SlideShare a Scribd company logo
1 of 19
WELCOME TO ECOMIT 2013
SRILANKA
A SURVEY ON WEB USAGE MINING
TECHNIQUES
Mr. Abdul Rahaman wahab sait
Lecturer, Shaqra University,
Kingdom of Saudi Arabia
(Research Scholar, Alagappa University,India)
rahamaan@gmail.com
Dr. Meyappan
Professor,
Dept. of Computer Science and Eng.,
Alagappa University, India
meyslotus@yahoo.com
INTRODUCTION
• Internet becomes a popular media for the
business people.
• Today millions of domains are exist in the
internet. This result clearly shows the growth
of the internet.
• web is also a database, it is a distributed
database, data are hidden, and it means data
are stored in deep web
INTRODUCTION
Figure 1 - Country wise Domain Registration
(only for 16 Countries)
INTRODUCTION
• The Figure shows the graphical representation
of first 16 countries having more domains in
the world.
• The data has been taken from the site
www.webhosting.info as on date 25.2.2013.
• E-business is the electronic version of business
which runs on internet. Buying and selling
activities are happening through internet
INTRODUCTION
• Competition is the constant word in the
world, which gives new idea for a person to
present himself as unique.
• In this scenario, E-business needs the help of
data mining techniques to promote the buying
and selling activities.
• Web mining techniques are very useful to
determine the customer behavior from the
huge pool of web data.
INTRODUCTION
• web usage mining (WUM)
WUM is used to discover interest patterns which
can be applied to many real world problems
like improving the presentation of website,
better understanding of the users behavior
and product recommendation.
INTRODUCTION
•THREE MAJOR CATEGORIES OF PATTERN
EXTRACTION:-
ASSOCIATION RULES
CLUSTERING
CLASSIFICATION
•In this survey we have presented WUM
techniques implemented using clustering and
classification.
Role of WUM
• WUM helps to determine frequent access
behavior of the users, needed links can be
identified to improve the overall performance
of future access.
• It provides detailed feedback on user behavior
providing the website designer information on
which to base redesign decisions.
• It can be used to do statistical research about
the users / customers for the site.
Role of WUM
• It can be used for performance evaluation for
the company / organization.
• It is usually an automated process whereby
web server collect and report user access
patterns in server access logs.
An Illustration of Pattern
Extraction
• The above figure illustrates the method of WUM.
• Data collected from web log data are pre
processed and if it is necessary it will be
transformed into correct form and given as an
input to the pattern extraction Methods.
Web Logs
• Web log are plain text files which records activity of the
user. The above figure shows the types of web log.
• Web server – The common place to store the usage data
and the primary source of data for web usage mining that
are collected when users access web pages.
Web Logs
• Web proxy server – Primarily used for security
purpose. A Web proxy acts as an intermediate
level of caching between client browsers and
Web servers.
• Client Log - When user surfs the website,
some data will be stored about the activity
within the client for the future use of the
client or by the web server.
SURVEY - WUM Algorithms
• Clustering is the process of grouping
observations of similar kinds into smaller
groups within the larger population.
• Clustering is the subject of dynamic research in
different fields such as statistics, pattern
recognition and machine learning.
SURVEY - WUM Algorithms
• Clustering is unsupervised learning of a hidden data concept.
• The following table shows the research based on the
clustering algorithm.
Research based on Clustering Approach
SURVEY - WUM Algorithms
• Classification is one of most important data
mining function that assigns items in a
collection to target categories or classes.
• Classification is a supervised learning method
and processing and evaluation will depend
upon the target.
• The following table shows the research based
on classification algorithms
SURVEY - WUM Algorithms
Research based on Classification Approach
CONCLUSION
• Clustering and Classification techniques are
the foundation for making website with
intelligence.
• The main goal of this paper is to study the
existing techniques implemented with
clustering and classification algorithms.
• The further study will lead to do a new
automated web usage mining technique for
web page classification and pattern
extraction.
THANK YOU

More Related Content

What's hot

Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
Atul Khanna
 

What's hot (20)

Web Mining
Web MiningWeb Mining
Web Mining
 
Web mining
Web mining Web mining
Web mining
 
Discovering knowledge using web structure mining
Discovering knowledge using web structure miningDiscovering knowledge using web structure mining
Discovering knowledge using web structure mining
 
Web Mining
Web MiningWeb Mining
Web Mining
 
5463 26 web mining
5463 26 web mining5463 26 web mining
5463 26 web mining
 
Web mining
Web miningWeb mining
Web mining
 
Preprocessing of Web Log Data for Web Usage Mining
Preprocessing of Web Log Data for Web Usage MiningPreprocessing of Web Log Data for Web Usage Mining
Preprocessing of Web Log Data for Web Usage Mining
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
4.5 mining the worldwideweb
4.5 mining the worldwideweb4.5 mining the worldwideweb
4.5 mining the worldwideweb
 
Webmining Overview
Webmining OverviewWebmining Overview
Webmining Overview
 
Web Content Mining
Web Content MiningWeb Content Mining
Web Content Mining
 
Web mining
Web miningWeb mining
Web mining
 
Web mining
Web miningWeb mining
Web mining
 
webmining overview
webmining overviewwebmining overview
webmining overview
 
Web mining tools
Web mining toolsWeb mining tools
Web mining tools
 

Similar to A survey on web usage mining techniques

J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Mumbai Academisc
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
ijcsa
 
A WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
A   WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATIONA   WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
A WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
Curtis Bimpong Donkor
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
Rohit Gupta
 

Similar to A survey on web usage mining techniques (20)

Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
Enactment of Firefly Algorithm and Fuzzy C-Means Clustering For Consumer Requ...
 
Neev Load Testing Services
Neev Load Testing ServicesNeev Load Testing Services
Neev Load Testing Services
 
WEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESSWEB MINING – A CATALYST FOR E-BUSINESS
WEB MINING – A CATALYST FOR E-BUSINESS
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
MULTIFACTOR NAÏVE BAYES CLASSIFICATION FOR THE SLOW LEARNER PREDICTION OVER M...
 
Group-9.pptx
Group-9.pptxGroup-9.pptx
Group-9.pptx
 
A WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
A   WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATIONA   WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
A WEB BASED TRADING PLATFORM FOR GHANAIAN UNIVERSITY PRESENTATION
 
EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE
EFFICIENT DATA EXTRACTION USING  ARTIFICIAL INTELLIGENCEEFFICIENT DATA EXTRACTION USING  ARTIFICIAL INTELLIGENCE
EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE
 
UNIT I Streaming Data & Architectures.pptx
UNIT I Streaming Data & Architectures.pptxUNIT I Streaming Data & Architectures.pptx
UNIT I Streaming Data & Architectures.pptx
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 
A Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior PredictionA Survey on: Utilizing of Different Features in Web Behavior Prediction
A Survey on: Utilizing of Different Features in Web Behavior Prediction
 
UNIT IV RESOURCE MANAGEMENT AND SECURITY
UNIT IV RESOURCE MANAGEMENT AND SECURITYUNIT IV RESOURCE MANAGEMENT AND SECURITY
UNIT IV RESOURCE MANAGEMENT AND SECURITY
 
Employee Self Services Portal
Employee Self Services Portal Employee Self Services Portal
Employee Self Services Portal
 
WEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEMWEB BASED INFORMATION RETRIEVAL SYSTEM
WEB BASED INFORMATION RETRIEVAL SYSTEM
 
IRT Unit_4.pptx
IRT Unit_4.pptxIRT Unit_4.pptx
IRT Unit_4.pptx
 
Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...Building a Real-Time Security Application Using Log Data and Machine Learning...
Building a Real-Time Security Application Using Log Data and Machine Learning...
 
final_presentatiyyyyyyyyy6666on.pptx.pdf
final_presentatiyyyyyyyyy6666on.pptx.pdffinal_presentatiyyyyyyyyy6666on.pptx.pdf
final_presentatiyyyyyyyyy6666on.pptx.pdf
 
A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)A Generic Model for Student Data Analytic Web Service (SDAWS)
A Generic Model for Student Data Analytic Web Service (SDAWS)
 
Web usage mining
Web usage miningWeb usage mining
Web usage mining
 

More from International Center for Research & Development

More from International Center for Research & Development (20)

GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech  - Dr. Michelle Philip.pptxGWS2022 Keynote Speech  - Dr. Michelle Philip.pptx
GWS2022 Keynote Speech - Dr. Michelle Philip.pptx
 
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.pptGWS2022 Keynote Speech- Dr Madhu Sharan.ppt
GWS2022 Keynote Speech- Dr Madhu Sharan.ppt
 
Alaa k
Alaa kAlaa k
Alaa k
 
Dr.okoro
Dr.okoro Dr.okoro
Dr.okoro
 
Shirin abbas
Shirin abbasShirin abbas
Shirin abbas
 
Zeynep muftuoglu
Zeynep muftuogluZeynep muftuoglu
Zeynep muftuoglu
 
Sanduni gunawardena
Sanduni gunawardenaSanduni gunawardena
Sanduni gunawardena
 
Lawan cheri
Lawan cheriLawan cheri
Lawan cheri
 
Clive hickson 2019
Clive hickson 2019Clive hickson 2019
Clive hickson 2019
 
Elim shanko
Elim shankoElim shanko
Elim shanko
 
Prof. Maria Silva
Prof. Maria SilvaProf. Maria Silva
Prof. Maria Silva
 
Priyadharsan
PriyadharsanPriyadharsan
Priyadharsan
 
Silva gvntm
Silva gvntmSilva gvntm
Silva gvntm
 
Malkanthi p
Malkanthi pMalkanthi p
Malkanthi p
 
Bandara r m_u_s
Bandara r m_u_sBandara r m_u_s
Bandara r m_u_s
 
Gayathri sl
Gayathri slGayathri sl
Gayathri sl
 
Mignodel
MignodelMignodel
Mignodel
 
Suha
SuhaSuha
Suha
 
Gouri
GouriGouri
Gouri
 
Roseline
RoselineRoseline
Roseline
 

A survey on web usage mining techniques

  • 1. WELCOME TO ECOMIT 2013 SRILANKA
  • 2. A SURVEY ON WEB USAGE MINING TECHNIQUES Mr. Abdul Rahaman wahab sait Lecturer, Shaqra University, Kingdom of Saudi Arabia (Research Scholar, Alagappa University,India) rahamaan@gmail.com Dr. Meyappan Professor, Dept. of Computer Science and Eng., Alagappa University, India meyslotus@yahoo.com
  • 3. INTRODUCTION • Internet becomes a popular media for the business people. • Today millions of domains are exist in the internet. This result clearly shows the growth of the internet. • web is also a database, it is a distributed database, data are hidden, and it means data are stored in deep web
  • 4. INTRODUCTION Figure 1 - Country wise Domain Registration (only for 16 Countries)
  • 5. INTRODUCTION • The Figure shows the graphical representation of first 16 countries having more domains in the world. • The data has been taken from the site www.webhosting.info as on date 25.2.2013. • E-business is the electronic version of business which runs on internet. Buying and selling activities are happening through internet
  • 6. INTRODUCTION • Competition is the constant word in the world, which gives new idea for a person to present himself as unique. • In this scenario, E-business needs the help of data mining techniques to promote the buying and selling activities. • Web mining techniques are very useful to determine the customer behavior from the huge pool of web data.
  • 7. INTRODUCTION • web usage mining (WUM) WUM is used to discover interest patterns which can be applied to many real world problems like improving the presentation of website, better understanding of the users behavior and product recommendation.
  • 8. INTRODUCTION •THREE MAJOR CATEGORIES OF PATTERN EXTRACTION:- ASSOCIATION RULES CLUSTERING CLASSIFICATION •In this survey we have presented WUM techniques implemented using clustering and classification.
  • 9. Role of WUM • WUM helps to determine frequent access behavior of the users, needed links can be identified to improve the overall performance of future access. • It provides detailed feedback on user behavior providing the website designer information on which to base redesign decisions. • It can be used to do statistical research about the users / customers for the site.
  • 10. Role of WUM • It can be used for performance evaluation for the company / organization. • It is usually an automated process whereby web server collect and report user access patterns in server access logs.
  • 11. An Illustration of Pattern Extraction • The above figure illustrates the method of WUM. • Data collected from web log data are pre processed and if it is necessary it will be transformed into correct form and given as an input to the pattern extraction Methods.
  • 12. Web Logs • Web log are plain text files which records activity of the user. The above figure shows the types of web log. • Web server – The common place to store the usage data and the primary source of data for web usage mining that are collected when users access web pages.
  • 13. Web Logs • Web proxy server – Primarily used for security purpose. A Web proxy acts as an intermediate level of caching between client browsers and Web servers. • Client Log - When user surfs the website, some data will be stored about the activity within the client for the future use of the client or by the web server.
  • 14. SURVEY - WUM Algorithms • Clustering is the process of grouping observations of similar kinds into smaller groups within the larger population. • Clustering is the subject of dynamic research in different fields such as statistics, pattern recognition and machine learning.
  • 15. SURVEY - WUM Algorithms • Clustering is unsupervised learning of a hidden data concept. • The following table shows the research based on the clustering algorithm. Research based on Clustering Approach
  • 16. SURVEY - WUM Algorithms • Classification is one of most important data mining function that assigns items in a collection to target categories or classes. • Classification is a supervised learning method and processing and evaluation will depend upon the target. • The following table shows the research based on classification algorithms
  • 17. SURVEY - WUM Algorithms Research based on Classification Approach
  • 18. CONCLUSION • Clustering and Classification techniques are the foundation for making website with intelligence. • The main goal of this paper is to study the existing techniques implemented with clustering and classification algorithms. • The further study will lead to do a new automated web usage mining technique for web page classification and pattern extraction.