21,995 Hits in 7.7 sec

The Explore of the Web-Based Learning Environment Base on Web Sequential Pattern Mining

Hai-yan Wu, Jing-jun Zhu, Xin-yu Zhang
2009 2009 International Conference on Computational Intelligence and Software Engineering  
We present a method of transaction identification based on users' access path tree. It can find out all the transactions effectively.  ...  In this paper, we present an efficient method of web sequential pattern mining in the Elearning environment.  ...  So the transaction identification is actually to find all the MFPs in a user session. We can find the MFPs from a user's access path in a session.  ... 
doi:10.1109/cise.2009.5364267 fatcat:iiiwe3ze4bhsjdpil7czsefrta

An Efficient Method of Web Sequential Pattern Mining Based on Session Filter and Transaction Identification

Jingjun Zhu, Haiyan Wu, Guozhu Gao
2010 Journal of Networks  
We present a method of transaction identification based on users' access path tree. It can find out all the transactions effectively.  ...  In this paper, we present an efficient method of web sequential pattern mining based on session filter and transaction identification.  ...  So the transaction identification is actually to find all the MFPs in a user session. We can find the MFPs from a user's access path in a session.  ... 
doi:10.4304/jnw.5.9.1017-1024 fatcat:c5giqidenjegtlxeytow4kwyvq

Link Based Session Reconstruction: Finding All Maximal Paths [article]

Murat Ali Bayir, Ismail Hakki Toroslu
2013 arXiv   pre-print
This paper introduces a new method for the session construction problem, which is the first main step of the web usage mining process.  ...  Through experiments, it is shown that when our new technique is used, it outperforms previous approaches in web usage mining applications such as next-page prediction.  ...  INTRODUCTION The purpose of Web Usage Mining (WUM) [3] is to find interesting knowledge about navigation behaviors of web users.  ... 
arXiv:1307.1927v1 fatcat:pi4vfowhebetbgx47bo7vtkmoy

Smart Miner

Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar, Guven Fidan
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
of paths traversed in the web graph that corresponds to users' navigations among web pages.  ...  In this paper, we propose a novel framework called Smart-Miner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation patterns.  ...  We proved with maximality property that all possible paths that can be generated from user access sequence must be subset of at least one maximal path.  ... 
doi:10.1145/1526709.1526732 dblp:conf/www/BayirTCF09 fatcat:xtugkexzlbbtnaglv4cdn5jf4q

A Novel Technique for Web Log mining with Better Data Cleaning and Transaction Identification

2011 Journal of Computer Science  
Sessions are reconstructed and paths are completed by appending missing pages in preprocessing.  ...  There are several techniques like web usage mining exists. But all processes its own disadvantages.  ...  First by using Maximal Forward Reference the paths in a session is split into forward reference paths. Travel paths of a user session are found.  ... 
doi:10.3844/jcssp.2011.683.689 fatcat:dognijmcknfqnmtwhmipynhafq

Navigation Patterns Mining Approach Based On Expectation Maximization Algorithm

Norwati Mustapha, Manijeh Jalali, Abolghasem Bozorgniya, Mehrdad Jalali
2009 Zenodo  
The model makes user model based on expectation-maximization (EM) algorithm.An EM algorithm is used in statistics for finding maximum likelihood estimates of parameters in probabilistic models, where the  ...  Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. In this study we advance a model for mining of user-s navigation pattern.  ...  Data pretreatment in a web usage mining model, aims to reformat the original web logs to identify all web access sessions.  ... 
doi:10.5281/zenodo.1058346 fatcat:e7bck6tttzbs5fmob3diecrgy4

SpeedTracer: A Web usage mining and analysis tool

K.-L. Wu, P. S. Yu, A. Ballman
1998 IBM Systems Journal  
Q6 wu, YU, AND BALLMAN quences among the maximal forward paths of all user sessions.  ...  As a result, SpeedTracer first finds all maximum forward paths in each user session, and then discovers all common subpaths among all the maximum forward paths of user sessions.  ... 
doi:10.1147/sj.371.0089 fatcat:xss6k4cpyzhldi3m4pqjwclspe

Data Preparation for Mining World Wide Web Browsing Patterns

Robert Cooley, Bamshad Mobasher, Jaideep Srivastava
1999 Knowledge and Information Systems  
This paper presents several data preparation techniques in order to identify unique users and user sessions.  ...  Usage analysis includes straightforward statistics, such as page access frequency, as well as more sophisticated forms of analysis, such as finding the common traversal paths through a Web site.  ...  Session identification takes all of the page references for a given user in a log and breaks them up into user sessions.  ... 
doi:10.1007/bf03325089 fatcat:74ghidllhba3nhwmhfi3u7rzxe

WebFrame: In Pursuit of Computationally and Cognitively Efficient Web Mining [chapter]

Tong Zheng, Yonghe Niu, Randy Goebel
2002 Lecture Notes in Computer Science  
The goal of web mining is relatively simple: provide both computationally and cognitively efficient methods for improving the value of information to users of the WWW.  ...  methods, and the evaluation of the results of applying the results of learning in a web application.  ...  paths (in this case web logs).  ... 
doi:10.1007/3-540-47887-6_26 fatcat:ikpudl2tkvg2nnhoyxwixf3bci


2013 Journal of Computer Science  
The web has played a vital role to detect the information and finding the reasons to organize a system. As the web sites were increased, the web log files also increased based on the web searching.  ...  Aimed to overcome the deficiency of abundant data to web mining, the study proposed a path extraction using Euclidean Distance based algorithm with a sequential pattern clustering mining algorithm.  ...  The first step is splitting the forward reference paths by using the maximal forward reference paths in a particular session by user and travel path is also identified from those paths.  ... 
doi:10.3844/jcssp.2013.771.779 fatcat:5772wx5bpjfuvdngwbat2eshne

Similarity Matrix Based Session Clustering by Sequence Alignment Using Dynamic Programming

K. Duraiswamy, V. Valli Mayil
2008 Computer and Information Science  
Categorizing visitors or users based on their interaction with a web site is a key problem in web usage mining.  ...  of user in E-learning system , finding group of visitors with similar interest , providing customized content in site manager, categorizing customers in E-shopping etc.  ...  Clustering of user session starts with finding similarity between all pairs of user sessions. Here we use the sequence alignment using dynamic programming technique to find session similarities.  ... 
doi:10.5539/cis.v1n3p66 fatcat:4cddadasqvd3hpzqpemds46ymy

Preprocessing Techniques in Web Usage Mining: A Survey

Mitali Srivastava, Rakhi Garg, P. K. Mishra
2014 International Journal of Computer Applications  
Due to huge, unstructured and scattered amount of data available on web, it is very tough for users to get relevant information in less time.  ...  To achieve this, improvement in design of web site, personalization of contents, prefetching and caching activities are done according to user's behavior analysis.  ...  First Maximal forward reference is used to find the sequence of page in user access path and it is also used to identify the page, and finally Reference length algorithm is used to find whether the page  ... 
doi:10.5120/17104-7737 fatcat:vuogd32i6ja6lmapwwipgose2q

An Application of Session Based Clustering to Analyze Web Pages of User Interest from Web Log Files

2010 Journal of Computer Science  
Approach: The usage interest on the web pages in various sessions was partitioned into clusters such that sessions with "similar" interest were placed in the same cluster using expectation maximization  ...  Results: The approach results in the generation of usage profiles and automatic identification of user interest in each profile.  ...  Similarly, in web page 2, it occurs in Cluster2. For web page 3, the maximum rating occurs in Cluster4. For web page 8, we find the maximum rating appears in Cluster0.  ... 
doi:10.3844/jcssp.2010.785.793 fatcat:ioqteajtcvd75kb5hroa5dtsl4

Web Usage Mining — Languages and Algorithms [chapter]

J. R. Punin, M. S. Krishnamoorthy, M. J. Zaki
2003 Studies in Classification, Data Analysis, and Knowledge Organization  
We provide sample results, namely frequent patterns of users in a web site, with our web data mining algorithm.  ...  We generate web-log reports in LOGML format for a web site from web log files and the web graph.  ...  For each user (in Figure 4) we only record the pages accessed by them, ignoring the path information. The mining task is to find all frequently accessed sets of pages.  ... 
doi:10.1007/978-3-642-55721-7_28 fatcat:nucapgpo2fbodgsdisbt6nmnqa

An Efficient path Completion and Construction with Candidate key Constrained Clustering Algorithm in web Mining

J. Umarani
2020 Bioscience Biotechnology Research Communications  
Web usage Mining is a kind of the web analysis, pre-processing stage in WUM consists the following Data Cleaning, user identification, session identification and path completion (path added).  ...  In this research article focuses the path completion part. Web log is the most valuable input of the web analysis with WUM.  ...  Companied session Proposed Work: In pre-processing stage of web usage mining includes the data cleaning, user identification and session identification and final step is Path Completion.  ... 
doi:10.21786/bbrc/13.13/38 fatcat:mnqacnqffvhqvimqwkmmgbpjva
« Previous Showing results 1 — 15 out of 21,995 results