Adaptive Query Recommendation Techniques for Log Files Mining to Analysis User’s Session Pattern

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discovering Popular Clicks\' Pattern of Teen Users for Query Recommendation

Search engines are still the most important gates for information search in internet. In this regard, providing the best response in the shortest time possible to the user's request is still desired. Normally, search engines are designed for adults and few policies have been employed considering teen users. Teen users are more biased in clicking the results list than are adult users. This leads...

متن کامل

Analysis of Log Files Applying Mining Techniques and Fuzzy Logic

With the explosive growth of data available on the Internet, a recent area of investigation called Web Mining has arise. In this paper, we will study general aspects of this area, principally the process of Web Usage Mining where log files are analyzed. These files register the activity of the user when interact with the Web. In the Web Usage Mining, different techniques of mining to discover u...

متن کامل

Frequent Pattern Mining of Web Log Files Working Principles

Frequent pattern mining plays a major role in mining of web log files. Web usage mining is the one of the web mining process that involves application of mining techniques to web server logs to extract the behavior of users. A web usage mining consists of three important phases: data preprocessing, patterns discovery and pattern analysis. In data preprocessing phase the unwanted data are remove...

متن کامل

discovering users` access patterns for web usage mining from web log files

web usage mining (wum) is the automatic discovering of hidden informationof user access pattern from the web log data. frequent pattern discovery is one ofthe main techniques in wum that can be used to implement recommender systems,forecast user`s navigational behaviour, and personalize web sites. many algorithmshave been suggested on obtaining frequent user navigation patterns. this paperprese...

متن کامل

Anomaly Detection from Log Files Using Data Mining Techniques

Log files are created by devices or systems in order to provide information about processes or actions that were performed. Detailed inspection of security logs can reveal potential security breaches and it can show us system weaknesses. In our work we propose a novel anomaly-based detection approach based on data mining techniques for log analysis. Our approach uses Apache Hadoop technique to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016908085