Web Usage Mining

1146 Words3 Pages

Lots of persons interact everyday with web sites around the world. Massive amount of data are being generated and these information could be much respected to the company in the field of accepting Client’s behaviours. Web usage mining is relative independent, but not sequestered category, which mainly describes the techniques that discover the user's usage pattern and try to predict the user's behaviours. Web usage mining is the area of data mining which deals with the novelty and study of usage patterns with use of Web log data. Specifically web logs in direction to advance web based applications. User’s identification is, to identify who access Web site and which pages are accessed. If users have login of their information, it is easy to identify users. In fact, there are masses of users do not register their information. In fact there are great numbers of users access Web sites through, agent, numerous users use the same computer, firewall’s existence, independent user use different browsers, and so forth. All of difficulties mark this job greatly complicated and very tough, to identify every unique user accurately. We may use cookies to track users’ behaviours. But considering somebody privacy, many users do not practice cookies, so it is needed to find other methods to solve this problem. For users who use the similar computer or use the similar agent, how to find them? As presented in [9], it uses heuristic method to solve the problem, if a page is requested that is not directly reachable by a hyperlink with some of the, pages visited by the user, the experiential assumes that there is another user with the equal computer or with the equal IPaddress. Doru Tanasa and Brigitte Trousse [4] presents a method called navigation ... ... middle of paper ... ...onsideration from web server. It designated to permit companies to use cookies to learning online visitor behaviour. But, Check the convenience of methods to control cookies actuality on the computer, they are frequently restricted by the users. USER IDENTIFICATION BY THE REFERRAL LOG The method used here is this. Parameter REFERER_URL collected with the access log and site topology are used to concept browsing tracks for each user see (Cooley et al. 1999). If after the set of pages a new page appears which is not accessible from the previously viewed pages, a new user is anticipated. Additional condition by which a new user is expected is when in a path of before viewed pages there seems a page already navigated. This situation is very limited and not accurate. It does not receive repeated pages in the same user in same session what is very public in actual life.

Open Document