Skip to main content

Advertisement

Log in

Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With an eye on locating the sequences from web data the most talented solution web usage mining is elegantly employed. In this regard, the modern technique is plagued by several constraints like the forward reference of web access sequence, making it irrelevant for the incremental databases. With the intention of overwhelming these hassles, an innovative technique is elegantly launched for mining web access utility by employing the hybrid hill climbing genetic algorithm (HHCGA) based tree construction. The novel approach deploys the two tree constructions such as the HUWAS tree (HHCGA and utility based web access sequence tree) and the HIUWAS tree (HHCGA and incremental utility based web access sequence tree). The tree construction, in essence, is generally dependent on the internal and external utility values of the web access sequence. The HHCGA is effectively utilized to optimize both the HUWAS and HIUWAS trees. In this regard, hill climbing attracts attention as an optimization approach offering solutions for the search challenges and Genetic Algorithm makes its presence felt as an ideal one for issues encompassing an extensive and intricate search space with added local optimums. The epoch-making technique comes out with flying colors by effectively addressing both the forward and backward references of web access.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Graph 1
Graph 2
Graph 3
Graph 4
Graph 5
Graph 6

Similar content being viewed by others

References

  1. Ahmed, C.F., Tanbeer, S.K., Jeong, B.S., Lee, Y.K.: Efficient tree structures for high utility pattern mining in incremental databases. IEEE Trans. Knowl. Data Eng. 21(12), 1708–1721 (2009)

    Article  Google Scholar 

  2. Bhattacharya, S., Dubey, D.: High utility item set mining. Int. J. Emerg. Technol. Adv. Eng. 2(8), 476–481 (2012)

    Google Scholar 

  3. Chordia, B.S., Adhiya, K.P.: Grouping web access sequences using sequence alignment method. Indian J. Comput. Sci. Eng. (IJCSE) 2(3), 308–314 (2011). In Proceeding of Bhupendra S Chordia et al.

    Google Scholar 

  4. Fong, A.C.M., Zhou, B., Hui, S., Tang, J., Hong, G.: Generation of personalized ontology based on consumer emotion and behavior analysis. IEEE Trans. Affect. Comput. 3(2), 152–164 (2012)

    Article  Google Scholar 

  5. Jing, L., Keech, M., Chen, W.: Concurrency in web access patterns mining. In: Proceeding of IEEE International Conference on World Academy of Science, Engineering and Technology, vol. 3, pp. 842–851, 2009

  6. Langhnoja, S., Barot, M., Mehta, D.: Pre-processing: procedure on web log file for web usage mining. Proc. IEEE Int. J. Emerg. Technol. Adv. Eng. 2(12), 419–423 (2012)

    Google Scholar 

  7. Malik, S.K., Rizvi, S.: Information extraction using web usage mining, web scrapping and semantic annotation. In: Proceeding of IEEE International Conference on Computational Intelligence and Communication Systems, pp. 465–469, 2011

  8. Nasraoui, O., Soliman, M., Saka, E., Badia, A., Germain, R.: A web usage mining framework for mining evolving user profiles in dynamic web sites. IEEE Trans. Knowl. Data Eng. 20(2), 202–215 (2008)

    Article  Google Scholar 

  9. Nithya, P., Sumathi, P.: Novel pre-processing technique for web log mining by removing global noise and web robots. In: Proceeding of IEEE International Conference on Computing and Communication Systems, pp. 1–5, 2012

  10. Parikh, M., Chaudhari, B., Chand, C.: A comparative study of sequential pattern mining algorithms. Proc. IEEE Int. J. Appl. Innov. Eng. Manag. (IJAIEM) 2(2), 103–109 (2013)

    Google Scholar 

  11. Pierrakos, D., Paliouras, G.: Personalizing web directories with the aid of web usage data. IEEE Trans. Knowl. Data Eng. 22(9), 1331–1344 (2010)

    Article  Google Scholar 

  12. Prasanth, A.: Web usage mining—its application in E-services. Proc. Int. Emerg. Technol. Adv. Eng. 3(2), 572–576 (2013)

    Google Scholar 

  13. Sharma, P., Bhartiya, R.: An efficient algorithm for improved web usage mining. In: Proceeding of IEEE International Conference on Computer Technology and Applications vol. 3(2), pp. 766–769, 2013

  14. Soares, C., de Graaf E., Kok, J.N., Kosters, W.A.: Sequence mining on web access logs: a case study. In: Proceeding of International Conference on Information Technology, pp. 1–8, 2007

  15. Tiwari, S., Richariya, P., Razdan, D., Tomar, S.: A web usage mining framework for business intelligence. In: Proceeding of IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 731–734, May 2011

  16. Tseng, V.S., Shie, B.E., Wu, C.W., Philip, S.Y., Fellow, IEEE Abstract: Efficient algorithms for mining high utility item sets from transactional databases. IEEE Trans. Knowl. Data Eng. 25(8), 1172–1186 (2013)

    Article  Google Scholar 

  17. Tyagi, N.K., Solanki, A.K., Tyagi, S.: An algorithmic approach to data preprocessing in web usage mining. Int. J. Emerg. Technol. Knowl. Manag. 2(2), 279–283 (2010)

    Google Scholar 

  18. Varghese, N.M., John, J.: Cluster optimization for enhanced web usage mining using fuzzy logic. In: Proceeding of IEEE International Conference on Information and Communication Technologies (WICT), pp. 948–952, (2012)

  19. Varnagar, C.R., Madhak, N.N., Kodinariya, T.M., Rathod, J.N.: Web usage mining: a review on process, methods and techniques. In: Proceeding of IEEE International Conference on Information Communication and Embedded Systems, pp. 40–46, 2013

  20. Vijayalakshmi, S., Mohan, V.: Mining sequential access pattern with low support from large pre-processed web logs. Proc. IEEE Int. J. Comput. Sci. 6(11), 1293–1300 (2010)

    Google Scholar 

  21. Vijayalakshmi, S., Mohan, V., Raja, S.S.: Mining of users’ access behavior for frequent sequential pattern from web logs. Int. J. Database Manag. Syst. (IJDMS) (2010). https://doi.org/10.5121/ijdms.2010.2304

    Google Scholar 

  22. Xu, C., Chen, S., Cheng, J.: Network user interest pattern mining based on entropy clustering algorithm. In: Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Xi’an, China, 17–19 Sept 2015, pp. 200–204

  23. Yin, J., Zheng, Z., Cao, L.: USpan: an efficient algorithm for mining high utility sequential patterns. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 660–668, Aug 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Tamilselvi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tamilselvi, T., Tholkappia Arasu, G. Handling high web access utility mining using intelligent hybrid hill climbing algorithm based tree construction. Cluster Comput 22 (Suppl 1), 145–155 (2019). https://doi.org/10.1007/s10586-018-1959-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1959-8

Keywords

Navigation