SlideShare a Scribd company logo
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012



  A Least Square Approach ToAnlayze Usage Data For
             Effective Web Personalization
                                                             S.S.Patil
                             Rajarambapu Institute of TechnologyRajaramnagar/CSE,Sangli, India
                                                  sachin.patil@ritindia.edu

Abstract—Web server logs have abundant information about                information of web pages link, relevant data, products
the nature of users accessing it. The analysis of the users             etc.Traditionally, collaborative filtering technique was
current interestbased on the navigational behavior may help             employed to do this task. It generally produces
the organizationsto guide the users in their browsing activity          recommendations on objects yet not rated by user, by
and obtain relevantinformation in a shorter span of time                matching the ratings of current user for objects with those of
[1].Web usage mining is used to discover interesting user               similar users. To increase the user click rate and service quality
navigationpatterns and can be applied to many real-world                of Internet on a specific website, Web developer or designer
problems, such as improving Web sites/pages,                            needs to know what the user really wants to do & its interest
makingadditional topic or product recommendations, user/                to customize web pages to the user by learning its
customer behavior studies, etc [23].Web usage mining, in                navigational pattern. Various approaches are defined to unreal
conjunction with standard approaches to personalization                 the applicative techniques to gethigher and corrective
helps to address some of the shortcomings of these                      recommendations for user surf.
techniques, including reliance on subjective lack of
scalability, poor performance, user ratings and sparse                                 II. OVERVIEW OF RELATED WORK
data[2,3,4,5,6]. But, it is not sufficient to discover patterns
                                                                            Various approaches have been devised for recommender
from usage data for performing the personalization tasks.
                                                                        systems[2, 3, 4, 5]. The explicitfeedback from the user or rating
It is necessary to derive a good quality of aggregate usage
                                                                        on items help to match interest with online clustering ofusers
profiles which indeed will help to devise efficient
                                                                        with “similar interest” to provide recommendations. But
recommendation for web personalization [11, 12, 13].Also
                                                                        practically itleads toward limitations of scalability and
the unsupervised and competitive learning algorithms has
                                                                        performance[6] due to the lack of sufficient user information.
help to efficiently cluster user based access patterns by
                                                                        Otherapproaches relating usage mining are implied to discover
mining web logs [19, 20, 24].
                                                                        patterns or usage profiles from implicitfeedback such as page
    This paper presents and experimentally evaluates a
                                                                        visits of users.The offline pattern discoveryusing numerous
technique for finely tuninguser clusters based on similar
                                                                        data mining techniques are used toprovide dynamic
web access patterns on their usage profiles by approximating
                                                                        recommendations             based       on      the      user ’s
through least square approach. Each cluster is having users
                                                                        shortterminterest.”WebPersonalizer” a usagebasedWeb
with similar browsing patterns. These clusters are useful
                                                                        Personalization system using Web mining techniques to
in web personalization so that it communicates better with
                                                                        provide dynamicrecommendations was proposed in [6]. In
its users.Experimental results indicate thatusing the
                                                                        [7], a novelapproach using LCS algorithmimproves the quality
generated aggregate usage profiles with approximating
                                                                        of the recommendations system for predictions by classifying
clusters through least square approach effectively
                                                                        user navigation patterns. K-means clustering followed
personalize at early stages of user visits to a site without
                                                                        byclassification for recommender systems [8] is used to
deeper knowledge about them.
                                                                        predict the futurenavigations and has improved the accuracy
                                                                        of predictions.Recent developmentsfor online personalization
IndexTerms—Aggregate Usage           Profile,Least
                                                                        through usagemining have been proposed. In [2],
SquareApproach, Web Personalization, Recommender
                                                                        experimental evaluation of two different techniques suchas
Systems,Expectation Maximization.
                                                                        PACT and ARHP based on the clustering of user transactions/
                                                                        pageviews respectively for the discovery ofusage profiles
                       I. INTRODUCTION
                                                                        was proposed.In [9], Poisson parameters to determine the
    Tremendous growth of unstructured information available             recommendation scores helped tofocus on the discovery of
on internet & e-commerce sites makes it very difficult to access        user’s interest in a sessionusing clustering approach. They
relevant information quickly & efficiently.Web data research            are used to recommend pages to the user. This novel approach
has encountered a lot of challenges such as scalability,                in [9] involving integrated clustering, association rules and
multimedia and temporal issues etc.Web user drowns to huge              Markovmodels improved webpage prediction accuracy.
information facing the problem of overloaded information.Web            Various clustering algorithms had helped to group the user
personalization is the process based on users past behavior             sessions as like K-means, Fuzzy C-means and Subtractive
for providing users with relevant content including massive             Clustering [16, 17, 23, 24]. The clusters formed as a result of
© 2012 ACEEE                                                       24
DOI: 01.IJNS.03.01.535
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


applying these algorithms are aggregated to form web                    navigational patterns/interest from the user session file.
profiles. The recommendation engine uses these profiles, to             Clustering techniqueis employed to determine the session
generate pages for recommendation. In [21, 22], Formal                  clusters using model-based Expectation Maximization as in
Concept Analysis approach is used todiscover user access                [1]. The profile interest islearnt by determining an aggregate
patterns represented asassociation rules from web logs which            usage profile using theformula:
can then be used forpersonalization and
recommendation.However, the existingsystem does not
satisfy users particularly in large web sites in terms of the           wherein represents the weight of the page in sessions º c
quality of recommendations.This paper proposes
                                                                        and nc represents the number of sessions in cluster c.Table 1
toclassifyusernavigation patterns through web usage mining
                                                                        shows the aggregate usage profiles for 6 clusters under 13
system andeffectively provideonline recommendation. The
                                                                        distinct categories of pageviews URLs.(explained in IV)
tested resultson ritindia.edu dataset indicate to improve the
quality of thesystem for recommendations.                                              TABLE I. AGGREGATE USAGE PROFILES


                      III. METHODOLOGY
Personalization using usage mining consists of four basic
stages. The process embeds of:
1) Data Preprocessing
2) Pattern discovery
3) Pattern recognition
4) Recommendation process
     Classifying and matching an online userbased on his
browsing interestsforrecommendations of unvisited pages
has been employed in this paper using usage mining to                   II.PATTERN R ECOGNITION :
determine the interest of “similar” users.                              The individual profile effectiveness is measured using
Therecommendation[10] consists of offlinecomponent and                  weighted average visit percentage. It is to represent the
online component. The offline componentinvolves Data                    significance of user’s interest in the cluster.If the aggregate
Preprocessing, Pattern Discovery and PatternAnalysis. The               usage profilesconsist of m clusters and k pages, then the
outcome of the offline component is thederivation of                    significance in thecluster can be determined as follows:
aggregate usage profiles using web usage miningtechniques.
The online component is responsible for matchingthe current             whereI(j) is the index of the maximum value in each page
user’s profile to the aggregate usage profiles to generate the          andMI(j) represents the maximum value. Also the weight of
necessary recommendations.                                              page is considered as per pageview j.This maximization
I. DATA PREPROCESSING :
                                                                        function is used to recommend pages to users belonging to
     Preprocessing is the primary task of personalization               a profile/cluster.
involving cleansing of data, session and user identification,           IV. RECOMMENDATION PROCESS :
page view and transaction identification [10, 14, 15]. Let there            The recommendation engineis the online component of a
be set of pages P= {p1,p2,p3,p4,….,pn} and set of n sessions,           usage-based personalization system.The goal of
S= { s1,s2,s3,…..,sn} where each siº S is a subset of P. A file         personalization based on anonymous Webusage data is to
consisting of session profile of user requests for pages is             compute a recommendation set for the current (active) user
maintained.In [1], for a particular session, a session-pageview         session, consisting of the objects (links, ads, text, products,
matrix is maintainedconsisting of a sequence of page requests           etc.) that most closely match the current user profile.
in that session. A row representing a session and every                 Recommendation set can represent a long/short term view of
column represents a frequency of occurrence of pageview                 user’s navigational history based on the capability to track
visit in a session. Then the weight of the pageview is                  users across visits.The test data of user sessions are taken
determined by evaluating the importance of a page interms               as sequence of pages in time order. An active window size is
of the ratio of the frequency of visits to the page withrespect         fixed and those many pages are taken from the user session
to the overall page visits in a session and is represented by a         as active session. Then the similarity between the active
weighted session-pageview matrix. Each session si is modeled            session and all the cluster profiles is calculated using a vector
as a vector over the n-dimensionalspace of pageviews.                   similarity measure and the most similar profile selected for
II. PATTERN DISCOVERY :
                                                                        recommendations [1, 2, 25]. If an active session is represented
     The primary task of pattern discovery is to find out               as siandcluster as ck, then their similarity can be measured as
thehidden patterns using various mining techniques such                 follows:
asclustering, association rule, classification etc., which helps
to uncover the user behavior with respect to the site. It is an
offline task which helps to determine sessions with similar
© 2012 ACEEE                                                       25
DOI: 01.IJNS.03.01. 535
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


wherewi, j, represents weight of page i in active session jand                           IV. EXPERIMENTAL EVALUATION
wi, k, represents weight of page i in cluster k. The method of
least squares assumes that the best-fit similarity of a given            This section provides a detailed experimental evaluation of
type is the matching score that has the minimal sum of the               the profile generation techniques.The privately available data
deviations squared (least square error) from a given set of              set at the University of Shivaji, containing web log files of
data.Suppose that the data points are sim(s1,c1),sim(s2,c2),....,        ritindia.edu web site have been used for this research. It
sim(sj,ck) where sjis the independent variable and ckis the              includes the page visits of users who visited the “ritindia.edu”
dependent variable.The fitting score (sj) has the deviation              web site in period of June 2006 to April 2011. The initial log
(error) d from each data point,i.e., d1=c1-(s1),d2=c2-5ØSÜ(s2),          file produced a total of 16,233 transactions and the total number
...,dn=cn-5ØSÜ(sn). According to the method of least squares,            of URLs representing pageviews was 27. By using Support
the best matching score has the property that:                           filtering for long transactions,pageviews appearing in less
                                                                         than 0.5% or more than 85% of transactions were eliminated.
                                                                         Also, short transactions with at least 5 references were
                                                                         eliminated. The visits are recorded at the level of URL category
    This least square error approach helps to fine tune the              and in time order, which includes visits to major 13distinct
scores such as to approximate user clusters based on similar             categories ofpageviews URLs. Each sequence in the dataset
web access patterns on their usage profiles. Thena                       corresponds to a user’s request for a page.
recommendation score for each page view p in the selected                The 13 categories are:
cluster/profile is calculated. If C is the most similar cluster/          Id        Category              Id       Category
profile to the active session S, then a recommendation score              1         aboutkes               8         placement
for each page view p in C is as:                                          2         aboutrit               9       lifeatrit
                                                                          3         courses                10       contact
                                                                          4         departments            11       mission-vision
    Profiles having a similarity greater than a threshold value
                                                                          5          facilities            12        achievements
µc are selected as matching clusters in the decreasing order
                                                                          6          faculty               13       academics-at-rit
of their scores. The weight of pageview p in C is computed
                                                                          7         admission
twice i.e. directly and indirectly but to compensate the impact,
                                                                              A clustering model is estimated using approximately 15,000
square root in the above function is taken and results are
                                                                         samples within the dataset. They are further classified into
normalized to value between 0 and 1. If the pageview p is in
                                                                         training and testing sets. Dataset is split into 70% training
the current active session, then its recommendation value is
                                                                         and 30% testing sets such that the model is designed using
set to zero. These matching clusters can be used
                                                                         training set and then evaluated using test samples for
forrecommending pages instantaneously which have not
                                                                         performance. Applying the clustering algorithm for
beenvisited by the user.
                                                                         Expectation Minimization with 12 iterations resultsin 6major
    The following figure shows the overall process of web
                                                                         clusters. Each cluster represents several sessions of
personalization using web usage data.
                                                                         navigational patterns representing “similar” interest in the
                                                                         web pages or the usage profile and the aggregate usage
                                                                         profile is determined using Equation(1). During the online
                                                                         phase, the pages visited in a session are stored in a user
                                                                         session file and after each page visit, the relative frequency
                                                                         of pageviews in the active session is determined. An active
                                                                         session with sliding window size ‘n’ (in our experiment, the
                                                                         size is 5 as it represents the average number of pagevisits in
                                                                         the dataset) consists of the current page visit and the most
                                                                         recent n-1 pages visited. The window slides, as the user
                                                                         browses through various pages. Now, using the cosine
                                                                         similarity measure,the active session is matched with the
                                                                         aggregate usage profiles and matching cluster(s)having value
                                                                         greater than the threshold and are used for recommending
                                                                         pages exceeding threshold that have not been visited by the
                                                                         user.
                                                                         For example, consider the following 3 sessions consisting of
                                                                         page visits:
                                                                         18
                                                                         1 8 13
                                                                         1 13 1 13 1 7 1
                                                                         The sliding window consists of the pages 1 13 1 13 1 in the
  Figure 1.THE OVERALL PROCESS OF PERSONALIZATION                        fifth page visit.
© 2012 ACEEE                                                        26
DOI: 01.IJNS.03.01.535
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


Table 2 and 3represents the page visits and frequency of                    Clusters greater than the threshold value, are chosen to be
visited pages in the sliding window. It states the weight of                matching clusters as shown in Table4. This table depicts the
the pageviewby evaluating the importance of a page in terms                 comparative study of aggregate usage profiles and the
of the ratio of the frequency of visits to the page with respect            maximization function to show recommendations. It has been
to the overall page visits in the active session.                           found that when the user visits page 1 (window size 1), the
            TABLE II. PAGE VISITS   IN THE SLIDING WINDOW
                                                                            appropriate clusters, exceeding the threshold value are cluster
                                                                            2 and 4. It is seen that pages 2,3,6,7,9 can be recommended
                                                                            from cluster 2 and 4. Similarly when the user visits page 8
                                                                            subsequent to pagevisit 1(window size 2), the appropriate
                                                                            matching clusters are cluster 2, cluster 3 and cluster 4. As the
                                                                            window size increases to the fixed size limit (n=5),
                                                                            correspondingly, the matching clusters for the visited page(s)
                                                                            in the active session and the recommendations are dynamic
                                                                            in nature.Table 5 shows the recommended set of pages for all
                                                                            3 demo sessions.
   TABLE III. FREQUENCY OF PAGE         VISITED/WEIGHTED    PAGEVIEW        TABLE V. RECOMMENDATION SET FOR SESSION1, SESSION2,
                                                                                                       SESSION3




              TABLE IV. MATCHING CLUSTERS
                                                                               As compared to experimental study in [1], the
                                                                            recommendation of pages for demo sessions is calculated on
                                                                            Equation (3) for measuring similarities of sessions. Then the
                                                                            pages are recommended in the session as per Equation(6) for
                                                                            simple similarities of clusters which provides a less precision
                                                                            for recommending the matching scores of clusters.As
                                                                            compared to same, the least square approach analysis in our
                                                                            study helps to find deviations & to refine further the
                                                                            recommendations as per Equation (6) with similarity
                                                                            measures.In [1], if the above 3 demo samples are measured,
                                                                            then the recommendation set varies a lot recommending less
                                                                            pages under given threshold.

                                                                                           CONCLUSION AND FUTURE WORK
                                                                               The ability to collect detailed usage data at the level of
                                                                            individual mouse click provides Web-basedcompanies with
                                                                            a tremendous opportunity for personalizing the Web
                                                                            experience of clients.The practicality of employing Web usage
                                                                            mining techniques for personalization is directlyrelated to
                                                                            the discovery of effective aggregate profiles that can
© 2012 ACEEE                                                           27
DOI: 01.IJNS.03.01. 535
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


successfully capture relevant usernavigational patterns and                 [8] AlMurtadha Y, Sulaiman M, Mustapha N, Udzir N(2010).
can be used as part of usage-basedrecommendersystemto                       Mining Web Navigation Profiles for Recommendation
provide real-timepersonalization.                                           System.Inform.Technol.J. 9:790-796.
In this work, the primary objective was to classify and match               [9] Sule G,Ozsu M (2003).A User Interest Model for WebPage
                                                                            Navigation. DMAK, Seoul. 1:46-57.
an online userbased on his browsing interests.Identification
                                                                            [10] Mobasher B, Cooley R, Srivatsava J(2000).Automatic
of the current interests of the user based on theshort-term                 Personalization Based on Web Usage Mining. ACM. 43:142-151.
navigational patterns instead of explicit userinformation has               [11] Cooley R, Mobasher B, Srivatsava J(1997). Web
proved to be one of the potential sources forrecommendation                 Mining:Information and Pattern Discovery on the World Wide Web.
of pages.Inparticular context ofanonymous usage data, these                 IEEE. 9: 558-567.
workunder least square approximation show promise in                        [12] Srivatsava J, Cooley R, Deshpande M, Tan P(2000). WebUsage
creatingeffective personalization solutions that can help retain            Mining: Discovery and Applications of Usage Patterns from
and convert unidentified visitors based ontheir activities in               WebData. ACM. 1: 12-23.
the early stages of their visits. Future work involves with                 [13] Agarwal R,Srikant R(1994). Fast Algorithms for
                                                                            MiningAssociation Rules in Large Database. Procd.of Conf.on Very
various types of transactions derived from user sessions,
                                                                            Large Data Bases, USA. 1:12-15.
such as to isolate specifictypes of “content” pages in the                  [14] Sumathi C, Padmaja R,Valli,Santhanam T(2010). J. of
recommendation process. Also theplan is to                                  Comp.Sci. 1:785-793.
incorporateclient-side agents and use of optimization                       [15] Suresh R,Padmajavalli R(2006). Overview of DataPreprocessing
techniques to assess thequality of recommendations.                         in Data and Web Usage Mining. IEEE. 1: 193-198.
                                                                            [16] Chiu S (1994). Fuzzy Model Identification Based on Cluster
                           REFERENCES                                       Estimation. J. of Intelligent and Fuzzy Systems. 2(3).
                                                                            [17] Bezdek J (1973). Fuzzy Mathematics in Pattern Classification,
[1] Sumathi CP, PadmajaValli R (2010).Automatic Recommendation              Cornell Univ. PhD Thesis.
of Web Pages in WebUsage Mining. Internat.J. on Computer Science            [18] Witten I, Frank E (2005). Data Mining: Practical Machine
and Engg.2(9).                                                              Learning Tools and Techniques. 2 Edt. : Kaufmann M, Francisco S.
[2] Mobasher B, Honghua D, Tao L, Nakagawa M(2002). Discovery               [19] Hartigan T, Wong A (1979). A K-Means Clustering Algorithm.
and Evaluation of Aggregate Usage Profiles for Web                          Applied Statistics. 28:100-108.
Personalization.ACM. 6:61-82.                                               [20] Ng K, Junjie M, Huang J, Zengyou Y (2007). On the Impact
[3] Eirinaki M, Vazirgiannis M (2003).Web mining for Web                    of Dissimilarities Measure in K-modes Clustering Algo. IEEE. 29(3).
personalization.ACM. 3(1).                                                  [21] Vasumathi D, Govardhan A (2005). Efficient Web Usage Mining
[4] Khalil F, JiuyongL,Hua W (2008). Integrating Recommendation             Based On Formal Concept Analysis. IFIP. 163(2).
Models for Improved Web Page Prediction Accuracy. Australa.Conf.            [22] Spiliopoulou M (2000). Web usage mining for Web Site
on Computer science. 74:91-100.                                             Evaluation. ACM. 43(8): 127-134.
[5] Forsati R, MeybodiM,Ghari N (2009). Web Page                            [23] Ratanakumar J (2010). An Implementation of Web
Personalization based on Weighted Association Rules. Internat.              Personalization Using Mining Techniques. J. of Theoretical and
Conf. on Electronic Computer Tech. 1: 130-135.                              Appl. I. T. 5(1):67-73.
[6] Mobasher B,Dai H,LuoandT,Nakagawa (2001).Improvingthe                   [24] Memon K, Dagli C (2003). Web Personalization using Neuro-
effectiveness of collaborative filtering on anonymous Web usagedata.        Fuzzy Clustering. IEEE. 1: 525-529.
IJCAI, Seattle.                                                             [25] Mobasher B, Cooley R,Srivatsava J (1999).Creating Adaptive
[7] Mehrdad J, Norwati M, Ali M, Nasir B (2009). A Recommender              Web Sites Through Usage-Based Clustering of URLs. Proc. KDEX
System for Online Personalizationin the WUM Applications. Procd.            ’99. Workshop on Knowledge and Data Engineering Exchange.
of the World Congress onEngg.and Comp. Sci. 9(2).




© 2012 ACEEE                                                           28
DOI: 01.IJNS.03.01.535

More Related Content

What's hot

A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
eSAT Publishing House
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
eSAT Journals
 
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
Journal For Research
 
IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...
eSAT Publishing House
 
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
eSAT Publishing House
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
IOSR Journals
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
Bouneffouf Djallel
 
Recommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semanticsRecommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semantics
eSAT Journals
 
Recommendation generation by integrating sequential
Recommendation generation by integrating sequentialRecommendation generation by integrating sequential
Recommendation generation by integrating sequential
eSAT Publishing House
 
Paper id 41201614
Paper id 41201614Paper id 41201614
Paper id 41201614
IJRAT
 
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
idescitation
 
Similarity based Dynamic Web Data Extraction and Integration System from Sear...
Similarity based Dynamic Web Data Extraction and Integration System from Sear...Similarity based Dynamic Web Data Extraction and Integration System from Sear...
Similarity based Dynamic Web Data Extraction and Integration System from Sear...
IDES Editor
 
Application of fuzzy logic for user
Application of fuzzy logic for userApplication of fuzzy logic for user
Application of fuzzy logic for user
IJCI JOURNAL
 
Kp3518241828
Kp3518241828Kp3518241828
Kp3518241828
IJERA Editor
 
50120140502013
5012014050201350120140502013
50120140502013
IAEME Publication
 
F0433439
F0433439F0433439
F0433439
IOSR Journals
 

What's hot (16)

A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
 
IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...IJRET : International Journal of Research in Engineering and TechnologyImprov...
IJRET : International Journal of Research in Engineering and TechnologyImprov...
 
User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...User search goal inference and feedback session using fast generalized – fuzz...
User search goal inference and feedback session using fast generalized – fuzz...
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
Recommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semanticsRecommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semantics
 
Recommendation generation by integrating sequential
Recommendation generation by integrating sequentialRecommendation generation by integrating sequential
Recommendation generation by integrating sequential
 
Paper id 41201614
Paper id 41201614Paper id 41201614
Paper id 41201614
 
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
Advance Clustering Technique Based on Markov Chain for Predicting Next User M...
 
Similarity based Dynamic Web Data Extraction and Integration System from Sear...
Similarity based Dynamic Web Data Extraction and Integration System from Sear...Similarity based Dynamic Web Data Extraction and Integration System from Sear...
Similarity based Dynamic Web Data Extraction and Integration System from Sear...
 
Application of fuzzy logic for user
Application of fuzzy logic for userApplication of fuzzy logic for user
Application of fuzzy logic for user
 
Kp3518241828
Kp3518241828Kp3518241828
Kp3518241828
 
50120140502013
5012014050201350120140502013
50120140502013
 
F0433439
F0433439F0433439
F0433439
 

Viewers also liked

Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
IDES Editor
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
IDES Editor
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
IDES Editor
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital Filter
IDES Editor
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
IDES Editor
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
IDES Editor
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
IDES Editor
 
Detecting Malicious Dropping Attack in the Internet
Detecting Malicious Dropping Attack in the InternetDetecting Malicious Dropping Attack in the Internet
Detecting Malicious Dropping Attack in the Internet
IDES Editor
 
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
IDES Editor
 
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation ModelDesign of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
IDES Editor
 
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
IDES Editor
 
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff CallsPerformance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
IDES Editor
 
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
IDES Editor
 
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
IDES Editor
 
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
IDES Editor
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
IDES Editor
 
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
IDES Editor
 

Viewers also liked (18)

Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance AngiogramsExtraction of Circle of Willis from 2D Magnetic Resonance Angiograms
Extraction of Circle of Willis from 2D Magnetic Resonance Angiograms
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
 
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation SystemOptimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
Optimally Learnt, Neural Network Based Autonomous Mobile Robot Navigation System
 
Conditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital FilterConditional Averaging a New Algorithm for Digital Filter
Conditional Averaging a New Algorithm for Digital Filter
 
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
The Effectiveness of PIES Compared to BEM in the Modelling of 3D Polygonal Pr...
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor NetworksAnalysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
 
Detecting Malicious Dropping Attack in the Internet
Detecting Malicious Dropping Attack in the InternetDetecting Malicious Dropping Attack in the Internet
Detecting Malicious Dropping Attack in the Internet
 
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
Design and Analysis of Adaptive Neural Controller for Voltage Source Converte...
 
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation ModelDesign of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model
 
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
Design of Equitable Dominating Set Based Semantic Overlay Networks with Optim...
 
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff CallsPerformance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls
 
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
Novel Voltage Mode Multifunction Filter based on Current Conveyor Transconduc...
 
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
An Efficient PMG based Wind Energy Conversion System with Power Quality Impro...
 
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
Mitigation of Harmonic Current through Hybrid Power Filter in Single Phase Re...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
Partial Shading Detection and MPPT Controller for Total Cross Tied Photovolta...
 

Similar to A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization

A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
IJERA Editor
 
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
IRJET Journal
 
H0314450
H0314450H0314450
H0314450
iosrjournals
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
IOSR Journals
 
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
IJAEMSJORNAL
 
Semantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movementsSemantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movements
IJwest
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
ijdpsjournal
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
ijcsa
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system
Iaetsd Iaetsd
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
James Heller
 
Optimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage DataOptimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage Data
IDES Editor
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET Journal
 
IRJET- An Integrated Recommendation System using Graph Database and QGIS
IRJET-  	  An Integrated Recommendation System using Graph Database and QGISIRJET-  	  An Integrated Recommendation System using Graph Database and QGIS
IRJET- An Integrated Recommendation System using Graph Database and QGIS
IRJET Journal
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET Journal
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET Journal
 
Classification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A SurveyClassification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A Survey
IRJET Journal
 
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
IRJET Journal
 
Sub1582
Sub1582Sub1582
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
IJERA Editor
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
ijctet
 

Similar to A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization (20)

A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
 
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
 
H0314450
H0314450H0314450
H0314450
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
Certain Issues in Web Page Prediction, Classification and Clustering in Data ...
 
Semantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movementsSemantically enriched web usage mining for predicting user future movements
Semantically enriched web usage mining for predicting user future movements
 
An effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded contentAn effective search on web log from most popular downloaded content
An effective search on web log from most popular downloaded content
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
 
3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system3 iaetsd semantic web page recommender system
3 iaetsd semantic web page recommender system
 
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
AN EXTENSIVE LITERATURE SURVEY ON COMPREHENSIVE RESEARCH ACTIVITIES OF WEB US...
 
Optimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage DataOptimization of Search Results with Duplicate Page Elimination using Usage Data
Optimization of Search Results with Duplicate Page Elimination using Usage Data
 
IRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET-A Survey on Web Personalization of Web Usage Mining
IRJET-A Survey on Web Personalization of Web Usage Mining
 
IRJET- An Integrated Recommendation System using Graph Database and QGIS
IRJET-  	  An Integrated Recommendation System using Graph Database and QGISIRJET-  	  An Integrated Recommendation System using Graph Database and QGIS
IRJET- An Integrated Recommendation System using Graph Database and QGIS
 
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
IRJET- Text-based Domain and Image Categorization of Google Search Engine usi...
 
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
IRJET- A Literature Review and Classification of Semantic Web Approaches for ...
 
Classification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A SurveyClassification of User & Pattern discovery in WUM: A Survey
Classification of User & Pattern discovery in WUM: A Survey
 
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...
 
Sub1582
Sub1582Sub1582
Sub1582
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 

A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 A Least Square Approach ToAnlayze Usage Data For Effective Web Personalization S.S.Patil Rajarambapu Institute of TechnologyRajaramnagar/CSE,Sangli, India sachin.patil@ritindia.edu Abstract—Web server logs have abundant information about information of web pages link, relevant data, products the nature of users accessing it. The analysis of the users etc.Traditionally, collaborative filtering technique was current interestbased on the navigational behavior may help employed to do this task. It generally produces the organizationsto guide the users in their browsing activity recommendations on objects yet not rated by user, by and obtain relevantinformation in a shorter span of time matching the ratings of current user for objects with those of [1].Web usage mining is used to discover interesting user similar users. To increase the user click rate and service quality navigationpatterns and can be applied to many real-world of Internet on a specific website, Web developer or designer problems, such as improving Web sites/pages, needs to know what the user really wants to do & its interest makingadditional topic or product recommendations, user/ to customize web pages to the user by learning its customer behavior studies, etc [23].Web usage mining, in navigational pattern. Various approaches are defined to unreal conjunction with standard approaches to personalization the applicative techniques to gethigher and corrective helps to address some of the shortcomings of these recommendations for user surf. techniques, including reliance on subjective lack of scalability, poor performance, user ratings and sparse II. OVERVIEW OF RELATED WORK data[2,3,4,5,6]. But, it is not sufficient to discover patterns Various approaches have been devised for recommender from usage data for performing the personalization tasks. systems[2, 3, 4, 5]. The explicitfeedback from the user or rating It is necessary to derive a good quality of aggregate usage on items help to match interest with online clustering ofusers profiles which indeed will help to devise efficient with “similar interest” to provide recommendations. But recommendation for web personalization [11, 12, 13].Also practically itleads toward limitations of scalability and the unsupervised and competitive learning algorithms has performance[6] due to the lack of sufficient user information. help to efficiently cluster user based access patterns by Otherapproaches relating usage mining are implied to discover mining web logs [19, 20, 24]. patterns or usage profiles from implicitfeedback such as page This paper presents and experimentally evaluates a visits of users.The offline pattern discoveryusing numerous technique for finely tuninguser clusters based on similar data mining techniques are used toprovide dynamic web access patterns on their usage profiles by approximating recommendations based on the user ’s through least square approach. Each cluster is having users shortterminterest.”WebPersonalizer” a usagebasedWeb with similar browsing patterns. These clusters are useful Personalization system using Web mining techniques to in web personalization so that it communicates better with provide dynamicrecommendations was proposed in [6]. In its users.Experimental results indicate thatusing the [7], a novelapproach using LCS algorithmimproves the quality generated aggregate usage profiles with approximating of the recommendations system for predictions by classifying clusters through least square approach effectively user navigation patterns. K-means clustering followed personalize at early stages of user visits to a site without byclassification for recommender systems [8] is used to deeper knowledge about them. predict the futurenavigations and has improved the accuracy of predictions.Recent developmentsfor online personalization IndexTerms—Aggregate Usage Profile,Least through usagemining have been proposed. In [2], SquareApproach, Web Personalization, Recommender experimental evaluation of two different techniques suchas Systems,Expectation Maximization. PACT and ARHP based on the clustering of user transactions/ pageviews respectively for the discovery ofusage profiles I. INTRODUCTION was proposed.In [9], Poisson parameters to determine the Tremendous growth of unstructured information available recommendation scores helped tofocus on the discovery of on internet & e-commerce sites makes it very difficult to access user’s interest in a sessionusing clustering approach. They relevant information quickly & efficiently.Web data research are used to recommend pages to the user. This novel approach has encountered a lot of challenges such as scalability, in [9] involving integrated clustering, association rules and multimedia and temporal issues etc.Web user drowns to huge Markovmodels improved webpage prediction accuracy. information facing the problem of overloaded information.Web Various clustering algorithms had helped to group the user personalization is the process based on users past behavior sessions as like K-means, Fuzzy C-means and Subtractive for providing users with relevant content including massive Clustering [16, 17, 23, 24]. The clusters formed as a result of © 2012 ACEEE 24 DOI: 01.IJNS.03.01.535
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 applying these algorithms are aggregated to form web navigational patterns/interest from the user session file. profiles. The recommendation engine uses these profiles, to Clustering techniqueis employed to determine the session generate pages for recommendation. In [21, 22], Formal clusters using model-based Expectation Maximization as in Concept Analysis approach is used todiscover user access [1]. The profile interest islearnt by determining an aggregate patterns represented asassociation rules from web logs which usage profile using theformula: can then be used forpersonalization and recommendation.However, the existingsystem does not satisfy users particularly in large web sites in terms of the wherein represents the weight of the page in sessions º c quality of recommendations.This paper proposes and nc represents the number of sessions in cluster c.Table 1 toclassifyusernavigation patterns through web usage mining shows the aggregate usage profiles for 6 clusters under 13 system andeffectively provideonline recommendation. The distinct categories of pageviews URLs.(explained in IV) tested resultson ritindia.edu dataset indicate to improve the quality of thesystem for recommendations. TABLE I. AGGREGATE USAGE PROFILES III. METHODOLOGY Personalization using usage mining consists of four basic stages. The process embeds of: 1) Data Preprocessing 2) Pattern discovery 3) Pattern recognition 4) Recommendation process Classifying and matching an online userbased on his browsing interestsforrecommendations of unvisited pages has been employed in this paper using usage mining to II.PATTERN R ECOGNITION : determine the interest of “similar” users. The individual profile effectiveness is measured using Therecommendation[10] consists of offlinecomponent and weighted average visit percentage. It is to represent the online component. The offline componentinvolves Data significance of user’s interest in the cluster.If the aggregate Preprocessing, Pattern Discovery and PatternAnalysis. The usage profilesconsist of m clusters and k pages, then the outcome of the offline component is thederivation of significance in thecluster can be determined as follows: aggregate usage profiles using web usage miningtechniques. The online component is responsible for matchingthe current whereI(j) is the index of the maximum value in each page user’s profile to the aggregate usage profiles to generate the andMI(j) represents the maximum value. Also the weight of necessary recommendations. page is considered as per pageview j.This maximization I. DATA PREPROCESSING : function is used to recommend pages to users belonging to Preprocessing is the primary task of personalization a profile/cluster. involving cleansing of data, session and user identification, IV. RECOMMENDATION PROCESS : page view and transaction identification [10, 14, 15]. Let there The recommendation engineis the online component of a be set of pages P= {p1,p2,p3,p4,….,pn} and set of n sessions, usage-based personalization system.The goal of S= { s1,s2,s3,…..,sn} where each siº S is a subset of P. A file personalization based on anonymous Webusage data is to consisting of session profile of user requests for pages is compute a recommendation set for the current (active) user maintained.In [1], for a particular session, a session-pageview session, consisting of the objects (links, ads, text, products, matrix is maintainedconsisting of a sequence of page requests etc.) that most closely match the current user profile. in that session. A row representing a session and every Recommendation set can represent a long/short term view of column represents a frequency of occurrence of pageview user’s navigational history based on the capability to track visit in a session. Then the weight of the pageview is users across visits.The test data of user sessions are taken determined by evaluating the importance of a page interms as sequence of pages in time order. An active window size is of the ratio of the frequency of visits to the page withrespect fixed and those many pages are taken from the user session to the overall page visits in a session and is represented by a as active session. Then the similarity between the active weighted session-pageview matrix. Each session si is modeled session and all the cluster profiles is calculated using a vector as a vector over the n-dimensionalspace of pageviews. similarity measure and the most similar profile selected for II. PATTERN DISCOVERY : recommendations [1, 2, 25]. If an active session is represented The primary task of pattern discovery is to find out as siandcluster as ck, then their similarity can be measured as thehidden patterns using various mining techniques such follows: asclustering, association rule, classification etc., which helps to uncover the user behavior with respect to the site. It is an offline task which helps to determine sessions with similar © 2012 ACEEE 25 DOI: 01.IJNS.03.01. 535
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 wherewi, j, represents weight of page i in active session jand IV. EXPERIMENTAL EVALUATION wi, k, represents weight of page i in cluster k. The method of least squares assumes that the best-fit similarity of a given This section provides a detailed experimental evaluation of type is the matching score that has the minimal sum of the the profile generation techniques.The privately available data deviations squared (least square error) from a given set of set at the University of Shivaji, containing web log files of data.Suppose that the data points are sim(s1,c1),sim(s2,c2),...., ritindia.edu web site have been used for this research. It sim(sj,ck) where sjis the independent variable and ckis the includes the page visits of users who visited the “ritindia.edu” dependent variable.The fitting score (sj) has the deviation web site in period of June 2006 to April 2011. The initial log (error) d from each data point,i.e., d1=c1-(s1),d2=c2-5ØSÜ(s2), file produced a total of 16,233 transactions and the total number ...,dn=cn-5ØSÜ(sn). According to the method of least squares, of URLs representing pageviews was 27. By using Support the best matching score has the property that: filtering for long transactions,pageviews appearing in less than 0.5% or more than 85% of transactions were eliminated. Also, short transactions with at least 5 references were eliminated. The visits are recorded at the level of URL category This least square error approach helps to fine tune the and in time order, which includes visits to major 13distinct scores such as to approximate user clusters based on similar categories ofpageviews URLs. Each sequence in the dataset web access patterns on their usage profiles. Thena corresponds to a user’s request for a page. recommendation score for each page view p in the selected The 13 categories are: cluster/profile is calculated. If C is the most similar cluster/ Id Category Id Category profile to the active session S, then a recommendation score 1 aboutkes 8 placement for each page view p in C is as: 2 aboutrit 9 lifeatrit 3 courses 10 contact 4 departments 11 mission-vision Profiles having a similarity greater than a threshold value 5 facilities 12 achievements µc are selected as matching clusters in the decreasing order 6 faculty 13 academics-at-rit of their scores. The weight of pageview p in C is computed 7 admission twice i.e. directly and indirectly but to compensate the impact, A clustering model is estimated using approximately 15,000 square root in the above function is taken and results are samples within the dataset. They are further classified into normalized to value between 0 and 1. If the pageview p is in training and testing sets. Dataset is split into 70% training the current active session, then its recommendation value is and 30% testing sets such that the model is designed using set to zero. These matching clusters can be used training set and then evaluated using test samples for forrecommending pages instantaneously which have not performance. Applying the clustering algorithm for beenvisited by the user. Expectation Minimization with 12 iterations resultsin 6major The following figure shows the overall process of web clusters. Each cluster represents several sessions of personalization using web usage data. navigational patterns representing “similar” interest in the web pages or the usage profile and the aggregate usage profile is determined using Equation(1). During the online phase, the pages visited in a session are stored in a user session file and after each page visit, the relative frequency of pageviews in the active session is determined. An active session with sliding window size ‘n’ (in our experiment, the size is 5 as it represents the average number of pagevisits in the dataset) consists of the current page visit and the most recent n-1 pages visited. The window slides, as the user browses through various pages. Now, using the cosine similarity measure,the active session is matched with the aggregate usage profiles and matching cluster(s)having value greater than the threshold and are used for recommending pages exceeding threshold that have not been visited by the user. For example, consider the following 3 sessions consisting of page visits: 18 1 8 13 1 13 1 13 1 7 1 The sliding window consists of the pages 1 13 1 13 1 in the Figure 1.THE OVERALL PROCESS OF PERSONALIZATION fifth page visit. © 2012 ACEEE 26 DOI: 01.IJNS.03.01.535
  • 4. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 Table 2 and 3represents the page visits and frequency of Clusters greater than the threshold value, are chosen to be visited pages in the sliding window. It states the weight of matching clusters as shown in Table4. This table depicts the the pageviewby evaluating the importance of a page in terms comparative study of aggregate usage profiles and the of the ratio of the frequency of visits to the page with respect maximization function to show recommendations. It has been to the overall page visits in the active session. found that when the user visits page 1 (window size 1), the TABLE II. PAGE VISITS IN THE SLIDING WINDOW appropriate clusters, exceeding the threshold value are cluster 2 and 4. It is seen that pages 2,3,6,7,9 can be recommended from cluster 2 and 4. Similarly when the user visits page 8 subsequent to pagevisit 1(window size 2), the appropriate matching clusters are cluster 2, cluster 3 and cluster 4. As the window size increases to the fixed size limit (n=5), correspondingly, the matching clusters for the visited page(s) in the active session and the recommendations are dynamic in nature.Table 5 shows the recommended set of pages for all 3 demo sessions. TABLE III. FREQUENCY OF PAGE VISITED/WEIGHTED PAGEVIEW TABLE V. RECOMMENDATION SET FOR SESSION1, SESSION2, SESSION3 TABLE IV. MATCHING CLUSTERS As compared to experimental study in [1], the recommendation of pages for demo sessions is calculated on Equation (3) for measuring similarities of sessions. Then the pages are recommended in the session as per Equation(6) for simple similarities of clusters which provides a less precision for recommending the matching scores of clusters.As compared to same, the least square approach analysis in our study helps to find deviations & to refine further the recommendations as per Equation (6) with similarity measures.In [1], if the above 3 demo samples are measured, then the recommendation set varies a lot recommending less pages under given threshold. CONCLUSION AND FUTURE WORK The ability to collect detailed usage data at the level of individual mouse click provides Web-basedcompanies with a tremendous opportunity for personalizing the Web experience of clients.The practicality of employing Web usage mining techniques for personalization is directlyrelated to the discovery of effective aggregate profiles that can © 2012 ACEEE 27 DOI: 01.IJNS.03.01. 535
  • 5. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 successfully capture relevant usernavigational patterns and [8] AlMurtadha Y, Sulaiman M, Mustapha N, Udzir N(2010). can be used as part of usage-basedrecommendersystemto Mining Web Navigation Profiles for Recommendation provide real-timepersonalization. System.Inform.Technol.J. 9:790-796. In this work, the primary objective was to classify and match [9] Sule G,Ozsu M (2003).A User Interest Model for WebPage Navigation. DMAK, Seoul. 1:46-57. an online userbased on his browsing interests.Identification [10] Mobasher B, Cooley R, Srivatsava J(2000).Automatic of the current interests of the user based on theshort-term Personalization Based on Web Usage Mining. ACM. 43:142-151. navigational patterns instead of explicit userinformation has [11] Cooley R, Mobasher B, Srivatsava J(1997). Web proved to be one of the potential sources forrecommendation Mining:Information and Pattern Discovery on the World Wide Web. of pages.Inparticular context ofanonymous usage data, these IEEE. 9: 558-567. workunder least square approximation show promise in [12] Srivatsava J, Cooley R, Deshpande M, Tan P(2000). WebUsage creatingeffective personalization solutions that can help retain Mining: Discovery and Applications of Usage Patterns from and convert unidentified visitors based ontheir activities in WebData. ACM. 1: 12-23. the early stages of their visits. Future work involves with [13] Agarwal R,Srikant R(1994). Fast Algorithms for MiningAssociation Rules in Large Database. Procd.of Conf.on Very various types of transactions derived from user sessions, Large Data Bases, USA. 1:12-15. such as to isolate specifictypes of “content” pages in the [14] Sumathi C, Padmaja R,Valli,Santhanam T(2010). J. of recommendation process. Also theplan is to Comp.Sci. 1:785-793. incorporateclient-side agents and use of optimization [15] Suresh R,Padmajavalli R(2006). Overview of DataPreprocessing techniques to assess thequality of recommendations. in Data and Web Usage Mining. IEEE. 1: 193-198. [16] Chiu S (1994). Fuzzy Model Identification Based on Cluster REFERENCES Estimation. J. of Intelligent and Fuzzy Systems. 2(3). [17] Bezdek J (1973). Fuzzy Mathematics in Pattern Classification, [1] Sumathi CP, PadmajaValli R (2010).Automatic Recommendation Cornell Univ. PhD Thesis. of Web Pages in WebUsage Mining. Internat.J. on Computer Science [18] Witten I, Frank E (2005). Data Mining: Practical Machine and Engg.2(9). Learning Tools and Techniques. 2 Edt. : Kaufmann M, Francisco S. [2] Mobasher B, Honghua D, Tao L, Nakagawa M(2002). Discovery [19] Hartigan T, Wong A (1979). A K-Means Clustering Algorithm. and Evaluation of Aggregate Usage Profiles for Web Applied Statistics. 28:100-108. Personalization.ACM. 6:61-82. [20] Ng K, Junjie M, Huang J, Zengyou Y (2007). On the Impact [3] Eirinaki M, Vazirgiannis M (2003).Web mining for Web of Dissimilarities Measure in K-modes Clustering Algo. IEEE. 29(3). personalization.ACM. 3(1). [21] Vasumathi D, Govardhan A (2005). Efficient Web Usage Mining [4] Khalil F, JiuyongL,Hua W (2008). Integrating Recommendation Based On Formal Concept Analysis. IFIP. 163(2). Models for Improved Web Page Prediction Accuracy. Australa.Conf. [22] Spiliopoulou M (2000). Web usage mining for Web Site on Computer science. 74:91-100. Evaluation. ACM. 43(8): 127-134. [5] Forsati R, MeybodiM,Ghari N (2009). Web Page [23] Ratanakumar J (2010). An Implementation of Web Personalization based on Weighted Association Rules. Internat. Personalization Using Mining Techniques. J. of Theoretical and Conf. on Electronic Computer Tech. 1: 130-135. Appl. I. T. 5(1):67-73. [6] Mobasher B,Dai H,LuoandT,Nakagawa (2001).Improvingthe [24] Memon K, Dagli C (2003). Web Personalization using Neuro- effectiveness of collaborative filtering on anonymous Web usagedata. Fuzzy Clustering. IEEE. 1: 525-529. IJCAI, Seattle. [25] Mobasher B, Cooley R,Srivatsava J (1999).Creating Adaptive [7] Mehrdad J, Norwati M, Ali M, Nasir B (2009). A Recommender Web Sites Through Usage-Based Clustering of URLs. Proc. KDEX System for Online Personalizationin the WUM Applications. Procd. ’99. Workshop on Knowledge and Data Engineering Exchange. of the World Congress onEngg.and Comp. Sci. 9(2). © 2012 ACEEE 28 DOI: 01.IJNS.03.01.535