High Utility Mining Algorithm for Preprocessed Web Data

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2012 by IJCTT Journal
Volume-3 Issue-3                           
Year of Publication : 2012
Authors :Swapna Mallipeddi, D.N.V.S.L.S.Indira

MLA

Swapna Mallipeddi, D.N.V.S.L.S.Indira"High Utility Mining Algorithm for Preprocessed Web Data"International Journal of Computer Trends and Technology (IJCTT),V3(3):359-363 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -With the explosive growth of information sources available on the World Wide Web and the rapidly increasing pace of adoption to Internet commerce, the Internet has evolved into a gold mine that contains or dynamically generates information that is beneficial to E-businesses.Web usage mining is usually an automated process whereby Web servers collect and report user access patterns in server access logsThrough the world wide web development, the web utility mining, which can be viewed as a mixed term of web mining & utility mining, becomes much more meaningful with the introduction of the emerging concepts of two-phase algorithm & on-shelf utility, already proved to be very effective under their respective fields of data mining. In real applications, however, utility mining may have a bias if items are not always on-shelf. On-shelf utility mining is then proposed, which considers not only individual profit and quantity of each item in a transaction but also common on-shelf time periods of a product combination. With the rapid growth of the Web, the web log data have become an important data source for machine learning and data mining. During preprocessing phase, raw Web logs need to be cleaned, analyzed and converted before further utility mining. In this paper to improve the efficiency of on shelf utility mining we apply the 2-phase algorithm on preprocessed web transactions.

References-

[1] A New Perspective Of Web Usage Mining: Using Enterprise Proxy Log Yu Zhang.
[2] Two Levels of Prediction Model for User’s Browsing Behavior1 Chu-Hui Lee, Yu-Hsiang Fu.
[3] Jianxi Zhang, Peiying Zhao, Lin Shang and Lunsheng Wang, "Web usage mining based on fuzzy clustering in identifying target group", ISECS International Colloquium on Computing, Communication, Control, and Management, Vol. 4, Pp. 209-212, 2009.
[4] Houqun Yang, Jingsheng Lei and Fa Fu, "An Approach of Multi-path Segmentation Clustering Based on Web Usage Mining", Fourth International Conference on Fuzzy Systems and Knowledge Discovery, Vol. 4, Pp. 644-648, 2007.
[5] Bamshad Mobasher, “Data Mining for Web Personalization,” LCNS, Springer-Verleg Berlin Heidelberg, 2007.
[6] Jaideep Srivastava , Robert Cooley , Mukund Deshpande, Pang-Ning Tan- “Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data”, 2008.
[7] Honghua Dai and Bamshad Mobasher-“Integrating Semantic Knowledge with Web Usage Mining for Personalization”, 2007.
[8] Mark E. Snyder, Ravi Sundaram, Mayur Thakur- “Preprocessing DNS Log Data for Effective Data Mining”, 2008.
[9] Two Phase Utility Mining Algorithm G. Sunil Kumar, C.V.K Sirisha, Kanaka Durga.R, A.Devi.

KeywordsMicroarray Data, Data Cluster Analysis, Bioinformatics.