Web Usage Mining for Semantic Web Personalization جینی شیره شعاعی زهرا.

Slides:



Advertisements
Similar presentations
Dr. Leo Obrst MITRE Information Semantics Information Discovery & Understanding Command & Control Center February 6, 2014February 6, 2014February 6, 2014.
Advertisements

Schema Matching and Query Rewriting in Ontology-based Data Integration Zdeňka Linková ICS AS CR Advisor: Július Štuller.
The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
Association Analysis (Data Engineering). Type of attributes in assoc. analysis Association rule mining assumes the input data consists of binary attributes.
10 -1 Lecture 10 Association Rules Mining Topics –Basics –Mining Frequent Patterns –Mining Frequent Sequential Patterns –Applications.
Web Mining Research: A Survey Authors: Raymond Kosala & Hendrik Blockeel Presenter: Ryan Patterson April 23rd 2014 CS332 Data Mining pg 01.
Chase Repp.  knowledge discovery  searching, analyzing, and sifting through large data sets to find new patterns, trends, and relationships contained.
Experiments on Query Expansion for Internet Yellow Page Services Using Log Mining Summarized by Dongmin Shin Presented by Dongmin Shin User Log Analysis.
Edi Winarko, John F. Roddick
Data Mining Techniques Cluster Analysis Induction Neural Networks OLAP Data Visualization.
Logic in general Logics are formal languages for representing information such that conclusions can be drawn Syntax defines the sentences in the language.
WebMiningResearch ASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Web Mining Research: A Survey
Towards Semantic Web Mining Bettina Berndt Andreas Hotho Gerd Stumme.
Learning Classifier Systems to Intrusion Detection Monu Bambroo 12/01/03.
The Web is perhaps the single largest data source in the world. Due to the heterogeneity and lack of structure, mining and integration are challenging.
Web Mining Research: A Survey
WebMiningResearch ASurvey Web Mining Research: A Survey By Raymond Kosala & Hendrik Blockeel, Katholieke Universitat Leuven, July 2000 Presented 4/18/2002.
Core Text Mining Operations 2007 년 02 월 06 일 부산대학교 인공지능연구실 한기덕 Text : The Text Mining Handbook pp.19~41.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Web Mining Research: A Survey
WebMiningResearchASurvey Web Mining Research: A Survey Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Presented by Shan Huang, 4/24/2007 Revised.
Semantics For the Semantic Web: The Implicit, the Formal and The Powerful Amit Sheth, Cartic Ramakrishnan, Christopher Thomas CS751 Spring 2005 Presenter:
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 7: Expert Systems and Artificial Intelligence Decision Support.
Efficient Data Mining for Path Traversal Patterns CS401 Paper Presentation Chaoqiang chen Guang Xu.
Scaling and Attitude Measurement in Travel and Hospitality Research Research Methodologies CHAPTER 11.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
Data Mining : Introduction Chapter 1. 2 Index 1. What is Data Mining? 2. Data Mining Functionalities 1. Characterization and Discrimination 2. MIning.
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
Chapter 10 Architectural Design
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Research paper: Web Mining Research: A survey SIGKDD Explorations, June Volume 2, Issue 1 Author: R. Kosala and H. Blockeel.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
ICMLC2007, Aug. 19~22, 2007, Hong Kong 1 Incremental Maintenance of Ontology- Exploiting Association Rules Ming-Cheng Tseng 1, Wen-Yang Lin 2 and Rong.
Text CONSEG 09 Domain Knowledge assisted Requirements Evolution (K-RE)
An Integrated Approach to Extracting Ontological Structures from Folksonomies Huairen Lin, Joseph Davis, Ying Zhou ESWC 2009 Hyewon Lim October 9 th, 2009.
1 Context-Aware Search Personalization with Concept Preference CIKM’11 Advisor : Jia Ling, Koh Speaker : SHENG HONG, CHUNG.
Protege OWL Plugin Short Tutorial. OWL Usage The world wide web is a natural application area of ontologies, because ontologies could be used to describe.
INF 384 C, Spring 2009 Ontologies Knowledge representation to support computer reasoning.
1 ECE 453 – CS 447 – SE 465 Software Testing & Quality Assurance Instructor Kostas Kontogiannis.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Of 33 lecture 10: ontology – evolution. of 33 ece 720, winter ‘122 ontology evolution introduction - ontologies enable knowledge to be made explicit and.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Theory and Application of Database Systems A Hybrid Approach for Extending Ontology from Text He Wei.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Dimitrios Skoutas Alkis Simitsis
Expert Systems with Applications 34 (2008) 459–468 Multi-level fuzzy mining with multiple minimum supports Yeong-Chyi Lee, Tzung-Pei Hong, Tien-Chin Wang.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Faculty of Informatics and Information Technologies Slovak University of Technology Personalized Navigation in the Semantic Web Michal Tvarožek Mentor:
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
1 Introduction to Data Mining C hapter 1. 2 Chapter 1 Outline Chapter 1 Outline – Background –Information is Power –Knowledge is Power –Data Mining.
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Enable Semantic Interoperability for Decision Support and Risk Management Presented by Dr. David Li Key Contributors: Dr. Ruixin Yang and Dr. John Qu.
Some Thoughts to Consider 5 Take a look at some of the sophisticated toys being offered in stores, in catalogs, or in Sunday newspaper ads. Which ones.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
A WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEB SITES.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 28 Data Mining Concepts.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
WebMiningResearchASurvey Web Mining Research: A Survey Authors: Raymond Kosala and Hendrik Blockeel ACM SIGKDD, July 2000 Computer Science Department University.
Ontology Engineering and Feature Construction for Predicting Friendship Links in the Live Journal Social Network Author:Vikas Bahirwani 、 Doina Caragea.
Artificial Intelligence Logical Agents Chapter 7.
Semantic Web Technologies Readings discussion Research presentations Projects & Papers discussions.
Personalized Ontology for Web Search Personalization S. Sendhilkumar, T.V. Geetha Anna University, Chennai India 1st ACM Bangalore annual Compute conference,
Data mining in web applications
DATA MINING © Prentice Hall.
Web Ontology Language for Service (OWL-S)
ece 627 intelligent web: ontology and beyond
Presentation transcript:

Web Usage Mining for Semantic Web Personalization جینی شیره شعاعی زهرا

  With the explosive growth of information on the Web, it has become more difficult to access relevant information from the Web. One possible approach to solve this problem is web personalization.   In Semantic Web, user access behavior models can be shared as ontology.   Agent software can then utilize it to provide personalized services such as recommendation and search.   we need to tackle the technical issues on transforming web access activities into ontology, and deducing personalized usage knowledge from the ontology.

In this paper:   The proposed approach first incorporates fuzzy logic into Formal Concept Analysis to mine user access data for automatic ontology generation, and then applies approximate reasoning to generate personalized usage knowledge from the ontology for providing personalized services.

  Web usage mining, which aims to discover interesting and frequent user access patterns from web usage data, can be used to model past web access behavior of users.   The acquired model can then be used for analyzing and predicting the future user access behavior.   In Semantic Web environment, user access behavior models can be shared as ontology.

  To provide semantic web personalization, we need to tackle the technical issues on how to define web access activities, discover hierarchical relationships from web access activities, transform them into ontology automatically, and deduce personalized usage knowledge from the ontology.

Proposed Architecture consists of two main components: Web Usage Ontology Generation and Semantic Web Personalization.

Web Usage Ontology Generation (1) Preprocessing; (2) Constructing Web Usage Context; (3) Constructing Web Usage Lattice; (4) Pruning Web Usage Lattice; (5)Generating Web Usage Ontology.

Preprocessing   Preprocessing is responsible for processing the original web usage logs in order to identify all user access sessions for each individual user.   A user access session S = e1e2…en is a sequence of access events. Each ei = (tsi, tei, URLi), where tsi is the start time of event ei, tei is the end time of event ei, and URLi is the URL accessed by the user in event ei.

Preprocessing

Constructing Web Usage Context defined seven real-life time concepts, namely Early Morning, Morning, Noon, Early Afternoon, Late Afternoon, Evening and Night to represent temporal attributes for web activities. We have also defined 26 web categories such as Games, Adults, Sports and Entertainment as event attributes to describe web access activities. user access behavior can be represented by a set of temporal and event attributes.

Z(mc) is defined as the proportion of the duration of accessing a web category mc in all user access sessions, which indicates the user’s global interest of the web category mc. z(gi, mc) is defined as the proportion of the duration of accessing a web category mc within a user access session gi, which indicates the user’s local interest of the web category mc.

Constructing Web Usage Lattice

Pruning Web Usage Lattice The Web Usage Lattice may be quite complicated and huge due to the large number of web access activities generated.

Pruning Web Usage Lattice Given a minimum support MinSup = 0.1 and MinConf = 0.15, the pruned Web Usage Lattice is shown in below:

Generating Web Usage Ontology   We use OWL (Web Ontology Language) to represent the generated ontology.   we define the following transformation rules:   1. Classes. Each web access activity is mapped into an activity class. Note that the root (labeled as 0) in the pruned Web Usage Lattice is a virtual node, thus there is no need for generating the corresponding activity class.   2. Properties. Each temporal and event attribute of a web access activity is transformed into a property of the corresponding class. The membership value of each attribute is stored in the corresponding property. Further, the fuzzy support and confidence of each web access activity are also represented as properties named “Support” and “Confidence” respectively.   3. Class Hierarchy Relations. Each hierarchical relation between web access activities forms a taxonomy relation between activity classes. The sub-activity relationship in the Web Usage Lattice is transformed into the subclass relationship in the Web Usage Ontology.

Generating Web Usage Ontology example on transforming the activity node 4 into the corresponding class definition of “Activity_4” of the Web Usage Ontology.

  Knowledge on user access behavior from Web Usage Ontology can be extracted as activity rules.   Each activity rule is represented in the form of conditional and qualified propositions   The conditional and qualified propositions are characterized by the canonical form “If x is A, then y is B is S”, where x and y are variables whose values are in sets X and Y respectively, A and B are fuzzy sets on X and Y respectively, and S is a fuzzy truth qualifier.   {true, very true, fairly true, absolutely,true, undecided, absolutely false, fairly false, very false, false}. Extracting Activity Rules

  Web Usage Ontology gives two kinds of activity rules:   simple activity rules and   Association activity rules.   Simple activity rules can be extracted from the properties of each activity class directly, whereas association activity rules can be inferred from activity classes and the class hierarchy.

Extracting Activity Rules   Given a Web Usage Ontology, simple activity rules of each activity class are in the form of “If x is A then y is B is S”, where A and B are fuzzy sets of the corresponding temporal properties and event properties of the activity class respectively. We can calculate the fuzzy truth qualifier S using the confidence property (Conf) of the activity class and the minimum confidence (MinConf) that is used for pruning the Web Usage Lattice

Extracting Simple Activity Rules For example, from the activity class “Activity_4” given in Figure 6, a simple activity rule “If 0.5/T2 then 0.8/C1+0.5/C3 is fairly true” can be extracted.

Extracting Association Activity Rules   Given a Web Usage Ontology, association activity rules are in the form of “If x is A then y is B is S”, where A and B are fuzzy sets of the temporal and event properties of activity classes i and j respectively. Such rules require the activity class j to be the immediate subclass of the activity class i, and the fuzzy confidence Conf >MinConf.   The fuzzy confidence (Conf) of association activity rules is equal to the support property of the activity class j divided by that of activity class i.

Example For example, in the Web Usage Ontology given in slide 6, the relation from the activity class “Activity_1” to the activity class “Activity_4” represents an association activity rule “If 0.4/T2+0.5/C3 then 0.5/T2 +0.8/C1 +0.5/C3 is true”.

Providing Personalized Services   After deriving the personalized usage knowledge from approximate reasoning of activity rules, agent software can then customize and reorganize web resources for the users for the specific time interval Tp based on the ranked list of web content categories LC.   Assume that we have obtained [19:00:00, 20:00:00] and {C1:1.0, C2:0.0, C3:0.5} as personalized usage knowledge after approximate reasoning. If the agent   If software needs to provide personalized search service, then the URL links to web contents related to C1 (Sports) will be highlighted to the user with higher priority in the search result list during the time period [19:00:00, 20:00:00].   If the agent software intends to perform personalized web recommendation, then web resources involving C1 (Sports) and C3 (Chat) will be recommended as the content that are more likely to be accessed by the user during the time period [19:00:00, 20:00:00].

Conclusion   The performance of the proposed approach is currently under evaluation using web usage data from a group of research students in the Database Technology Lab, Nanyang Technological University, Singapore.

?