Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User access path prediction method

A technology of access paths and prediction methods, applied in special data processing applications, instruments, website content management, etc., can solve problems such as the exponential increase in the number of codes and the long length of binary position codes.

Inactive Publication Date: 2018-06-12
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The PLWAP algorithm based on frequent path mining compresses the data in a tree, but uses binary to encode the position of the nodes in the tree. When the amount of data is too large, the length of the binary position encoding will become unimaginably long, and the encoding The number will also show the defect that the exponential trend of 2 will increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User access path prediction method
  • User access path prediction method
  • User access path prediction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Now do data preprocessing on a certain log file to get the user's access sequence set, as shown in the second column of Table 1, here specify the minimum support threshold λ=0.75, where a, b, c, d, e, f Represents the pages requested by the user, and the access sequence from left to right represents the sequence of pages requested by the user in chronological order.

[0045] Table 1 User Access Sequence Set with λ=0.75

[0046]

[0047] First, get the frequent access sequence set: scan the access sequence set, and count the number of occurrences of each access page in the access sequence set, such as image 3 shown on the left. Since the minimum support threshold λ=0.75, only when the number of times is greater than or equal to the minimum support threshold * the number of access sequence sets (4*0.75, that is, 3) can be regarded as frequent items (or frequent access pages), delete non- Frequent items, to obtain frequently accessed sequence sets, such as image 3 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of computer software, and discloses a user access path prediction method. The method is used for better predicting user access paths. According to the method, firstly, a user access sequence set is constructed from a log file, and then on the sequence set, an improved PLWAP algorithm is used for conducting frequent path mining to obtain frequent access paths; therefore, a page which a user accesses in the next step is predicted, and suggestions are provided for page recommendation and website topology structure adjustment. The method is suitable for user access path prediction.

Description

technical field [0001] The invention relates to the field of computer software, in particular to a user access path prediction method. Background technique [0002] The sequence of page clicks that a user generates while on a website is called a user access path. Frequent pattern mining is performed on each user's access path to predict user behavior. For website structure optimization and web page recommendation, WEB mining is to perform data mining on the log data generated by the server to find out useful patterns. [0003] The PLWAP algorithm based on frequent path mining compresses the data in a tree, but uses binary to encode the position of the nodes in the tree. When the amount of data is too large, the length of the binary position encoding will become unimaginably long, and the encoding The number of will also show the defect that the exponential trend of 2 will increase. Contents of the invention [0004] The technical problem to be solved by the present inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/2246G06F16/2465G06F16/972
Inventor 刘明鸣胡涛
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products