{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T14:34:13Z","timestamp":1778596453353,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T00:00:00Z","timestamp":1451347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Adv Data Anal Classif"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11634-015-0228-4","type":"journal-article","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T06:30:34Z","timestamp":1451370634000},"page":"519-546","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A fuzzy neural network based framework to discover user access patterns from web log data"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0642-0535","authenticated-orcid":false,"given":"Zahid A.","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Syed Abdul","family":"Sattar","sequence":"additional","affiliation":[]},{"given":"A. Vinaya","family":"Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"issue":"4","key":"228_CR1","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1142\/S0219649203000565","volume":"2","author":"A Abraham","year":"2003","unstructured":"Abraham A (2003) Business intelligence from web usage mining. J Inf Knowl Manag 2(4):375\u2013390","journal-title":"J Inf Knowl Manag"},{"key":"228_CR2","doi-asserted-by":"crossref","unstructured":"Alam S (2011) Intelligent web usage clustering based recommender system. In: Proceedings of the fifth ACM conference on Recommender systems, ACM, pp 367\u2013370","DOI":"10.1145\/2043932.2044008"},{"issue":"3","key":"228_CR3","first-page":"18","volume":"1","author":"Z Ansari","year":"2011","unstructured":"Ansari Z, Ahmed W, Azeem M, Babu A (2011a) Discovery of web usage profiles using various clustering techniques. Int J Comput Inf Syst 1(3):18\u201327","journal-title":"Int J Comput Inf Syst"},{"issue":"4","key":"228_CR4","first-page":"1407","volume":"2","author":"ZA Ansari","year":"2011","unstructured":"Ansari ZA, Babu AV, Ahmed W, Azeem MF (2011d) A comparative study of mining web usage patterns using variants of k-means clustering algorithm. Int J Comput Sci Inf Technol (IJCSIT) 2(4):1407\u20131413","journal-title":"Int J Comput Sci Inf Technol (IJCSIT)"},{"issue":"6","key":"228_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.18517\/ijaseit.2.6.248","volume":"2","author":"Z Ansari","year":"2012","unstructured":"Ansari Z, Azeem M, Babu AV, Ahmed W (2012) A fuzzy approach for feature evaluation and dimensionality reduction to improve the quality of web usage mining results. Int J Adv Sci Eng Inf Technol 2(6):67\u201373","journal-title":"Int J Adv Sci Eng Inf Technol"},{"key":"228_CR6","unstructured":"Ansari Z, Azeem MF, Babu AV, Ahmed W (2011b) Preprocessing users web page navigational data to discover usage patterns. In: The Seventh International Conference on Computing and Information Technology, Bangkok, Thailand"},{"key":"228_CR7","doi-asserted-by":"crossref","unstructured":"Ansari Z, Babu AV, Ahmed W, Azeem MF (2011c) A fuzzy set theoretic approach to discover user sessions from web navigational data. In: IEEE Recent Advances in Intelligent Computational Systems (RAICS) 2011, pp 879 \u2013 884","DOI":"10.1109\/RAICS.2011.6069435"},{"key":"228_CR8","volume-title":"Survey of clustering data mining techniques","author":"P Berkhin","year":"2002","unstructured":"Berkhin P (2002) Survey of clustering data mining techniques. Springer, Heidelberg"},{"key":"228_CR9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/3-540-28349-8_2","volume-title":"Grouping Multidimensional Data","author":"P Berkhin","year":"2006","unstructured":"Berkhin P (2006) A survey of clustering data mining techniques. Grouping Multidimensional Data. Springer, Berlin Heidelberg, pp 25\u201371"},{"issue":"2","key":"228_CR10","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek JC, Ehrlich R, Full W (1984) Fcm: The fuzzy c-means clustering algorithm. Elsevier Comput Geosci 10(2):191\u2013203","journal-title":"Elsevier Comput Geosci"},{"issue":"5","key":"228_CR11","first-page":"460","volume":"4","author":"L Chaofeng","year":"2009","unstructured":"Chaofeng L (2009) Research on web session clustering. J Softw 4(5):460\u2013468","journal-title":"J Softw"},{"key":"228_CR12","doi-asserted-by":"crossref","unstructured":"Chau M, Cheng R, Kao B, Ng J (2006) Uncertain data mining: An example in clustering location data. In: Advances in Knowledge Discovery and Data Mining, Lecture Notes in Computer Science, vol 3918. Springer, pp 199\u2013204","DOI":"10.1007\/11731139_24"},{"key":"228_CR13","doi-asserted-by":"crossref","unstructured":"Chen J, Cook T (2007) Mining contiguous sequential patterns from web logs. In: Proceedings of the 16th international conference on World Wide Web, ACM, pp 1177\u20131178","DOI":"10.1145\/1242572.1242753"},{"issue":"4","key":"228_CR14","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1016\/j.eswa.2009.09.047","volume":"37","author":"PH Chou","year":"2010","unstructured":"Chou PH, Li PH, Chen KK, Wu MJ (2010) Integrating web mining and neural network for personalized e-commerce automatic service. Elsevier Expert Syst Appl 37(4):2898\u20132910","journal-title":"Elsevier Expert Syst Appl"},{"key":"228_CR15","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/285243.285286","volume":"28","author":"E Cohen","year":"1998","unstructured":"Cohen E, Krishnamurthy B, Rexford J (1998) Improving end-to-end performance of the web using server volumes and proxy filters. SIGCOMM Comput Commun Rev 28:241\u2013253","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"228_CR16","first-page":"191","volume":"5","author":"M Dimitrijevic","year":"2010","unstructured":"Dimitrijevic M, Bosnjak Z, Subotica S (2010) Discovering interesting association rules in the web log usage data. Interdiscip J Inf Knowl Manag 5:191\u2013207","journal-title":"Interdiscip J Inf Knowl Manag"},{"key":"228_CR17","unstructured":"Dong YH (2004) A novel competitive neural network for web mining. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 2004"},{"issue":"1","key":"228_CR18","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.neunet.2009.08.007","volume":"23","author":"K Du","year":"2010","unstructured":"Du K (2010) Clustering: a neural network approach. Elsevier Neural Netw 23(1):89\u2013107","journal-title":"Elsevier Neural Netw"},{"key":"228_CR19","unstructured":"Etminani K, Delui A, Yanehsari N, Rouhani M (2009) Web usage mining: Discovery of the users navigational patterns using som. In: First International Conference on Networked Digital Technologies, 2009. NDT 09, pp 224\u2013249"},{"key":"228_CR20","unstructured":"Fukuyama SM Y (1989) A new method of choosing the number of clusters for the fuzzy c-means method. In: Proceeding of fifth Fuzzy System Symposium, pp 247\u2013250"},{"key":"228_CR21","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.neunet.2008.09.011","volume":"22","author":"A Ghosh","year":"2009","unstructured":"Ghosh A, Shankar BU, Meher SK (2009) A novel approach to neuro-fuzzy classification. Neural Netw 22:100\u2013109","journal-title":"Neural Netw"},{"key":"228_CR22","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1023\/A:1012801612483","volume":"17","author":"M Halkidi","year":"2001","unstructured":"Halkidi M, Batistakis Y, Vazirgiannis M (2001) On clustering validation techniques. J Intell Inf Syst 17:107\u2013145","journal-title":"J Intell Inf Syst"},{"key":"228_CR23","doi-asserted-by":"crossref","unstructured":"Ketata A, Mudur S, Shiri N (2009) Dependable performance analysis for fuzzy clustering of web usage data. In: IEEE Symposium on Computational Intelligence and Data Mining, 2009. CIDM 09, pp 275\u2013282","DOI":"10.1109\/CIDM.2009.4938660"},{"key":"228_CR24","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T Kohonen","year":"1990","unstructured":"Kohonen T (1990) The self-organizing map. Proc IEEE 78:1464\u20131480","journal-title":"Proc IEEE"},{"issue":"18","key":"228_CR25","first-page":"38","volume":"56","author":"T Kumar","year":"2012","unstructured":"Kumar T, Guruprasad H (2012) Clustering web usage data using concept hierarchy and self organizing map. Int J Comput Appl 56(18):38\u201344","journal-title":"Int J Comput Appl"},{"issue":"3","key":"228_CR26","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TFUZZ.2011.2106216","volume":"19","author":"H Capitaine Le","year":"2011","unstructured":"Le Capitaine H, Frelicot C (2011) A cluster validity index combining an overlap measure and a separation measure based on fuzzy aggregation operators. IEEE Trans Fuzzy Syst 19(3):580\u2013588","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"228_CR27","doi-asserted-by":"crossref","first-page":"863","DOI":"10.4028\/www.scientific.net\/AMM.63-64.863","volume":"63","author":"B Li","year":"2011","unstructured":"Li B, Yang J, Liu C, Zhang J, Zhang Y (2011) Research on improved clustering algorithm on web usage mining based on scientific analysis of web materials. Appl Mech Mater 63:863\u2013867","journal-title":"Appl Mech Mater"},{"key":"228_CR28","first-page":"581","volume":"15","author":"HC Liu","year":"2009","unstructured":"Liu HC, Yih WLJM, Wu D (2009) Fuzzy cmeans algorithm based on common mahalanobis distances. J Mult Valued Logic Soft Comput 15:581\u2013595","journal-title":"J Mult Valued Logic Soft Comput"},{"key":"228_CR29","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/978-3-540-72079-9_3","volume":"4321","author":"B Mobasher","year":"2007","unstructured":"Mobasher B (2007) Data mining for web personalization. Lect Notes Comput Sci 4321:90","journal-title":"Lect Notes Comput Sci"},{"key":"228_CR30","series-title":"Lecture Notes in Computer Science","first-page":"235","volume-title":"WEBKDD 2001 Mining Web Log Data Across All Customers Touch Points","author":"A Nanopoulos","year":"2002","unstructured":"Nanopoulos A, Katsaros D, Manolopoulos Y (2002) Exploiting web log mining for web cache enhancement. In: Kohavi R, Masand B, Spiliopoulou M, Srivastava J (eds) WEBKDD 2001 Mining Web Log Data Across All Customers Touch Points, vol 2356., Lecture Notes in Computer ScienceSpringer, Berlin, pp 235\u2013241"},{"issue":"5","key":"228_CR31","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1109\/TNN.2002.1031947","volume":"13","author":"S Pal","year":"2002","unstructured":"Pal S, Talwar V, Mitra P et al (2002) Web mining in soft computing framework: relevance, state of the art and future directions. IEEE Trans Neural Netw 13(5):1163\u20131177","journal-title":"IEEE Trans Neural Netw"},{"issue":"3","key":"228_CR32","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.datak.2008.01.002","volume":"65","author":"S Park","year":"2008","unstructured":"Park S, Suresh NC, Jeong BK (2008) Sequence based clustering for web usage mining: a new experimental framework and ann enhanced k means algorithm. Elsevier Data Knowl Eng 65(3):512\u2013543","journal-title":"Elsevier Data Knowl Eng"},{"key":"228_CR33","unstructured":"Perkowitz EO M (1998) Adaptive web sites: Automatically synthesizing web pages. In: Proceedings of the 15th National Conference on Artificial Intelligence, Madison, WI, pp 727\u2013732"},{"key":"228_CR34","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1145\/345124.345171","volume":"43","author":"EOM Perkowitz","year":"2000","unstructured":"Perkowitz EOM (2000) Adaptive web sites. Commun ACM 43:152\u2013158","journal-title":"Commun ACM"},{"issue":"1","key":"228_CR35","doi-asserted-by":"crossref","first-page":"9","DOI":"10.20533\/ijmip.2042.4647.2011.0002","volume":"1","author":"PS Raghavendra","year":"2011","unstructured":"Raghavendra PS, Chowdhury SR, Kameswari SV (2011) Web usage mining using statistical classifiers and fuzzy artificial neural networks. Int J Multimed Image Process (IJMIP) 1(1):9\u201316","journal-title":"Int J Multimed Image Process (IJMIP)"},{"key":"228_CR36","doi-asserted-by":"crossref","unstructured":"Ren L (2009) Research of web data mining based on fuzzy logic and neural networks. In: Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009. FSKD \u201909, vol 3, pp 485\u2013489","DOI":"10.1109\/FSKD.2009.344"},{"key":"228_CR37","first-page":"72","volume":"9","author":"A Sharma","year":"2012","unstructured":"Sharma A (2012) Web usage mining using neural network. Int J Rev Comput 9:72\u201378","journal-title":"Int J Rev Comput"},{"issue":"9","key":"228_CR38","first-page":"13","volume":"36","author":"K Shveta","year":"2011","unstructured":"Shveta K, Bhatia HM, Dixit VS (2011) Aggregate profiling for recommendation of web pages using som and k-means clustering techniques. Int J Comput Appl 36(9):13\u201320","journal-title":"Int J Comput Appl"},{"issue":"2","key":"228_CR39","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J Srivastava","year":"2000","unstructured":"Srivastava J, Cooley R, Deshpande M, Tan P (2000) Web usage mining: Discovery and applications of usage patterns from web data. SIGKDD Explor 1(2):12\u201323","journal-title":"SIGKDD Explor"},{"key":"228_CR40","doi-asserted-by":"crossref","unstructured":"Van\u00a0Hulle MM (2012) Self organizing maps. In: Handbook of Natural Computing. Springer, pp 585\u2013622","DOI":"10.1007\/978-3-540-92910-9_19"},{"key":"228_CR41","doi-asserted-by":"crossref","unstructured":"Vigna G, Robertson W, Kher V, Kemmerer R (2003) A stateful intrusion detection system for world-wide web servers. In: Proceedings. 19th Annual Computer Security Applications Conference, 2003, pp 34\u201343","DOI":"10.1109\/CSAC.2003.1254308"},{"key":"228_CR42","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.1016\/j.fss.2007.03.004","volume":"158","author":"W Wang","year":"2007","unstructured":"Wang W, Zhang Y (2007) On fuzzy cluster validity indices. Elsevier Fuzzy Sets Syst 158:2095\u20132117","journal-title":"Elsevier Fuzzy Sets Syst"},{"issue":"2","key":"228_CR43","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1531817.1531825","volume":"40","author":"C Wei","year":"2009","unstructured":"Wei C, Sen W, Yuan Z, Lian-Chang C (2009) Algorithm of mining sequential patterns for web personalization services. ACM SIGMIS Database 40(2):57\u201366","journal-title":"ACM SIGMIS Database"},{"key":"228_CR44","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/34.85677","volume":"13","author":"XL Xie","year":"1987","unstructured":"Xie XL, Beni G (1987) A validity measure for fuzzy clustering. IEEE Trans Pattern Anal Mach Intell 13:841\u2013847","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"228_CR45","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu R, Wunsch ID (2005) Survey of clustering algorithms. IEEE Trans Neural Netw 16(3):645\u2013678","journal-title":"IEEE Trans Neural Netw"},{"key":"228_CR46","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1016\/S0031-3203(98)00157-5","volume":"32","author":"N Zahid Lmea","year":"1999","unstructured":"Zahid Lmea N (1999) A new cluster validity for fuzzy clustering. Pattern Recognit 32:1089\u20131097","journal-title":"Pattern Recognit"}],"container-title":["Advances in Data Analysis and Classification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11634-015-0228-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11634-015-0228-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11634-015-0228-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11634-015-0228-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:15:11Z","timestamp":1567458911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11634-015-0228-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,29]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["228"],"URL":"https:\/\/doi.org\/10.1007\/s11634-015-0228-4","relation":{},"ISSN":["1862-5347","1862-5355"],"issn-type":[{"value":"1862-5347","type":"print"},{"value":"1862-5355","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,29]]}}}