This document discusses an enhanced approach for detecting user behavior through country-wise local search. It begins with an abstract describing the development of the web and challenges in the field. It then discusses various techniques for web mining including web usage mining, web content mining, and web structure mining. It also discusses sequential pattern mining algorithms and procedures for recommendation systems. The key contribution is proposing a new local search algorithm for country-wise search to make searching more efficient based on local results.
Identifying the Number of Visitors to improve Website Usability from Educatio...Editor IJCATR
Web usage mining deals with understanding the Visitor’s behaviour with a Website. It helps in understanding the concerns
such as present and future probability of every website user, relationship between behaviour and website usability. It has different
branches such as web content mining, web structure and web usage mining. The focus of this paper is on web mining usage patterns of
an educational institution web log data. There are three types of web related log data namely web access log, error log and proxy log
data. In this paper web access log data has been used as dataset because the web access log data is the typical source of navigational
behaviour of the website visitor. The study of web server log analysis is helpful in applying the web mining techniques.
Recommendation generation by integrating sequential pattern mining and semanticseSAT Journals
Abstract As the Internet usage keeps increasing, the number of web sites and hence the number of web pages also keeps increasing. A recommendation system can be used to provide personalized web service by suggesting the pages that are likely to be accessed in future. Most of the recommendation systems are based on association rule mining or based on keywords. Using the association rule mining the prediction rate is less as it doesn’t take into account the order of access of the web pages by the users. The recommendation systems that are key-word based provides lesser relevant results. This paper proposes a recommendation system that uses the advantages of sequential pattern mining and semantics over the association rule mining and keyword based systems respectively. Keywords: Sequential Pattern Mining, Taxonomy, Apriori-All, CS-Mine, Semantic, Clustering
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Web Page Recommendation Using Web MiningIJERA Editor
On World Wide Web various kind of content are generated in huge amount, so to give relevant result to user web recommendation become important part of web application. On web different kind of web recommendation are made available to user every day that includes Image, Video, Audio, query suggestion and web page. In this paper we are aiming at providing framework for web page recommendation. 1) First we describe the basics of web mining, types of web mining. 2) Details of each web mining technique.3)We propose the architecture for the personalized web page recommendation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Identifying the Number of Visitors to improve Website Usability from Educatio...Editor IJCATR
Web usage mining deals with understanding the Visitor’s behaviour with a Website. It helps in understanding the concerns
such as present and future probability of every website user, relationship between behaviour and website usability. It has different
branches such as web content mining, web structure and web usage mining. The focus of this paper is on web mining usage patterns of
an educational institution web log data. There are three types of web related log data namely web access log, error log and proxy log
data. In this paper web access log data has been used as dataset because the web access log data is the typical source of navigational
behaviour of the website visitor. The study of web server log analysis is helpful in applying the web mining techniques.
Recommendation generation by integrating sequential pattern mining and semanticseSAT Journals
Abstract As the Internet usage keeps increasing, the number of web sites and hence the number of web pages also keeps increasing. A recommendation system can be used to provide personalized web service by suggesting the pages that are likely to be accessed in future. Most of the recommendation systems are based on association rule mining or based on keywords. Using the association rule mining the prediction rate is less as it doesn’t take into account the order of access of the web pages by the users. The recommendation systems that are key-word based provides lesser relevant results. This paper proposes a recommendation system that uses the advantages of sequential pattern mining and semantics over the association rule mining and keyword based systems respectively. Keywords: Sequential Pattern Mining, Taxonomy, Apriori-All, CS-Mine, Semantic, Clustering
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Web Page Recommendation Using Web MiningIJERA Editor
On World Wide Web various kind of content are generated in huge amount, so to give relevant result to user web recommendation become important part of web application. On web different kind of web recommendation are made available to user every day that includes Image, Video, Audio, query suggestion and web page. In this paper we are aiming at providing framework for web page recommendation. 1) First we describe the basics of web mining, types of web mining. 2) Details of each web mining technique.3)We propose the architecture for the personalized web page recommendation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
S.Jagan, Dr.S.P.Rajagopalan "A Survey on Web Personalization of Web Usage Mining", International Research Journal of Engineering and Technology (IRJET),Volume 2,issue-01 Mar-2015. e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net , published by Fast Track Publications
Abstract
Now a day, World Wide Web (www) is a rich and most powerful source of information. Day by day it is becoming more complex and expanding in size to get maximum information details online. However, it is becoming more complex and critical task to retrieve exact information expected by its users. To deal with this problem one more powerful concept is personalization which is becoming more powerful now days. Personalization is a subclass of information filtering system that seek to predict the 'ratings' or 'preferences' that a user would give to an items, they had not yet considered, using a model built from the characteristics of an item (content-based approaches or collaborative filtering approaches). Web mining is an emerging field of data mining used to provide personalization on the web. It consist three major categories i.e. Web Content Mining, Web Usage Mining, and Web Structure Mining. This paper focuses on web usage mining and algorithms used for providing personalization on the web.
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...ijdkp
Web sequential patterns are important for analyzing and understanding users’ behaviour to improve the
quality of service offered by the World Wide Web. Web Prefetching is one such technique that utilizes
prefetching rules derived through Cyclic Model Analysis of the mined Web sequential patterns. The more
accurate the prediction and more satisfying the results of prefetching if we use a highly efficient and
scalable mining technique such as the Bidirectional Growth based Directed Acyclic Graph. In this paper,
we propose a novel algorithm called Bidirectional Growth based mining Cyclic behavior Analysis of web
sequential Patterns (BGCAP) that effectively combines these strategies to generate prefetching rules in the
form of 2-sequence patterns with Periodicity and threshold of Cyclic Behaviour that can be utilized to
effectively prefetch Web pages, thus reducing the users’ perceived latency. As BGCAP is based on
Bidirectional pattern growth, it performs only (log n+1) levels of recursion for mining n Web sequential
patterns. Our experimental results show that prefetching rules generated using BGCAP is 5-10% faster for
different data sizes and 10-15% faster for a fixed data size than TD-Mine. In addition, BGCAP generates
about 5-15% more prefetching rules than TD-Mine.
In this world of information technology, everyone has the tendency to do business electronically. Today
lot of businesses are happening on World Wide Web (WWW), it is very important for the website owner to
provide a better platform to attract more customers for their site. Providing information in a better way is
the solution to bring more customers or users. Customer is the end-user, who accessing the information
in a way it yields some credit to the web site owners. In this paper we define web mining and present a
method to utilize web mining in a better way to know the users and website behaviour which in turn
enhance the web site information to attract more users. This paper also presents an overview of the
various researches done on pattern extraction, web content mining and how it can be taken as a catalyst
for E-business.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
Comparable Analysis of Web Mining Categoriestheijes
Web Data Mining is the current field of analysis which is a combination of two research area known as Data Mining and World Wide Web. Web Data Mining research associates with various research diversities like Database, Artificial Intelligence and Information redeem. The mining techniques are categorized into various categories namely Web Content Mining, Web Structure Mining and Web Usage Mining. In this work, analysis of mining techniques are done. From the analysis it has been concluded that Web Content Mining has unstructured or semi- structure view of data whereas Web Structure Mining have linked structure and Web Usage Mining mainly includes interaction.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
Information is overloaded in the Internet due to the unstable growth of information and it makes information search as complicate process. Recommendation System (RS) is the tool and largely used nowadays in many areas to generate interest items to users. With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Web recommendation systems assist the users to get the exact information and facilitate the information search easier. Web recommendation is one of the techniques of web personalization, which recommends web pages or items to the user based on the previous browsing history. But the tremendous growth in the amount of the available information and the number of visitors to web sites in recent years places some key challenges for recommender system. The recent recommender systems stuck with producing high quality recommendation with large information, resulting unwanted item instead of targeted item or product, and performing many recommendations per second for millions of user and items. To avoid these challenges a new recommender system technologies are needed that can quickly produce high quality recommendation, even for a very large scale problems. To address these issues we use two recommender system process using fuzzy clustering and collaborative filtering algorithms. Fuzzy clustering is used to predict the items or product that will be accessed in the future based on the previous action of user browsers behavior. Collaborative filtering recommendation process is used to produce the user expects result from the result of fuzzy clustering and collection of Web Database data items. Using this new recommendation system, it results the user expected product or item with minimum time. This system reduces the result of unrelated and unwanted item to user and provides the results with user interested domain.
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
Web log data available at server side helps in identifying user access pattern. Analysis of Web log data poses challenges as it consists of plentiful information of a Web page. Log file contains information about User name, IP address, Access Request, Number of Bytes Transferred, Result Status, Uniform Resource Locator (URL), User Agent and Time stamp. Analysing the log file gives clear idea about the user. Data Pre-Processing is an important step in mining process. Web log data contains irrelevant data so it has to be Pre-Processed. If the collected Web log data is Pre-Processed, then it becomes easy to find the desire information about visitors and also retrieve other information from Web log data. This paper proposes a novel technique to Pre-Process the Web log data and given detailed discussion about the content of Web log data. Each Uniform Resource Locator (URL) in the Web log data is parsed into tokens based on the Web structure and then it is implemented using SQL server management studio.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET-A Survey on Web Personalization of Web Usage MiningIRJET Journal
S.Jagan, Dr.S.P.Rajagopalan "A Survey on Web Personalization of Web Usage Mining", International Research Journal of Engineering and Technology (IRJET),Volume 2,issue-01 Mar-2015. e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net , published by Fast Track Publications
Abstract
Now a day, World Wide Web (www) is a rich and most powerful source of information. Day by day it is becoming more complex and expanding in size to get maximum information details online. However, it is becoming more complex and critical task to retrieve exact information expected by its users. To deal with this problem one more powerful concept is personalization which is becoming more powerful now days. Personalization is a subclass of information filtering system that seek to predict the 'ratings' or 'preferences' that a user would give to an items, they had not yet considered, using a model built from the characteristics of an item (content-based approaches or collaborative filtering approaches). Web mining is an emerging field of data mining used to provide personalization on the web. It consist three major categories i.e. Web Content Mining, Web Usage Mining, and Web Structure Mining. This paper focuses on web usage mining and algorithms used for providing personalization on the web.
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...ijdkp
Web sequential patterns are important for analyzing and understanding users’ behaviour to improve the
quality of service offered by the World Wide Web. Web Prefetching is one such technique that utilizes
prefetching rules derived through Cyclic Model Analysis of the mined Web sequential patterns. The more
accurate the prediction and more satisfying the results of prefetching if we use a highly efficient and
scalable mining technique such as the Bidirectional Growth based Directed Acyclic Graph. In this paper,
we propose a novel algorithm called Bidirectional Growth based mining Cyclic behavior Analysis of web
sequential Patterns (BGCAP) that effectively combines these strategies to generate prefetching rules in the
form of 2-sequence patterns with Periodicity and threshold of Cyclic Behaviour that can be utilized to
effectively prefetch Web pages, thus reducing the users’ perceived latency. As BGCAP is based on
Bidirectional pattern growth, it performs only (log n+1) levels of recursion for mining n Web sequential
patterns. Our experimental results show that prefetching rules generated using BGCAP is 5-10% faster for
different data sizes and 10-15% faster for a fixed data size than TD-Mine. In addition, BGCAP generates
about 5-15% more prefetching rules than TD-Mine.
In this world of information technology, everyone has the tendency to do business electronically. Today
lot of businesses are happening on World Wide Web (WWW), it is very important for the website owner to
provide a better platform to attract more customers for their site. Providing information in a better way is
the solution to bring more customers or users. Customer is the end-user, who accessing the information
in a way it yields some credit to the web site owners. In this paper we define web mining and present a
method to utilize web mining in a better way to know the users and website behaviour which in turn
enhance the web site information to attract more users. This paper also presents an overview of the
various researches done on pattern extraction, web content mining and how it can be taken as a catalyst
for E-business.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
Comparable Analysis of Web Mining Categoriestheijes
Web Data Mining is the current field of analysis which is a combination of two research area known as Data Mining and World Wide Web. Web Data Mining research associates with various research diversities like Database, Artificial Intelligence and Information redeem. The mining techniques are categorized into various categories namely Web Content Mining, Web Structure Mining and Web Usage Mining. In this work, analysis of mining techniques are done. From the analysis it has been concluded that Web Content Mining has unstructured or semi- structure view of data whereas Web Structure Mining have linked structure and Web Usage Mining mainly includes interaction.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
Information is overloaded in the Internet due to the unstable growth of information and it makes information search as complicate process. Recommendation System (RS) is the tool and largely used nowadays in many areas to generate interest items to users. With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Web recommendation systems assist the users to get the exact information and facilitate the information search easier. Web recommendation is one of the techniques of web personalization, which recommends web pages or items to the user based on the previous browsing history. But the tremendous growth in the amount of the available information and the number of visitors to web sites in recent years places some key challenges for recommender system. The recent recommender systems stuck with producing high quality recommendation with large information, resulting unwanted item instead of targeted item or product, and performing many recommendations per second for millions of user and items. To avoid these challenges a new recommender system technologies are needed that can quickly produce high quality recommendation, even for a very large scale problems. To address these issues we use two recommender system process using fuzzy clustering and collaborative filtering algorithms. Fuzzy clustering is used to predict the items or product that will be accessed in the future based on the previous action of user browsers behavior. Collaborative filtering recommendation process is used to produce the user expects result from the result of fuzzy clustering and collection of Web Database data items. Using this new recommendation system, it results the user expected product or item with minimum time. This system reduces the result of unrelated and unwanted item to user and provides the results with user interested domain.
a novel technique to pre-process web log data using sql server management studioINFOGAIN PUBLICATION
Web log data available at server side helps in identifying user access pattern. Analysis of Web log data poses challenges as it consists of plentiful information of a Web page. Log file contains information about User name, IP address, Access Request, Number of Bytes Transferred, Result Status, Uniform Resource Locator (URL), User Agent and Time stamp. Analysing the log file gives clear idea about the user. Data Pre-Processing is an important step in mining process. Web log data contains irrelevant data so it has to be Pre-Processed. If the collected Web log data is Pre-Processed, then it becomes easy to find the desire information about visitors and also retrieve other information from Web log data. This paper proposes a novel technique to Pre-Process the Web log data and given detailed discussion about the content of Web log data. Each Uniform Resource Locator (URL) in the Web log data is parsed into tokens based on the Web structure and then it is implemented using SQL server management studio.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
In today’s era, as we all know internet technologies are growing rapidly. Along with this, instantly, Web page recommendations are also improving. The aim of a Web page recommender system is to predict the Web page or pages, which will be visited from a given Web-page of a website. Data preprocessing is one basic and essential part of Web page recommendation. Data preprocessing consists of cleanup and constructing data to organize for extracting pattern. In this paper, we discuss and focus on Web page Recommendation and role of data preprocessing in Web page recommendation, considering how data preprocessing is related to Web page recommendation.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting valuable information from web databases. Web mining is one of the data mining domains where data mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate a particular website based on the information which is stored in web log files. Web mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library. Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase the complexity of dealing information from different web service providers. The collection of information becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting valuable information from web databases. Web mining is one of the data mining domains where data mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate a particular website based on the information which is stored in web log files. Web mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library. Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase the complexity of dealing information from different web service providers. The collection of information becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Web is a collection of inter-related files on one or more web servers while web mining means extracting valuable information from web databases. Web mining is one of the data mining domains where data mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate a particular website based on the information which is stored in web log files. Web mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library. Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase the complexity of dealing information from different web service providers. The collection of information becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
Automatic recommendation for online users using web usage miningIJMIT JOURNAL
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intuition of the user and provide them with the recommendation list. Most specifically, an online navigation behavior grows with each passing day, thus extracting information intelligently from it is a difficult issue. Web master should use web usage mining method to capture intuition. A WUM is designed to operate on web server logs which contain user’s navigation. Hence, recommendation system using WUM can be used to forecast the navigation pattern of user and recommend those to user in a form of recommendation list. In this paper, we propose a two tier architecture for capturing users intuition in the form of recommendation list containing pages visited by user and pages visited by other user’s having similar usage profile. The practical implementation of proposed architecture and algorithm shows that accuracy of user intuition capturing is improved.
Automatic Recommendation for Online Users Using Web Usage Mining IJMIT JOURNAL
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intuition of the user and provide them with the recommendation list. Most specifically, an online navigation behavior grows with each passing day, thus extracting information intelligently from it is a difficult issue. Web master should use web usage mining method to capture intuition. A WUM is designed to operate on web server logs which contain user’s navigation. Hence, recommendation system using WUM can be used to forecast the navigation pattern of user and recommend those to user in a form of recommendation list. In this paper, we propose a two tier architecture for capturing users intuition in the form of recommendation list containing pages visited by user and pages visited by other user’s having similar usage profile. The practical implementation of proposed architecture and algorithm shows that accuracy of user intuition capturing is improved.
Web personalization using clustering of web usage dataijfcstjournal
The exponential growth in the number and the complexity of information resources and services on the Web
has made log data an indispensable resource to characterize the users for Web-based environment. It
creates information of related web data in the form of hierarchy structure through approximation. This
hierarchy structure can be used as the input for a variety of data mining tasks such as clustering,
association rule mining, sequence mining etc.
In this paper, we present an approach for personalizing web user environment dynamically when he
interacting with web by clustering of web usage data using concept hierarchy. The system is inferred from
the web server’s access logs by means of data and web usage mining techniques to extract the information
about users. The extracted knowledge is used for the purpose of offering a personalized view of the
services to users.
International conference On Computer Science And technologyanchalsinghdm
ICGCET 2019 | 5th International Conference on Green Computing and Engineering Technologies. The conference will be held on 7th September - 9th September 2019 in Morocco. International Conference On Engineering Technology
The conference aims to promote the work of researchers, scientists, engineers and students from across the world on advancement in electronic and computer systems.
A Comparative Study of Recommendation System Using Web Usage Mining Editor IJMTER
Web Mining is one of the Developing field in research. Exact custom of the Web is to get the
beneficial material in the sites. To reduce the work time of user the Web Usage Mining (WUM) technique
is introduced. In this Technique use Web Page recommendation for the Web request from the user. For
the recommendation system in Web Usage Mining (WUM) variousauthor has introduce different
Algorithm and technique to improve the user interest in surfing the Web. Web log files are used todefine
the user interest and there next recommend page to view.The data stored in the web log file consist of
large amount oferoded, incomplete, and unnecessary information. So, the Web log files have to preprocess, customize, and to clean the data. In this paper we will survey different recommendation technique
to identify the issues in web surfing and to improve web usagemining (WUM) pre-processing for pattern
mining and analysis.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Similar to An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Local Search (18)
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data.
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
Diagnosing lungs cancer Using Neural NetworksIJSRD
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
A Survey on Sentiment Analysis and Opinion MiningIJSRD
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
A Defect Prediction Model for Software Product based on ANFISIJSRD
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Product Quality Analysis based on online ReviewsIJSRD
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075.
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
A crime is an act which is against the laws of a country or region. The technique which is used to find areas on a map which have high crime intensity is known as crime hotspot prediction. The technique uses the crime data which includes the area with crime rate and predict the future location with high crime intensity. The motivation of crime hotspot prediction is to raise people’s awareness regarding the dangerous location in certain time period. It can help for police resource allocation for creating a safe environment. The paper presents survey of different types of data mining techniques for crime hotspots prediction.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Digital Artifact 2 - Investigating Pavilion Designs
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Local Search
1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 285
An Enhanced Approach for Detecting User’s Behavior Applying
Country-Wise Local Search
Abhishek Kumar Shukla1
G.S. Dhakad2
1
M. Tech Student 2
Assistant Professor
1,2
Department of Computer Science &Engineering
1,2
NITM, Gwalior, India
Abstract— The development of the web in past few years
has created a lot of challenge in this field. The new work in
this field is the search of the data in a search tree pattern
based on tree. Various sequential mining algorithms have
been devoloped till date. Web usage mining is used to
operate the web server logs, that contains the navigation
history of the user. Recommendater system is explained
properly with the explanation of whole procedure of the
recommendater system. The search results of the data leads
to the proper ad efficient search. But the problem was the
time utilization and the search results generated from them.
So, a new local search algorithm is proposed for country-
wise search that makes the searching more efficient on local
results basis. This approach has lead to an advancement in
the search based methods and the results generated.
Key words: Sequential pattern mining, web mining,
recommendation system
I. INTRODUCTION
Data mining is an extension of traditional data analysis and
statistical approaches. In addition it integrates analytical
techniques taken from a range of disciplines including, but
that is not limited to pattern matching numerical analysis,
and areas of artificial intelligence such as neural networks,
genetic algorithms and machine learning, [1].
The Internet has grown into a gold mine that
comprises or dynamically generates information beneficial
to E-businesses With the help of rapid growth in sources
information available on the World Wide Web(www) and
the rapidly growing pace of adoption to Internet
commerce[2].
Web mining can be classifies as the discovery and
analysis of useful information derived from the World Wide
Web(WWW), which is based on different ways to gather
information and different emphasis. Web Usage Mining can
be determined as the discovery and analysis of user access
patterns, by associated data from a specific Web site and
mining of log files.
Web usage mining can be accomplished first by
reporting visitors traffic information based on Web server
log files and other source of traffic data (as discussed
below). Web server log files were utilized initially by the
system administrators and webmasters for the purposes of
“what kind of errors are being generated, how much traffic
they are getting and how many requests fail”, etc. Though,
Web server log files can also trace and record the visitor‟s
on-line behavioral aspects. For example, after some basic
traffic analysis, the log files can help us to answer questions
such as “What pages are the most and least popular? from
which search engine are visitors coming?”[3]. Web log file
is one way to gather Web traffic data. The another way is to
“sniff” TCP/IP packets as they cross the network, and to
“plug in” to each Web server.
After the Web traffic data is gained, it may be
combined with other relational databases, over which the
implementation of data mining techniques can be done.
Recommender system is a subclass of filtering
information system that pursue to predict the 'rating' or
'preference' that user would give to an item. Recommender
systems have become extremely common in recent years,
and can be applied in a variety of applications. The most
popular ones are probably music, books, news, research
articles, movies, music, news, books, research articles,
search queries, social tags, and products in general.
II. WEB MINING
Web can be explained as a complex system with
interconnected elements and mining is the process to extract
information or data, so web mining is the process of data
extraction from this interconnected system. Web mining can
be separated into three different types – Web usage mining,
Web content mining and Web structure mining [4].
A. Web Content Mining
It refers to mine the information from weblog or record set.
In this technique content like picture text and graphs are
scanned to find out the significance of the content from the
requested query. Web page Content mining is a traditional
search process of web page via content [5].
B. Web Structure Mining
This technique refers to mine the information from the
linkage structure of the Webpage then this linkage
information is used to capture the list of interesting patterns.
Web Structure mining mines the structures like HTML or
XML tags and extracts information from the actual
organization of the pages. To give weight to the page, it uses
interconnections between web pages [5].
C. Web Usage Mining
This is the application of data mining techniques. Web
Usage miming refers to discover interesting usage patterns
from Web data in order to understand and better serve the
requirements of Web-based applications. Web usage mining
refers to mine the information gathered from the web access
behavior of the customers at the same time as they are
investigating and skimming through the Web[6]. Web usage
mining is the application of data mining techniques to
appreciate the web usage patterns. It mines data from logs,
cookies, bookmarks, , scrolls, mouse click, user sessions,
user profiles, user queries etc. The three phases of web
usage mining are preprocessing, pattern discovery, and
pattern analysis [6].
2. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 286
Fig. 1: Web Mining Classification
Sequential pattern is a sequence of itemsets that
frequently occurred in a specific order, all items in the same
itemsets are supposed to have the same transaction time
value or within a time gap.
III. PROCEDURE OF RECOMMENDATION SYSTEM
Recommender systems now became famous commercially
and in the research community, where many approaches
have been recommended for providing recommendations. In
numerous cases a system designer desires to employ a
recommendation system must choose between a set of
candidate approaches. A first step towards choosing an
appropriate algorithm is to resolve which properties of the
application need focus upon when making this choice.
Indeed, recommendation systems have a variety of
properties that may affect user experience such as
scalability, accuracy, robustness, and so forth.
Recommender systems are having the effect of guiding
users in a personalized way as the useful and interesting
objects in a large space of possible options [7]. As the input
Recommendation algorithms are using customer‟s interests
to generate a list of recommended items. Amazon.com, uses
recommendation algorithms to personalize the online store
for each n every customer [8]. Recommending items related
issues has been studied extensively and mainly the two
paradigms have emerged. First is Content-based
recommendation systems that tries to identify recommend
items similar to those a given user has liked before in the
past, whereas the second systems designed recommendation
systems, according to the collaborative recommendation
paradigm identifies those users whose preferences are
similar to the given user and recommend items they have
liked [9].
A. Types of Recommendation System:
1) Content-Based Recommendation System:
The system learns to those recommend items that are similar
to the ones that the user liked in the past. The similarity of
items is calculated based on the features associated with the
compared items. For example, if a user has positively rated a
movie that belongs to the comedy genre, then the system can
learn to recommend other movies from this genre. The
overview of content based recommender systems, imposing
some order among the extensive and diverse features
involved in their design and implementation. Content-based
Recommendation system discusses trends and the future
research which might lead towards the next generation of
recommender systems. Collaborative filtering: The simplest
and original implementation of this approach [10]
recommends to the active user the items that other users
with similar tastes liked in the past. The similarity in taste of
two users is calculated based on the similarity in the rating
history of the users. This is the reason why [11] refers to
collaborative filtering as “people-to-people correlation.”
Recommendation procedure is partitioned into following
steps:-
1) Collect Web logs
2) Apply pre-processing
3) Prepare processed data base
4) Apply Pattern mining algorithm
5) Construct Pattern tree
6) Recommendation rule generation
a) Web logs:
First we will collect Web logs (Web server access Log) of
any Web-site. Web logs are the text file (ASCII) files
contain information about user IP Address, User Name,
URL that Referred, Access Request, Time Stamp; error
codes etc. and generally resides in the web servers.
b) Apply Preprocessing:
First step is preprocessing. Preprocessing need to be carried
out before performing web mining calculations on the Web
server logs.
B. Preprocessing comprises of following methods [12]:
1) Data Cleansing:
During data cleansing process Irrelevant records are
eliminated. Since the target of web usage mining is to
retrieve traversal pattern, following two kinds of records
found unnecessary and should be removed:
1) The records having suffixes for filename as GIF,
JPEG, CSS.
2) While examining the web log for status field of every
record, it eliminates the record with status code range
more than 299 and below then 200.
2) User and Session Identification:
It‟s aim is to extract different user sessions from the original
web access log.
1) If all the IP addresses are same, different users could
be found by user agents and client IP address indicated
by the different operation systems and browsers.
2) If all of the browsers, IP address, and operating
systems are same, information related to referrer
should be taken into account. The ReferURI is
checked, new user‟s session is identified if the URL in
the ReferURI is „-‟ indicates that field hasn't been
accessed before.
3) Content Retrieval:
It retrieves content derived from user‟s query request i.e.
cs_uri_query.forEg:Query:http/1www.cs.depaul.edu/courses
/syllabus.asp?course=323-21-603&q=3&y=2002&id=671.
Retrieve the content such as syllabus/courses.asp which
helps in fast searching of unvisited pages i.e; pages of
another user‟s which are similar to user‟s interest.
4) Path Completion:
It should be used for obtaining the complete user access
path. If in the begning of session, Referrer as well URI has
3. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 287
some data value, eliminate value of Referrer with addition
of „-„.
5) Prepare processed data base
The database which was preprocessed is now formatted and
stored in the database. The data which is stored is now in the
cleaned form and in well representable form.
6) Apply Pattern mining algorithm
Pattern mining algorithm deal with the processed data base.
Processed data base is capture by the pattern mining
algorithm for the generation of frequently accessed pattern.
7) Construct Pattern tree
Frequently accessed patterns construct a pattern tree (nodes
of the tree are represented by frequently accessed patterns)
for the recommendation rule generation. Sequence of pattern
tree can be matched with the current access sequence of the
user and then generate recommendation rule.
8) Recommendation Rule Generation
For the recommendation, we will apply Algorithm to the log
data to capture the list of frequently used items in the form
of sets, then Calculate the Confidence and Support for
different url of a website [13]. Then on the basis of the
frequent data item list we will recommend (i.e. suggestion) a
page to the user which is the best match of the user query.
IV. SEQUENTIAL PATTERN MINING ALGORITHMS
This algorithm was first introduceded by R. Agrawal and R.
Srikanth [14]. To reduce the search space for finding
frequent sequence they both have also proposed a
generalized algorithm for sequential pattern mining GSP
[15]. Closed itemset mining and Sequential pattern mining
are associated with Closed sequential pattern mining. From
a sequential database, total set of sequential patterns are
discovered by sequential pattern mining .
A brief summary of the is given below with the help of flow
diagram.
Fig. 2: Sequential Pattern-Mining Algorithms
On the basis of Apriori method algorithms such as
SPAM [16], SPADE [17], and GSP were developed.
Apriori-based methods use candidate generate-and-test
framework, to make use of the downward closure property.
Algorithms like FreeSpan [18] and PrefixSpan [19] were
developed based on pattern-growth model. Algorithms like
Pattern-growth follows an incremental mechanism for
generating construct projections and possible frequent
sequences of the database for reducing the search space.
The sequential pattern mining efficiency is
increased with the help of algorithms like SPAM, SPADE
and PrefixSpan, in terms of time and space complexity.
SPAM and PrefixSpan work on depth-first search where as
SPADE work with breadth-first search. The sequential
pattern are generated using a simple join on id-lists, SPADE
uses vertical data format but Prefix Span uses horizontal
data format with pattern growth model. Spam has the
advantage that it runs faster then SPADE and Prefix due to
use of vertical bitmap representation but it also comes up
with drawback of more memory consumption.
Closed itemset mining technique was developed to
generate closed itemset with no supersets of same set.
Closed itemset mining generates smaller set of results as
compared to frequent itemset mining. Close [20] mines
closed itemsets and is based on Apriori approach. At first
Close employs bottom-up search and then calculates the
closure of all generators.
FPclose[21] mines closed itemsets and is based on
FP-growth method. During the mining process, frequency
count of whole dataset store by FPtree used by FPclose.
FPclose uses another data structure i.e. Closed Frequent
Itemset tree by traversing all closed itemsets, to examine
the closure of a frequent itemset as well as to decrease the
search space and the no of subset testing actions.
CLOSET[22] and CHARM [23] uses space efficient depth
first search. To generate compressed database representation
to mine closed itemset, FP tree is used by CLOSET where
as CHARM uses compact vertical tid list structure also
known as diffset.
CLOSET+[24] mines closed itemsets by using item
skipping and subset-checking techniques. Item skipping
technique speed up the mining by pruning the search space.
While subset-checking technique performs the closure-
checking and reduces the memory consumption. The
CLOSET+ performs better from CLOSET and CHARM in
terms of scalability , execution time and memory usage.
Now the recent focus in sequential pattern mining
has been diverted from mining the complete set of
sequential patterns to mine the closed sequential patterns for
achieving a more compact output set with better efficiency.
A pattern is a closed pattern if it does not have any super
pattern with the same support.
For closed sequential pattern mining the two well
known algorithms are CloSpan [25] and BIDE [26]. Both
these techniques uses PrefixSpan framework. As the above
closed itemset mining techniques, CloSpan also uses a
candidate maintenance-and-test paradigm. The mining is
done in two phases. In the first phase CloSpan generates a
closed sequential pattern candidate set and keeps in a prefix
sequence lattice where as in second phase, it eliminates non
closed sequential patterns by performing post pruning. It
uses an efficient search space pruning method, known as
equivalence of projected databases. It performs
subsequence/ supersequence checking efficiently by using
the size of the projected databases as the hash key.
CloSpan produces minimum number of patterns
compared to sequential pattrn mining while preserving the
same expressive power and runs faster than PrefixSpan.
4. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 288
CloSpan is not scalable because it performs under candidate
maintenance-and-test paradigm. In CloSpan large amount
of closed sequential pattern candidates will consume more
memory space utilization and it leads to large search space
for checking new pattern of closure, particularly low support
threshold values or long patterns.
BIDE generated closed sequential patterns without
maintaining candidates. The Non closed sequences are
eliminated by using BI-Directional Extension closure
checking scheme. Search Space is pruned by the BackScan
pruning method. It consumes less memory and runs faster
compared to previously announced closed sequential pattern
mining techniques, specially when the support is minimum.
Scalability is better compared to previous techniques.
FMCSP [27] uses breadth first search techniques and
generate output on frequent closed patterns online. It
removes the drawback of the candidate maintenance-and-
test paradigm and generate more search space in compared
to closed pattern mining algorithms explained above. It uses
equivalence class to reduce the runtime.
V. RELATED WORK
As of late, to forecast navigation patterns of users and their
inclination, many Web Usage Mining systems have been
proposed. In this section we review some of the research
work related to web recommendation.
S.Vijayalakshmi et al [28] proposed a new
technique for frequent sequential pattern (FSP) mining,
named as AWAPT (Adaptive Web Access Pattern Tree).
To efficientl store all the sequences that contain a given
item, it combines Suffix tree and Prefix tree together.
During the mining, AWAPT removes recursive
reconstruction of intermediate WAP tree by transmitting the
binary codes to every node of it. To improve the efficiency
of AWAPT, an attempt has been done to its approach.
AWAPT completely removes the requirements to engage in
numerous reconstructions of intermediate WAP-trees during
mining and considerably decreases execution time.
Jian Pei et al [29] done survey about the
problemetic mining access patterns from Web logs
efficiently. They have introduced a novel data structure for
effcient mining of access patterns from pieces of logs, and
termed as Web access pattern tree, or WAP-tree in short. it
stores extremely compressed critical information for access
pattern mining. And they facilitates the development of
novel algorithms for mining access patterns in large set of
log pieces. This algorithm can efficiently extracts access
patterns from web logs.
Pragya Rajput, Joy Bhattacharjee, Roopali Soni[30]
proposed work helps personalize the website according to
users, country being its analytical parameter(“ web
personalization is a action that tailors the web experience to
any individual or several users “).Distinctive IP address are
provided by every internet user by the Internet Service
Provider. Every region has some specific Internet service
provider. For example, in India BSNL is the major ISP.
VI. PROPOSED WORK
It is a good practice if we provide a list of recommendation
or suggestion to the users related to their search query, for
making effective search when they interact with the web.
Frequency is calculated on the basis of popularity of the
searched keyword and popularity is calculated with the help
of analysis of web log. In this paper we propose an approach
for the recommendation that uses pattern mining apriori
algorithm for finding frequently access pattern. Apriori
algorithm generates a list of frequently accessed patterns.
The frequently accessed patterns are find out on the basis of
the local country-wise search algorithm implemented. Then
with the help of frequently accessed patterns construct a
pattern tree (nodes of the tree are represented by frequently
accessed patterns) for the recommendation rule generation.
Diverse estimation procedures like Precision, applicability
and satisfibility are considered to compute the performance
of the system.
A. Sequential Pattern Mining
Generally, every line of web logs (one access record)
comprises the following key information: requested URL,
and HTTP status code, client IP address, date-timestamp,
user ID. Prior to applying sequential pattern mining,
Preprocessing must be done on the web logs. The main data
preprocessing techniques used here containing session
identification and user identification as well as data
cleaning.
Sequential pattern mining is an significant subject of data
mining which is broadly applied in several zones [31].
Generally, sequential pattern mining is defined as the
determination of whole set of frequent subsequences in a
set of sequences [32, 33]. Sequential pattern can be
explained as the sequence of itemsets that frequently appear
in a specific order, such that, all items in that same itemset
are expected to have the same transaction time value or
within a time gap.
In our proposed work, closed sequential pattern algorithm
has been explained like this:-
1) Algorithm 1: Call_Seq()
B. Pattern tree construction
A Pattern-tree model is proposed for storing sequential web
access patterns compactly, so that it can be used for
matching with a user‟s current access sequence and
generating recommendation rules more efficiently in the
Recommendation Rules Generation component. In general,
the set of sequential web access patterns can be treated as a
set of strings over a finite alphabet E (the set of unique
access events). Sometimes, the edges of a Tree are labeled
instead of the nodes, but nevertheless refer to the same
structure in either case.
The procedure for constructing the pattern tree in
the proposed system is as follows:
5. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 289
1) Algorithm 2: Call_PTC()
C. Recommendation Rule Generation
It‟s elements searches for the optimum-matching access path
in the Pattern tree according to the user‟s existing access
sequence. In general, as longer the user‟s existing access
sequence is, the lower the probability is of extracting the
matching path from the Pattern-tree. Some initial items can
be eliminated to make the current access sequence shorter
than the depth of the Pattern-tree before the sequence
matching process begins.
D. Generation of Recommendations for User Access
Sequences
The constructed pattern tree is used for matching and
generating web links for recommendations for user access
sequences. For instance, the proposed system provides
recommendations R for user web access sequences <xy>
and <zx> as follows:
1) Case 1:
The constructed pattern tree is searched for sequential
patterns with the presence of User‟s web access sequence
<xy>. In the pattern tree (shown in figure 3), next to the root
node has the sequences <xyy: 2> and <xyz: 4> that are
subset of given user web access sequence <xy>. So the
postfixes of these sequential patterns i.e., <y> and <z> are
given as recommendations to the user ( R = y: 2 and z: 4).
2) Case 2:
For user web access sequence <zx>, the pattern tree (shown
in figure 3) is searched for pattern with the presence of
<zx>. As the pattern <zx> does not have any postfixes, it‟s
child node i.e., <y> is provided as recommendations for the
user ( R = y: 2).
3) Algorithm 3: Call_Rec_rule_gen()
The process of recommendation rule generation works n a
particular algorithm that calls various algorithms within
itself.
The pseudo-code for the recommendation system
proposed can be explained as below:-
VII. PERFORMANCE EVALUATION
A. Evaluation Measures
Let S= x1,x2…xl,xl+1…can be a web access sequence. For
the prefix sequence Sprefix = x1x2…xl (l ≥ MinLength), we
generate a recommendation rule Rec_Rule = {s1, s2, …,
sm} using the Pattern-tree, where all events are ordered by
their support. If xl+1∈Rec_Rule, Recommendation rules are
labeled as correct, and incorrect. If there exists xi∈Rec_Rule
(l+1≤ i ≤ l+1+m, m>0), Recommendation rules are deemed
as m-step satisfactory. Otherwise, labeled as m-step
unsatisfactory. Let R_Rule = {Rec_Rule1, Rec_Rule2, …,
Rec_Rulen} be a set of recommendation rules, where
Rec_Rulei (1≤ i ≤n) is a recommendation rule. |R_Rule| = n
is the total number of recommendation rules in R_Rule. We
define the following measures.
1) Definition 1:
Let Rc be the subset of R_Rule consisting of all correct
recommendation rules. The overall web
recommendation precision is defined as
precision=
This precision measures how probable a user will access one
of the recommended pages.
2) Definition 2:
Time Utilization = the net time utilized by the algorithm to
process the code.
Where, R_Rule are total rules generated.
Rc is subset of R_Rule which are correct rules.
Rs is subset of R_Rule that consists of all satisfactory rules.
B. Results Analysis
1) Base paper results
Total number of records : 1560
CountryNo CountryName
1 United States
2 India
3 Brazil
2) No. WebsiteName
1) http://bluerobot.info/nw2/grigosikyfaheku
2) http://buttons-for-website.com
3) http://buttons-for-website.comhttp://buttons-for-
4) website.com/
5) http://semalt.semalt.com/crawler.php
6) http://texec.org
7) http://texec.org/
8) http://texec.org/about.html
9) https://www.megakin.com/
6. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 290
10) https://www.megakin.com/about.html
11) https://www.megakin.com/contact.html
Etc.
1) Step 1:- User is asked to input the search sequence
2) Step 2:- User is asked to enter the suffix that he wants to
search.
3) Step 3:- Then, user is asked to enter m-step satisfactory
recommendation rules to be searched.
Elapsed time in tree creation 67.419610 seconds.
3) Output_rule
25 3
25 3
25 3
25 3
25 3
25 3
28 3
28 3
– Precision = 0.750000
– Satisfaction = 0.375
– Elapsed time in tree searching 63.0953 seconds
4) Proposed Paper Results
CountryNo CountryName
1) United States
2) India
3) Brazil
5) Country Name United States
a) WebsiteNo WebsiteName
1) http://buttons-for-website.com
2) http://semalt.semalt.com/crawler.php
3) http://texec.org/
4) http://texec.org/css/josefin-sans/stylesheet.css
5) http://texec.org/services.html
6) http://whois.domaintools.com/texec.org
7) http://www.google.co.in/url
8) http://www.google.com/m
9) http://www.google.com/search
10) http://www.google.com/url
6) Country Name India
a) WebsiteNo WebsiteName
1) http://buttons-for-website.com
2) http://buttons-for-website.comhttp://buttons-for-
website.com/
3) http://semalt.semalt.com/crawler.php
4) http://texec.org/
5) http://texec.org/about.html
6) http://texec.org/contact.html
7) http://texec.org/css/josefin-sans/stylesheet.css
8) http://texec.org/hoc/
9) http://texec.org/http://texec.org/
10) http://texec.org/school/
7. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 291
Etc… for all the countries.
Elapsed time is 20.627226 seconds.
1) Step 1: User is asked to enter the country name first so
as to search loacally.
2) Step 2: User is asked to input the sequence to be
searched locally.
3) Step 3: Enter the suffix for the local search.
4) Step 4:- Then, user is asked to enter m-step satisfactory
recommendation rules to be searched.
7) Output_rule
14 3
14 3
14 3
14 3
14 3
14 3
16 3
16 3
Precision = 0.625000
Satisfaction = 0.125
Elapsed time in tree searching is 10.894232 seconds.
VIII. CONCLUSION
In this paper we have discussed about the sequential pattern
mining and web mining. Various sequential mining
algorithms have been developed that have been developed
till date with all the pros and cons of every algorithm.
Recommender system with various steps used in this system
has also been discussed. A brief introduction to each
algorithm has been discussed.
8. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 292
REFERENCES
[1] U. M. Fayyad, G. P. Shapiro and P. Smyth, From Data
Mining to Knowledge Discovery in Databases. 0738-
4602-1996, AI Magazine (Fall 1996). pp: 37–53.
[2] J. Han and M. Kamber, Data Mining: Concepts and
Techniques. Second edition Morgan Kaufmann
Publishers.
[3] S.K. Pani, L.Panigrahy, V.H.Sankar, Bikram Keshari
Ratha, A.K.Mandal, S.K.Padhi, “Web Usage Mining: A
Survey on Pattern Extraction from Web Logs”,
International Journal of Instrumentation, Control &
Automation
[4] M. Eirinaki and M. Vazirgiannis, “Web mining for web
personalization”, ACM Transactions on Internet
Technology, Vol. 3, No. 1, 2003, pp. 1-27.
[5] Dunham, M. H. 2003. Data Mining Introductory and
Advanced Topics. Pearson Education.
[6] Ms.Dipa Dixit and Mr Jayant Gadge, “Automatic
Recommendation for Online Users Using Web Usage
Mining”, International Journal of Managing Information
Technology (IJMIT) Vol.2, No.3, August 2010.
[7] Burke, R.: Hybrid Recommender Systems: Survey and
Experiments. User Modeling and User-Adapted
Interaction 12(4), 331–370 (2002)
[8] Linden, G., Smith, B., York, J.: Amazon.com
Recommendations: Item-to-Item Collaborative Filtering.
IEEE Internet Computing 7(1), 76–80 (2003)
[9] Balabanovic, M., Shoham, Y.: Fab: Content-based,
Collaborative Recommendation. Communications of the
ACM 40(3), 66–72 (1997)
[10]Schafer, J.B., Frankowski, D., Herlocker, J., Sen, S.:
Collaborative filtering recommender systems. In: The
Adaptive Web, pp. 291–324. Springer Berlin /
Heidelberg (2007)
[11]Schafer, J.B., Konstan, J.A., Riedl, J.: E-commerce
recommendation applications. Data Mining and
Knowledge Discovery 5(1/2), 115–153 (2001)
[12]M. Perkowitz and O. Etzioni, "Towards adaptive Web
sites: Conceptual framework and case study," Artificial
Intelligence, vol. 118, pp. 245-275, 2000.
[13]M. Jalali, N. Mustapha, A. Mamat, Md N. Sulaiman,
“OPWUMP An architecture for online predicting in
WUM-based personalization system”, In 13th
International CSI Computer Science, Springer
Verlag,2008. 307.
[14]R.Agrawal and R.Srikant, “Mining Sequential Patterns,"
In Proceedings of International conferenceon data
engineering. pp. 3-14.
[15]Minghua Zhang, Ben Kao, Chi-Lap Yip, David Cheung,
“A GSP-based Efficient Algorithm for Mining Frequent
Sequences”
[16]J. Ayres, J. Gehrke, T. Yiu, and J. Flannick, “Sequential
pattern mining using a bitmap representation,”
Proceedings of ACM SIGKDD ‟02, pp. 429-435, July
2002.
[17]M. Zaki, “SPADE: An efficient algorithm for mining
frequent sequences,” Kluwer Academic Publisher‟s
Machine Learning, vol. 42, pp. 31-60, 2001.
[18]J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen, U. Dayal, and
M.C. Hsu, “FreeSpan: Frequent patternprojected
sequential pattern mining,” Proc. ACM SIGKDD Int‟l
Conf. Knowledge Discovery and Data Mining (SIGKDD
‟00), pp. 355-359, Aug. 2000.
[19]J. Pei, J. Han, B. Mortazavi-Asl, and et al., “PrefixSpan :
Mining sequential patterns efficiently by prefix-
projected pattern growth,” Proc. Int‟l Conf. Data
Engineering (ICDE ‟01), pp. 215-224, Apr. 2001.
[20]N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal,
“Discovering frequent closed itemsets for association
rules,” 7th Int‟l Conf. on Database Theory, pp. 398-416,
Jan. 1999.
[21]Grahne G and Zhu J F, “Fast algorithm for frequent
itemset mining using FP-Trees,” IEEE Trans. on
Knowledge and Data Engineering, vol. 17, no. 10, pp.
1347-1362, 2005.
[22]J. Pei, J. Han, and R. Mao, “CLOSET: An efficient
algorithm for mining frequent closed itemsets,”
Proceedings of ACM DMKD ‟00, pp. 21-30, May 2000.
[23]M. Zaki and C. Hsiao, “CHARM: An efficient algorithm
for closed itemset mining,” Proceedings of SIAM‟s
SDM ‟02, pp. 457-473, Apr. 2002.
[24]J. Wang, J. Han, and J. Pei, “CLOSET+: Searching for
the best strategies for mining frequent closed itemsets,”
Proceedings of ACM SIGKDD ‟03, pp. 236-245, Aug.
2003.
[25]X. Yan, J. Han, and R. Afshar, “CloSpan: Mining closed
sequential patterns in large databases,” Proceedings of
SIAM‟s SDM ‟03, pp. 166-177, May 2003.
[26]J. Wang, J. Han, and Chun Li, “Frequent closed
sequence mining without candidate maintenance,” IEEE
TKDE, vol. 19, no. 8, pp. 1042-1056, Aug. 2007.
[27]Nancy P. Lin, Wei-Hua Hao, Hung-Jen Chen, Hao-En
Chueh and Chung-I Chang, “Fast mining of closed
sequential patterns,” WSEAS Transactions on
Computers, vol. 7, no. 3, Mar. 2008.
[28]S.Vijayalakshmi, V.Mohan and S.Suresh Raja, “Mining
Of Users‟ Access Behaviour For Frequent Sequential
Pattern From Web Logs”, International Journal of
Database Management Systems ( IJDMS ) Vol.2, No.3,
August 2010.
[29]Jian Pei, Jiawei Han, Behzad Mortazavi-asl, and Hua
Zhu, “Mining Access Patterns E_ciently from Web
Logs”, Natural Sciences and Engineering Research
Council of Canada (grant NSERC-A3723), the Networks
of Centres of Excellence of Canada (grant NCE/IRIS-3),
and the Hewlett-Packard Lab.
[30]Pragya Rajput, Joy Bhattacharjee, Roopali Soni, “A
Proposed Framework to Implicit Measures of User
Interests through Country and Predicting Users‟ Future
Requests in WWW”, International Journal of Soft
Computing and Engineering (IJSCE) ISSN: 2231-2307,
Volume-3, Issue-1, March 2013.
[31]Sizu Hou, Xianfei Zhang, "Alarms Association Rules
Based on Sequential Pattern Mining Algorithm," In
proceedings of the Fifth International Conference on
Fuzzy Systems and Knowledge Discovery, vol. 2,
pp.556-560, Shandong, 2008.
[32]R. Agrawal and R. Srikant, “Mining Sequential
Patterns”, In Proceedings of the 11th International
Conference on Data Engineering, pp. 3-14, Taipei,
Taiwan, 1995.
9. An Enhanced Approach for Detecting User’s Behavior Applying Country-Wise Local Search
(IJSRD/Vol. 3/Issue 10/2015/069)
All rights reserved by www.ijsrd.com 293
[33]Zhenglu Yang, Yitong Wang and Masaru Kitsuregawa,
"An Effective System for Mining Web Log", LNCS, vol.
3841, pp.40-52, 2006.