An Effective Analysis of Weblog Files to improve Website Performance
|
|
|
- Thomas Peters
- 10 years ago
- Views:
Transcription
1 An Effective Analysis of Weblog Files to improve Website Performance 1 T.Revathi, 2 M.Praveen Kumar, 3 R.Ravindra Babu, 4 Md.Khaleelur Rahaman, 5 B.Aditya Reddy Department of Information Technology, KL University, Vijayawada, AP, India. 1 [email protected] 2 [email protected] 3 [email protected] 4 [email protected] 5 [email protected] Abstract As there is an enormous growth in the web in terms of web sites, the size of web usage data is also increasing gradually. But this web usage data plays a vital role in the effective management of web sites. This web usage data is stored in a file called weblog by the web server. In order to discover the knowledge, required for improving the performance of websites, we need to apply the best preprocessing methodology on the server weblog file. Data preprocessing is a phase which automatically identifies the meaningful patterns and user behavior. So far analyzing the weblog data has been a challenging task in the area of web usage mining. In this paper we propose an effective and enhanced data preprocessing methodology which produces an efficient usage patterns and reduces the size of weblog down to 75-80% of its initial size. The experimental results are also shown in the following chapters. Keywords: Web usage mining, Preprocessing, weblog. 1. Introduction Web usage mining (WUM) is one of the applications of data mining techniques which discover the usage patterns from web usage data. The outcome of this web usage mining can be used for web personalization, website modification, system improvement, and marketing etc. Generally web usage mining[4] consists of 4 stages 1.Data collection 2.Data preprocessing 3.Pattern discovery 4. Analysis and knowledge discovery as shown in fig1. Data Collection Data Preprocessing Pattern Discovery Analysis and knowledge Discovery Figure1: the structure of web usage mining Here data preprocessing phase consists of data cleaning, user and session identification and generating the database of log file. Pattern discovery is phase which extracts the usage patterns from the preprocessed data. Pattern analysis and knowledge discovery is final phase of WUM which filters the uninteresting patterns and rules from the interesting patterns. This is a crucial phase of WUM as it identifies the interests and web watching behavior of user s. Analyzing the user behavior has been a challenging task of web usage mining. If we are able to identify the user interests automatically, the goal of WUM is almost accomplished. This paper deals with the three main stages of WUM i.e preprocessing, pattern discovery and analysis. An efficient preprocessing methodology is discussed with a log file taken from a real time e-commerce website and experimental 55
2 results are also produced. All frequent patterns of log data, general, access and activity statistics of web log data are shown. 2. Data preprocessing Data preprocessing is a significant step in web usage mining which often consumes more time and effort. This starts with data preparation stage where the original data will be integrated and transformed into a suitable form on which specific data mining operations can be applied. It s shown below[1]. can be eliminated as they exceed the range of WUM. 3. Error requests with status codes such as 494(unknown) 404(file not found), 501(inner server error) can be removed. 5. Delete all the entries of request methods except GET method. An algorithm for data cleaning is depicted as shown below. Input: log files (LF) Output: Summarized log file (SLF) Begin 1. Read records in LF 2. For each record in LF Raw logs collected Data cleaning User and Session Identification 3. Read fields (Status code, method) 4. If status code= 200 and method= GET Then Session file and a database of cleaned log Figure2: the phases of data preprocessing 2.1 Data collection Path Completion The main sources of weblog files in web usage mining are 1.Web Servers 2.Web proxy Servers 3.Client browsers. Here Server logs supply the best usage data than the remaining log files. If at all there are multiple weblog files, they should be converted into a joint weblog file. This joint file will undergo further operations. In this paper a server log file of 7.8 MB is considered for the purpose of analysis. 5. Get IP_address and URL 6. If URL_suffix is={.gif,.js,.jpeg,.jpg,.css} Then 7. Remove URL_suffix 8. Save IP_address and URL End if Else 9. Next record End if End Algorithm for Data cleaning 2.3 User identification User identification means identifying each user accessing website, whose goal is to mine every user s access characteristic, and the make user clustering and provide 2.2 Data cleaning Data cleaning is a process which eliminates the irrelevant and redundant log entries from the original log file and converts the log file into a data base in order to identify individual user s and sessions. That irrelevant information[9] includes 1.Log entries with filename suffixes such as.gif,.jpeg,.jpg,.css,.cgi, can be deleted because these images will auto download with our requested pages. 2. The entries with filename suffixes such as robot.txt Figure 3: A database of cleaned log 56
3 personal service for the users. But user identification is complicated by the presence of local caches, proxy servers. We assume that each user has unique IP address and each IP address represents one user. But in fact there are three conditions: (1)Some user has unique IP address.(2).due to proxy server, some user may share one IP address.as of now, we propose following rules[4] for user identification: If there is a new IP address, then there is a new user. If the IP address is same, but the operating system or browser are different, then assumption is that each different agent type for an IP address represents a different user. Moreover we give some notations for user identification. Here Usersi= {User_ID, User_IP, User_Url, User_Time, User_RefferPage, User_Agent), 0<i<n where i is the no of total users; User_ID is user s ID have been identified. User_IP is the user s IP address. User_Url is the web page accessed. User_Time is the time at which user accessed. User_RefferPage is the last page that the user requested. User_Agent is the agent user used. By applying all those above rules, we can easily identify the individual users. 2.4 Session identification The goal of session identification is to divide the page requests of each user into individual sessions i.e we find each user s access pattern and frequent path. The best method to identify a session is using a timeout mechanism. We use the following rules[9] in our experiment to identify individual sessions.1.if there is a new user, then there is a new session 2.If the referrer page is null in a user session, then we can make sure that there is a new session.3.if the time between page requests exceeds certain limit (25 or 30 minutes), we can assume that user is starting a new session. Here we propose some notation notations which help us to identify user s sessions. Sessionsi={User_ID,Sj,[urlj1,urlj2, urljk]), 0<i<n where n is the total no of sessions. User_ID stands for user s ID that has been identified; Sj stands for one of the user s sessions; urljk stands for aggregate of web pages in session Sj. By applying the above stated rules, we can identify user s sessions. 2.5 Path completion Because of local buffers existence, some requested pages will not be recorded in access log. The goal of path completion is to fill in all the missing references that are not recorded. The solution for path completion[9] is that if a requested page can be reachable by a hyperlink from any of the visited pages by the user, we assume that it should be added in the session. When there are two or more pages which have a super link to it in one session, then it should be placed before the latest visited page. 3. Experimental Results In this paper we took the server log file of a e-commerce site dreamers.net.in whose size is around 7.8 MB. Various analyses have been done to identify the user web watching behavior and interests. Table1: format of the weblog taken host url time status method agent Here the results of extracted user profiles have been in the form of tables. Table2 table 3, table4 shows user s daily access statistics, top hosts, most requested images etc. Table2: user s daily access statistics Date Hits Page Views visitors Table 3: Top Hosts S no Hosts Hits Bandwidth
4 Table 4: Most requested images Images Hits image/data/logo.png 46 image/data/cart.png 40 img-sys/headerbg.png 47 image/cache/data/imac_90*90.png 51 catalog/view/theme/default.png 65 image/cache/data/palm_logo.png 54 image/cache/data/ipod_shuffle.png 48 image/cache/data/ipod_touch.png 46 image/cache/data/hp_logo.png 72 catalog/view/theme/default/add.png 34 image/cache/data/hp_banner.png 76 image/cache/data/macbook_pr.png 43 cache/data/iphone_1-80*80.png 56 Fig 5: Status codes Fig 6: Most popular browsers Fig 4: Most popular pages 58
5 4.Conclusion And Future work In this paper we presented an efficient preprocessing methodology for web log data and we described some techniques to identify individual users and sessions. And we analyzed a server log file of an ecommerce site to determine some statistics like user s daily access statistics, top hosts, most popular requested pages, most popular images, browsers, hits per each days etc. Apart from that, status codes and frequent error types are also shown to help the system administrator and web designer in improving the performance of the web site. Similar studies can be done for any other web sites to improve their performance. But this work can be extended by applying data mining techniques like association, classification, clustering to a group of regular users to find frequently accessed patterns that leads to high accuracy and performance. Fig 7: Hits per each day in January Acknowledgement We are very thankful to the faculty of IT Department, KL University, Vijayawada, India for guiding us throughout this research. References Fig 8: Error Types [1].K.R Sunnetha, R.krishnamoorthi, Identifying User Behavior by Analyzing Web Server Access Log File IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 [2].R. Cooley, B. Mobasher, and J. Srivastava Web Mining: Information and Pattern Discovery on the World Wide Web. [3].Li Chaofeng Research and Development of Data Preprocessing in Web Usage Mining [4].Suneetha K.R, Dr. R. Krishnamoorthi Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Proceedings of the World Congress on Engineering and Computer Science [5].Mr. Sanjay Bapu Thakare, Prof. Sangrarn. Z. Gawali A Effective and Complete Preprocessing for Web Usage Mining International Journal on Computer Science and Engineering. 59
6 [6].Jaideep Srivastava,Robert Cooleyz, Mukund Deshpande, Pang-Ning Tan Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data [7].G T Raju and P S Satyanarayana Knowledge Discovery from Web Usage Data: CompletePreprocessing Methodology International Journal of Computer Science and Network Security. [8] Berendt, B., B. Mobasher, M. Nakagawa, and M. Spiliopoulou, The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis, Lecture Notes in Computer Science, Vol. 2703, pp , September, [9].Fang yuan, Li-Juan wang, ge yu Study on data preprocessing algorithm in web log mining Proceedings of the Second International Conference on Machine Learning and Cybernetics, Wan, 2-5 November About Authors Ms.T Revathi is currently working as Assistant Professor in the department of IT, KL University, Vijayawada, AP, and India. She received her master s degree from JNTU Kakinada. She published many papers in international journals. Her area of interests includes web usage mining, advanced computer architectures. M.Praveenkumar,R.RavindraBabu,Md.Khallelur Rahaman,B.Aditya Reddy, all are pursuing B.tech final year in the Department of InfromationTechnology, KL University, Vijayawada,AP,India. Their area of interests is data mining, android and cloud computing. 60
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 [email protected]
Advanced Preprocessing using Distinct User Identification in web log usage data
Advanced Preprocessing using Distinct User Identification in web log usage data Sheetal A. Raiyani 1, Shailendra Jain 2, Ashwin G. Raiyani 3 Department of CSE (Software System), Technocrats Institute of
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House
Data Preprocessing and Easy Access Retrieval of Data through Data Ware House Suneetha K.R, Dr. R. Krishnamoorthi Abstract-The World Wide Web (WWW) provides a simple yet effective media for users to search,
Web Usage mining framework for Data Cleaning and IP address Identification
Web Usage mining framework for Data Cleaning and IP address Identification Priyanka Verma The IIS University, Jaipur Dr. Nishtha Kesswani Central University of Rajasthan, Bandra Sindri, Kishangarh Abstract
Pre-Processing: Procedure on Web Log File for Web Usage Mining
Pre-Processing: Procedure on Web Log File for Web Usage Mining Shaily Langhnoja 1, Mehul Barot 2, Darshak Mehta 3 1 Student M.E.(C.E.), L.D.R.P. ITR, Gandhinagar, India 2 Asst.Professor, C.E. Dept., L.D.R.P.
PREPROCESSING OF WEB LOGS
PREPROCESSING OF WEB LOGS Ms. Dipa Dixit Lecturer Fr.CRIT, Vashi Abstract-Today s real world databases are highly susceptible to noisy, missing and inconsistent data due to their typically huge size data
Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data
Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI
AN EFFICIENT APPROACH TO PERFORM PRE-PROCESSING
AN EFFIIENT APPROAH TO PERFORM PRE-PROESSING S. Prince Mary Research Scholar, Sathyabama University, hennai- 119 [email protected] E. Baburaj Department of omputer Science & Engineering, Sun Engineering
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data
A Survey on Preprocessing of Web Log File in Web Usage Mining to Improve the Quality of Data R. Lokeshkumar 1, R. Sindhuja 2, Dr. P. Sengottuvelan 3 1 Assistant Professor - (Sr.G), 2 PG Scholar, 3Associate
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Arti Tyagi Sunita Choudhary
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
Analysis of Server Log by Web Usage Mining for Website Improvement
IJCSI International Journal of Computer Science Issues, Vol., Issue 4, 8, July 2010 1 Analysis of Server Log by Web Usage Mining for Website Improvement Navin Kumar Tyagi 1, A. K. Solanki 2 and Manoj Wadhwa
Web Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING
ANALYSIS OF WEB LOGS AND WEB USER IN WEB MINING L.K. Joshila Grace 1, V.Maheswari 2, Dhinaharan Nagamalai 3, 1 Research Scholar, Department of Computer Science and Engineering [email protected]
A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining
A Sun Javafx Based Data Analysis Tool for Real Time Web Usage Mining Kiran Patidar Department of Computer Engineering Padmashree Dr.D.Y. Patil Institute of Engineering And Technology Pimpri,Pune Abstract-
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
An Enhanced Framework For Performing Pre- Processing On Web Server Logs
An Enhanced Framework For Performing Pre- Processing On Web Server Logs T.Subha Mastan Rao #1, P.Siva Durga Bhavani #2, M.Revathi #3, N.Kiran Kumar #4,V.Sara #5 # Department of information science and
How To Analyze Web Server Log Files, Log Files And Log Files Of A Website With A Web Mining Tool
International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol 4, Issue 1, 2013, pp1-8 http://bipublication.com ANALYSIS OF WEB SERVER LOG FILES TO INCREASE THE EFFECTIVENESS
Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 2, Issue 5 (March 2013) PP: 16-21 Web Mining Patterns Discovery and Analysis Using Custom-Built Apriori Algorithm
Identifying User Behavior by Analyzing Web Server Access Log File
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.4, April 2009 327 Identifying User Behavior by Analyzing Web Server Access Log File K. R. Suneetha, Dr. R. Krishnamoorthi,
Web Usage Mining: Identification of Trends Followed by the user through Neural Network
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 617-624 International Research Publications House http://www. irphouse.com /ijict.htm Web
Generalization of Web Log Datas Using WUM Technique
Generalization of Web Log Datas Using WUM Technique 1 M. SARAVANAN, 2 B. VALARAMATHI, 1 Final Year M. E. Student, 2 Professor & Head Department of Computer Science and Engineering SKP Engineering College,
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
An Overview of Preprocessing on Web Log Data for Web Usage Analysis
International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4, March 2013 An Overview of Preprocessing on Web Log Data for Web Usage Analysis Naga
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING
AN OVERVIEW OF PREPROCESSING OF WEB LOG FILES FOR WEB USAGE MINING N. M. Abo El-Yazeed Demonstrator at High Institute for Management and Computer, Port Said University, Egypt [email protected]
Association rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, [email protected] Tanja Krunić, The
ABSTRACT The World MINING 1.2.1 1.2.2. R. Vasudevan. Trichy. Page 9. usage mining. basic. processing. Web usage mining. Web. useful information
SSRG International Journal of Electronics and Communication Engineering (SSRG IJECE) volume 1 Issue 1 Feb Neural Networks and Web Mining R. Vasudevan Dept of ECE, M. A.M Engineering College Trichy. ABSTRACT
Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
A SURVEY ON WEB MINING TOOLS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 10, Oct 2015, 27-34 Impact Journals A SURVEY ON WEB MINING TOOLS
Why Google Analytics Cannot Be Used For Educational Web Content
Why Google Analytics Cannot Be Used For Educational Web Content Sanda-Maria Dragoş Chair of Computer Systems, Department of Computer Science Faculty of Mathematics and Computer Science Babes-Bolyai University
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING
International Journal of Science, Environment and Technology, Vol. 2, No 5, 2013, 1008 1016 ISSN 2278-3687 (O) ANALYSING SERVER LOG FILE USING WEB LOG EXPERT IN WEB DATA MINING 1 V. Jayakumar and 2 Dr.
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS
CHAPTER 3 PREPROCESSING USING CONNOISSEUR ALGORITHMS 3.1 Introduction In this thesis work, a model is developed in a structured way to mine the frequent patterns in e-commerce domain. Designing and implementing
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
Cloud Mining: Web usage mining and user behavior analysis using fuzzy C-means clustering
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 2 (Nov-Dec. 2012), PP 09-15 Cloud Mining: Web usage mining and user behavior analysis using fuzzy C-means
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors
A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. [email protected]
Web Mining Functions in an Academic Search Application
132 Informatica Economică vol. 13, no. 3/2009 Web Mining Functions in an Academic Search Application Jeyalatha SIVARAMAKRISHNAN, Vijayakumar BALAKRISHNAN Faculty of Computer Science and Engineering, BITS
A Cube Model for Web Access Sessions and Cluster Analysis
A Cube Model for Web Access Sessions and Cluster Analysis Zhexue Huang, Joe Ng, David W. Cheung E-Business Technology Institute The University of Hong Kong jhuang,kkng,[email protected] Michael K. Ng,
Access Patterns in Web Log Data: A Review
Journal of Network and Innovative Computing ISSN 2160-2174, Volume 1 (2013) pp. 348-355 MIR Labs, www.mirlabs.net/jnic/index.html Access Patterns in Web Log Data: A Review Mohammed Hamed Ahmed Elhiber
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
Analysis of Web Log from Database System utilizing E-web Miner Algorithm
Analysis of Web Log from Database System utilizing E-web Miner Algorithm Mukul B. Chavan P.G. Student, Dept. of Computer Engineering G.H. Raisoni College of Engg & Mgmt, Wagholi Pune, India [email protected]
UNIVERSITI TEKNOLOGI MARA THE DEVELOPMENT AND EVALUATION OF CONFIGURABLE WEB USAGE ANALYZER NASRUL AZLI BIN AHMAD
UNIVERSITI TEKNOLOGI MARA FACULTY OF INFORMATION TECHNOLOGY AND QUANTITATIVE SCIENCE THE DEVELOPMENT AND EVALUATION OF CONFIGURABLE WEB USAGE ANALYZER BY NASRUL AZLI BIN AHMAD 2004633591 B. Sc (HONS) DATA
V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu, India [email protected]
(IJCSIS) International Journal of Computer Science and Information Security, A Survey on Preprocessing Methods for Web Usage Data V.Chitraa Lecturer CMS College of Science and Commerce Coimbatore, Tamilnadu,
KOINOTITES: A Web Usage Mining Tool for Personalization
KOINOTITES: A Web Usage Mining Tool for Personalization Dimitrios Pierrakos Inst. of Informatics and Telecommunications, [email protected] Georgios Paliouras Inst. of Informatics and Telecommunications,
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining
Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,
Web Mining as a Tool for Understanding Online Learning
Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA [email protected] James Laffey University of Missouri Columbia Columbia, MO USA [email protected]
Web Log Based Analysis of User s Browsing Behavior
Web Log Based Analysis of User s Browsing Behavior Ashwini Ladekar 1, Dhanashree Raikar 2,Pooja Pawar 3 B.E Student, Department of Computer, JSPM s BSIOTR, Wagholi,Pune, India 1 B.E Student, Department
Indirect Positive and Negative Association Rules in Web Usage Mining
Indirect Positive and Negative Association Rules in Web Usage Mining Dhaval Patel Department of Computer Engineering, Dharamsinh Desai University Nadiad, Gujarat, India Malay Bhatt Department of Computer
A Tool for Web Usage Mining
8th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'07), 16-19 December, 2007, Birmingham, UK. A Tool for Web Usage Mining Jose M. Domenech 1 and Javier Lorenzo 2
Business Lead Generation for Online Real Estate Services: A Case Study
Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer
Implementation of a New Approach to Mine Web Log Data Using Mater Web Log Analyzer Mahadev Yadav 1, Prof. Arvind Upadhyay 2 1,2 Computer Science and Engineering, IES IPS Academy, Indore India Abstract
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING
A COGNITIVE APPROACH IN PATTERN ANALYSIS TOOLS AND TECHNIQUES USING WEB USAGE MINING M.Gnanavel 1 & Dr.E.R.Naganathan 2 1. Research Scholar, SCSVMV University, Kanchipuram,Tamil Nadu,India. 2. Professor
ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 2007 : 7 : 2 (379-386) ANALYZING OF SYSTEM ERRORS FOR INCREASING A WEB SERVER PERFORMANCE BY USING WEB USAGE MINING
Analysing Large Web Log Files in a Hadoop Distributed Cluster Environment
Analysing Large Files in a Hadoop Distributed Cluster Environment S Saravanan, B Uma Maheswari Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham,
Web Log Mining: A Study of User Sessions
UNIVERSITY OF PADUA Department of Information Engineering PersDL 2007 10th DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries Corfu, Greece,
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING Dr.S. Vijiyarani 1 and Ms. E. Suganya 2 1 Assistant professor, Department of Computer science, School of Computer Science and Engineering, Bharathiar University, Coimbatore
Web Usage Association Rule Mining System
Interdisciplinary Journal of Information, Knowledge, and Management Volume 6, 2011 Web Usage Association Rule Mining System Maja Dimitrijević The Advanced School of Technology, Novi Sad, Serbia [email protected]
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey
1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics
Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012 Web Users Session Analysis Using DBSCAN and Two Phase Utility Mining Algorithms G. Sunil
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Web usage mining: Review on preprocessing of web log file
Web usage mining: Review on preprocessing of web log file Sunita sharma Ashu bansal M.Tech., CSE Deptt. A.P., CSE Deptt. Hindu College of Engg. Hindu College of Engg. Sonepat, Haryana Sonepat, Haryana
Web Mining using Artificial Ant Colonies : A Survey
Web Mining using Artificial Ant Colonies : A Survey Richa Gupta Department of Computer Science University of Delhi ABSTRACT : Web mining has been very crucial to any organization as it provides useful
A Survey on Web Mining Tools and Techniques
A Survey on Web Mining Tools and Techniques 1 Sujith Jayaprakash and 2 Balamurugan E. Sujith 1,2 Koforidua Polytechnic, Abstract The ineorable growth on internet in today s world has not only paved way
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
FRAMEWORK FOR WEB PERSONALIZATION USING WEB MINING
FRAMEWORK FOR WEB PERSONALIZATION USING WEB MINING Monika Soni 1, Rahul Sharma 2, Vishal Shrivastava 3 1 M. Tech. Scholar, Arya College of Engineering and IT, Rajasthan, India, [email protected] 2 M.
Web Server Performance Optimization using Prediction Prefetching Engine
Web Server Performance Optimization using Prediction Prefetching Engine Silky Makker Dept of Computer Science & Engg, Manav Rachna International University Faridabad, India R.K Rathy Dept of Computer Science
A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation
A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation Amit Pratap Singh 1, Dr. R. C. Jain 2 1 Research Scholar, Samrat Ashok Technical Institute, Visdisha, M.P., Barkatullah
WebAdaptor: Designing Adaptive Web Sites Using Data Mining Techniques
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. WebAdaptor: Designing Adaptive Web Sites Using Data Mining Techniques Howard J. Hamilton, Xuewei Wang, and Y.Y. Yao
A SURVEY OF PERSONALIZED WEB SEARCH USING BROWSING HISTORY AND DOMAIN KNOWLEDGE
A SURVEY OF PERSONALIZED WEB SEARCH USING BROWSING HISTORY AND DOMAIN KNOWLEDGE GOODUBAIGARI AMRULLA 1, R V S ANIL KUMAR 2,SHAIK RAHEEM JANI 3,ABDUL AHAD AFROZ 4 1 AP, Department of CSE, Farah Institute
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
VOL. 3, NO. 7, July 2013 ISSN 2225-7217 ARPN Journal of Science and Technology 2011-2012. All rights reserved.
An Effective Web Usage Analysis using Fuzzy Clustering 1 P.Nithya, 2 P.Sumathi 1 Doctoral student in Computer Science, Manonmanaiam Sundaranar University, Tirunelveli 2 Assistant Professor, PG & Research
An Empirical Study of Application of Data Mining Techniques in Library System
An Empirical Study of Application of Data Mining Techniques in Library System Veepu Uppal Department of Computer Science and Engineering, Manav Rachna College of Engineering, Faridabad, India Gunjan Chindwani
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Web Log Data Sparsity Analysis and Performance Evaluation for OLAP
Web Log Data Sparsity Analysis and Performance Evaluation for OLAP Ji-Hyun Kim, Hwan-Seung Yong Department of Computer Science and Engineering Ewha Womans University 11-1 Daehyun-dong, Seodaemun-gu, Seoul,
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
