A system based on a modified version of the FCM algorithm for profiling web users from access log

نویسندگان

  • Paolo Corsini
  • Laura De Dosso
  • Beatrice Lazzerini
  • Francesco Marcelloni
چکیده

In this paper, we present a system based on an appropriately targeted version of the well-known fuzzy C-means (FCM) algorithm to determine a small number of profiles of typical Web site users from the Web access log. These profiles can be extremely useful, for instance, to customize the Web site, or to send personalized advertisements. After filtering the access log, for instance, by eliminating occasional users, the FCM algorithm clusters the users of the Web site into groups characterized by a set of common interests and represented by a prototype, which defines the profile of the group typical member. To show the effectiveness of our system, we describe how the profiles determined by the FCM algorithm are a concise representation of the association rules discovered applying the well-known A-priori algorithm to the raw access log data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Dynamic Replication based on Firefly Algorithm in Data Grid

In data grid, using reservation is accepted to provide scheduling and service quality. Users need to have an access to the stored data in geographical environment, which can be solved by using replication, and an action taken to reach certainty. As a result, users are directed toward the nearest version to access information. The most important point is to know in which sites and distributed sy...

متن کامل

A New RSTB Invariant Image Template Matching Based on Log-Spectrum and Modified ICA

Template matching is a widely used technique in many of image processing and machine vision applications. In this paper we propose a new as well as a fast and reliable template matching algorithm which is invariant to Rotation, Scale, Translation and Brightness (RSTB) changes. For this purpose, we adopt the idea of ring projection transform (RPT) of image. In the proposed algorithm, two novel s...

متن کامل

Classification of Web Log Data to Identify Interested Users Using Naïve Bayesian Classification

Web Usage Mining (WUM) is the process of extracting knowledge from Web user’s access data by exploiting Data Mining technologies. It can be used for different purposes such as personalization, system improvement and site modification. Study of interested web users, provides valuable information for web designer to quickly respond to their individual needs. The main objective of this paper is to...

متن کامل

Clustering Algorithm in Data Mining Based on Web Log

The advantages of FCM algorithm are that it is mainly applied in point data cluster and can't directly process relational data, for which the paper proposes a clustering algorithm in data mining based on web log. Firstly, the paper improves FCM algorithm which makes it can process relational data, and makes robustness improvement on the algorithm. Then, the traditional FCM algorithm needs to de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003