Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 20
Page No. 3899 - 3904

Optimizing Web Log Data to Perceive User Behavior

Authors : B. Prasanna Kumar Reddy and Duvvada Rajeswara Rao

References

Araya, S., M. Silva and R. Weber, 2004. A methodology for web usage mining and its application to target group identification. Fuzzy Sets Syst., 148: 139-152.
CrossRef  |  Direct Link  |  

Babu, D.S., S.A. Nabi, M.A. Ali and Y. Raju, 2011. Web usage mining: A research concept of web mining. Int. J. Comput. Sci. Inf. Technol., 2: 2390-2393.
Direct Link  |  

Catlegde, L. and J. Pitkow, 1995. Characterising browsing behaviours in the world wide web. Comput. Netw. ISDN. Syst., 27: 1065-1073.
CrossRef  |  Direct Link  |  

Cristianini, N. and T.J. Shawe, 2000. An Introduction to Support Vector Machines and other Kernel-Based Learning Methods. Cambridge University Press, Cambridge, UK., ISBN: 0-521-78019-5, Pages: 187.

Eltahir, M.A. and A.A.F. Dafa, 2013. Extracting knowledge from web server logs using web usage mining. Proceedings of the 2013 International Conference on Computing, Electrical and Electronics Engineering (ICCEEE), August 26-28, 2013, IEEE, Khartoum, Sudan, ISBN: 978-1-4673-6231-3, pp: 413-417.

Hyvarinen, A. and E. Oja, 2000. Independent component analysis: Algorithms and applications. Neural Networks, 13: 411-430.
CrossRef  |  

Ivancsy, R. and I. Vajk, 2006. Frequent pattern mining in web log data. Acta Polytech. Hungarica, 3: 77-90.
Direct Link  |  

Pani, S.K., L. Panigrahy, V.H. Sankar, B.K. Ratha and A.K. Mandal et al., 2011. Web usage mining: A survey on pattern extraction from web logs. Int. J. Instrumentation Control Autom., 1: 15-23.

Raju, G.T. and P.S. Satyanarayana, 2008. Knowledge discovery from web usage data: Complete preprocessing methodology. Int. J. Comput. Sci. Netw. Secur., 8: 179-186.
Direct Link  |  

Shi, P., 2009. An efficient approach for clustering web access patterns from web logs. Int. J. Adv. Sci. Technol., 5: 1-14.
Direct Link  |  

Suneetha, K.R. and R. Krishnamoorti, 2009. Identifying user behavior by analyzing web server access log file. Int. J. Comput. Sci. Network Security, 9: 327-332.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved