Fig. 1. The process of web log mining
Fig. 3. Data acquisition procedure through web logs
Fig. 4. Execution steps of ODBC log data acquisition Strategy
Fig. 5. The process of buried point data acquisition
Fig. 6. Data acquisition procedure through packet sniffer
Fig. 7. Code Snippet of the Buried Point
Fig. 8. JS Code of the Script File ma.js
Fig. 9. Data Storage Architecture
Fig. 10. Data Analysis Model
Fig. 2. The process of data acquisition
References
- World Internet Users and 2019 Population Stats, https://www.internetworldstats.com/stats.htm 2019.03.
- Intelligent Information push-pull Technology, https://baike.baidu.com/item/%E6%99%BA%E8%83%BD%E4%BF%A1%E6%81%AF%E6%8E%A8%E6%8B%89%E6%8A%80%E6%9C%AF/8266146, 2019.03.
- M. S. Chen, J. S. Park, K. S. Hong, P. S. Yu, "Efficient Data Mining for Path Traversal Patterns", Proc. of the IEEE International Conference on Knowledge and Data Engineering, pp. 209-220, March, 1998.
- H. Mannila, H. Toivonen, A. I. Verkamo, "Discovery of Frequent Episodes in Event Sequences", Proc. of the IEEE International Conference on Data Mining and Knowledge Discovery, pp. 259-289, 1997.
- T. W. Yan, M. Jacobsen, H. G. Molina, U. Dayal, "From User Access Patterns to Dynamic Hypertext Linking", Proc. of 5th Internationl World Wide Web Conference, 1996.
- X. F. Xu, "Key Classification Mining Algorithms for Massive Data", pp. 35-51, 2010.
- M. L. Liu, X. F. Li, T. Snu, "Survey of Data Mining Technology Standards", Computer Science. Vol. 35, pp. 8-10, 2008. https://doi.org/10.3969/j.issn.1002-137X.2008.11.002
- S. P. Singh, Meenu, "Analysis of Web Site Using Web Log Expert Tool Based on Web Data Mining", Proc. of International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 63-68, March, 2017.
- Web mining, https://en.wikipedia.org/wiki/Web_mining, 2019.03.
- J. Zhang, Z. Q. Shi, "User Characteristics Analysis Based On Web Log Mining", Proc. of 7th International Conference on BioMedical Engineering and Informatics, pp. 863-866, Oct.,2014.