Presentation is loading. Please wait.

Presentation is loading. Please wait.

Web Personalization Based on Static Information and Dynamic User Behavior Center for E-Business Technology Seoul National University Seoul, Korea Nam,

Similar presentations


Presentation on theme: "Web Personalization Based on Static Information and Dynamic User Behavior Center for E-Business Technology Seoul National University Seoul, Korea Nam,"— Presentation transcript:

1 Web Personalization Based on Static Information and Dynamic User Behavior Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang Hyun Intelligent Database Systems Lab School of Computer Science & Engineering Seoul National University, Seoul, Korea Massimiliano Albanese, Antonio Picariello, Carlo and Lucio Sansone Department of Information and Communication Systems, University of Naples (Napoli) “Federico II”, Naples, Italy WIDM '04

2 Copyright  2008 by CEBT Contents  Introduction  Various personalization schemes  System architecture  The web usage mining strategy Pattern analysis, clustering, and classification The re-classification algorithm Web personalization  Experimental results  Conclusions  Evaluation IDS Lab Seminar (User Log Analysis) - 2

3 Copyright  2008 by CEBT Introduction  3 types of data which have to be managed in a web Content - whatever is in a web page Structure - organization of the content Log(usage) data - usage patterns of web sites  The application of data mining techniques depends on data types Web content mining, web structure mining, web usage mining  In this paper, web usage mining is considered. Described as the process of customizing the content and the structure of web sites in order to provide users with information IDS Lab Seminar (User Log Analysis) - 3

4 Copyright  2008 by CEBT Various personalization schemes  Yan et al A methodology for the automatic classification of web users according to their access patterns, using cluster analysis on the web logs …  Perkowitz and Etzioni First describes adaptive web sites as sites that semi-automatically improve their organization by learning from visitor access patterns – algorithm based on a clustering methodology  Srivastava et al A prototype system (WebSIFT) which performs intelligent cleansing and preprocessing for identifying users IDS Lab Seminar (User Log Analysis) - 4

5 Copyright  2008 by CEBT Various personalization schemes  Grandi Time-related issue Introduces an exhaustive annotated bibliography on temporal and evolution aspects in the World Wide Web  The novelty of this paper’s approach Propose a clustering process made up of 2 phases 1 st phase – A pattern analysis and classification is performed by means of an unsupervised clustering algorithm, using the registration information 2 nd phase – Re-classification is iteratively repeated until a suitable convergence is reached to overcome the inaccuracy of the registration information IDS Lab Seminar (User Log Analysis) - 5

6 Copyright  2008 by CEBT System architecture IDS Lab Seminar (User Log Analysis) - 6

7 Copyright  2008 by CEBT System architecture  User profiling The process of gathering information specific to each visitor  Log analysis / web usage mining The process of analyzing the information stored in web server logs – To extract statistical information and discover interesting usage patterns – To cluster the users into groups according to their behavior – To discover potential correlations between web pages and user groups  Content management The process of classifying the content of a web site into semantic categories to make information retrieval and presentation easier  Web site publishing A publishing mechanism that is used to present the content stored in the web server IDS Lab Seminar (User Log Analysis) - 7

8 Copyright  2008 by CEBT The web usage mining strategy  1 st phase The users are attributed to a tentative class by means of an unsupervised clustering algorithm. Uses the static information provided by the users Determines the number of classes the users can belong to  2 nd phase A novel re-classification algorithm is iteratively repeated until a suitable convergence in attributing each user to a class is reached Re-classification is used to overcome the inaccuracy. Accomplished by the log analysis and content management modules – On the basis of the dynamic navigational behavior of the users IDS Lab Seminar (User Log Analysis) - 8

9 Copyright  2008 by CEBT Pattern analysis, clustering, and classification  The task of user profiling module is to associate each user to the class that better describes her behavior To accomplish this, user have to mapped into a feature space.  Issue - the definition of the classes the users can belong to Unsupervised clustering procedure can be used for partitioning the feature space into a certain number of clusters In order to choice the optimal number of clusters, a possible approach could be the maximization of an index IDS Lab Seminar (User Log Analysis) - 9

10 Copyright  2008 by CEBT Pattern analysis, clustering, and classification  C index The minimization of C index indicates a good clustering. – ∵ Pairs of patterns with a small distance are in the same cluster. The denominator is used for normalization. Also used for comparing different clustering techniques 1) AutoClass C - A fuzzy clustering algorithm based on the Bayesian theory 2) the Rival Penalized Competitive Learning (RPCL) algorithm - Used for training a competitive neural network IDS Lab Seminar (User Log Analysis) - 10 S : The sum of distances over all pairs of patterns from the same cluster S min : the sum of l smallest distances S max : the sum of the l largest distances out of all pairs ( Let l be the number of those pairs ) C ∈ [0,1]

11 Copyright  2008 by CEBT The re-classification algorithm  Basic idea 1) Classify the web site resources based on the type of users that have accessed them 2) Re-classify the users based on both the class (previously assigned) and the resources (accessed since the last re- classification)  Content management module Selects all the significant words appearing into the different resources of the web site. Associates them to a specific content category. IDS Lab Seminar (User Log Analysis) - 11

12 Copyright  2008 by CEBT The re-classification algorithm  Log analysis module Registers all the activities of the users. In order to use this information for re-classifying users, we need to attribute each content category to a specific user class The process of attributing each category to a class can be accomplished by considering the first classification performed by – The chosen clustering algorithm – Counting the number of times the users of a given class ask for something belonging to a specific content category with each resource type Each content category can be attributed to a class with a probability that is proportional to the number of user requests.  The whole process will lead to convergence if after a suitable number of re-classifications the number of re-classified users leads to ‘zero’. IDS Lab Seminar (User Log Analysis) - 12

13 Copyright  2008 by CEBT Web personalization  Given the class of user, the contents related to the categories attributed to that class will be shown by the web site publishing module on her personalized home page when she logs in the web site.  Example All the news and the stories containing keywords related to those categories will be presented, as well as the results of last queries involving the same keywords. IDS Lab Seminar (User Log Analysis) - 13

14 Copyright  2008 by CEBT Experimental results  Use SOAP (a light weight, XML based protocol for exchange of information in a decentralized, distributed environment.)  A commercial web site ‘pariare.com’ Provide information about entertainment in Napoli. 2682 users who already registered to the web site. The features used to initially classify the users are : – Age – Sex – Category of place in which users prefer to go – Number of times per week in which users go out – Preferred day of the week to go out – The Pariapoli parameter (a measure of the degree of interest towards the virtual community of Pariare) – Type of entertainment users are looking for IDS Lab Seminar (User Log Analysis) - 14

15 Copyright  2008 by CEBT Experimental results IDS Lab Seminar (User Log Analysis) - 15 The optimal number of clusters

16 Copyright  2008 by CEBT Experimental results IDS Lab Seminar (User Log Analysis) - 16 K : The overall percentage of re-classified users amounts (i,j) : the percentage of i-class users who have been re-classified as j-class (i,i) : the percentage of i-class users which have not been re-classified K = 3.14%K = 0.62%K = 0.16%

17 Copyright  2008 by CEBT Experimental results IDS Lab Seminar (User Log Analysis) - 17 The convergence is even faster ∵ The value of the C index is lower for the RPCL clustering than for the AutoClass C clustering. K = 1.78%K = 0.9%K = 0%

18 Copyright  2008 by CEBT Experimental results IDS Lab Seminar (User Log Analysis) - 18 AutoClass CRPCL

19 Copyright  2008 by CEBT Conclusions  Introduce a novel web usage mining strategy for web personalization  The novelty of this strategy relies in the fact that web site users are clustered through a two-phase process that takes into account both static information and dynamic behavior  The experimental results have confirmed the effectiveness of suggested approach. It leads to a stable classification whatever the initial classification is. IDS Lab Seminar (User Log Analysis) - 19

20 Copyright  2008 by CEBT Evaluation  Pros Interesting subject Introduce various personalization schemes Offer architecture and modules Show detail experiment and results  Cons Few examples – Most of contents are just explanations. Many sentences are too long. – This causes hardness to read and understand the contents. IDS Lab Seminar (User Log Analysis) - 20


Download ppt "Web Personalization Based on Static Information and Dynamic User Behavior Center for E-Business Technology Seoul National University Seoul, Korea Nam,"

Similar presentations


Ads by Google