used by working people, employees or students. Fig.3: Total Number of Hits Ratio The daily web data for the entire week from October 8, 2012 to October 14, 2012, tells about the number of Hits occurs, which Files, Pages, Visits, and Kbytes have been visited. For this week, the maximum Hits per Day were 637, the maximum Files per Day were 144, the maximum Pages per Day were 85, the maximum visits per Day were 13 and the maximum Kbytes per Day were 903. (see Appendix-A) We have found different types of errors occurred during the web surfing. The different types of errors are shown in table-3 below. S. No. Table-3: 404 Errors (Page Not Found) Error Hits Not Found Service Unavailable Forbidden 1 Total 400 It is very clear from the table-3 that 404 is most frequently occurred error. Some other types of client and server errors are shown. The graphical presentation of daily error types is shown in fig.4. Fig.4: Daily Errors Types 6.2 Experiment-2 In this work, the collected web server log files from October 8, 2012 to October 14, 2012 are experimented through WebLog Expert tool. It has been found that most of the Web browsers are used by the most of the users to visit the Website. Google Chrome is one of mostly used web browser. Which is shown in fig.5.(see Appendix- B) Fig.5: Mostly Used Web Browser Different versions of the Web browser Internet Explorer are shown in table-4. Most of the users accessed the website through the Internet Explorer version 7.x. Table-4: Different Versions of Internet Explorer S. No. Web Browser Hits Visitors % of Total Visitors 1. Internet % Explorer 7.x 2. Internet % Explorer 8.x 3. Internet % Explorer 6.x 4. Internet % Explorer 9.x Total % Arvind K. Sharma and P.C. Gupta 5
6 The graphical presentation of this information is shown in fig.6. Fig.6: Different versions of Internet Explorer Several Operating Systems have been used by the website users to access the Website. Windows Operating Systems have been frequently used by the website users. Windows XP operating system has been used by the most of users to access the Website. The mostly used Operating System is shown in fig.7 below. (see Appendix-C) Fig.7: Mostly Used Operating System [VII] CONCLUSION Web is a huge storehouse of web pages and links. It offers large quantity of data for Internet users. When users visit the Web they leave copious information in terms of web access logs which is heterogeneous, complex, high dimensional and incremental in nature. Analyzing such type of data will help to determine the browsing interest of the website users. In this paper, the complete analysis of web server log files has been done by using WebLog Expert tool. The obtained results shall definitely help to the Website Maintainers, Website Analysts, Website Designers and Developers to manage their System by determining occurred errors, corrupted and broken links. This work will also increase the effectiveness of the Website. REFERENCES [1] Margaret H. Dunham, S. Sridhar, Data Mining: Introductory and Advanced Topics, Pearson Education. [2] Arvind Kumar Sharma, P.C. Gupta, Exploration of efficient methodologies for the Improvement in web mining techniques: A survey, International Journal of Research in IT & Management(IJRIM) Vol.1, Issue-3, July [3] Liu, H., et al., Combined mining of Web server logs and web contents for classifying user navigation patterns and predicting user s future requests, Data and Knowledge Engineering, 2007,Vol 61, Issue 2, pp [4] Arya, S., et al., A methodology for web usage mining and its applications to target group identification, Fuzzy sets and systems, 2004, pp [5] Valter Cumbi et al. Mozambican Government Portal Case Study: Visitor Analysis, IST-Africa 2007 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, [6] F.M. Facca, and P.L. Lanzi, Mining interesting Knowledge from Web logs: a survey, Elsevier Science, Data and Knowledge Engineering, 2005, 53, pp [7] G. R.C. et al., "An Efficient Preprocessing Methodology for Discovering Patterns and Clustering of Web Users using a Dynamic ART1 Neural Network,"Fifth International Conference on Information Processing, Springer-Verlag. [8] Maheswara Rao.V.V.R and Valli Kumari.V, "An Enhanced Pre-Processing Research Framework for web Log Data Using a Learning Algorithm," Computer Science and Information Technology, DOI, pp. 1-15, /csit [9] Mehrdad Jalali et al., A Recommender System for Online Personalization in the WUM Applications, Proceedings of the World Congress on Engineering and Computer Science 2009 Vol. II, WCECS 2009, October 20-22, 2009, San Francisco, USA. [10] K Sudheer Reddy et al, An Effective Methodology for Pattern Discovery in Web Usage Mining, International Journal of Computer Science and Information Technologies, Vol. 3 (2), 2012, [11] L.K. Joshila Grace et al., Web Log Data Analysis and Mining in Proc CCSIT-2011, Springer CCIS, Vol. 133, Jan [12] [Online] [13] DAV Kota website s server is available at: [Online] Arvind K. Sharma and P.C. Gupta 6
7 AUTHOR S PROFILE Arvind K. Sharma had received his Master s Degree in Computer Science from Maharshi Dayanand University, Rohtak and M.Phil Degree in Computer Science from Alagappa University, Karaikudi. He is pursuing Ph.D in Computer Science from School of Computer and Systems Sciences, Jaipur National University, Jaipur, Rajasthan, India. His areas of interest include Data Mining, Web Usage Mining and Web Applications. P. C. Gupta had received his Ph.D degree in Computer Science from Bundelkhand University, Jhansi. Presently he is working as Associate Professor in the Department of Computer Science & Informatics, University of Kota, Rajasthan, India. He has published various technical and research papers in National and International Conferences and Journals. His research interest lies in Artificial Intelligence and Neural Networks. Appendix A General Statistics Arvind K. Sharma and P.C. Gupta 7
8 Appendix B Appendix C Arvind K. Sharma and P.C. Gupta 8
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
Analysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering [email protected]
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
Guide to Analyzing Feedback from Web Trends
Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
An Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
Web Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
An Effective Analysis of Weblog Files to improve Website Performance
An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
Web Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Generalization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
Pre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. [email protected]
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
A Survey on Web Mining Tools and Techniques
A Survey on Web Mining Tools and Techniques 1 Sujith Jayaprakash and 2 Balamurugan E. Sujith 1,2 Koforidua Polytechnic, Abstract The ineorable growth on internet in today s world has not only paved way
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
10. Java Servelet. Introduction
Chapter 10 Java Servlets 227 10. Java Servelet Introduction Java TM Servlet provides Web developers with a simple, consistent mechanism for extending the functionality of a Web server and for accessing
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Description of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
Identifying User Behavior by Analyzing Web Server Access Log File
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 327 Identifying User Behavior by Analyzing Web Server Access Log File K. R. Suneetha, Dr. R. Krishnamoorthi,
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
PREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information
SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
SmarterStats vs. Google Analytics
SmarterTools Inc. SmarterStats vs. Google Analytics A Comparison of Log File and Script-based Analysis for Accurate Website Statistics SmarterTools Development Team 10/7/2010 Contents Who Should Use This
Web usage mining: Review on preprocessing of web log file
Web usage mining: Review on preprocessing of web log file Sunita sharma Ashu bansal M.Tech., CSE Deptt. A.P., CSE Deptt. Hindu College of Engg. Hindu College of Engg. Sonepat, Haryana Sonepat, Haryana
A Study of Web Traffic Analysis
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
Web Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA
Articles 37 Econ Lit C8 EVALUATION OF E-COMMERCE WEB SITES ON THE BASIS OF USABILITY DATA Assoc. prof. Snezhana Sulova, PhD Introduction Today increasing numbers of commercial companies are using the electronic
A SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
Nuance Mobile Developer Program. HTTP Services for Nuance Mobile Developer Program Clients
Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Notice Nuance Mobile Developer Program HTTP Services for Nuance Mobile Developer Program Clients Copyright 2011
Configuring Your Gateman Proxy Server
Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
By Bardia, Patit, and Rozheh
HTTP By Bardia, Patit, and Rozheh HTTP - Introduction - Hyper Text Transfer Protocol -uses the TCP/IP technology -has had the most impact on the World Wide Web (WWW) - specs in RFC 2616 (RFC2616) HTTP
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It?
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It? Ling Shi Cai, Leau Yu Beng, Charlie Albert Lasuin, Tan Soo Fun, Chin Pei Yee Abstract This paper explains the development of
An Approach to Convert Unprocessed Weblogs to Database Table
An Approach to Convert Unprocessed Weblogs to Database Table Kiruthika M, Dipa Dixit, Pranay Suresh, Rishi M Department of Computer Engineering, Fr. CRIT, Vashi, Navi Mumbai Abstract With the explosive
An Investigative Approach of Web Data Mining Tools for Web Analytics
An Investigative Approach of Web Data Mining Tools for Web Analytics 1 Dr. Arvind K Sharma, 2 Dr. Anubhav Kumar 1 Research Supervisor, Career Point University, Kota, Rajasthan, India 2 Dept. of CSE, IET
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION
ANALYSIS OF WEBSITE USAGE WITH USER DETAILS USING DATA MINING PATTERN RECOGNITION K.Vinodkumar 1, Kathiresan.V 2, Divya.K 3 1 MPhil scholar, RVS College of Arts and Science, Coimbatore, India. 2 HOD, Dr.SNS
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
v6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Analysis of Web Log from Database System utilizing E-web Miner Algorithm
Analysis of Web Log from Database System utilizing E-web Miner Algorithm Mukul B. Chavan P.G. Student, Dept. of Computer Engineering G.H. Raisoni College of Engg & Mgmt, Wagholi Pune, India [email protected]
Web Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 [email protected] 1-800-349-1070 Licensed under a Creative
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Indirect Positive and Negative Association Rules in Web Usage Mining
Indirect Positive and Negative Association Rules in Web Usage Mining Dhaval Patel Department of Computer Engineering, Dharamsinh Desai University Nadiad, Gujarat, India Malay Bhatt Department of Computer
Working With Virtual Hosts on Pramati Server
Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
Log analyzer programs for distance education systems
Available online at www.sciencedirect.com Procedia Social and Behavioral Sciences 9 (2010) 1208 1213 WCLTA 2010 Log analyzer programs for distance education systems hsan Güne a *, Muammer Akçay b, Gökhan
(M.S.), INDIA. Keywords: Internet, SQL injection, Filters, Session tracking, E-commerce Security, Online shopping.
Securing Web Application from SQL Injection & Session Tracking 1 Pranjali Gondane, 2 Dinesh. S. Gawande, 3 R. D. Wagh, 4 S.B. Lanjewar, 5 S. Ugale 1 Lecturer, Department Computer Science & Engineering,
Web Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
Keywords: NCSA, W3C, WHOWEDA, HTTP, DOS
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Mining Web Log
RCS Liferay Google Analytics Portlet Installation Guide
RCS Liferay Google Analytics Portlet Installation Guide Document Revisions Date Revision By 07/02/12 1 Pablo Rendón 2 Table of Contents RCS Liferay-Google Analytics...1 Document Revisions...2 General Description...4
Concepts. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Concepts Understanding Server Logs and SmarterLogs SmarterStats
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Performance Evaluation of Online Image Compression Tools
Performance Evaluation of Online Image Compression Tools Rupali Sharma 1, aresh Kumar 1, Department of Computer Science, PTUGZS Campus, Bathinda (Punjab), India 1 [email protected], [email protected]
HTTP Protocol. Bartosz Walter <[email protected]>
HTTP Protocol Bartosz Walter Agenda Basics Methods Headers Response Codes Cookies Authentication Advanced Features of HTTP 1.1 Internationalization HTTP Basics defined in
DOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
Survey on web log data in teams of Web Usage Mining
Survey on web log data in teams of Web Usage Mining *Mrudang D. Pandya, **Prof. Kiran R Amin *(U.V.PATEL COLLAGE OF ENGINEERING,GANPAT UNIVERSITY, Ganpat Vidyanagar,Mehsana-Gozaria HighwayMehsana - 384012,
Deploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Profile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 [email protected],
1) Login using your unique user name and password. (If you have not requested a user name and password, click on Request Login)
How to navigate MCR Safety s Web-Based Customer Service http://www.mcrsafety.com/customerservice Recommended Browsers: Internet Explorer, Google Chrome, Firefox 1) Login using your unique user name and
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Data Mining of Web Access Logs
Data Mining of Web Access Logs A minor thesis submitted in partial fulfilment of the requirements for the degree of Master of Applied Science in Information Technology Anand S. Lalani School of Computer
Digital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Model-Based Cluster Analysis for Web Users Sessions
Model-Based Cluster Analysis for Web Users Sessions George Pallis, Lefteris Angelis, and Athena Vakali Department of Informatics, Aristotle University of Thessaloniki, 54124, Thessaloniki, Greece [email protected]
Cloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Web Mining. Margherita Berardi LACAM. Dipartimento di Informatica Università degli Studi di Bari [email protected]
Web Mining Margherita Berardi LACAM Dipartimento di Informatica Università degli Studi di Bari [email protected] Bari, 24 Aprile 2003 Overview Introduction Knowledge discovery from text (Web Content
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
