2012
DOI: 10.1007/978-81-322-1041-2_35
|View full text |Cite
|
Sign up to set email alerts
|

“An Inclusive Survey on Data Preprocessing Methods Used in Web Usage Mining”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Before applying data mining technique for server log [12,21,31], it needs to preprocess that server log and after applying preprocessing technique they will transform in structure form and split according to its attribute. In Table 1, we are showing a sample of the preprocessed weblog.…”
Section: Finding Utility Of Transactional Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…Before applying data mining technique for server log [12,21,31], it needs to preprocess that server log and after applying preprocessing technique they will transform in structure form and split according to its attribute. In Table 1, we are showing a sample of the preprocessed weblog.…”
Section: Finding Utility Of Transactional Datasetmentioning
confidence: 99%
“…Utility itemset mining is an important field of data mining; its aim to extract high utility itemset from databases and those itemsets, which have high project, are founded [11]. Here, the utility of itemset means profitability importance and interestingness of the item [12,13]. In a transactional database, the utility of an item depends on two types of utility: internal utility and external utility as we are shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Preprocessing techniques based on some heuristics is proposed in [6]. [7] and [8] A sample HTTP request for the NASA Kennedy Space Centre WWW server [10] is depicted in figure 1. The web access log line in Figure 1 shows that a user from the IP address 199.72.81.55 successfully requested the page "apollo" on 01 st July 1995 at 00:00:01 a.m.…”
Section: Related Workmentioning
confidence: 99%
“…When the users visit any web site, their all activities are appended into web log files. Even a single click, including images, html document or other objects get logged in web log files [1]. The information in Log files includes User Name, Visiting path, Path traversed, Time Stamp, Page Last Visited, User Agent, URL, and Request type [2].…”
Section: Introductionmentioning
confidence: 99%