Xiuming Yu, Meijing Li, Hyeongsoo Kim, Dong Gyu Lee, J. Park, K. Ryu
{"title":"一种挖掘访问模式的新方法","authors":"Xiuming Yu, Meijing Li, Hyeongsoo Kim, Dong Gyu Lee, J. Park, K. Ryu","doi":"10.1109/ICAWST.2011.6163169","DOIUrl":null,"url":null,"abstract":"Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A novel approach to mining access patterns\",\"authors\":\"Xiuming Yu, Meijing Li, Hyeongsoo Kim, Dong Gyu Lee, J. Park, K. Ryu\",\"doi\":\"10.1109/ICAWST.2011.6163169\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.\",\"PeriodicalId\":126169,\"journal\":{\"name\":\"2011 3rd International Conference on Awareness Science and Technology (iCAST)\",\"volume\":\"196 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 3rd International Conference on Awareness Science and Technology (iCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAWST.2011.6163169\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAWST.2011.6163169","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.