scholarly journals DERIVING USER ACCESS PATTERNS AND MINING WEB COMMUNITY WITH WEB-LOG DATA FOR PREDICTING USER SESSIONS WITH PAJEK

2012 ◽  
Vol 03 (01) ◽  
pp. 415-419
Author(s):  
Balaji S. ◽  
◽  
Sasikala S. ◽  
2012 ◽  
Vol 2012 ◽  
pp. 1-7 ◽  
Author(s):  
Xiuming Yu ◽  
Meijing Li ◽  
Taewook Kim ◽  
Seon-phil Jeong ◽  
Keun Ho Ryu

Discovering access patterns from web log data is a typical sequential pattern mining application, and a lot of access pattern mining algorithms have been proposed. In this paper, we propose an improved approach of Gap-BIDE algorithm to extract user access patterns from web log data. Compared with the previous Gap-BIDE algorithm, a process of getting a large event set is proposed in the provided algorithm; the proposed approach can find out the frequent events by discarding the infrequent events which do not occur continuously in an accessing time before generating candidate patterns. In the experiment, we compare the previous access pattern mining algorithm with the proposed one, which shows that our approach is very efficient in discovering access patterns in large database.


Author(s):  
Muhammad Zia Aftab Khan ◽  
Jihyun Park

The purpose of this paper is to develop WebSecuDMiner algorithm to discover unusual web access patterns based on analysing the potential rules hidden in web server log and user navigation history. Design/methodology/approach: WebSecuDMiner uses equivalence class transformation (ECLAT) algorithm to extract user access patterns from the web log data, which will be used to identify the user access behaviours pattern and detect unusual one. Data extracted from the web serve log and user browsing behaviour is exploited to retrieve the web access pattern that is produced by the same user. Findings: WebSecuDMiner is used to detect whether any unauthorized access have been posed and take appropriate decisions regarding the review of the original rights of suspicious user. Research limitations/implications: The present work uses the database which is extracted from web serve log file and user browsing behaviour. Although the page is viewed by the user, the visit is not recorded in the server log file, since it can be access from the browser's cache.


Respati ◽  
2017 ◽  
Vol 7 (20) ◽  
Author(s):  
Indra Listiawan

An Institution Website is a profile of an institution for the people who directly or indirectly related to the agency. Some problems related to the performance of a web are the speed and accuracy of presentation of the information needed by the community.Technology of adaptive Website is one of technology that attempted to simplify the user to find the information that need from a website. The technology is based on web log. Log is used as a reference for the access patterns are realized in the form of recommendations links to information that is often accessed by people from the website. Log data processing performed by implemented the FWDPTree algorithm to get a particular tree structure that stores information page along with the frequency of occurrence, then performed datamining by algorithm FWDP-mine.This Technology has been able  to reach information more quickly There are still weaknesses in this system. The adaptive system has not been able to make the process of adaptation in realtime, this is due to the need for time to process large log data in order to obtain the user's access patterns, while the session that occurred during the offline process does not processed. Keywords— Adaptive web, Data Log, FWDP Algorithm, Association Rule, Realtime 


2004 ◽  
pp. 305-334 ◽  
Author(s):  
Yannis Manolopoulos ◽  
Mikolaj Morzy ◽  
Tadeusz Morzy ◽  
Alexandros Nanopoulos ◽  
Marek Wojciechowski ◽  
...  

Access histories of users visiting a web server are automatically recorded in web access logs. Conceptually, the web-log data can be regarded as a collection of clients’ access-sequences, where each sequence is a list of pages accessed by a single user in a single session. This chapter presents novel indexing techniques that support efficient processing of so-called pattern queries, which consist of finding all access sequences that contain a given subsequence. Pattern queries are a key element of advanced analyses of web-log data, especially those concerning typical navigation schemes. In this chapter, we discuss the particularities of efficiently processing user access-sequences with pattern queries, compared to the case of searching unordered sets. Extensive experimental results are given, which examine a variety of factors and illustrate the superiority of the proposed methods over indexing techniques for unordered data adapted to access sequences.


2012 ◽  
Vol 3 (4) ◽  
pp. 92-94
Author(s):  
SUJATHA PADMAKUMAR ◽  
◽  
Dr.PUNITHAVALLI Dr.PUNITHAVALLI ◽  
Dr.RANJITH Dr.RANJITH

2019 ◽  
Vol 161 ◽  
pp. 493-501
Author(s):  
Suleiman Alsaif ◽  
Alice S Li ◽  
Ben Soh ◽  
Sara Alraddady

2014 ◽  
Vol 687-691 ◽  
pp. 1592-1595
Author(s):  
Yun Peng Duan ◽  
Chun Xi Zhao ◽  
Ying Shi

With the widely application of the WWW and the emergence of Web technology, make the research of data mining has entered a new stage. Web log mining is based on the idea of data mining to analyze the server log processing. Paper aimed at the early stage of the data mining is put forward based on log data preprocessing methods, the purpose is to divide server logs into multiple unique user access sequence at a time, and to give a good algorithm.


Sign in / Sign up

Export Citation Format

Share Document