We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

by Hamed Jelodar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 7
Year of Publication: 2013
Authors: Hamed Jelodar
10.5120/13502-1251

Hamed Jelodar . Exploitation of Server Log Files of User Behavior in Order to Inform Administrator. International Journal of Computer Applications. 78, 7 ( September 2013), 26-30. DOI=10.5120/13502-1251

@article{ 10.5120/13502-1251,
author = { Hamed Jelodar },
title = { Exploitation of Server Log Files of User Behavior in Order to Inform Administrator },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 7 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number7/13502-1251/ },
doi = { 10.5120/13502-1251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:00.046216+05:30
%A Hamed Jelodar
%T Exploitation of Server Log Files of User Behavior in Order to Inform Administrator
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 7
%P 26-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

All requests that are send to website server are stored in a file called Server File Log, all pages users observe or all user’s requests to the Server are stored in that File. In this paper we are going to investigate the user’s behavior by web usage mining through Server File Log in order to improve the website better service and at the end by analyzing Download software website we present the result in illustration.

References
  1. H. Hannah , K. Thangavel , A. Pethalakshmi, "Rough set based Feature Selection for Web Usage Mining," Conference on Computational Intelligence and Multimedia Applications, 2007, Vol. 1, pp. 33-38.
  2. K. Etminani, M. Akbarzadeh-T and N. Raeeji Yanehsari, "Web Usage Mining: users' navigational patterns extraction from web logs," 2009, IFSA-EUSFLAT, pp. 396-401.
  3. D. Singh S, S. Verma, "Web Usage Pattern Analysis Through Web Logs: A Review," Computer Science and Software Engineering, India, 2012. pp. 49 -53,
  4. V. Chitraa , A. Selvadoss Thanamani, "A Novel Technique for Sessions Identification in Web Usage Mining Preprocessing," International Journal of Computer Applications. India, 2011, Vol 35, No 9, pp. 23-27.
  5. Madhak, Nirali N, Kodinariya, Trupti M. , Rathodand Jayesh N, "Web Usage Mining: A Review on Process, Methods and Techniques," International Journal of Computer Applications. India, 2013,
  6. Y Yan LI, Boqin FENG, Qinjiao MAO, "Research on Path Completion Technique In Web Usage Mining", IEEE International Symposium On Computer Science and Computational Technology, 2008,
  7. N. Lakshmi, R. Sekhara Rao, S. Satyanarayana Reddy, "An Overview of Preprocessing on Web Log Data for Web Usage Analysis," International Journal of Computer Applications. India, 2013, Vol 2, No 4, pp. 274-279.
Index Terms

Computer Science
Information Sciences

Keywords

Web Mining Web Log File Web Usage Mining.