SlideShare a Scribd company logo
1 of 20
LOGO
APPLYING WEB MINING
APPLICATION FOR USER
BEHAVIOR UNDERSTANDING
Dr. Zakaria Suliman Zubi
Associate Professor
Computer Science Department
Faculty Of Science
Sirte University, Libya
LOGO Contents
Abstract
Introduction
Phases of web usage mining
Results of using Association Rules
Conclusion
LOGO Abstract
Web usage mining (WUM) focuses on the discovering of potential knowledge from
browsing patterns of the users. Which leads us to find the correlation between pages in the
analysis stage.
The primary data source used in web usage mining is the server log-files (web-logs).
 Browsing web pages by the user leaves a lot of information in the log-file. Analyzing log-
files information drives us to understand the behavior of the user.
Web log is an essential part for the web mining to extract usage patterns and study the
visiting characteristics of user.
Our paper focus on the use of web mining techniques to classify web pages type according
to user visits.
 This classification helps us to understand the user behavior.
We also uses some classification and association rule techniques for discovering the
potential knowledge from the browsing patterns.
LOGO Contents
Abstract
Introduction
Phases of web usage mining
Results of using Association Rules
Conclusion
LOGO
The Internet offers a huge, widely global information center for
News, advertising, consume information, financial management,
education, government, and e-commerce .
The aim of using web mining techniques for understanding user
behavior is to profile user characteristics.
Web mining can be organized into three main categories: web
content mining, web structure mining, and web usage mining.
INTRODUCTION
LOGO INTRODUCTION Cont..
1-Web content mining analyzes web content such as text,
multimedia data, and structured data (within web pages or linked
across web pages).
2 -Web structure mining is the process of using graph and
network mining theory and methods to analyze the nodes and
connection structures on the Web.
3- Web Usage Mining is a special type of web mining tool, which
can discover the knowledge in the hidden browsing patterns and
analyses the visiting characteristics of the users.
Web Mining
Web Usage Mining
Web Content Mining
Web Structure Mining
LOGO INTRODUCTION Cont..
The Primary Data of Web Usage Mining
Fig 2:portion of a typical server log
A standard log-file had the following format
remotehost; logname; username; date; request; status; bytes[ where:
remotehost: is the remote hostname or its IP address;
logname:is the remote log name of the user;
username: is the username with which the user has authenticated himself,
date: is the date and time of the request,
request: is the exact request line as it came from the client,
status: is the HTTP status code returned to the client, and
bytes: is the content-length of the document transferred.
1-Web server logs .
2-Data about visitors of the sites.
3-Registration forms.
LOGO Contents
Abstract
Introduction
Phases of web usage mining
Results of using Association Rules
Conclusion
LOGO
Web usage mining is a complete process that
includes various stages of data mining cycle, including
Data Preprocessing, Pattern Discovery & Pattern
Analysis.
 Initially, at the data preprocessing stage web log is
preprocessed to clean, integrate and transform into a
common log.
In the pattern discovery: Data mining techniques
are applied to discover the interesting characteristics
in the hidden patterns.
Pattern Analysis is the final stage of web usage
mining which can validate interested patterns from the
output of pattern discovery that can be used to predict
user behavior.
THE PHASES OF WEB USAGE MINING
LOGO THE PHASES OF WEB USAGE MINING
Data Preprocessing Process
Data Cleaning:
The log-file is first examined to remove
irrelevant entries such as those that represent
multimedia data and scripts or uninteresting
entries such as those that belongs to top/bottom
frames.
Pageview Identification:
Identification of page views is heavily
dependent on the intra-page structure of the
site, as well as on the page contents and the
underlying site do-main knowledge. each
pageview can be viewed as a collection of Web
objects or resources representing a specific
“user event,”. Session
Identification
User
Identification
Pageview
Identification
Data
Cleaning
LOGO
Data Preprocessing Process
User Identification:
Since several users may share a single
machine name, certain heuristics are
used to identify users . We use the
phrase user activity record to refer to the
sequence of logged activities belonging
to the same user.
Session Identification:
 Aims to split the page access of each
user into separated sessions. It defines
the number of times the user has
accessed a web page and time out
defines a time limit for the access of
particular web page for more than 30
minutes if more the session will be
divided in more than one session.
Sample of user and sessions identification
THE PHASES OF WEB USAGE MINING
LOGO THE PHASES OF WEB USAGE MINING
Pattern Discovery Process:
Discovering user access pattern from the user access log files is the main
purpose of using web usage mining .
Association Rule Mining:
Association rule mining discovery and statistical correlation analysis can
find groups of web pages types that are commonly accessed together
(Association rule mining can be used to discover correlation between pages
types found in a web log) this technique is applied to user and session
identification consisting of item where every item represents a page type ,we
will also use Apriori algorithm to find the correlation between pages based on
the confidence and support vectors.
What are the set of pages type frequently accessed together by the web users.
e.g (Sport, News, Social)
What the page type will be fetched next.
e.g Entertainment
LOGO THE PHASES OF WEB USAGE MINING
Classification
Classification techniques play an important role in Web analytics
applications for modeling the users according to various predefined
metrics.
In the Web domain, we are interested in developing a profile of users
belonging to a particular class or category . This requires extraction and
selection of features that best describe the properties of a given class or
category.
We will focus also on k-nearest neighbor (K-NN) which was
considered as a predictive technique for classification models. Whereas;
 k represents a number of similar cases or the number of items in the
group.
LOGO THE PHASES OF WEB USAGE MINING
Pattern Analysis Process:
In this stage of process the discovered patterns will further
processed ,filtered ,possibly resulting in aggregate user models
that can be used as a visualizations tools ,the next figure
summarizes the whole process:
LOGO Contents
Abstract
Introduction
Phases of web usage mining
Results of using Association Rules
Conclusion
LOGO RESULTS OF USING ASSOCIATION RULES
Log-file in a flat file format. Import log-file database to our implemented
application.
LOGO
Extract the transactional database of
web sever log for every user where
every transaction represents a session.
Find the association rules of user
behavior after applying the Aprori
algorithm to the transactional database of
the user.
RESULTS OF USING ASSOCIATION RULES
LOGO Contents
Abstract
Introduction
Phases of web usage mining
Results of using Association Rules
Conclusion
LOGO CONCLUSION
 We used web data that contained all the information about the user. When
the user leaves accessing the web pages. This data is called web logs or (server-
logs)
A statistical methods such as classification, association rule mining discovery
and statistical correlation analysis which can find groups of web pages types
that are commonly accessed together are applied as well.
Classification is used to map the data item into one of several predefined
classes. The class will belongs into one category such as sport or politics or
education or..etc. We also uses the k-nearest neighbor (K-NN) algorithm as a
common classification method to select the best class.
Association rule mining was used to discover correlation between sites types
found in a web log.
The implemented application program was designed in C# programming
language.
LOGO
Any Questions????

More Related Content

Similar to applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp01.ppt

Logminingsurvey
LogminingsurveyLogminingsurvey
Logminingsurvey
drewz lin
 
2000-08.doc
2000-08.doc2000-08.doc
2000-08.doc
butest
 
2000-08.doc
2000-08.doc2000-08.doc
2000-08.doc
butest
 

Similar to applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp01.ppt (20)

Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
Logminingsurvey
LogminingsurveyLogminingsurvey
Logminingsurvey
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
 
Implementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server MonitoringImplementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server Monitoring
 
C017231726
C017231726C017231726
C017231726
 
Bb31269380
Bb31269380Bb31269380
Bb31269380
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
IRJET - Re-Ranking of Google Search Results
IRJET - Re-Ranking of Google Search ResultsIRJET - Re-Ranking of Google Search Results
IRJET - Re-Ranking of Google Search Results
 
A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining A Comparative Study of Recommendation System Using Web Usage Mining
A Comparative Study of Recommendation System Using Web Usage Mining
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web MiningA Novel Method for Data Cleaning and User- Session Identification for Web Mining
A Novel Method for Data Cleaning and User- Session Identification for Web Mining
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
Webmining ppt
Webmining pptWebmining ppt
Webmining ppt
 
Framework for web personalization using web mining
Framework for web personalization using web miningFramework for web personalization using web mining
Framework for web personalization using web mining
 
Framework for web personalization using web mining
Framework for web personalization using web miningFramework for web personalization using web mining
Framework for web personalization using web mining
 
2000-08.doc
2000-08.doc2000-08.doc
2000-08.doc
 
2000-08.doc
2000-08.doc2000-08.doc
2000-08.doc
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

More from Zakaria Zubi

Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
Zakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
Zakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
Zakaria Zubi
 

More from Zakaria Zubi (13)

Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Edi text
Edi textEdi text
Edi text
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Recently uploaded

PODOCARPUS...........................pptx
PODOCARPUS...........................pptxPODOCARPUS...........................pptx
PODOCARPUS...........................pptx
Cherry
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Cherry
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.
Cherry
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
NazaninKarimi6
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
Cherry
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
Cherry
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 

Recently uploaded (20)

CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
 
Use of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptxUse of mutants in understanding seedling development.pptx
Use of mutants in understanding seedling development.pptx
 
PODOCARPUS...........................pptx
PODOCARPUS...........................pptxPODOCARPUS...........................pptx
PODOCARPUS...........................pptx
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
GBSN - Microbiology (Unit 3)Defense Mechanism of the body
GBSN - Microbiology (Unit 3)Defense Mechanism of the body GBSN - Microbiology (Unit 3)Defense Mechanism of the body
GBSN - Microbiology (Unit 3)Defense Mechanism of the body
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
Site specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdfSite specific recombination and transposition.........pdf
Site specific recombination and transposition.........pdf
 
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRingsTransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
TransientOffsetin14CAftertheCarringtonEventRecordedbyPolarTreeRings
 
Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.Phenolics: types, biosynthesis and functions.
Phenolics: types, biosynthesis and functions.
 
Site Acceptance Test .
Site Acceptance Test                    .Site Acceptance Test                    .
Site Acceptance Test .
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Dr. E. Muralinath_ Blood indices_clinical aspects
Dr. E. Muralinath_ Blood indices_clinical  aspectsDr. E. Muralinath_ Blood indices_clinical  aspects
Dr. E. Muralinath_ Blood indices_clinical aspects
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kanchipuram Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp01.ppt

  • 1. LOGO APPLYING WEB MINING APPLICATION FOR USER BEHAVIOR UNDERSTANDING Dr. Zakaria Suliman Zubi Associate Professor Computer Science Department Faculty Of Science Sirte University, Libya
  • 2. LOGO Contents Abstract Introduction Phases of web usage mining Results of using Association Rules Conclusion
  • 3. LOGO Abstract Web usage mining (WUM) focuses on the discovering of potential knowledge from browsing patterns of the users. Which leads us to find the correlation between pages in the analysis stage. The primary data source used in web usage mining is the server log-files (web-logs).  Browsing web pages by the user leaves a lot of information in the log-file. Analyzing log- files information drives us to understand the behavior of the user. Web log is an essential part for the web mining to extract usage patterns and study the visiting characteristics of user. Our paper focus on the use of web mining techniques to classify web pages type according to user visits.  This classification helps us to understand the user behavior. We also uses some classification and association rule techniques for discovering the potential knowledge from the browsing patterns.
  • 4. LOGO Contents Abstract Introduction Phases of web usage mining Results of using Association Rules Conclusion
  • 5. LOGO The Internet offers a huge, widely global information center for News, advertising, consume information, financial management, education, government, and e-commerce . The aim of using web mining techniques for understanding user behavior is to profile user characteristics. Web mining can be organized into three main categories: web content mining, web structure mining, and web usage mining. INTRODUCTION
  • 6. LOGO INTRODUCTION Cont.. 1-Web content mining analyzes web content such as text, multimedia data, and structured data (within web pages or linked across web pages). 2 -Web structure mining is the process of using graph and network mining theory and methods to analyze the nodes and connection structures on the Web. 3- Web Usage Mining is a special type of web mining tool, which can discover the knowledge in the hidden browsing patterns and analyses the visiting characteristics of the users. Web Mining Web Usage Mining Web Content Mining Web Structure Mining
  • 7. LOGO INTRODUCTION Cont.. The Primary Data of Web Usage Mining Fig 2:portion of a typical server log A standard log-file had the following format remotehost; logname; username; date; request; status; bytes[ where: remotehost: is the remote hostname or its IP address; logname:is the remote log name of the user; username: is the username with which the user has authenticated himself, date: is the date and time of the request, request: is the exact request line as it came from the client, status: is the HTTP status code returned to the client, and bytes: is the content-length of the document transferred. 1-Web server logs . 2-Data about visitors of the sites. 3-Registration forms.
  • 8. LOGO Contents Abstract Introduction Phases of web usage mining Results of using Association Rules Conclusion
  • 9. LOGO Web usage mining is a complete process that includes various stages of data mining cycle, including Data Preprocessing, Pattern Discovery & Pattern Analysis.  Initially, at the data preprocessing stage web log is preprocessed to clean, integrate and transform into a common log. In the pattern discovery: Data mining techniques are applied to discover the interesting characteristics in the hidden patterns. Pattern Analysis is the final stage of web usage mining which can validate interested patterns from the output of pattern discovery that can be used to predict user behavior. THE PHASES OF WEB USAGE MINING
  • 10. LOGO THE PHASES OF WEB USAGE MINING Data Preprocessing Process Data Cleaning: The log-file is first examined to remove irrelevant entries such as those that represent multimedia data and scripts or uninteresting entries such as those that belongs to top/bottom frames. Pageview Identification: Identification of page views is heavily dependent on the intra-page structure of the site, as well as on the page contents and the underlying site do-main knowledge. each pageview can be viewed as a collection of Web objects or resources representing a specific “user event,”. Session Identification User Identification Pageview Identification Data Cleaning
  • 11. LOGO Data Preprocessing Process User Identification: Since several users may share a single machine name, certain heuristics are used to identify users . We use the phrase user activity record to refer to the sequence of logged activities belonging to the same user. Session Identification:  Aims to split the page access of each user into separated sessions. It defines the number of times the user has accessed a web page and time out defines a time limit for the access of particular web page for more than 30 minutes if more the session will be divided in more than one session. Sample of user and sessions identification THE PHASES OF WEB USAGE MINING
  • 12. LOGO THE PHASES OF WEB USAGE MINING Pattern Discovery Process: Discovering user access pattern from the user access log files is the main purpose of using web usage mining . Association Rule Mining: Association rule mining discovery and statistical correlation analysis can find groups of web pages types that are commonly accessed together (Association rule mining can be used to discover correlation between pages types found in a web log) this technique is applied to user and session identification consisting of item where every item represents a page type ,we will also use Apriori algorithm to find the correlation between pages based on the confidence and support vectors. What are the set of pages type frequently accessed together by the web users. e.g (Sport, News, Social) What the page type will be fetched next. e.g Entertainment
  • 13. LOGO THE PHASES OF WEB USAGE MINING Classification Classification techniques play an important role in Web analytics applications for modeling the users according to various predefined metrics. In the Web domain, we are interested in developing a profile of users belonging to a particular class or category . This requires extraction and selection of features that best describe the properties of a given class or category. We will focus also on k-nearest neighbor (K-NN) which was considered as a predictive technique for classification models. Whereas;  k represents a number of similar cases or the number of items in the group.
  • 14. LOGO THE PHASES OF WEB USAGE MINING Pattern Analysis Process: In this stage of process the discovered patterns will further processed ,filtered ,possibly resulting in aggregate user models that can be used as a visualizations tools ,the next figure summarizes the whole process:
  • 15. LOGO Contents Abstract Introduction Phases of web usage mining Results of using Association Rules Conclusion
  • 16. LOGO RESULTS OF USING ASSOCIATION RULES Log-file in a flat file format. Import log-file database to our implemented application.
  • 17. LOGO Extract the transactional database of web sever log for every user where every transaction represents a session. Find the association rules of user behavior after applying the Aprori algorithm to the transactional database of the user. RESULTS OF USING ASSOCIATION RULES
  • 18. LOGO Contents Abstract Introduction Phases of web usage mining Results of using Association Rules Conclusion
  • 19. LOGO CONCLUSION  We used web data that contained all the information about the user. When the user leaves accessing the web pages. This data is called web logs or (server- logs) A statistical methods such as classification, association rule mining discovery and statistical correlation analysis which can find groups of web pages types that are commonly accessed together are applied as well. Classification is used to map the data item into one of several predefined classes. The class will belongs into one category such as sport or politics or education or..etc. We also uses the k-nearest neighbor (K-NN) algorithm as a common classification method to select the best class. Association rule mining was used to discover correlation between sites types found in a web log. The implemented application program was designed in C# programming language.