SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 567
Web Usage Mining: A Survey on User’s Navigation Pattern from Web
Logs
Richa Patel1 Akshay Kansara2
1
P.G. Student 2
Assistant Professor
1,2
Department of Computer Science and Engineering
1,2
Mehasana, India
Abstract— With an expontial growth of World Wide Web,
there are so many information overloaded and it became
hard to find out data according to need. Web usage mining
is a part of web mining, which deal with automatic
discovery of user navigation pattern from web log. This
paper presents an overview of web mining and also provide
navigation pattern from classification and clustering
algorithm for web usage mining. Web usage mining contain
three important task namely data preprocessing, pattern
discovery and pattern analysis based on discovered pattern.
And also contain the comparative study of web mining
techniques.
Key words: web mining, web usage mining, web log data,
classification, clustering
I. INTRODUCTION
In today’s world internet has become extremely popular and
its growth is very rapid. The information is available on
internet for people whom they are using for their different
intend. The resources for using internet are growing fast, it
is necessary for users to use automatic tools for discover
desired information. People require systems at client side
and server side for finding out the desired information.
Above system used to mine data and extract information
from that source. So for a specific user only interesting
information of web is useful and rest of the information not
important. Several users are interested in content of web and
they can browse by using search engines. Using web log
files, we can find out information related to web access
pattern. These web log files provide the information related
to behavior of user. In business area, user’s behavior plays
an important role for extracting information.
In this area, user navigation patterns are described
as the common browsing behaviors along with a group of
users. During navigation, many users may have common
interests .so navigation patterns should capture the
overloaded information or user’s need. In addition,
navigation patterns should also be able to differentiate
among web pages based on their different meaning to each
pattern.
The rest of paper is as follows: Section II presents
the overview of web mining and types of web mining.
Section III related to literature work. Section IV explains the
comparisons of WCM, WSM and WUM. Section V
represent conclusion.
II. WEB MINING
A. Overview
Web mining is a part of data mining techniques to
automatically discover and extract knowledge from the web.
It can be broadly divided into three tasks: web content
mining, web usage mining, web structure mining.
Classification of Web Mining can be understood using
the given Fig .1
Fig.1: Web Mining Classification
Web Mining is an application of Data Mining
which deals with the extraction of interesting pattern from
the World Wide Web. In above figure web mining can be
classified into three categories: web structure mining, web
content mining and web usage mining. Web Structure
Mining is the process of inferring knowledge from the
World Wide Web and links between web pages. The
structure of a typical web graph contains web pages as
nodes and hyperlinks as edges between related web pages. It
is the process of using graph theory to examine the node and
connection structure of a web site. Web content mining is
the process of extracting useful information from the
available web pages. Generally, the web content mining
contain the several types of source data such as textual,
image, audio, video, metadata as well as hyperlinks. Web
Usage mining is a part of data mining techniques to discover
useful navigation patterns from web log. Resource data is
usually collected when user interact with web server such as
web server log, proxy server logs, user queries, registration
data. In short, Web usage mining is a process of extracts
information from user how to use web sites. Web content
mining is a process of extracts information from texts,
images and other contents. Web structure mining is a
process of extracts information from hyperlinks of web
pages.
B. Web Usage Mining
Web usage mining is an part of web mining. It contain the
two categories, first is general access pattern tracking and
second is customized usage tracking. Now, general access
pattern is a mining process using the history of the web page
visited by user. And customized usage tracking is targeted
on specific user. Web usage mining, the art of analyzing
user interactions with a web page, has been dealt by several
researchers using different approaches.[1] there are many
research area in data mining techniques like association rule
mining, classification ,clustering and Sequential-pattern-
mining-based.
C. Web Usage Mining Techniques
These techniques given below:
Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs
(IJSRD/Vol. 2/Issue 09/2014/129)
All rights reserved by www.ijsrd.com 568
1) Sequential-pattern-mining-based: Allows the
discovery of temporally ordered Web access
patterns,
2) Association-rule-mining-based: Finds correlations
among Web pages,
3) Clustering-based: Groups users with similar
characteristics,
4) Classification-based: Groups users into predefined
classes based on their characteristics [2].
Here all are given briefly:
1) Association Rules Mining:
Association rule mining can be used for related pages that
are most often referenced together in a single server
sessions. These rules refer to sets of pages that are accessed
together with a support value more than some predefined
threshold. Association rule is a concept of data mining that
is used for basket transaction data analysis. There are
several association rule algorithms have been used, such as
Apriori, Partition. This rule is being applicable for business
intelligence and marketing applications, e-Commerce and
also it can help web designers to restructure their web site.
2) Sequential Pattern Mining:
A database consists of sequences of events or values that
change with time, is called a time-series database. Time-
series database is widely used to store historical data in a
variety of areas such as, scientific data, financial data,
medical data, and so on. Different mining techniques have
been designed for mining time-series data, basically there
are four kinds of patterns we can get from various types of
time series data:1) Trend analysis, 2) Sequential pattern,
3)Similarity search, and 4) Periodical patterns. This
technique of sequential pattern mining attempts to find the
relationships between occurrences of sequential events, and
also to find if there exists any specific order of the
occurrences We can find the sequential patterns of cross
different items and also find the specific individual items.
Generally, Sequential pattern mining is used in analyzing of
DNA sequence. An example of sequential patterns is that
every time IBM stock drops at least 4%, Microsoft stock
will drops 5% within three days.
3) Classification:
Classification is a supervised learning technique, to
automatically generate a model that can be classify as a
class of objects so that to predict the classification or
missing attribute value of future objects whose class may
not be known. Classification is a two-step process. In the
first step is model construction, it is based on the collection
of training data set, a model is constructed to describe the
predetermine characteristics of a set of data classes or
concepts. Class label of training data is known is called
supervised learning (i.e., which class the training sample
belongs to is provided). In the second step, model usage is
used to predict the classes of future objects or data. .
Classification can be done by using several learning
algorithms such as decision tree classifiers, k-nearest
neighbor classifiers, naïve Bayesian classifiers, Support
Vector Machines etc. The decision tree induction
Classification algorithms such as C4.5, ID3, CART, and
Hunt’s algorithm can be used to predict if page is of interest
to the user.
4) Clustering:
Classification is a supervised learning technique, clustering
is another mining technique similar to classification.
However clustering is an unsupervised learning technique.
Clustering is a technique in which set of data item or object
having similar characteristics they are group together.
Objects characteristics are same within a cluster but
dissimilar to characteristics of object in other clusters.
Clustering can be performed on either the page views or the
user views. Clustering analysis in web usage mining intends
to find the cluster of page, user, or sessions from web log
file, where each cluster represents a group of objects with
common interesting or characteristic. The clustering method
are model-based, partition based, grid based, hierarchical
based. To construct partition of data, we use partition
method like k-mean, k-medoid. Each partition represent
cluster.
5) Web Log Data
Log files can be classified into three categories:
 Web Server Log Files: Web server log files located
in web server and notes activity of the user
browsing website. There are four types of web
server logs i.e., transfer logs, error logs, agent logs,
and referrer logs.
 Web Proxy Server Log Files: web proxy server log
files contain information about the proxy server
from which user request came to the web server.
 Client browser Log Files: client browser log files
reside in client’s browser and to store them special
software are used.
6) Log Files Parameters
To recognizing user browsing patterns, they are use log files
parameters which are given below.
 User Name: To identify the user who has visited
the website and this identification normally is IP
address.
 Path Traversed: it is the path taken by the user
within the website.
 Visiting Path: in which path taken by the user while
visiting the website.
 Time Stamp: It is the time spends by user on each
page and is normally known as session.
 Page Last Visited: It is the last page visited by the
user while leaving the website.
 Success Rate: It is measured by copying and
downloads activity carried out on the website.
 User Agent: It is the browser that user send request
to server.
 URL: It is the resource that is accessed by the user
and it may be of any format like CGI, HTML etc.
 Request Type: It is the method that is used by user
to send request to the server and it can be either
GET or POST method.
a) Types of Log File Format
There are mainly three kinds of log file formats that are used
by majority of the servers.
Common Log File Format: It is the standardized
text file format that is used by most of the web servers to
generate the log files.[16]
Format is given below:
Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs
(IJSRD/Vol. 2/Issue 09/2014/129)
All rights reserved by www.ijsrd.com 569
 Log Format "%h %l %u %t "%r" %>s %b"
common CustomLog logs/access_log common eg:
127.0.0.1 RFC 1413 frank [10/Oct/2000:13:55:36 -
0700] "GET /apache_pb.gif HTTP/1.0" 200
2326[16]
 Combined Log Format: It is same as the common
log file format but with three additional fields i.e.,
referral field, the user_agent field, and the cookie
field.[16]
Format is given below:
Log Format "%h %l %u %t "%r" %>s %b
"%{Referer}i" "%{Useragent i"" combined CustomLog
log/access_log combined eg: 127.0.0.1 - frank
[10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif
HTTP/1.0" 200 2326 "http://www.example.com/start.html"
"Mozilla/4.08 [en] (Win98; I;Nav)”[16]
 Multiple Access Logs: It is the combination of
common log format and combined log file format
but in this format multiple directories can be
created for access logs.[16]
Format is given below:
LogFormat "%h %l %u %t "%r" %>s %b" common
CustomLog logs/access_log common CustomLog
logs/referer_log "%{Referer}i -> %U" CustomLog
logs/agent_log "%{User-agent}i"[16]
The above techniques help in the development of
effective marketing strategies as well as design of better
Web sites. Generally, users are not ready to disclose
personal information and may tend to give false information
to the websites. Hence, it is assumed that the anonymity of
users for WUM in general, particularly for non-commercial
web sites where user registration is not required, and
disregards clustering and classification.
D. Web Usage Mining Steps
There are several steps in web usage mining given in fig.2
Fig. 2: stages of preprocessing [3]
The main objectives of preprocessing are to reduce
the size of data and at a same time quality being enhanced.
Preprocessing contain the following steps – Merging of Log
files from Different Web Servers, Data cleaning, User
Identification, Session Identification, Data formatting and
Summarization as shown in Fig. 2.
1) Merging
At the beginning of the data preprocessing is merging, the
request from the all web log files, merging all log files with
web server name and synchronization of web server clocks,
including time zone differences.
2) Data Cleaning
The second step of data preprocessing is data cleaning, it
consists of remove unnecessary request from web server log
files. We need to eliminate the irrelevant entries if all web
log entries are not valid. Usually, this process remove
request which contain non-analyzed data such as images,
multimedia files and page style files.
3) User Identification
In generally, the web log file contains only the computer
address (name or IP address) and the user agent (for ECLF
log files). The web log file also contains the user login that
can be used for the user identification when user login or
register in particular web sites.
4) Session Identification
To group the activities of a single user from the web log
files is called a session [4]. A user session is called when as
longer as user connected to particular web sites. Default
session taken as a 30 minutes time-out. A session is a set of
reference pages from one web site during one logical time
period. Historically session identification is done by a user
logging into a computer, performing the task and then
logging off. The login and logoff represent the logical time
period of the start session and end of the session.
5) Data Formatting & Summarization
This is the last step of data preprocessing, the structured or
formatted file containing user sessions and visits are
transformed into a relational database model.
III. LITERATURE REVIEW
The focus of literature review is to study and analyze about
available technique to predict the users' navigation pattern
with the web or web site. . There are many Web log analysis
tools presented for mine the data from log record on Web
page. Log record provides useful information likes IP
address, URL and time and so on. Analyzing and
discovering of log could help organizations to discovered
more potential customers, pages popularity number of times
a page has been visited etc. that can help in reorganizing the
Web site for fast and easy customer access, , attracting more
advertisement capital by intelligent adverts improving links
and navigation, turning viewers into customers by better
site architecture.
Internet is a gold mine, but only for those
companies who realize the importance of Web mining and
adopt a Web mining strategy now.[5] Generally, Companies
have to implement Web mining systems to identify their
own strength and weakness , and to understand their
customers' profiles of their E-marketing efforts on the web
through continuous improvements. In this paper author
describe the overview of web mining and types and
application of web mining. From the data analysis and
graphing workspace tool, we are helpful in providing useful
information related to the user access patterns, which could
not be possible by using traditional approaches.[6] in this
paper they considered university’s peak working time for
analysis of web traffic. Traffic data was selected based on
daily, monthly and hourly including request volume and
page volume to generate cluster models. In web usage
mining grouping of web access sequences can be used to
determine the behavior or intent of a set of users.[7] The
task of grouping web sessions based on similarity and
consists of maximizing the intra-group similarity while
Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs
(IJSRD/Vol. 2/Issue 09/2014/129)
All rights reserved by www.ijsrd.com 570
minimizing the inter-group similarity is done using sequence
alignment method.[7] In this paper author describe a new
method to group web sessions, which considers the global
and local alignment techniques of similarity measurement..
Length of session also plays an important role for session.
Sequence alignment method can be improved by affine gaps
in computing global alignment value .we can also find the
web session similarity based on Fuzzy Rough Set Theory. In
that, rough set theory defines the characteristics of each
cluster. Web site graph contain vertices of web pages and
edges of link between web pages. Using Table Filling
Algorithm to generate the cluster Traditional clustering
methods create clusters by describing the members of each
cluster whereas the rough set based clustering techniques
create clusters describing the main characteristics of each
cluster.[9] [8], There is an attempt to provide an overview of
the state of the art in the research of web usage mining,
while discussing the most relevant tools available in the
sphere as well as the niche requirements that the current
variety of tools lack. All tools are related to statistical
analysis techniques, likes WEBMINER, Web Tool, Web
Mate and so on. The main uses of web content mining are to
gather, categorize, organize and provide the best possible
information available on the Web to the user requesting the
information [17]. In this paper web content mining tool scan
the HTML documents, text and images. They compare the
web content mining tools like screen-scraper, Automation
Anywhere 6.1, Web Info Extractor, Mozenda, and Web
Content Extractor. Screen-scrapper needs prior knowledge
of proxy server and some knowledge of HTML and HTTP
where as other tools do not require any such knowledge and
it need Internet connection to run [17]. Web contains noisy
data, redundant information and which mirrored web pages
in and abundance [18]. They use web content extraction
method to remove noisy data present in web documents.
They use three phases to perform web content extraction
method. First phase list of documents are selected, second
phase documents are preprocessed, and in third phase result
are presented to user. Proposed method shows better
performance when compared with existing methods [18].
Web content mining tool and techniques and analyzed the
method for retrieving information. This method focuses on
the following objectives: Focusing on the role of web
content extraction and identifying list problems when
mining list of documents. Studying the solutions to this
problem, presenting the method which is used to identify
required patterns in an effective manner [18] Examining a
Web content data consist of structured, semi – structured
and un- structured data. Web content mining techniques
such as text based clustering, partition clustering,
hierarchical clustering, graph based clustering, neural
network based clustering , fuzzy clustering and probabilistic
clustering. And they also describe the research issue on web
content mining such as data/information extraction in that
product or result search extraction, web information
integration and schema matching, opinion extraction from
online sources in that customer review of products, forums,
blogs, and chat rooms .knowledge synthesis, segmenting
web pages and detecting noise in that like content of web
page without advertisement, navigation links and copyrights
notices. An EM algorithm is used in statistics for finding
maximum likelihood estimates of parameters in probabilistic
models, where the model depends on unobserved latent
variables.[10]This algorithm is a type of partitioning
clustering method and it is a mixture of Markov chain used
for clustering user session. In this algorithm there are two
steps, first is expectation step in which value is expected
from cluster probabilities and second is maximization step
in which they compute distribution parameters and their like
hood. This algorithm work same as k-mean in that set of
parameters are re-computed until desired value is achieved.
This algorithm used for improve cluster quality. Machine
learning research area have two activity first is clustering
and second is classification. Both the classification and
clustering algorithm are used to find the maximum and
minimum likelihood estimates of parameters in probabilistic
models, where the model depends on unobserved latent
variables.[11]In this paper ,author use graph partitioned
clustering algorithm to discover the navigation pattern and
LCS classification algorithm to predict future requests.
After applying clustering and classification three
performance parameters accuracy, coverage and F1 Measure
are measured. They provide accuracy 0.87% when threshold
was 0.9.To predict future request and finding navigation
pattern we use clustering and classification techniques. In
this paper there are two phase, one is online phase and
second is offline phase. The offline phase takes care of
preprocessing and clustering, while the classification and
prediction is performed during the online phase [12].Ant-
based clustering method used to discover or extract user’s
navigational pattern from web log files. The LCS
classification algorithm uses the knowledge from offline
stage and predicts the users’ next request [12]. After
applying clustering and classification they measure
maximum accuracy 74% when threshold value increases. In
this paper we deal with classification algorithms for
studying the user/client behavior and for the generation of
interested user patterns [13]. In this paper they give the
comparison of classification algorithms based on some
factor like accuracy, precision, session based timing and
recall. Classification algorithms are to be applied on the web
log data and then performance of these algorithms can be
measured. Here classification algorithm likes Decision Tree
Classifier, Naive Byes Classifier, Support Vector Machine,
Neural Networks, Rule Based Classifier, and K-Nearest
Neighbor Classifier are analyzed. After analyzing above
algorithms, author say that the Decision Tree classifier and
SVM algorithm are perform well as compared to others.
Clustering is useful in characterizing customer groups based
on purchasing patterns, categorizing web documents that
have similar functionality [14]. In this paper they uses graph
based clustering algorithm which is Chameleon clustering
algorithm, it takes data point as an input and forms
clusters. They uses adjacency matrix in which session as
rows and pages as column. This matrix generates the data
point which is input to algorithm. This algorithm works
same as KNN graph. It has two phases. In first phase, they
use graph partition algorithm to partition cluster into small
sub-clusters. And in second phase, they merge the cluster
until relative number of cluster is achieved. This algorithm
provides both interconnectivity and closeness to identifying
the most similar pairs of cluster.
Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs
(IJSRD/Vol. 2/Issue 09/2014/129)
All rights reserved by www.ijsrd.com 571
IV. COMPARATIVE STUDY OF WCM, WSM AND WUM
Here, given table represent the comparison of WCM, WSM
and WUM:
Specification WCM WSM WUM
Tasks
information
from the
web content /
documents
It discover the
model
underlying the
link structure
of the web
It tries to
make sense
of data
generated by
web surfer’s
session or
behavior
Input Data primary data
It uses primary
data
It uses
secondary
data
Data View
structured,
semi-
structured,
unstructured
Linking of
structure
Interactive
Data
Method
Machine
Learning,
statistical
Method,
Association
Rule,
Proprietary
algorithm
Proprietary
algorithm
Statistical
Method,
Machine
Learning
Application
Categories
Finding
Extraction
Rules,
Finding Pattern
in text,
Finding
Frequent Sub-
structure,
Categorization,
Clustering
Categorization,
Clustering
Site
Construction,
Adaption
and
Management,
Marketing
User
Modeling
Outcome
Bag of word,
Phrases, Edge
labeled graph
Graph
Relational
Table, Graph
V. CONCLUSION
This paper provide a more current evolution and of Web
Usage Mining. It describes the user navigation pattern from
classification and clustering algorithm. Web Usage Mining
is a fast rising research area for generating interested log
information. And also provide the comparison table of Web
Content Mining, Web Structure Mining and Web Usage
Mining.
REFERENCES
[1] Niranjana. Kannan and Dr. Elizabeth Shanthi,
“Classification and Clustering of Web Log Data to
Analyze User Navigation Patterns”, JGRCS,
Volume 1, No. 1, August 2010
[2] Yew-Kwong Woon ,Wee-Keong Ng, Ee-Peng
Lim,“Web Usage Mining: Algorithms and Results”
[3] Ramya C, Kavitha G, “An Efficient Preprocessing
Methodology for Discovering Patterns and
Clustering of Web Users using a Dynamic ART1
Neural Network”, Fifth International Conference
on Information Processing, Augus-2011,Bangalore,
INDIA
[4] Vijayashri Losarwar, Dr. Madhuri Joshi, “Data
Preprocessing in Web Usage Mining”,
ICAIES'2012,July 15-16, 2012
[5] Monika Yadav, Pradeep Mittal, “Web Mining: An
Introduction”, IJARCSSE, Volume 3, Issue 3,
March 2013
[6] Shakti Kundu, “An Intelligent Approach Of Web
Data Mining”, IJCSE, Vol. 4 No. 05 May 2012
[7] Bhupendra S Chordia, Krishnakant P Adhiya,
“Grouping Web Access Sequences Using
Sequence Alignment Method”, IJCSE, Vol. 2 No.
3 Jun-Jul 2011
[8] Chhavi Rana, “A Study of Web Usage Mining
Research Tools”, Int. J. Advanced Networking and
Applications,Volume:03 Issue:06 Pages:1422-1429
(2012)
[9] T. Vijaya kumar & H. S. Guruprasad, “Clustering
Of Web Usage Data Using Fuzzy Tolerance
Rough Set Similarity and Table Filling Algorithm”,
IJCSEITR, Vol. 3, Issue 2, Jun 2013, 143-152
[10]Norwati Mustapha, Manijeh Jalali, Abolghasem
Bozorgniya, Mehrdad Jalali, “Navigation Patterns
Mining Approach based on Expectation
Maximization Algorithm”, World Academy of
Science, Engineering and Technology Vol:3 2009-
02-26
[11]V.Sujatha, Punithavalla, , “Improved User
Navigation Pattern Prediction Technique From
Web Log Data”, International Conference on
Communication Technology and System Design
2011
[12]K. Devipriyaa and Dr. B.Kalpana, “Users'
Navigation Pattern Discovery using Ant Based
Clustering and LCS Classification”, JGRCS,
Volume 1, No. 1, August 2010
[13]Supreet Dhillon, Kamaljit Kaur , “ Comparative
Study of Classification Algorithms for Web Usage
Mining”, IJARCSSE, Volume 4, Issue 7, July 2014
[14]T.Vijaya Kumar, Dr. H.S.Guruprasad2, “Clustering
Of Web Usage Data Using Chameleon
Algorithm”, IJIRCCE, Vol. 2, Issue 6, June 2014
[15]Naresh Barsagade, “Web Usage Mining and
Pattern Discovery: A Survey Paper”
[16]Nanhay Singh1, Achin Jain1, Ram Shringar Raw1.
“Comparison Analysis Of Web Usage Mining
Using Pattern Recognisation Techniques”,
International Journal of Data Mining & Knowledge
Management Process (IJDKP) Vol.3, No.4, July
2013
[17]Abdelhakim Herrouz, Chabane Khentout
Mahieddine Djoudi, “ Overview Of Web Content
Mining Tools”, The International Journal Of
Engineering And Science (IJES) ,Volume 2 ,Issue
6 ,2013
[18]Shanmuga Priya, S. Sakthivel, “An Implementation
Of Web Personalization Using Web Mining
Techniques”, IJCSMC, Vol. 2, Issue. 6, June 2013,
pg.145 – 150

More Related Content

What's hot

Web mining slides
Web mining slidesWeb mining slides
Web mining slides
mahavir_a
 
Web Mining
Web MiningWeb Mining
Web Mining
Ziyad Abid
 
Webmining ppt
Webmining pptWebmining ppt
Webmining ppt
kiransatyawada
 
Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure miningAtul Khanna
 
Web mining
Web miningWeb mining
Web mining
MohamadHayeri1
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
ijdkp
 
Web usage mining
Web usage miningWeb usage mining
Web usage mining
shabnamfsayyad
 
Web mining
Web mining Web mining
Web mining
TeklayBirhane
 
Webmining Overview
Webmining OverviewWebmining Overview
Webmining Overview
DataminingTools Inc
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
Sushil kasar
 
Web mining
Web miningWeb mining
Web mining
Silicon
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)
Amir Fahmideh
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation FinalEr. Jagrat Gupta
 
Web mining tools
Web mining toolsWeb mining tools
Web mining tools
Sujata Regoti
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
IJSRD
 
Web mining
Web miningWeb mining

What's hot (20)

Web Mining
Web MiningWeb Mining
Web Mining
 
Web Content Mining
Web Content MiningWeb Content Mining
Web Content Mining
 
Web mining slides
Web mining slidesWeb mining slides
Web mining slides
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Webmining ppt
Webmining pptWebmining ppt
Webmining ppt
 
Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
5463 26 web mining
5463 26 web mining5463 26 web mining
5463 26 web mining
 
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
BIDIRECTIONAL GROWTH BASED MINING AND CYCLIC BEHAVIOUR ANALYSIS OF WEB SEQUEN...
 
Web usage mining
Web usage miningWeb usage mining
Web usage mining
 
Web mining
Web mining Web mining
Web mining
 
Webmining Overview
Webmining OverviewWebmining Overview
Webmining Overview
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
 
Web mining
Web miningWeb mining
Web mining
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)
 
Web Mining Presentation Final
Web Mining Presentation FinalWeb Mining Presentation Final
Web Mining Presentation Final
 
Web mining tools
Web mining toolsWeb mining tools
Web mining tools
 
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
An Enhanced Approach for Detecting User's Behavior Applying Country-Wise Loca...
 
Web mining
Web miningWeb mining
Web mining
 

Similar to Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs

A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
ijctet
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
IOSR Journals
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
ijcax
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
IOSR Journals
 
H0314450
H0314450H0314450
H0314450
iosrjournals
 
Recommendation generation by integrating sequential
Recommendation generation by integrating sequentialRecommendation generation by integrating sequential
Recommendation generation by integrating sequential
eSAT Publishing House
 
Recommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semanticsRecommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semantics
eSAT Journals
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
IOSR Journals
 
D43062127
D43062127D43062127
D43062127
IJERA Editor
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
IJERA Editor
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
Ouzza Brahim
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
IJERA Editor
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
ijcsa
 

Similar to Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs (20)

A detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniquesA detail survey of page re ranking various web features and techniques
A detail survey of page re ranking various web features and techniques
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...Performance of Real Time Web Traffic Analysis Using Feed  Forward Neural Netw...
Performance of Real Time Web Traffic Analysis Using Feed Forward Neural Netw...
 
H0314450
H0314450H0314450
H0314450
 
Recommendation generation by integrating sequential
Recommendation generation by integrating sequentialRecommendation generation by integrating sequential
Recommendation generation by integrating sequential
 
Recommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semanticsRecommendation generation by integrating sequential pattern mining and semantics
Recommendation generation by integrating sequential pattern mining and semantics
 
Comparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering TechniqueComparative Analysis of Collaborative Filtering Technique
Comparative Analysis of Collaborative Filtering Technique
 
D43062127
D43062127D43062127
D43062127
 
A Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage MiningA Review on Pattern Discovery Techniques of Web Usage Mining
A Review on Pattern Discovery Techniques of Web Usage Mining
 
Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
50320140501002
5032014050100250320140501002
50320140501002
 
Web log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy cWeb log data analysis by enhanced fuzzy c
Web log data analysis by enhanced fuzzy c
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 

Recently uploaded

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 567 Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs Richa Patel1 Akshay Kansara2 1 P.G. Student 2 Assistant Professor 1,2 Department of Computer Science and Engineering 1,2 Mehasana, India Abstract— With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques. Key words: web mining, web usage mining, web log data, classification, clustering I. INTRODUCTION In today’s world internet has become extremely popular and its growth is very rapid. The information is available on internet for people whom they are using for their different intend. The resources for using internet are growing fast, it is necessary for users to use automatic tools for discover desired information. People require systems at client side and server side for finding out the desired information. Above system used to mine data and extract information from that source. So for a specific user only interesting information of web is useful and rest of the information not important. Several users are interested in content of web and they can browse by using search engines. Using web log files, we can find out information related to web access pattern. These web log files provide the information related to behavior of user. In business area, user’s behavior plays an important role for extracting information. In this area, user navigation patterns are described as the common browsing behaviors along with a group of users. During navigation, many users may have common interests .so navigation patterns should capture the overloaded information or user’s need. In addition, navigation patterns should also be able to differentiate among web pages based on their different meaning to each pattern. The rest of paper is as follows: Section II presents the overview of web mining and types of web mining. Section III related to literature work. Section IV explains the comparisons of WCM, WSM and WUM. Section V represent conclusion. II. WEB MINING A. Overview Web mining is a part of data mining techniques to automatically discover and extract knowledge from the web. It can be broadly divided into three tasks: web content mining, web usage mining, web structure mining. Classification of Web Mining can be understood using the given Fig .1 Fig.1: Web Mining Classification Web Mining is an application of Data Mining which deals with the extraction of interesting pattern from the World Wide Web. In above figure web mining can be classified into three categories: web structure mining, web content mining and web usage mining. Web Structure Mining is the process of inferring knowledge from the World Wide Web and links between web pages. The structure of a typical web graph contains web pages as nodes and hyperlinks as edges between related web pages. It is the process of using graph theory to examine the node and connection structure of a web site. Web content mining is the process of extracting useful information from the available web pages. Generally, the web content mining contain the several types of source data such as textual, image, audio, video, metadata as well as hyperlinks. Web Usage mining is a part of data mining techniques to discover useful navigation patterns from web log. Resource data is usually collected when user interact with web server such as web server log, proxy server logs, user queries, registration data. In short, Web usage mining is a process of extracts information from user how to use web sites. Web content mining is a process of extracts information from texts, images and other contents. Web structure mining is a process of extracts information from hyperlinks of web pages. B. Web Usage Mining Web usage mining is an part of web mining. It contain the two categories, first is general access pattern tracking and second is customized usage tracking. Now, general access pattern is a mining process using the history of the web page visited by user. And customized usage tracking is targeted on specific user. Web usage mining, the art of analyzing user interactions with a web page, has been dealt by several researchers using different approaches.[1] there are many research area in data mining techniques like association rule mining, classification ,clustering and Sequential-pattern- mining-based. C. Web Usage Mining Techniques These techniques given below:
  • 2. Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs (IJSRD/Vol. 2/Issue 09/2014/129) All rights reserved by www.ijsrd.com 568 1) Sequential-pattern-mining-based: Allows the discovery of temporally ordered Web access patterns, 2) Association-rule-mining-based: Finds correlations among Web pages, 3) Clustering-based: Groups users with similar characteristics, 4) Classification-based: Groups users into predefined classes based on their characteristics [2]. Here all are given briefly: 1) Association Rules Mining: Association rule mining can be used for related pages that are most often referenced together in a single server sessions. These rules refer to sets of pages that are accessed together with a support value more than some predefined threshold. Association rule is a concept of data mining that is used for basket transaction data analysis. There are several association rule algorithms have been used, such as Apriori, Partition. This rule is being applicable for business intelligence and marketing applications, e-Commerce and also it can help web designers to restructure their web site. 2) Sequential Pattern Mining: A database consists of sequences of events or values that change with time, is called a time-series database. Time- series database is widely used to store historical data in a variety of areas such as, scientific data, financial data, medical data, and so on. Different mining techniques have been designed for mining time-series data, basically there are four kinds of patterns we can get from various types of time series data:1) Trend analysis, 2) Sequential pattern, 3)Similarity search, and 4) Periodical patterns. This technique of sequential pattern mining attempts to find the relationships between occurrences of sequential events, and also to find if there exists any specific order of the occurrences We can find the sequential patterns of cross different items and also find the specific individual items. Generally, Sequential pattern mining is used in analyzing of DNA sequence. An example of sequential patterns is that every time IBM stock drops at least 4%, Microsoft stock will drops 5% within three days. 3) Classification: Classification is a supervised learning technique, to automatically generate a model that can be classify as a class of objects so that to predict the classification or missing attribute value of future objects whose class may not be known. Classification is a two-step process. In the first step is model construction, it is based on the collection of training data set, a model is constructed to describe the predetermine characteristics of a set of data classes or concepts. Class label of training data is known is called supervised learning (i.e., which class the training sample belongs to is provided). In the second step, model usage is used to predict the classes of future objects or data. . Classification can be done by using several learning algorithms such as decision tree classifiers, k-nearest neighbor classifiers, naïve Bayesian classifiers, Support Vector Machines etc. The decision tree induction Classification algorithms such as C4.5, ID3, CART, and Hunt’s algorithm can be used to predict if page is of interest to the user. 4) Clustering: Classification is a supervised learning technique, clustering is another mining technique similar to classification. However clustering is an unsupervised learning technique. Clustering is a technique in which set of data item or object having similar characteristics they are group together. Objects characteristics are same within a cluster but dissimilar to characteristics of object in other clusters. Clustering can be performed on either the page views or the user views. Clustering analysis in web usage mining intends to find the cluster of page, user, or sessions from web log file, where each cluster represents a group of objects with common interesting or characteristic. The clustering method are model-based, partition based, grid based, hierarchical based. To construct partition of data, we use partition method like k-mean, k-medoid. Each partition represent cluster. 5) Web Log Data Log files can be classified into three categories:  Web Server Log Files: Web server log files located in web server and notes activity of the user browsing website. There are four types of web server logs i.e., transfer logs, error logs, agent logs, and referrer logs.  Web Proxy Server Log Files: web proxy server log files contain information about the proxy server from which user request came to the web server.  Client browser Log Files: client browser log files reside in client’s browser and to store them special software are used. 6) Log Files Parameters To recognizing user browsing patterns, they are use log files parameters which are given below.  User Name: To identify the user who has visited the website and this identification normally is IP address.  Path Traversed: it is the path taken by the user within the website.  Visiting Path: in which path taken by the user while visiting the website.  Time Stamp: It is the time spends by user on each page and is normally known as session.  Page Last Visited: It is the last page visited by the user while leaving the website.  Success Rate: It is measured by copying and downloads activity carried out on the website.  User Agent: It is the browser that user send request to server.  URL: It is the resource that is accessed by the user and it may be of any format like CGI, HTML etc.  Request Type: It is the method that is used by user to send request to the server and it can be either GET or POST method. a) Types of Log File Format There are mainly three kinds of log file formats that are used by majority of the servers. Common Log File Format: It is the standardized text file format that is used by most of the web servers to generate the log files.[16] Format is given below:
  • 3. Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs (IJSRD/Vol. 2/Issue 09/2014/129) All rights reserved by www.ijsrd.com 569  Log Format "%h %l %u %t "%r" %>s %b" common CustomLog logs/access_log common eg: 127.0.0.1 RFC 1413 frank [10/Oct/2000:13:55:36 - 0700] "GET /apache_pb.gif HTTP/1.0" 200 2326[16]  Combined Log Format: It is same as the common log file format but with three additional fields i.e., referral field, the user_agent field, and the cookie field.[16] Format is given below: Log Format "%h %l %u %t "%r" %>s %b "%{Referer}i" "%{Useragent i"" combined CustomLog log/access_log combined eg: 127.0.0.1 - frank [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://www.example.com/start.html" "Mozilla/4.08 [en] (Win98; I;Nav)”[16]  Multiple Access Logs: It is the combination of common log format and combined log file format but in this format multiple directories can be created for access logs.[16] Format is given below: LogFormat "%h %l %u %t "%r" %>s %b" common CustomLog logs/access_log common CustomLog logs/referer_log "%{Referer}i -> %U" CustomLog logs/agent_log "%{User-agent}i"[16] The above techniques help in the development of effective marketing strategies as well as design of better Web sites. Generally, users are not ready to disclose personal information and may tend to give false information to the websites. Hence, it is assumed that the anonymity of users for WUM in general, particularly for non-commercial web sites where user registration is not required, and disregards clustering and classification. D. Web Usage Mining Steps There are several steps in web usage mining given in fig.2 Fig. 2: stages of preprocessing [3] The main objectives of preprocessing are to reduce the size of data and at a same time quality being enhanced. Preprocessing contain the following steps – Merging of Log files from Different Web Servers, Data cleaning, User Identification, Session Identification, Data formatting and Summarization as shown in Fig. 2. 1) Merging At the beginning of the data preprocessing is merging, the request from the all web log files, merging all log files with web server name and synchronization of web server clocks, including time zone differences. 2) Data Cleaning The second step of data preprocessing is data cleaning, it consists of remove unnecessary request from web server log files. We need to eliminate the irrelevant entries if all web log entries are not valid. Usually, this process remove request which contain non-analyzed data such as images, multimedia files and page style files. 3) User Identification In generally, the web log file contains only the computer address (name or IP address) and the user agent (for ECLF log files). The web log file also contains the user login that can be used for the user identification when user login or register in particular web sites. 4) Session Identification To group the activities of a single user from the web log files is called a session [4]. A user session is called when as longer as user connected to particular web sites. Default session taken as a 30 minutes time-out. A session is a set of reference pages from one web site during one logical time period. Historically session identification is done by a user logging into a computer, performing the task and then logging off. The login and logoff represent the logical time period of the start session and end of the session. 5) Data Formatting & Summarization This is the last step of data preprocessing, the structured or formatted file containing user sessions and visits are transformed into a relational database model. III. LITERATURE REVIEW The focus of literature review is to study and analyze about available technique to predict the users' navigation pattern with the web or web site. . There are many Web log analysis tools presented for mine the data from log record on Web page. Log record provides useful information likes IP address, URL and time and so on. Analyzing and discovering of log could help organizations to discovered more potential customers, pages popularity number of times a page has been visited etc. that can help in reorganizing the Web site for fast and easy customer access, , attracting more advertisement capital by intelligent adverts improving links and navigation, turning viewers into customers by better site architecture. Internet is a gold mine, but only for those companies who realize the importance of Web mining and adopt a Web mining strategy now.[5] Generally, Companies have to implement Web mining systems to identify their own strength and weakness , and to understand their customers' profiles of their E-marketing efforts on the web through continuous improvements. In this paper author describe the overview of web mining and types and application of web mining. From the data analysis and graphing workspace tool, we are helpful in providing useful information related to the user access patterns, which could not be possible by using traditional approaches.[6] in this paper they considered university’s peak working time for analysis of web traffic. Traffic data was selected based on daily, monthly and hourly including request volume and page volume to generate cluster models. In web usage mining grouping of web access sequences can be used to determine the behavior or intent of a set of users.[7] The task of grouping web sessions based on similarity and consists of maximizing the intra-group similarity while
  • 4. Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs (IJSRD/Vol. 2/Issue 09/2014/129) All rights reserved by www.ijsrd.com 570 minimizing the inter-group similarity is done using sequence alignment method.[7] In this paper author describe a new method to group web sessions, which considers the global and local alignment techniques of similarity measurement.. Length of session also plays an important role for session. Sequence alignment method can be improved by affine gaps in computing global alignment value .we can also find the web session similarity based on Fuzzy Rough Set Theory. In that, rough set theory defines the characteristics of each cluster. Web site graph contain vertices of web pages and edges of link between web pages. Using Table Filling Algorithm to generate the cluster Traditional clustering methods create clusters by describing the members of each cluster whereas the rough set based clustering techniques create clusters describing the main characteristics of each cluster.[9] [8], There is an attempt to provide an overview of the state of the art in the research of web usage mining, while discussing the most relevant tools available in the sphere as well as the niche requirements that the current variety of tools lack. All tools are related to statistical analysis techniques, likes WEBMINER, Web Tool, Web Mate and so on. The main uses of web content mining are to gather, categorize, organize and provide the best possible information available on the Web to the user requesting the information [17]. In this paper web content mining tool scan the HTML documents, text and images. They compare the web content mining tools like screen-scraper, Automation Anywhere 6.1, Web Info Extractor, Mozenda, and Web Content Extractor. Screen-scrapper needs prior knowledge of proxy server and some knowledge of HTML and HTTP where as other tools do not require any such knowledge and it need Internet connection to run [17]. Web contains noisy data, redundant information and which mirrored web pages in and abundance [18]. They use web content extraction method to remove noisy data present in web documents. They use three phases to perform web content extraction method. First phase list of documents are selected, second phase documents are preprocessed, and in third phase result are presented to user. Proposed method shows better performance when compared with existing methods [18]. Web content mining tool and techniques and analyzed the method for retrieving information. This method focuses on the following objectives: Focusing on the role of web content extraction and identifying list problems when mining list of documents. Studying the solutions to this problem, presenting the method which is used to identify required patterns in an effective manner [18] Examining a Web content data consist of structured, semi – structured and un- structured data. Web content mining techniques such as text based clustering, partition clustering, hierarchical clustering, graph based clustering, neural network based clustering , fuzzy clustering and probabilistic clustering. And they also describe the research issue on web content mining such as data/information extraction in that product or result search extraction, web information integration and schema matching, opinion extraction from online sources in that customer review of products, forums, blogs, and chat rooms .knowledge synthesis, segmenting web pages and detecting noise in that like content of web page without advertisement, navigation links and copyrights notices. An EM algorithm is used in statistics for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables.[10]This algorithm is a type of partitioning clustering method and it is a mixture of Markov chain used for clustering user session. In this algorithm there are two steps, first is expectation step in which value is expected from cluster probabilities and second is maximization step in which they compute distribution parameters and their like hood. This algorithm work same as k-mean in that set of parameters are re-computed until desired value is achieved. This algorithm used for improve cluster quality. Machine learning research area have two activity first is clustering and second is classification. Both the classification and clustering algorithm are used to find the maximum and minimum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables.[11]In this paper ,author use graph partitioned clustering algorithm to discover the navigation pattern and LCS classification algorithm to predict future requests. After applying clustering and classification three performance parameters accuracy, coverage and F1 Measure are measured. They provide accuracy 0.87% when threshold was 0.9.To predict future request and finding navigation pattern we use clustering and classification techniques. In this paper there are two phase, one is online phase and second is offline phase. The offline phase takes care of preprocessing and clustering, while the classification and prediction is performed during the online phase [12].Ant- based clustering method used to discover or extract user’s navigational pattern from web log files. The LCS classification algorithm uses the knowledge from offline stage and predicts the users’ next request [12]. After applying clustering and classification they measure maximum accuracy 74% when threshold value increases. In this paper we deal with classification algorithms for studying the user/client behavior and for the generation of interested user patterns [13]. In this paper they give the comparison of classification algorithms based on some factor like accuracy, precision, session based timing and recall. Classification algorithms are to be applied on the web log data and then performance of these algorithms can be measured. Here classification algorithm likes Decision Tree Classifier, Naive Byes Classifier, Support Vector Machine, Neural Networks, Rule Based Classifier, and K-Nearest Neighbor Classifier are analyzed. After analyzing above algorithms, author say that the Decision Tree classifier and SVM algorithm are perform well as compared to others. Clustering is useful in characterizing customer groups based on purchasing patterns, categorizing web documents that have similar functionality [14]. In this paper they uses graph based clustering algorithm which is Chameleon clustering algorithm, it takes data point as an input and forms clusters. They uses adjacency matrix in which session as rows and pages as column. This matrix generates the data point which is input to algorithm. This algorithm works same as KNN graph. It has two phases. In first phase, they use graph partition algorithm to partition cluster into small sub-clusters. And in second phase, they merge the cluster until relative number of cluster is achieved. This algorithm provides both interconnectivity and closeness to identifying the most similar pairs of cluster.
  • 5. Web Usage Mining: A Survey on User’s Navigation Pattern from Web Logs (IJSRD/Vol. 2/Issue 09/2014/129) All rights reserved by www.ijsrd.com 571 IV. COMPARATIVE STUDY OF WCM, WSM AND WUM Here, given table represent the comparison of WCM, WSM and WUM: Specification WCM WSM WUM Tasks information from the web content / documents It discover the model underlying the link structure of the web It tries to make sense of data generated by web surfer’s session or behavior Input Data primary data It uses primary data It uses secondary data Data View structured, semi- structured, unstructured Linking of structure Interactive Data Method Machine Learning, statistical Method, Association Rule, Proprietary algorithm Proprietary algorithm Statistical Method, Machine Learning Application Categories Finding Extraction Rules, Finding Pattern in text, Finding Frequent Sub- structure, Categorization, Clustering Categorization, Clustering Site Construction, Adaption and Management, Marketing User Modeling Outcome Bag of word, Phrases, Edge labeled graph Graph Relational Table, Graph V. CONCLUSION This paper provide a more current evolution and of Web Usage Mining. It describes the user navigation pattern from classification and clustering algorithm. Web Usage Mining is a fast rising research area for generating interested log information. And also provide the comparison table of Web Content Mining, Web Structure Mining and Web Usage Mining. REFERENCES [1] Niranjana. Kannan and Dr. Elizabeth Shanthi, “Classification and Clustering of Web Log Data to Analyze User Navigation Patterns”, JGRCS, Volume 1, No. 1, August 2010 [2] Yew-Kwong Woon ,Wee-Keong Ng, Ee-Peng Lim,“Web Usage Mining: Algorithms and Results” [3] Ramya C, Kavitha G, “An Efficient Preprocessing Methodology for Discovering Patterns and Clustering of Web Users using a Dynamic ART1 Neural Network”, Fifth International Conference on Information Processing, Augus-2011,Bangalore, INDIA [4] Vijayashri Losarwar, Dr. Madhuri Joshi, “Data Preprocessing in Web Usage Mining”, ICAIES'2012,July 15-16, 2012 [5] Monika Yadav, Pradeep Mittal, “Web Mining: An Introduction”, IJARCSSE, Volume 3, Issue 3, March 2013 [6] Shakti Kundu, “An Intelligent Approach Of Web Data Mining”, IJCSE, Vol. 4 No. 05 May 2012 [7] Bhupendra S Chordia, Krishnakant P Adhiya, “Grouping Web Access Sequences Using Sequence Alignment Method”, IJCSE, Vol. 2 No. 3 Jun-Jul 2011 [8] Chhavi Rana, “A Study of Web Usage Mining Research Tools”, Int. J. Advanced Networking and Applications,Volume:03 Issue:06 Pages:1422-1429 (2012) [9] T. Vijaya kumar & H. S. Guruprasad, “Clustering Of Web Usage Data Using Fuzzy Tolerance Rough Set Similarity and Table Filling Algorithm”, IJCSEITR, Vol. 3, Issue 2, Jun 2013, 143-152 [10]Norwati Mustapha, Manijeh Jalali, Abolghasem Bozorgniya, Mehrdad Jalali, “Navigation Patterns Mining Approach based on Expectation Maximization Algorithm”, World Academy of Science, Engineering and Technology Vol:3 2009- 02-26 [11]V.Sujatha, Punithavalla, , “Improved User Navigation Pattern Prediction Technique From Web Log Data”, International Conference on Communication Technology and System Design 2011 [12]K. Devipriyaa and Dr. B.Kalpana, “Users' Navigation Pattern Discovery using Ant Based Clustering and LCS Classification”, JGRCS, Volume 1, No. 1, August 2010 [13]Supreet Dhillon, Kamaljit Kaur , “ Comparative Study of Classification Algorithms for Web Usage Mining”, IJARCSSE, Volume 4, Issue 7, July 2014 [14]T.Vijaya Kumar, Dr. H.S.Guruprasad2, “Clustering Of Web Usage Data Using Chameleon Algorithm”, IJIRCCE, Vol. 2, Issue 6, June 2014 [15]Naresh Barsagade, “Web Usage Mining and Pattern Discovery: A Survey Paper” [16]Nanhay Singh1, Achin Jain1, Ram Shringar Raw1. “Comparison Analysis Of Web Usage Mining Using Pattern Recognisation Techniques”, International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.4, July 2013 [17]Abdelhakim Herrouz, Chabane Khentout Mahieddine Djoudi, “ Overview Of Web Content Mining Tools”, The International Journal Of Engineering And Science (IJES) ,Volume 2 ,Issue 6 ,2013 [18]Shanmuga Priya, S. Sakthivel, “An Implementation Of Web Personalization Using Web Mining Techniques”, IJCSMC, Vol. 2, Issue. 6, June 2013, pg.145 – 150