SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Personal Web Usage Mining
Mining client side Web Usage Data
Web Usage Mining
The discovery of patterns in the browsing and navigation
data of Web users.
Web usage mining has been an important technology for
understanding user’s behaviors on the Web.
Currently, most Web usage mining research has been
focusing on the Web server side.
The main purpose of research is to improve a Web site’s
service and the server’s performance.
Data sources for Web usage mining are primarily Web
server logs. Although it is very important and interesting
to investigate server side issues, we argue that an
equally important and potentially fruitful aspect of Web
usage mining is the mining of client side usage data.
Web Usage Mining on Server Side
Currently, Web usage mining finds patterns in Web server
logs. The logs are preprocessed to group requests from
the same user into sessions.
A session contains the requests from a single visit of a
user to the Web site. During the preprocessing, irrelevant
information for Web usage mining such as background
images and unsuccessful requests is ignored. The users
are identified by the IP addresses in the log and all
requests from the same IP address within a certain time-
window are put into a session.
Different heuristics have been developed to deal with the
inaccuracy due to caching, IP sharing or blocking, and
network congestion.
Web Usage Mining on Server Side
Some common characteristics
‱ Their goal is to improve Web services and performance
Through the improvement of Web sites, including their
contents, structure, presentation, and delivery.
‱ They focus on the mining of server side data. Their data
sources are almost exclusively server logs, sometimes with
site structure and/or page contents.
‱ They target groups of users instead of individual users. It is
overwhelming for a Web site to deal with users on an
individual basis.
Personal Web Usage Mining
Individual’s Web usage, rather than group behaviors.
By looking into a user’s Web usage data, we hope to
understand the user’s interests, behaviors, and
preferences.
In other words, we are building the user’s Web profile.
We call this personal Web usage mining since it focuses
on personal Web usage.
Personal Web Usage Mining
Some of the reasons we advocate personal Web usage
mining are as follows.
‱ The goal of personal Web usage mining is to help and
enhance individual users Web use. It intends to make the
Web easier to use from a single user’s point of view.
‱ Client side data provide a more accurate and complete
picture of a user’s Web activities.
‱ We can achieve true individualism and personalization.
● Users have full control of what, when, and how their
data can be used for mining.
● Personal Web usage has increased significantly
recently,
Personal Web Usage Mining
Some researchers are building intelligent agents or
Internet agents that will help individuals use the Web. For
example, many agents were built for information filtering
and gathering on the Web.
WARREN is a multi-agent system for compiling financial
information.
WEBMATE edits a personal newpaper.
WebSifter is a meta-search agent which uses taxonomy
to improve search on the Web.
Other examples include home page finder , user
interface learning agent, and Web browsing assistant.
Although some aspects and pieces of personal Web
usage mining may be around in various areas such as
intelligent agent, Web warehousing, and Web usage
mining,
Personal Web Usage Mining
Two kinds of user Web activities are recorded for
analysis:
● The remote activities
include requests sent by a user to a Web server. Such
kind of click stream data includes the URLs of pages as
well as any keywords, queries, forms, and cookies sent
with the URL.
The remote activities can be captured by almost all Web
browsers. Besides, the browsers also cache the Web pages
in most cases.
Personal Web Usage Mining
Two kinds of user Web activities are recorded for
analysis:
● The local activities
include actions the user can take at his or her desktop
without the knowledge of Web servers. They include,
but are not limited to, the following.
Save a page, Print a page, Click Back on browser, Click Forward on
browser, Click Reload on browser, Click Stop on browser, Email a
link/page, Add a bookmark, Minimize/maximize/close window, Change
visual settings such as font size.
The local activities can be recorded by an activity recorder, which is a
client side program running on top of the browser.
Personal Web Usage Mining
These two kinds of activities are put together into an
activity log. Each entry in the activity log will contain a
timestamp and an activity. Some will contain extra
information such as URL, cache address,keyword,
cookie, email address, and font size.
The schema of the log looks like this:
(timestamp, activity, [URL], [cache address],[keyword],
[cookie], [email address], [other optional fields])
Personal Web Usage Mining
There are four major modules in the framework:
● Logging
● Data Warehousing
● Data mining
● Tool/Application.
Personal Web Usage Mining
In the logging module, user Web activities are stored
into the activity, as well as the cached pages.
In the data warehousing module, the logs and cached
pages are cleansed, extracted, transformed, aggregated,
and stored in a data warehouse. The data warehouse will
facilitate search, query, and OLAP operations, in the
mean time providing data sources for mining.
In the data mining module, various data mining
algorithms are applied to the data in the data warehouse,
whose findings will be used by the tools and applications
in the tool/application module.
Personal web usage mining

Weitere Àhnliche Inhalte

Was ist angesagt? (6)

SharePoint And WCM
SharePoint And WCMSharePoint And WCM
SharePoint And WCM
 
Ofc216 Shah German Webcms
Ofc216 Shah German WebcmsOfc216 Shah German Webcms
Ofc216 Shah German Webcms
 
What’s new in share point 2013
What’s new in share point 2013What’s new in share point 2013
What’s new in share point 2013
 
Web 2.0 and Depository Web Sites: A Winning Combination (FDLP Version)
Web 2.0 and Depository Web Sites: A Winning Combination (FDLP Version)Web 2.0 and Depository Web Sites: A Winning Combination (FDLP Version)
Web 2.0 and Depository Web Sites: A Winning Combination (FDLP Version)
 
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
SPCA2013 - Best Practices Document Management in SharePoint (Online) 2013
 
Magnolia Innovation Spotlight - DX Summit 2018 - Agile Content Delivery
Magnolia Innovation Spotlight - DX Summit 2018 - Agile Content DeliveryMagnolia Innovation Spotlight - DX Summit 2018 - Agile Content Delivery
Magnolia Innovation Spotlight - DX Summit 2018 - Agile Content Delivery
 

Ähnlich wie Personal web usage mining

Research Paper
Research PaperResearch Paper
Research Paper
Dominic Mutai
 

Ähnlich wie Personal web usage mining (20)

Pxc3893553
Pxc3893553Pxc3893553
Pxc3893553
 
Implementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server MonitoringImplementation of Intelligent Web Server Monitoring
Implementation of Intelligent Web Server Monitoring
 
C017231726
C017231726C017231726
C017231726
 
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUESCOMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
COMPARISON ANALYSIS OF WEB USAGE MINING USING PATTERN RECOGNITION TECHNIQUES
 
Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...Identifying the Number of Visitors to improve Website Usability from Educatio...
Identifying the Number of Visitors to improve Website Usability from Educatio...
 
Web mining
Web miningWeb mining
Web mining
 
Bb31269380
Bb31269380Bb31269380
Bb31269380
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
 
Automatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage miningAutomatic recommendation for online users using web usage mining
Automatic recommendation for online users using web usage mining
 
Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining
Automatic Recommendation for Online Users Using Web Usage Mining
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
 
Web Page Recommendation Using Web Mining
Web Page Recommendation Using Web MiningWeb Page Recommendation Using Web Mining
Web Page Recommendation Using Web Mining
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Web Analytics Primer
Web Analytics PrimerWeb Analytics Primer
Web Analytics Primer
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 

Mehr von Daminda Herath (10)

Data mining
Data miningData mining
Data mining
 
Data mining
Data miningData mining
Data mining
 
Web mining
Web miningWeb mining
Web mining
 
Web content mining
Web content miningWeb content mining
Web content mining
 
Personal Web Usage Mining
Personal Web Usage MiningPersonal Web Usage Mining
Personal Web Usage Mining
 
XML
XMLXML
XML
 
Social Aspect of the Internet
Social Aspect of the InternetSocial Aspect of the Internet
Social Aspect of the Internet
 
Web Content Mining
Web Content MiningWeb Content Mining
Web Content Mining
 
JavaScript Libraries
JavaScript LibrariesJavaScript Libraries
JavaScript Libraries
 
1. Overview of Distributed Systems
1. Overview of Distributed Systems1. Overview of Distributed Systems
1. Overview of Distributed Systems
 

KĂŒrzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

KĂŒrzlich hochgeladen (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Personal web usage mining

  • 1. Personal Web Usage Mining Mining client side Web Usage Data
  • 2. Web Usage Mining The discovery of patterns in the browsing and navigation data of Web users. Web usage mining has been an important technology for understanding user’s behaviors on the Web. Currently, most Web usage mining research has been focusing on the Web server side. The main purpose of research is to improve a Web site’s service and the server’s performance. Data sources for Web usage mining are primarily Web server logs. Although it is very important and interesting to investigate server side issues, we argue that an equally important and potentially fruitful aspect of Web usage mining is the mining of client side usage data.
  • 3. Web Usage Mining on Server Side Currently, Web usage mining finds patterns in Web server logs. The logs are preprocessed to group requests from the same user into sessions. A session contains the requests from a single visit of a user to the Web site. During the preprocessing, irrelevant information for Web usage mining such as background images and unsuccessful requests is ignored. The users are identified by the IP addresses in the log and all requests from the same IP address within a certain time- window are put into a session. Different heuristics have been developed to deal with the inaccuracy due to caching, IP sharing or blocking, and network congestion.
  • 4. Web Usage Mining on Server Side Some common characteristics ‱ Their goal is to improve Web services and performance Through the improvement of Web sites, including their contents, structure, presentation, and delivery. ‱ They focus on the mining of server side data. Their data sources are almost exclusively server logs, sometimes with site structure and/or page contents. ‱ They target groups of users instead of individual users. It is overwhelming for a Web site to deal with users on an individual basis.
  • 5. Personal Web Usage Mining Individual’s Web usage, rather than group behaviors. By looking into a user’s Web usage data, we hope to understand the user’s interests, behaviors, and preferences. In other words, we are building the user’s Web profile. We call this personal Web usage mining since it focuses on personal Web usage.
  • 6. Personal Web Usage Mining Some of the reasons we advocate personal Web usage mining are as follows. ‱ The goal of personal Web usage mining is to help and enhance individual users Web use. It intends to make the Web easier to use from a single user’s point of view. ‱ Client side data provide a more accurate and complete picture of a user’s Web activities. ‱ We can achieve true individualism and personalization. ● Users have full control of what, when, and how their data can be used for mining. ● Personal Web usage has increased significantly recently,
  • 7. Personal Web Usage Mining Some researchers are building intelligent agents or Internet agents that will help individuals use the Web. For example, many agents were built for information filtering and gathering on the Web. WARREN is a multi-agent system for compiling financial information. WEBMATE edits a personal newpaper. WebSifter is a meta-search agent which uses taxonomy to improve search on the Web. Other examples include home page finder , user interface learning agent, and Web browsing assistant. Although some aspects and pieces of personal Web usage mining may be around in various areas such as intelligent agent, Web warehousing, and Web usage mining,
  • 8. Personal Web Usage Mining Two kinds of user Web activities are recorded for analysis: ● The remote activities include requests sent by a user to a Web server. Such kind of click stream data includes the URLs of pages as well as any keywords, queries, forms, and cookies sent with the URL. The remote activities can be captured by almost all Web browsers. Besides, the browsers also cache the Web pages in most cases.
  • 9. Personal Web Usage Mining Two kinds of user Web activities are recorded for analysis: ● The local activities include actions the user can take at his or her desktop without the knowledge of Web servers. They include, but are not limited to, the following. Save a page, Print a page, Click Back on browser, Click Forward on browser, Click Reload on browser, Click Stop on browser, Email a link/page, Add a bookmark, Minimize/maximize/close window, Change visual settings such as font size. The local activities can be recorded by an activity recorder, which is a client side program running on top of the browser.
  • 10. Personal Web Usage Mining These two kinds of activities are put together into an activity log. Each entry in the activity log will contain a timestamp and an activity. Some will contain extra information such as URL, cache address,keyword, cookie, email address, and font size. The schema of the log looks like this: (timestamp, activity, [URL], [cache address],[keyword], [cookie], [email address], [other optional fields])
  • 11. Personal Web Usage Mining There are four major modules in the framework: ● Logging ● Data Warehousing ● Data mining ● Tool/Application.
  • 12. Personal Web Usage Mining In the logging module, user Web activities are stored into the activity, as well as the cached pages. In the data warehousing module, the logs and cached pages are cleansed, extracted, transformed, aggregated, and stored in a data warehouse. The data warehouse will facilitate search, query, and OLAP operations, in the mean time providing data sources for mining. In the data mining module, various data mining algorithms are applied to the data in the data warehouse, whose findings will be used by the tools and applications in the tool/application module.