DocumentCode :
3475540
Title :
A novel approach to mining access patterns
Author :
Yu, Xiuming ; Li, Meijing ; Kim, Hyeongsoo ; Lee, Dong Gyu ; Park, Jeong Seok ; Keun Ho Ryu
Author_Institution :
Database / Bioinf. Lab., Chungbuk Nat. Univ., CheongJu, South Korea
fYear :
2011
fDate :
27-30 Sept. 2011
Firstpage :
350
Lastpage :
355
Abstract :
Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.
Keywords :
Internet; data mining; BIDE method; Web log files; Web log mining; Web servers; Web usage mining; Websites; access pattern mining; bidirectional extension closure checking method; business intelligence systems; information discovery; large event set; Bidirectional control; IP networks; BIDE method; Web Usage Mining; large event set; web log file; web log mining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Awareness Science and Technology (iCAST), 2011 3rd International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4577-0887-9
Type :
conf
DOI :
10.1109/ICAwST.2011.6163169
Filename :
6163169
Link To Document :
بازگشت