{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:18:20Z","timestamp":1742912300364,"version":"3.40.3"},"publisher-location":"India","reference-count":33,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132210405"},{"type":"electronic","value":"9788132210412"}],"license":[{"start":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:00:00Z","timestamp":1354579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:00:00Z","timestamp":1354579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-81-322-1041-2_35","type":"book-chapter","created":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T20:44:11Z","timestamp":1354567451000},"page":"407-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["\u201cAn Inclusive Survey on Data Preprocessing Methods Used in Web Usage Mining\u201d"],"prefix":"10.1007","author":[{"given":"Brijesh","family":"Bakariya","sequence":"first","affiliation":[]},{"given":"Krishna K.","family":"Mohbey","sequence":"additional","affiliation":[]},{"given":"G. S.","family":"Thakur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,4]]},"reference":[{"key":"35_CR1","unstructured":"Mohd Helmy Abd Wahab, Mohd Norzali Haji Mohd, Hafizul Fahri Hanafi, Mohamad Farhan and Mohamad Mohsin \u201cData Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm\u201d World Academy of Science, Engineering and Technology 2008."},{"key":"35_CR2","unstructured":"Ms.Dipa Dixit and Ms. M. Kiruthika\u201dPreprocessing of Web Logs\u201d (IJCSE) International Journal on Computer Science and Engineering Volume 02, 2010."},{"key":"35_CR3","unstructured":"Arshi Shamsi, Rahul Nayak, Pankaj Pratap Singh and Mahesh Kumar Tiwari \u201cWeb Usage Mining by Data Preprocessing\u201d IJCST Volume 3, Jan. - March 2012."},{"key":"35_CR4","unstructured":"T. Revathi, M. Mohana Rao and Ch. S. Sasanka \u201cAn Enhanced Pre-Processing Research Framework for Web Log Data\u201d IJARCSSE Volume 2, March 2012."},{"key":"35_CR5","unstructured":"M. Malarvizhi and S. A. Sahaay.\u201d Preprocessing of Educational Institution Web Log Data for Finding Frequent Patterns using Weighted Association Rule Mining Technique\u201d, 2012."},{"key":"35_CR6","unstructured":"Suneetha K.R and R. Krishnamoorthi\u201d Data Preprocessing and Easy Access Retrieval of Data through Data Ware House\u201d WCECS, Volume 1, October 2009."},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Khasawneh N. And Chan C.\u201dActive user-based and ontology-based web log data preprocessing for web usage mining\u201d IEEE\/WIC\/ACM International Conference on Web Intelligence, December 2006.","DOI":"10.1109\/WI.2006.32"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Khasawneh N.,Shatnawi M.,Fraiwan M. \u201cConverting Web Applications into Standard XML Web Services\u201d The Tenth International Conference on Intelligent System Design and Applications, Dec 2010.","DOI":"10.1109\/ISDA.2010.5687165"},{"key":"35_CR9","unstructured":"R. Cooley, B. Mobasher, J. Srivastava,\u201dGrouping web page references into transactions for mining world wide web browsing patterns\u201d, University of Minnesota, Dept. of Computer Science, Minneapolis, 1997."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"R. Kosala, H. Blockeel. \u201cWeb Mining Research: A Survey,\u201d In SIGKDD Explorations, ACM press, 2000.","DOI":"10.1145\/360402.360406"},{"key":"35_CR11","unstructured":"Han, J. and M. Kamber \u201cData Mining: Concepts and Techniques\u201d. A. Stephan. San Francisco, Morgan Kaufmann Publishers is an imprint of Elsevier, 2006."},{"key":"35_CR12","unstructured":"Raju. G. T. and Satyanarayana. P. S., \u201cKnowledge Discovery from Web Usage Data: Complete Preprocessing Methodology\u201d, IJCSNS International Journal of Computer Science and Network Security, Volume8, January 2008."},{"key":"35_CR13","unstructured":"Suneetha, K. R. and D. R. Krishnamoorthi \u201cIdentifying User Behavior by Analyzing Web Server Access Log File\u201d IJCSNS International Journal of Computer Science and Network Security, Volume 9, April 2009."},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Etminani, K., Delui, A.R., Yanehsari, N.R. and Rouhani, \u201cWeb Usage Mining: Discovery of the Users\u2019 Navigational Patterns Using SOM\u201d, First International Conference on Networked Digital Technologies, 2009.","DOI":"10.1109\/NDT.2009.5272158"},{"key":"35_CR15","unstructured":"Ramya C and Kavitha G, \u201cAn Efficient Preprocessing Methodology for Discovering Patterns and Clustering of Web Users using a Dynamic ART1 Neural Network\u201d, Fifth International Conference on Information Processing, Springer, 2011."},{"key":"35_CR16","unstructured":"Renata Ivancsy, and Sandor Juhasz, \u201cAnalysis of Web User Identification Methods\u201d, World Academy of Science, Engineering and Technology, Volume 34, 2007."},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Ling Zheng, Hui Gui and Feng Li, \u201cOptimized Preprocessing Technology for Web Log Mining\u201d, International Conference on Computer Design and Applications, Volume1, 2010.","DOI":"10.1109\/ICCDA.2010.5540924"},{"key":"35_CR18","unstructured":"Li Chaofeng,\u201cResearch and Development of Data Preprocessing in Web Usage Mining\u201d, International Journal of computer applications, 2011."},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Shaimaa Ezzat Salama, Mohamed I. Marie, \u201cWeb Server Logs preprocessing for Web Intrusion Detection\u201d,Computer and Information Science, Volume 4, 2011.","DOI":"10.5539\/cis.v4n4p123"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Liang Wei and Zhao Shu-hai,\u201cA Hybrid Recommender System Combining Web Page Clustering with Web Usage Mining\u201d, International Conference on Computational Intelligence and software Engineering, 2009.","DOI":"10.1109\/CISE.2009.5366251"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Yan Li, Boqin Feng and Qinjiao Mao, \u201cResearch on Path Completion Technique in Web Usage Mining\u201d, International Symposium on Computer Science and Computational Technology, Volume 1, 2008.","DOI":"10.1109\/ISCSCT.2008.151"},{"key":"35_CR22","unstructured":"Jian Chen, Jian Yin, Tung, A.K.H. and Bin Liu, \u201cDiscovering Web usage patterns by mining cross-transaction association rules\u201d, International Conference on Machine Learning and Cybernetics, Volume 5, 2004."},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Yi Dong, Huiying Zhang and Linnan Jiao, \u201cResearch on Application of User Navigation Pattern Mining Recommendation\u201d, Proceeding of the 6th World Congress on Intelligent Control and Automation, IEEE,China, June 21 \u2013 23, 2006.","DOI":"10.1109\/WCICA.2006.1714254"},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Tasawar Hussain, Sohail Asghar and Nayyer Masood \u201cWeb Usage Mining: A Survey on Preprocessing of Web Log File\u201d Center of Research in Data Engineering (CORDE) Department of Computer Science, 2010.","DOI":"10.1109\/ICIET.2010.5625730"},{"key":"35_CR25","unstructured":"Sanjay Bapu Thakare,Sangram and Z. Gawali \u201cA Effective and Complete Preprocessing for Web Usage Mining\u201d (IJCSE) International Journal on Computer Science and engineering, Volume 2, 2010."},{"key":"35_CR26","unstructured":"D.S. Rajput, R.S. Thakur and G.S. Thakur \u201cRule Generation from Textual Data by using Graph based Approach\u201d International Journal of Computer Applications New York, USA, Nov. 2011."},{"key":"35_CR27","unstructured":"Aditi Shrivastava, Nitin Shukla \u201cExtracting Knowledge from User Access Logs\u201d International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012."},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Liu Wenyun, Bao Lingyun, \u201cApplication of Web Mining in E-Commerce Enterprises Knowledge Management\u201d, International Conference on E-Business and E-Government, IEEE, 2010.","DOI":"10.1109\/ICEE.2010.447"},{"key":"35_CR29","doi-asserted-by":"crossref","unstructured":"Zhang Haiyang, \u201cThe Research of Web Mining in E-commerce\u201d, IEEE, 2011.","DOI":"10.1109\/ICMSS.2011.5999196"},{"key":"35_CR30","unstructured":"Vijayashri Losarwar, Dr. Madhuri Joshi, \u201cData Preprocessing in Web Usage Mining\u201d, International Conference on Artificial Intelligence and Embedded Systems (ICAIES\u20192012) Singapore, July 15-16, 2012."},{"key":"35_CR31","unstructured":"R. Agrawal, R. Srikant, \u201cFast Algorithm for Mining Association Rule\u201d, International Conference on Very Large Databases, Santiago, Chile, September 1994."},{"key":"35_CR32","unstructured":"R. Agrawal, R. Srikant,\u201dMining sequential patterns\u201d,11th International conference,IEEE Computer Society Press, Taiwan,1995."},{"key":"35_CR33","doi-asserted-by":"crossref","unstructured":"Jaideep Srivastav, Robert Cooley, Mukund Deshpande, Pang-Ning Tan,\u201d Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data\u201d, ACM SIGKDD, Volume 1, Issue 2, Jan 2000.","DOI":"10.1145\/846183.846188"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1041-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T22:09:22Z","timestamp":1675289362000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1041-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,4]]},"ISBN":["9788132210405","9788132210412"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1041-2_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012,12,4]]},"assertion":[{"value":"4 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}