UNIVERSITY COLLEGE DUBLIN DUBLIN CITY UNIVERSITY This material is based upon work supported by Science Foundation Ireland under Grant No. 03/IN3/1361 TEMPORAL.

Slides:



Advertisements
Similar presentations
Drafting Your Outline What to do in the next week!
Advertisements

Web Mining.
Web Usage Mining Web Usage Mining (Clickstream Analysis) Mark Levene (Follow the links to learn more!)
By Venkata Sai Pulluri ( ) Narendra Muppavarapu ( )
Rule Discovery from Time Series Presented by: Murali K. Kadimi.
IT 433 Data Warehousing and Data Mining Association Rules Assist.Prof.Songül Albayrak Yıldız Technical University Computer Engineering Department
Data Mining Techniques Cluster Analysis Induction Neural Networks OLAP Data Visualization.
Design Guidelines for Effective WWW History Mechanisms Linda Tauscher and Saul Greenberg University of Calgary This talk accompanied a paper, and was presented.
Ex. 11 (pp.409) Given the lattice structure shown in Figure 6.33 and the transactions given in Table 6.24, label each node with the following letter(s):
WebMiningResearch ASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007.
WebKDD 2001 Aristotle University of Thessaloniki 1 Effective Prediction of Web-user Accesses: A Data Mining Approach Nanopoulos Alexandros Katsaros Dimitrios.
Web Mining Research: A Survey
LinkSelector: A Web Mining Approach to Hyperlink Selection for Web Portals Xiao Fang University of Arizona 10/18/2002.
FACT: A Learning Based Web Query Processing System Hongjun Lu, Yanlei Diao Hong Kong U. of Science & Technology Songting Chen, Zengping Tian Fudan University.
The Web is perhaps the single largest data source in the world. Due to the heterogeneity and lack of structure, mining and integration are challenging.
Web Mining Research: A Survey
WebMiningResearchASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007 Revised.
1 Fast Algorithms for Mining Association Rules Rakesh Agrawal Ramakrishnan Srikant Slides from Ofer Pasternak.
Knowledge Compilation from the Web. Some Examples  Finding relationships  Discovering micro-communities  Creating concept hierarchies.
Data Mining CS 157B Section 2 Keng Teng Lao. Overview Definition of Data Mining Application of Data Mining.
Web Usage Mining Sara Vahid. Agenda Introduction Web Usage Mining Procedure Preprocessing Stage Pattern Discovery Stage Data Mining Approaches Sample.
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
CS 401 Paper Presentation Praveen Inuganti
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
Introduction The large amount of traffic nowadays in Internet comes from social video streams. Internet Service Providers can significantly enhance local.
MINING RELATED QUERIES FROM SEARCH ENGINE QUERY LOGS Xiaodong Shi and Christopher C. Yang Definitions: Query Record: A query record represents the submission.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
南台科技大學 資訊工程系 A web page usage prediction scheme using sequence indexing and clustering techniques Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2010/10/15.
Web Usage Mining for Semantic Web Personalization جینی شیره شعاعی زهرا.
A journey into different worlds…... Why are there different habitats on our earth? Why cannot all of the animals on earth just live in one big environment?
From Social Bookmarking to Social Summarization: An Experiment in Community-Based Summary Generation Oisin Boydell, Barry Smyth Adaptive Information Cluster,
2001/11/27IDS Lab Seminar1 Adaptive Fraud Detection Advisor: Dr. Hsu Graduate: Yung-Chu Lin Source: Fawcett, Tom and Foster Provost, Journal of Data Mining.
User Behavior Analysis of Location Aware Search Engine Third international Conference of MDM, 2002 Takahiko Shintani, Iko Pramudiono NTT Information Sharing.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Association Rule Mining
Retroactive Answering of Search Queries Beverly Yang Glen Jeh.
Analysing Clickstream Data: From Anomaly Detection to Visitor Profiling Peter I. Hofgesang Wojtek Kowalczyk ECML/PKDD Discovery.
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Chien-Shing Chen Author : Juan D.Velasquez Richard Weber Hiroshi Yasuda 國立雲林科技大學 National.
Web Mining Issues Size Size –>350 million pages –Grows at about 1 million pages a day Diverse types of data Diverse types of data.
+ User-induced Links in Collaborative Tagging Systems Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbolt CIKM’09 Speaker: Nonhlanhla Shongwe 18 January.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Chaoyang University of Technology Clustering web transactions using rough approximation Source : Fuzzy Sets and Systems 148 (2004) 131–138 Author : Supriya.
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
Information Design Trends Unit Five: Delivery Channels Lecture 2: Portals and Personalization Part 2.
Predicting User Interests from Contextual Information R. W. White, P. Bailey, L. Chen Microsoft (SIGIR 2009) Presenter : Jae-won Lee.
© Prentice Hall1 DATA MINING Web Mining Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist University Companion slides.
Improvement of Apriori Algorithm in Log mining Junghee Jaeho Information and Communications University,
A WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEB SITES.
Differential Analysis on Deep Web Data Sources Tantan Liu, Fan Wang, Jiedan Zhu, Gagan Agrawal December.
Rapid Association Rule Mining Amitabha Das, Wee-Keong Ng, Yew-Kwong Woon, Proc. of the 10th ACM International Conference on Information and Knowledge Management(CIKM’01),2001.
Market Basket Analysis
Effective Prediction of Web-user Accesses: A Data Mining Approach
CIS 510 help Become Exceptional / cis510rank.com
Profiling based unstructured process logs
Data Mining Jim King.
Web Mining Ref:
CIS 510 Possible Is Everything/snaptutorial.com
CIS 510 Education for Service-- snaptutorial.com.
CIS 510Competitive Success/tutorialrank.com
CIS 510 Education for Service-- tutorialrank.com.
CIS 510 RANK Lessons in Excellence-- cis510rank.com.
CIS 510 Teaching Effectively-- snaptutorial.com
Lin Lu, Margaret Dunham, and Yu Meng
Data Mining Association Rules Assoc.Prof.Songül Varlı Albayrak
Mining Access Pattrens Efficiently from Web Logs Jian Pei, Jiawei Han, Behzad Mortazavi-asl, and Hua Zhu 2000년 5월 26일 DE Lab. 윤지영.
Boštjan Kožuh Statistical Office of the Republic of Slovenia,
Effective Prediction of Web-user Accesses: A Data Mining Approach
Date: 2012/11/15 Author: Jin Young Kim, Kevyn Collins-Thompson,
Discovery of Significant Usage Patterns from Clickstream Data
Web Mining Research: A Survey
Presentation transcript:

UNIVERSITY COLLEGE DUBLIN DUBLIN CITY UNIVERSITY This material is based upon work supported by Science Foundation Ireland under Grant No. 03/IN3/1361 TEMPORAL RULES FOR MOBILE WEB PERSONALIZATION Martin Halvey, Mark T. Keane, Barry Smyth Adaptive Information Cluster, University College Dublin. Many systems attempt to predict user navigation in the Internet through the use of past behaviours, preferences and environmental factors Many systems attempt to predict user navigation in the Internet through the use of past behaviours, preferences and environmental factors Many of these systems do not take into account that users have different sets of preferences at different times Many of these systems do not take into account that users have different sets of preferences at different times Here we present methods for creating temporal rules that describe user navigation patterns Here we present methods for creating temporal rules that describe user navigation patterns INTRODUCTION PREDICTING USER NAVIGATION CONCLUSIONS User navigation patterns in the Internet are time dependent; users have different needs and goals at different times. As such we have presented a number of methods for learning rules that can be applied during particular time periods, during which users in general have different goals. We have analyzed our methods with respect to pages that users have visited and found that a greater number rules with high confidence and high support values were discovered. Finally we used our methods to try and predict user navigation in a WAP portal by using a number of weeks worth of navigation to predict subsequent weeks navigation. TIME BASED USER PROFILES The problem of mining association rules can be formalized as follows : Let I = {i 1,i 2,..., i m } be a set of literals, called items. Let D be a set of transactions, where each transaction T is a set of items such that T I. Associated with each transaction is a unique identifier, called its TID. We say that a transaction T contains X, a set of some items in I, if X T. An association rule is an implication of the form X Y, where X I, Y I, and X Y = 0. The rule X Y holds in the transaction set D with confidence c if c% of transactions in D that contain X also contain Y. The rule X Y has support s in the transaction set D if s% of transactions in D contain X υ Y. Our proposal is that each transaction T has associated with it a timestamp t : So for some rules R of the form X Y, the rule could be refined to R of the form X υ t Y such that confidence c of X Y for transactions that take place in transaction set D during times t is greater than confidence c over all of the transaction set D. TEMPORAL RULES FOR URLS To evaluate the effectiveness of the techniques that we have outlined in this paper we analyze web logs from a mobile Internet portal of a major European operator. This data, gathered in September 2002, involved 1,168 users and 147,700 individual user sessions. We propose 4 methods to carry out this refinement of the rules : Point Better, for each point in the time period that the confidence c is improved we create a new rule. Point Better, for each point in the time period that the confidence c is improved we create a new rule. Sequence Better, a refinement to to the point better method where a rule may be refined to include sequences of points. Sequence Better, a refinement to to the point better method where a rule may be refined to include sequences of points. Point Threshold, this is a refinement of the point better method, for each point in the time period that the confidence c is above a certain threshold we create a new rule Point Threshold, this is a refinement of the point better method, for each point in the time period that the confidence c is above a certain threshold we create a new rule Sequence Threshold, a refinement to to the sequence better method where a rule may be refined to include sequences of points. Sequence Threshold, a refinement to to the sequence better method where a rule may be refined to include sequences of points. We also use 2 different time points : Hours of day Hours of day Days of week Days of week To evaluate the effectiveness of the techniques that we have outlined in this paper for personalization, the data set was segmented into four parts, each part is the equivalent of 1 weeks browsing on the WAP portal. In turn each possible combination of 3 weeks was used to learn rules using Apriori. The point threshold and sequence threshold methods were then applied to each of the possible combination of 3 weeks. Each of the rule sets was then used to try and predict user navigation in the 4 th week. The following figures show some results for the point threshold method applied to days (PTD) and hours (PTH), and the sequence threshold method for days (STD) and for hours (STH).