CN102122291A - Blog friend recommendation method based on tree log pattern analysis - Google Patents
Blog friend recommendation method based on tree log pattern analysis Download PDFInfo
- Publication number
- CN102122291A CN102122291A CN2011100204787A CN201110020478A CN102122291A CN 102122291 A CN102122291 A CN 102122291A CN 2011100204787 A CN2011100204787 A CN 2011100204787A CN 201110020478 A CN201110020478 A CN 201110020478A CN 102122291 A CN102122291 A CN 102122291A
- Authority
- CN
- China
- Prior art keywords
- blog
- tree
- node
- subtree
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000004458 analytical method Methods 0.000 title abstract description 5
- 238000004804 winding Methods 0.000 claims description 10
- 101100391272 Neosartorya fumigata (strain ATCC MYA-4609 / Af293 / CBS 101355 / FGSC A1100) freB gene Proteins 0.000 claims description 6
- 238000012163 sequencing technique Methods 0.000 claims description 6
- 230000015572 biosynthetic process Effects 0.000 claims description 5
- 238000009412 basement excavation Methods 0.000 claims description 3
- 230000002123 temporal effect Effects 0.000 claims description 3
- 230000008859 change Effects 0.000 claims description 2
- 238000000605 extraction Methods 0.000 claims description 2
- 238000005065 mining Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 abstract description 5
- 230000008569 process Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a blog friend recommendation method based on tree log pattern analysis. An offline digging method is adopted, a server log is analyzed to extract the access record of a visitor on a blog page; an access log tree which takes a blog to be recommended as a root is further constructed by the technologies of grouping, sorting, loop-back removal and the like; the constructed access log tree is frequently dug to find a frequent subtree conforming to a preset requirement; nodes in the frequent subtree serves as candidate blog friends; a recommendation degree is calculated according to the set formula; and friends with highest scores are recommended. An algorithm in the method is different from the traditional algorithm based on frequent item digging or frequent sequence digging; a frequent tree structure digging method is adopted for fully digging aiming at the specific parallel link relationship and indirect access characteristic of the blogosphere; and potential access contact among blogs is extracted and is recommended to an access user, thereby improving user experience. The blog friend recommendation method is an efficient and practical blog recommendation method.
Description
Technical field
The present invention relates to the data analysis technique of blog server daily record and the digging technology of frequent access pattern, particularly relate to a kind of blog intimate recommend method of analyzing based on tree-like logging mode.
Background technology
Along with the continuous development of Internet technology, blog has been not only the platform of a simple issue individual article, information, increased various types of as interaction functions such as message, concern, good friends after, can form a blog circle gradually between the user.Comprise good friend, potential good friend (not adding the blog of buddy list or good friend's good friend as yet) and like-minded other blogs or the like in the blog circle.In the so typical web2.0 of blog used, setting up like-minded user's social relationships was decision systems key of success, had therefore become the main functionality of blog system towards the friend recommendation of blog.The blog intimate exemplary application is by the visit behavior of user to blog, finds potential relevance between blog user, and try the suggestion blog according to relevance will with might its crowd be converted into the good friend and concern with common interest.
The blog circle is a kind of tree-like or graphic structure of complexity, has had some friend recommendation systems towards blog at present.They generally do recommendation based on the good friend's relation set up between blog and the visit capacity of server record, these recommend methods excavate based on frequent-item or frequent sequence, have the following disadvantages and shortcoming: 1) do not consider distinctive parallel linking relationship and dereference characteristic between blog; 2) do not consider logical relation between blog page that the sequencing of user to access pages hides; 3) do not take into full account the hierarchical relationship and the depth relationship of website organizational structure.
Summary of the invention
Abundant user behavior information and the page organizational information that daily record is implied at blog server, the object of the present invention is to provide a kind of blog intimate recommend method of analyzing based on tree-like logging mode, at the blog daily record, based on the blog recommend method of tree structure excavation.
The technical scheme that the present invention solves its technical matters employing is:
The step that this method adopts is as follows:
1) resolves original log, extract effective information, in database, create conversational list, be used for the access path of recording user;
2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root;
3) the access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement;
4) the node in the frequent subtree as candidate's blog intimate, calculate by the formula degree of setting of recommendation, get the highest several of score value and recommend.
2, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: resolve original log in the described step 1), extract effective information, be exactly with the daily record in the daily record resolver extraction server, obtain the Visitor Logs in the timeslice, remove the redundant information in user's request, change into visit tlv triple<visitor, access time, accesses blog〉deposit in the conversational list, the selection of timeslice size is according to the performance of the computing machine of blog visit capacity and operation mining algorithm, the visitor is the registered user's, with user by name " visitor's " sign, the visitor is an anonymous, is the sign of " visitor " with User IP.
3, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: described step 2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, access log according to the user, remove winding, structure is the access log tree of root with blog to be recommended, be exactly institutional framework information according to the website, at blog to be recommended, in conversational list, find out the time that the user that visited this blog and user visit this blog for the first time, search the visitor who obtains at each, extract the record of searching other blog that the visitor that obtains visits after visit blog to be recommended; The tree structure maker is a unit structure access log tree with each visitor, the corresponding node of each blog of Accessor Access, each node comprises the visit triplet information, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, delete limit at the latest on the access time, the access log tree of generation has three characteristics: the first, the access log tree has identical root node, is blog to be recommended; The second, there is not the identical brotgher of node of label in all access log trees; The 3rd, the access log tree is unordered, and promptly the child node of each node is unordered.
4, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: in the described step 3) access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement, exactly all access log trees are designated as t1 respectively, t2 ... tn selects suitable minimum support minsup (0,1), excavate with frequent subtree delver, concrete steps are as follows:
The first step, traversal t1, t2 ... tn is classified as same node point to " accesses blog " identical node in " visit tlv triple ", adds up the number of times fre1 that every kind of node occurs in access log tree, for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second the step, EQ1 is done expansion, node among two EQ1 is done attended operation, constitute set membership, formation comprises the tree of 2 nodes, as candidate's subtree, count the occurrence number fre2 of candidate's subtree in all-access daily record tree, for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2;
The 3rd the step, from EQ2, right wing footpath for every tree, do and enumerate expansion, node of each expansion is found out all possible candidate's subtree, counts occurrence number frei〉tree of minsup*n, be designated as new frequent subtree EQi, do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the candidate's subtree that does not meet.
5, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: the node in the frequent subtree that in the described step 4) excavation is obtained is as candidate's blog intimate, calculate by the formula degree of setting of recommendation, getting the highest several of score value recommends, be exactly greater than 3 frequent subtree to the node number, fre sorts from big to small according to occurrence frequency, take out every frequent subtree successively, be done as follows: according to breadth first traversal, from the tree the 2nd layer, calculate the recommendation degree R of each node, formula is as follows:
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0; W
kBe every layer weight parameter, be defaulted as 1; B
kBe every layer number of branches, brotgher of node number under the promptly same father node; After calculating the recommendation degree of all both candidate nodes, as required, select the highest plurality of nodes of score value, get the blog of node correspondence and recommend as blog intimate.
The beneficial effect that the present invention has is:
To the visit behavior of blog and the design feature of blog website,,, excavate the frequent access pattern of tree structure according to the visitor at the access log of server in conjunction with existing data mining technology.The service provider of blog for the user recommends blog intimate, improves user experience according to the visit behavior of the frequent access model study analysis user of excavating; Simultaneously also can assist the web site architecture teacher to organize web site architecture better, improve the rate of people logging in of user blog.
Description of drawings
Fig. 1 is based on the overall construction drawing of the blog intimate recommend method of tree-like logging mode analysis.
Fig. 2 is access session and index thereof.
Fig. 3 is the access log tree that the session according to visitor1 among Fig. 2 constructs.
Fig. 4 is the synoptic diagram of frequent subtree method for digging.
Fig. 5 is the synoptic diagram of recommendation degree computing method.
Embodiment
The invention will be further described below in conjunction with instantiation and accompanying drawing.
By blog log analysis method provided by the present invention, can be quick, extract the frequent access pattern effectively, by intelligentized screening process potential blog intimate is recommended calling party, overall construction drawing as shown in Figure 1, concrete implementation step is as follows:
1) the daily record resolver among Fig. 1 is resolved the server log in the time period, the deletion redundant information, make up visit tlv triple<visitor, access time, accesses blog〉(triple<visitor, access_time, blog_url 〉), with the Apache Server daily record is example, and detailed process is as follows:
The daily record that is recorded in the Apache Server can be expressed as following form:
117.24.255.86?-?-?[01/Jul/2010:18:01:25?+0800]?"GET
http://B.blog.163.com?HTTP/1.0"?200?1231
"117.24.255.230.1277794615926482"?46807?"Mozilla/4.0?(compatible;?MSIE?6.0;?Windows?NT?5.1;?SV1;?.NET?CLR?2.0.50727;?.NET?CLR?3.0.04506.30)"
It is that the anonymous of 117.24.255.86 has been visited page http://A.blog.163.com in 01/Jul/2010:18:01:25+0800 time that this log record has provided IP.
So, can make up visit tlv triple<117.24.255.86 successively, 2010-7-1 18:01:25, blogA 〉, be the registered user for the visitor, with the sign of registration ID as visitor; For anonymous, as differentiation, create an interim ID with IP; For the page of visit, for the ease of next step processing, can the url address of the page be simplified in conjunction with the institutional framework information of website, as http://A.blog.163.com being reduced to blogA here, both must be corresponding one by one.
2) at blog to be recommended, the tree structure maker among Fig. 1 is found out the user of visit blog to be recommended excessively in database, and the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root, and concrete steps are as follows:
The first step, institutional framework information according to the website, at certain blog blogA to be recommended, the packet sequencing module of tree structure maker finds out the all-access (SQL query: select visitor, distinct access_time from triple where access_url=blogA) of spending the time that the user of blogA and this user visit blogA for the first time in conversational list.Suppose that the time that user visitor0 visits blogA for the first time is access_time0, search the page of all access times after access_time0 of user visitor0, the user that each inquiry is obtained does same operation (SQL query: select visitor, access_time, access_url from triple where visitor=visitor0 and access_time〉access_time0, through above operation, can obtain user session information as shown in Figure 2
Second step to the record that inquiry obtains, was a unit structure access log tree with visitor, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, the winding module of going in the tree structure maker is eliminated winding by deletion time that limit at the latest of swinging fore-upward, and the access log tree that produces according to the session of visitor1 among Fig. 2 as shown in Figure 3.The access log tree that produces has three characteristics: the first, and all access log trees have identical root node, are blog to be recommended; The second, there is not the identical node of label in all access log trees; The 3rd, the access log tree is unordered, does not promptly consider the sequencing between the brotgher of node.
3) frequent subtree delver shown in Figure 1 access log tree that previous step is constructed is cooked frequent recurrence unordered tree and excavates, find out the frequent subtree that meets preset requirement, concrete steps are as follows: the tree structure maker is respectively t1 to the access log tree numbering that previous step obtains, t2 ... tn.
The first step: the candidate's subtree generation module in the tree structure maker travels through all access log trees, " accesses blog " identical node in " visit tlv triple " is classified as same node point, position that every kind of node of subtree frequency statistics module statistics occurs in the access log tree and the total fre1(frequency that contains the tree of this kind node), for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second step: the node among the EQ1 is done attended operation in twos, constitute set membership,, count the number of times fre2 that candidate's frequent subtree occurs in all daily records as candidate's frequent subtree, concrete steps as shown in Figure 4, node A and Node B all belong to EQ1, and to A, B does attended operation, A is the father node of B, the last new position (in Fig. 4 be B node) of node in elite tree of adding of record simultaneously is for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2.
The 3rd step: from EQ2,, do and enumerate expansion, expand a node at every turn, find out all possible candidate's subtree, count occurrence number frei for the right wing footpath of every tree〉tree of minsup*n, be designated as new frequent subtree EQi.As shown in Figure 4, at first done the expansion in right wing footpath, expanded a new Node B, also can do expansion, but once can only expand a node original B node for node A.So do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the frequent subtree of the candidate who does not meet.Excavate in the process of tree, record for the ease of tree, adopted string encoding to tree, for example tree t1 is encoded to ABC-1BD-1E-1-1B among Fig. 4, the character code of t2 is ABC-1DE-1-1-1B, and coding inserts one-1 according to the depth-first traversal order when going back at every turn, according to this method, tree and string encoding are one to one.
4) excavate all frequent subtrees after, both candidate nodes recommended device shown in Figure 1 sorts from big to small according to the occurrence frequency fre of frequent subtree, taking out every frequent subtree successively is done as follows: according to the breadth first traversal order, from the tree the 2nd layer, node recommendation degree computing module calculates the recommendation degree R of each node, and formula is as follows:
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0;
Be every layer weight parameter, be defaulted as 1;
Be every layer number of branches, brotgher of node number under the promptly same father node.
As shown in Figure 5, excavated frequent subtree ABC-1D-1-1B(string encoding), this tree is at t1, all occur among the t2, so frequency fre is 100%, calculate the recommendation degree R of this candidate's subtree, step is as follows: for an A, at the 1st layer that sets, so skip over, for the Node B of the second layer, if do not have the direct link of A in the website structure to B, then T is 0, so R
B=0; If have the direct link of A, T=1, then R in the website structure to B
B=1*1*1/2=0.5.For node C, if the direct link that do not exist Node B to arrive node C, T=0 then, thereby R
C=0; If exist, then T=1, then R
C=1*1*(1/2) (1/3)=0.167.The situation of node D is identical with C.
After calculating the recommendation degree of all both candidate nodes, as required, select the blog of the highest plurality of nodes correspondence of score value and recommend as blog intimate.Press the node that Fig. 5 calculates, if all there is directly link, according to calculating, the B node, the recommendation degree of E node all is 0.5, so the blog of these two node correspondences is at first recommended as blog intimate, the recommendation degree of node C and node D is 0.167, if desired, the blog of their correspondences is further recommended as the blog intimate quilt.
Claims (5)
1. blog intimate recommend method of analyzing based on tree-like logging mode is characterized in that the step that this method adopts is as follows:
1) resolves original log, extract effective information, in database, create conversational list, be used for the access path of recording user;
2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root;
3) the access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement;
4) the node in the frequent subtree as candidate's blog intimate, calculate by the formula degree of setting of recommendation, get the highest several of score value and recommend.
2. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: resolve original log in the described step 1), extract effective information, be exactly with the daily record in the daily record resolver extraction server, obtain the Visitor Logs in the timeslice, remove the redundant information in user's request, change into visit tlv triple<visitor, access time, accesses blog〉deposit in the conversational list, the selection of timeslice size is according to the performance of the computing machine of blog visit capacity and operation mining algorithm, the visitor is the registered user's, with user by name " visitor's " sign, the visitor is an anonymous, is the sign of " visitor " with User IP.
3. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: described step 2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, access log according to the user, remove winding, structure is the access log tree of root with blog to be recommended, be exactly institutional framework information according to the website, at blog to be recommended, in conversational list, find out the time that the user that visited this blog and user visit this blog for the first time, search the visitor who obtains at each, extract the record of searching other blog that the visitor that obtains visits after visit blog to be recommended; The tree structure maker is a unit structure access log tree with each visitor, the corresponding node of each blog of Accessor Access, each node comprises the visit triplet information, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, delete limit at the latest on the access time, the access log tree of generation has three characteristics: the first, the access log tree has identical root node, is blog to be recommended; The second, there is not the identical brotgher of node of label in all access log trees; The 3rd, the access log tree is unordered, and promptly the child node of each node is unordered.
4. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: in the described step 3) access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement, exactly all access log trees are designated as t1 respectively, t2 ... tn selects suitable minimum support minsup (0,1), excavate with frequent subtree delver, concrete steps are as follows:
The first step, traversal t1, t2 ... tn is classified as same node point to " accesses blog " identical node in " visit tlv triple ", adds up the number of times fre1 that every kind of node occurs in access log tree, for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second the step, EQ1 is done expansion, node among two EQ1 is done attended operation, constitute set membership, formation comprises the tree of 2 nodes, as candidate's subtree, count the occurrence number fre2 of candidate's subtree in all-access daily record tree, for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2;
The 3rd the step, from EQ2, right wing footpath for every tree, do and enumerate expansion, node of each expansion is found out all possible candidate's subtree, counts occurrence number frei〉tree of minsup*n, be designated as new frequent subtree EQi, do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the candidate's subtree that does not meet.
5. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: the node in the frequent subtree that in the described step 4) excavation is obtained is as candidate's blog intimate, calculate by the formula degree of setting of recommendation, getting the highest several of score value recommends, be exactly greater than 3 frequent subtree to the node number, fre sorts from big to small according to occurrence frequency, take out every frequent subtree successively, be done as follows: according to breadth first traversal, from the tree the 2nd layer, calculate the recommendation degree R of each node, formula is as follows:
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0; W
kBe every layer weight parameter, be defaulted as 1; B
kBe every layer number of branches, brotgher of node number under the promptly same father node; After calculating the recommendation degree of all both candidate nodes, as required, select the highest plurality of nodes of score value, get the blog of node correspondence and recommend as blog intimate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100204787A CN102122291A (en) | 2011-01-18 | 2011-01-18 | Blog friend recommendation method based on tree log pattern analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100204787A CN102122291A (en) | 2011-01-18 | 2011-01-18 | Blog friend recommendation method based on tree log pattern analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102122291A true CN102122291A (en) | 2011-07-13 |
Family
ID=44250851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100204787A Pending CN102122291A (en) | 2011-01-18 | 2011-01-18 | Blog friend recommendation method based on tree log pattern analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102122291A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102646122A (en) * | 2012-02-21 | 2012-08-22 | 北京航空航天大学 | Automatic building method of academic social network |
WO2013034018A1 (en) * | 2011-09-09 | 2013-03-14 | 腾讯科技(深圳)有限公司 | Classification-based internet information push method and device, and computer storage medium |
CN103488683A (en) * | 2013-08-21 | 2014-01-01 | 北京航空航天大学 | Microblog data management system and implementation method thereof |
CN104252453A (en) * | 2013-06-25 | 2014-12-31 | 腾讯科技(深圳)有限公司 | Detection method and system for write operation in webpage recommendation location content access track |
CN104468488A (en) * | 2013-09-17 | 2015-03-25 | 北京千橡网景科技发展有限公司 | Recommendation method and device for anonymous user |
CN104702488A (en) * | 2013-12-10 | 2015-06-10 | 上海由你网络科技有限公司 | System and method for recommending friends |
CN106446161A (en) * | 2016-09-23 | 2017-02-22 | 中山大学 | Maximum frequent subgraph mining method adopting Hadoop |
CN106776622A (en) * | 2015-11-20 | 2017-05-31 | 北京国双科技有限公司 | The querying method and device of access log |
WO2017101652A1 (en) * | 2015-12-17 | 2017-06-22 | 北京国双科技有限公司 | Method and apparatus for determining an access path between website pages |
CN106897297A (en) * | 2015-12-17 | 2017-06-27 | 北京国双科技有限公司 | The determination method and device of access path between the column of website |
CN107256253A (en) * | 2017-06-09 | 2017-10-17 | 郑州云海信息技术有限公司 | A kind of system and method that web access module excavations are carried out based on XML |
CN108200084A (en) * | 2018-01-31 | 2018-06-22 | 湖北工业大学 | A kind of network security daily record based on grey wolf algorithm determines method and system |
WO2019042163A1 (en) * | 2017-09-01 | 2019-03-07 | 广东神马搜索科技有限公司 | Page information suggestion method, device, computing apparatus, and storage medium |
CN109446194A (en) * | 2018-08-21 | 2019-03-08 | 中国平安人寿保险股份有限公司 | Find method, apparatus, computer equipment and the storage medium of preparation supervisor |
CN109918576A (en) * | 2019-01-09 | 2019-06-21 | 常熟理工学院 | A kind of microblogging concern recommended method based on joint probability matrix decomposition |
CN109947892A (en) * | 2017-12-04 | 2019-06-28 | 阿里巴巴集团控股有限公司 | Analysis path determines method and system, interface, log tree constructing method |
CN110069463A (en) * | 2019-03-12 | 2019-07-30 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
CN111190873A (en) * | 2019-12-24 | 2020-05-22 | 同济大学 | Log mode extraction method and system for log training of cloud native system |
CN114003202A (en) * | 2021-05-28 | 2022-02-01 | 广东安证计算机司法鉴定所 | Member level construction method and device, computer equipment and storage medium |
-
2011
- 2011-01-18 CN CN2011100204787A patent/CN102122291A/en active Pending
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013034018A1 (en) * | 2011-09-09 | 2013-03-14 | 腾讯科技(深圳)有限公司 | Classification-based internet information push method and device, and computer storage medium |
CN102646122B (en) * | 2012-02-21 | 2014-01-22 | 北京航空航天大学 | Automatic building method of academic social network |
CN102646122A (en) * | 2012-02-21 | 2012-08-22 | 北京航空航天大学 | Automatic building method of academic social network |
CN104252453A (en) * | 2013-06-25 | 2014-12-31 | 腾讯科技(深圳)有限公司 | Detection method and system for write operation in webpage recommendation location content access track |
CN104252453B (en) * | 2013-06-25 | 2018-09-28 | 腾讯科技(深圳)有限公司 | The detection method and system of webpage recommending position access to content track write operation |
CN103488683B (en) * | 2013-08-21 | 2017-05-10 | 北京航空航天大学 | Microblog data management system and implementation method thereof |
CN103488683A (en) * | 2013-08-21 | 2014-01-01 | 北京航空航天大学 | Microblog data management system and implementation method thereof |
CN104468488A (en) * | 2013-09-17 | 2015-03-25 | 北京千橡网景科技发展有限公司 | Recommendation method and device for anonymous user |
CN104702488A (en) * | 2013-12-10 | 2015-06-10 | 上海由你网络科技有限公司 | System and method for recommending friends |
CN104702488B (en) * | 2013-12-10 | 2019-03-05 | 上海掌门科技有限公司 | Friend recommendation system and method |
CN106776622A (en) * | 2015-11-20 | 2017-05-31 | 北京国双科技有限公司 | The querying method and device of access log |
CN106776622B (en) * | 2015-11-20 | 2020-03-03 | 北京国双科技有限公司 | Query method and device for access log |
CN106897196A (en) * | 2015-12-17 | 2017-06-27 | 北京国双科技有限公司 | The determination method and device of access path between Website page |
CN106897297A (en) * | 2015-12-17 | 2017-06-27 | 北京国双科技有限公司 | The determination method and device of access path between the column of website |
WO2017101652A1 (en) * | 2015-12-17 | 2017-06-22 | 北京国双科技有限公司 | Method and apparatus for determining an access path between website pages |
CN106897196B (en) * | 2015-12-17 | 2019-10-25 | 北京国双科技有限公司 | The determination method and device of access path between Website page |
CN106446161B (en) * | 2016-09-23 | 2019-10-01 | 中山大学 | A kind of very big Frequent tree mining method for digging using Hadoop |
CN106446161A (en) * | 2016-09-23 | 2017-02-22 | 中山大学 | Maximum frequent subgraph mining method adopting Hadoop |
CN107256253A (en) * | 2017-06-09 | 2017-10-17 | 郑州云海信息技术有限公司 | A kind of system and method that web access module excavations are carried out based on XML |
WO2019042163A1 (en) * | 2017-09-01 | 2019-03-07 | 广东神马搜索科技有限公司 | Page information suggestion method, device, computing apparatus, and storage medium |
CN109947892B (en) * | 2017-12-04 | 2023-01-06 | 阿里巴巴集团控股有限公司 | Analysis path determination method and system, interface and log tree construction method |
CN109947892A (en) * | 2017-12-04 | 2019-06-28 | 阿里巴巴集团控股有限公司 | Analysis path determines method and system, interface, log tree constructing method |
CN108200084A (en) * | 2018-01-31 | 2018-06-22 | 湖北工业大学 | A kind of network security daily record based on grey wolf algorithm determines method and system |
CN109446194A (en) * | 2018-08-21 | 2019-03-08 | 中国平安人寿保险股份有限公司 | Find method, apparatus, computer equipment and the storage medium of preparation supervisor |
CN109918576A (en) * | 2019-01-09 | 2019-06-21 | 常熟理工学院 | A kind of microblogging concern recommended method based on joint probability matrix decomposition |
CN109918576B (en) * | 2019-01-09 | 2021-01-05 | 常熟理工学院 | Microblog attention recommendation method based on joint probability matrix decomposition |
CN110069463A (en) * | 2019-03-12 | 2019-07-30 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
CN110069463B (en) * | 2019-03-12 | 2021-07-16 | 北京奇艺世纪科技有限公司 | User behavior processing method, device electronic equipment and storage medium |
CN111190873A (en) * | 2019-12-24 | 2020-05-22 | 同济大学 | Log mode extraction method and system for log training of cloud native system |
CN111190873B (en) * | 2019-12-24 | 2022-08-16 | 同济大学 | Log mode extraction method and system for log training of cloud native system |
CN114003202A (en) * | 2021-05-28 | 2022-02-01 | 广东安证计算机司法鉴定所 | Member level construction method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102122291A (en) | Blog friend recommendation method based on tree log pattern analysis | |
CN105808696B (en) | It is a kind of based on global and local feature across line social network user matching process | |
CN104166668B (en) | News commending system and method based on FOLFM models | |
CN101266610B (en) | Web active user website accessing mode on-line excavation method | |
CN106934014B (en) | Hadoop-based network data mining and analyzing platform and method thereof | |
CN111782965A (en) | Intention recommendation method, device, equipment and storage medium | |
CN103023714B (en) | The liveness of topic Network Based and cluster topology analytical system and method | |
CN106815307A (en) | Public Culture knowledge mapping platform and its use method | |
CN104063448B (en) | Distributed type microblog data capturing system related to field of videos | |
CN107437026B (en) | Malicious webpage advertisement detection method based on advertisement network topology | |
CN104216889B (en) | Data dissemination analyzing and predicting method and system based on cloud service | |
CN104268148A (en) | Forum page information auto-extraction method and system based on time strings | |
CN104133868B (en) | A kind of strategy integrated for the classification of vertical reptile data | |
Ying et al. | Semantic trajectory-based high utility item recommendation system | |
CN102760151A (en) | Implementation method of open source software acquisition and searching system | |
CN109408578A (en) | One kind being directed to isomerous environment monitoring data fusion method | |
CN113254630A (en) | Domain knowledge map recommendation method for global comprehensive observation results | |
JP2021192237A (en) | Related score calculation system, method and program | |
CN106844553A (en) | Data snooping and extending method and device based on sample data | |
CN103440328B (en) | A kind of user classification method based on mouse behavior | |
CN108446333A (en) | A kind of big data text mining processing system and its method | |
CN105389330A (en) | Cross-community matched correlation method for open source resources | |
CN104199947A (en) | Important person speech supervision and incidence relation excavating method | |
Dua et al. | Discovery of Web frequent patterns and user characteristics from Web access logs: a framework for dynamic Web personalization | |
CN111107493B (en) | Method and system for predicting position of mobile user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110713 |