CN102122291A - Blog friend recommendation method based on tree log pattern analysis - Google Patents

Blog friend recommendation method based on tree log pattern analysis Download PDF

Info

Publication number
CN102122291A
CN102122291A CN2011100204787A CN201110020478A CN102122291A CN 102122291 A CN102122291 A CN 102122291A CN 2011100204787 A CN2011100204787 A CN 2011100204787A CN 201110020478 A CN201110020478 A CN 201110020478A CN 102122291 A CN102122291 A CN 102122291A
Authority
CN
China
Prior art keywords
blog
tree
node
subtree
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100204787A
Other languages
Chinese (zh)
Inventor
陈刚
胡天磊
寿黎但
陈珂
周健
贝毅君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN2011100204787A priority Critical patent/CN102122291A/en
Publication of CN102122291A publication Critical patent/CN102122291A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a blog friend recommendation method based on tree log pattern analysis. An offline digging method is adopted, a server log is analyzed to extract the access record of a visitor on a blog page; an access log tree which takes a blog to be recommended as a root is further constructed by the technologies of grouping, sorting, loop-back removal and the like; the constructed access log tree is frequently dug to find a frequent subtree conforming to a preset requirement; nodes in the frequent subtree serves as candidate blog friends; a recommendation degree is calculated according to the set formula; and friends with highest scores are recommended. An algorithm in the method is different from the traditional algorithm based on frequent item digging or frequent sequence digging; a frequent tree structure digging method is adopted for fully digging aiming at the specific parallel link relationship and indirect access characteristic of the blogosphere; and potential access contact among blogs is extracted and is recommended to an access user, thereby improving user experience. The blog friend recommendation method is an efficient and practical blog recommendation method.

Description

A kind of blog intimate recommend method of analyzing based on tree-like logging mode
Technical field
The present invention relates to the data analysis technique of blog server daily record and the digging technology of frequent access pattern, particularly relate to a kind of blog intimate recommend method of analyzing based on tree-like logging mode.
Background technology
Along with the continuous development of Internet technology, blog has been not only the platform of a simple issue individual article, information, increased various types of as interaction functions such as message, concern, good friends after, can form a blog circle gradually between the user.Comprise good friend, potential good friend (not adding the blog of buddy list or good friend's good friend as yet) and like-minded other blogs or the like in the blog circle.In the so typical web2.0 of blog used, setting up like-minded user's social relationships was decision systems key of success, had therefore become the main functionality of blog system towards the friend recommendation of blog.The blog intimate exemplary application is by the visit behavior of user to blog, finds potential relevance between blog user, and try the suggestion blog according to relevance will with might its crowd be converted into the good friend and concern with common interest.
The blog circle is a kind of tree-like or graphic structure of complexity, has had some friend recommendation systems towards blog at present.They generally do recommendation based on the good friend's relation set up between blog and the visit capacity of server record, these recommend methods excavate based on frequent-item or frequent sequence, have the following disadvantages and shortcoming: 1) do not consider distinctive parallel linking relationship and dereference characteristic between blog; 2) do not consider logical relation between blog page that the sequencing of user to access pages hides; 3) do not take into full account the hierarchical relationship and the depth relationship of website organizational structure.
Summary of the invention
Abundant user behavior information and the page organizational information that daily record is implied at blog server, the object of the present invention is to provide a kind of blog intimate recommend method of analyzing based on tree-like logging mode, at the blog daily record, based on the blog recommend method of tree structure excavation.
The technical scheme that the present invention solves its technical matters employing is:
The step that this method adopts is as follows:
1) resolves original log, extract effective information, in database, create conversational list, be used for the access path of recording user;
2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root;
3) the access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement;
4) the node in the frequent subtree as candidate's blog intimate, calculate by the formula degree of setting of recommendation, get the highest several of score value and recommend.
2, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: resolve original log in the described step 1), extract effective information, be exactly with the daily record in the daily record resolver extraction server, obtain the Visitor Logs in the timeslice, remove the redundant information in user's request, change into visit tlv triple<visitor, access time, accesses blog〉deposit in the conversational list, the selection of timeslice size is according to the performance of the computing machine of blog visit capacity and operation mining algorithm, the visitor is the registered user's, with user by name " visitor's " sign, the visitor is an anonymous, is the sign of " visitor " with User IP.
3, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: described step 2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, access log according to the user, remove winding, structure is the access log tree of root with blog to be recommended, be exactly institutional framework information according to the website, at blog to be recommended, in conversational list, find out the time that the user that visited this blog and user visit this blog for the first time, search the visitor who obtains at each, extract the record of searching other blog that the visitor that obtains visits after visit blog to be recommended; The tree structure maker is a unit structure access log tree with each visitor, the corresponding node of each blog of Accessor Access, each node comprises the visit triplet information, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, delete limit at the latest on the access time, the access log tree of generation has three characteristics: the first, the access log tree has identical root node, is blog to be recommended; The second, there is not the identical brotgher of node of label in all access log trees; The 3rd, the access log tree is unordered, and promptly the child node of each node is unordered.
4, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: in the described step 3) access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement, exactly all access log trees are designated as t1 respectively, t2 ... tn selects suitable minimum support minsup (0,1), excavate with frequent subtree delver, concrete steps are as follows:
The first step, traversal t1, t2 ... tn is classified as same node point to " accesses blog " identical node in " visit tlv triple ", adds up the number of times fre1 that every kind of node occurs in access log tree, for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second the step, EQ1 is done expansion, node among two EQ1 is done attended operation, constitute set membership, formation comprises the tree of 2 nodes, as candidate's subtree, count the occurrence number fre2 of candidate's subtree in all-access daily record tree, for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2;
The 3rd the step, from EQ2, right wing footpath for every tree, do and enumerate expansion, node of each expansion is found out all possible candidate's subtree, counts occurrence number frei〉tree of minsup*n, be designated as new frequent subtree EQi, do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the candidate's subtree that does not meet.
5, a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: the node in the frequent subtree that in the described step 4) excavation is obtained is as candidate's blog intimate, calculate by the formula degree of setting of recommendation, getting the highest several of score value recommends, be exactly greater than 3 frequent subtree to the node number, fre sorts from big to small according to occurrence frequency, take out every frequent subtree successively, be done as follows: according to breadth first traversal, from the tree the 2nd layer, calculate the recommendation degree R of each node, formula is as follows:
Figure 2011100204787100002DEST_PATH_IMAGE001
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0; W kBe every layer weight parameter, be defaulted as 1; B kBe every layer number of branches, brotgher of node number under the promptly same father node; After calculating the recommendation degree of all both candidate nodes, as required, select the highest plurality of nodes of score value, get the blog of node correspondence and recommend as blog intimate.
The beneficial effect that the present invention has is:
To the visit behavior of blog and the design feature of blog website,,, excavate the frequent access pattern of tree structure according to the visitor at the access log of server in conjunction with existing data mining technology.The service provider of blog for the user recommends blog intimate, improves user experience according to the visit behavior of the frequent access model study analysis user of excavating; Simultaneously also can assist the web site architecture teacher to organize web site architecture better, improve the rate of people logging in of user blog.
Description of drawings
Fig. 1 is based on the overall construction drawing of the blog intimate recommend method of tree-like logging mode analysis.
Fig. 2 is access session and index thereof.
Fig. 3 is the access log tree that the session according to visitor1 among Fig. 2 constructs.
Fig. 4 is the synoptic diagram of frequent subtree method for digging.
Fig. 5 is the synoptic diagram of recommendation degree computing method.
Embodiment
The invention will be further described below in conjunction with instantiation and accompanying drawing.
By blog log analysis method provided by the present invention, can be quick, extract the frequent access pattern effectively, by intelligentized screening process potential blog intimate is recommended calling party, overall construction drawing as shown in Figure 1, concrete implementation step is as follows:
1) the daily record resolver among Fig. 1 is resolved the server log in the time period, the deletion redundant information, make up visit tlv triple<visitor, access time, accesses blog〉(triple<visitor, access_time, blog_url 〉), with the Apache Server daily record is example, and detailed process is as follows:
The daily record that is recorded in the Apache Server can be expressed as following form:
117.24.255.86?-?-?[01/Jul/2010:18:01:25?+0800]?"GET
http://B.blog.163.com?HTTP/1.0"?200?1231
"117.24.255.230.1277794615926482"?46807?"Mozilla/4.0?(compatible;?MSIE?6.0;?Windows?NT?5.1;?SV1;?.NET?CLR?2.0.50727;?.NET?CLR?3.0.04506.30)"
It is that the anonymous of 117.24.255.86 has been visited page http://A.blog.163.com in 01/Jul/2010:18:01:25+0800 time that this log record has provided IP.
So, can make up visit tlv triple<117.24.255.86 successively, 2010-7-1 18:01:25, blogA 〉, be the registered user for the visitor, with the sign of registration ID as visitor; For anonymous, as differentiation, create an interim ID with IP; For the page of visit, for the ease of next step processing, can the url address of the page be simplified in conjunction with the institutional framework information of website, as http://A.blog.163.com being reduced to blogA here, both must be corresponding one by one.
2) at blog to be recommended, the tree structure maker among Fig. 1 is found out the user of visit blog to be recommended excessively in database, and the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root, and concrete steps are as follows:
The first step, institutional framework information according to the website, at certain blog blogA to be recommended, the packet sequencing module of tree structure maker finds out the all-access (SQL query: select visitor, distinct access_time from triple where access_url=blogA) of spending the time that the user of blogA and this user visit blogA for the first time in conversational list.Suppose that the time that user visitor0 visits blogA for the first time is access_time0, search the page of all access times after access_time0 of user visitor0, the user that each inquiry is obtained does same operation (SQL query: select visitor, access_time, access_url from triple where visitor=visitor0 and access_time〉access_time0, through above operation, can obtain user session information as shown in Figure 2
Second step to the record that inquiry obtains, was a unit structure access log tree with visitor, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, the winding module of going in the tree structure maker is eliminated winding by deletion time that limit at the latest of swinging fore-upward, and the access log tree that produces according to the session of visitor1 among Fig. 2 as shown in Figure 3.The access log tree that produces has three characteristics: the first, and all access log trees have identical root node, are blog to be recommended; The second, there is not the identical node of label in all access log trees; The 3rd, the access log tree is unordered, does not promptly consider the sequencing between the brotgher of node.
3) frequent subtree delver shown in Figure 1 access log tree that previous step is constructed is cooked frequent recurrence unordered tree and excavates, find out the frequent subtree that meets preset requirement, concrete steps are as follows: the tree structure maker is respectively t1 to the access log tree numbering that previous step obtains, t2 ... tn.
The first step: the candidate's subtree generation module in the tree structure maker travels through all access log trees, " accesses blog " identical node in " visit tlv triple " is classified as same node point, position that every kind of node of subtree frequency statistics module statistics occurs in the access log tree and the total fre1(frequency that contains the tree of this kind node), for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second step: the node among the EQ1 is done attended operation in twos, constitute set membership,, count the number of times fre2 that candidate's frequent subtree occurs in all daily records as candidate's frequent subtree, concrete steps as shown in Figure 4, node A and Node B all belong to EQ1, and to A, B does attended operation, A is the father node of B, the last new position (in Fig. 4 be B node) of node in elite tree of adding of record simultaneously is for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2.
The 3rd step: from EQ2,, do and enumerate expansion, expand a node at every turn, find out all possible candidate's subtree, count occurrence number frei for the right wing footpath of every tree〉tree of minsup*n, be designated as new frequent subtree EQi.As shown in Figure 4, at first done the expansion in right wing footpath, expanded a new Node B, also can do expansion, but once can only expand a node original B node for node A.So do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the frequent subtree of the candidate who does not meet.Excavate in the process of tree, record for the ease of tree, adopted string encoding to tree, for example tree t1 is encoded to ABC-1BD-1E-1-1B among Fig. 4, the character code of t2 is ABC-1DE-1-1-1B, and coding inserts one-1 according to the depth-first traversal order when going back at every turn, according to this method, tree and string encoding are one to one.
4) excavate all frequent subtrees after, both candidate nodes recommended device shown in Figure 1 sorts from big to small according to the occurrence frequency fre of frequent subtree, taking out every frequent subtree successively is done as follows: according to the breadth first traversal order, from the tree the 2nd layer, node recommendation degree computing module calculates the recommendation degree R of each node, and formula is as follows:
Figure 298397DEST_PATH_IMAGE001
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0; Be every layer weight parameter, be defaulted as 1;
Figure 561331DEST_PATH_IMAGE003
Be every layer number of branches, brotgher of node number under the promptly same father node.
As shown in Figure 5, excavated frequent subtree ABC-1D-1-1B(string encoding), this tree is at t1, all occur among the t2, so frequency fre is 100%, calculate the recommendation degree R of this candidate's subtree, step is as follows: for an A, at the 1st layer that sets, so skip over, for the Node B of the second layer, if do not have the direct link of A in the website structure to B, then T is 0, so R B=0; If have the direct link of A, T=1, then R in the website structure to B B=1*1*1/2=0.5.For node C, if the direct link that do not exist Node B to arrive node C, T=0 then, thereby R C=0; If exist, then T=1, then R C=1*1*(1/2) (1/3)=0.167.The situation of node D is identical with C.
After calculating the recommendation degree of all both candidate nodes, as required, select the blog of the highest plurality of nodes correspondence of score value and recommend as blog intimate.Press the node that Fig. 5 calculates, if all there is directly link, according to calculating, the B node, the recommendation degree of E node all is 0.5, so the blog of these two node correspondences is at first recommended as blog intimate, the recommendation degree of node C and node D is 0.167, if desired, the blog of their correspondences is further recommended as the blog intimate quilt.

Claims (5)

1. blog intimate recommend method of analyzing based on tree-like logging mode is characterized in that the step that this method adopts is as follows:
1) resolves original log, extract effective information, in database, create conversational list, be used for the access path of recording user;
2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, the access log according to the user removes winding, and making up with blog to be recommended is the access log tree of root;
3) the access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement;
4) the node in the frequent subtree as candidate's blog intimate, calculate by the formula degree of setting of recommendation, get the highest several of score value and recommend.
2. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: resolve original log in the described step 1), extract effective information, be exactly with the daily record in the daily record resolver extraction server, obtain the Visitor Logs in the timeslice, remove the redundant information in user's request, change into visit tlv triple<visitor, access time, accesses blog〉deposit in the conversational list, the selection of timeslice size is according to the performance of the computing machine of blog visit capacity and operation mining algorithm, the visitor is the registered user's, with user by name " visitor's " sign, the visitor is an anonymous, is the sign of " visitor " with User IP.
3. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: described step 2) at blog to be recommended, in database, find out the user of visit blog to be recommended excessively, access log according to the user, remove winding, structure is the access log tree of root with blog to be recommended, be exactly institutional framework information according to the website, at blog to be recommended, in conversational list, find out the time that the user that visited this blog and user visit this blog for the first time, search the visitor who obtains at each, extract the record of searching other blog that the visitor that obtains visits after visit blog to be recommended; The tree structure maker is a unit structure access log tree with each visitor, the corresponding node of each blog of Accessor Access, each node comprises the visit triplet information, and the formation of father and son's node relationships is according to the temporal sequencing of connected reference request; For the winding that produces, delete limit at the latest on the access time, the access log tree of generation has three characteristics: the first, the access log tree has identical root node, is blog to be recommended; The second, there is not the identical brotgher of node of label in all access log trees; The 3rd, the access log tree is unordered, and promptly the child node of each node is unordered.
4. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: in the described step 3) access log tree that constructs is cooked frequent recurrence unordered tree and excavate, find out the frequent subtree that meets preset requirement, exactly all access log trees are designated as t1 respectively, t2 ... tn selects suitable minimum support minsup (0,1), excavate with frequent subtree delver, concrete steps are as follows:
The first step, traversal t1, t2 ... tn is classified as same node point to " accesses blog " identical node in " visit tlv triple ", adds up the number of times fre1 that every kind of node occurs in access log tree, for fre1〉node of minsup*n, be designated as frequent subtree EQ1;
Second the step, EQ1 is done expansion, node among two EQ1 is done attended operation, constitute set membership, formation comprises the tree of 2 nodes, as candidate's subtree, count the occurrence number fre2 of candidate's subtree in all-access daily record tree, for fre2〉candidate's subtree of minsup*n, be designated as frequent subtree EQ2;
The 3rd the step, from EQ2, right wing footpath for every tree, do and enumerate expansion, node of each expansion is found out all possible candidate's subtree, counts occurrence number frei〉tree of minsup*n, be designated as new frequent subtree EQi, do similar recursive operation, constantly increase the interstitial content of the frequent subtree of excavating, till the candidate's subtree that does not meet.
5. a kind of blog intimate recommend method of analyzing based on tree-like logging mode according to claim 1, it is characterized in that: the node in the frequent subtree that in the described step 4) excavation is obtained is as candidate's blog intimate, calculate by the formula degree of setting of recommendation, getting the highest several of score value recommends, be exactly greater than 3 frequent subtree to the node number, fre sorts from big to small according to occurrence frequency, take out every frequent subtree successively, be done as follows: according to breadth first traversal, from the tree the 2nd layer, calculate the recommendation degree R of each node, formula is as follows:
Figure 2011100204787100001DEST_PATH_IMAGE002
Parameter declaration: fre is the frequency of frequent subtree; T represents whether there is direct page link, exists, and then T is 1, does not exist, and then T is 0; D is the degree of depth of this node, and the root node degree of depth is designated as 0; W kBe every layer weight parameter, be defaulted as 1; B kBe every layer number of branches, brotgher of node number under the promptly same father node; After calculating the recommendation degree of all both candidate nodes, as required, select the highest plurality of nodes of score value, get the blog of node correspondence and recommend as blog intimate.
CN2011100204787A 2011-01-18 2011-01-18 Blog friend recommendation method based on tree log pattern analysis Pending CN102122291A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100204787A CN102122291A (en) 2011-01-18 2011-01-18 Blog friend recommendation method based on tree log pattern analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100204787A CN102122291A (en) 2011-01-18 2011-01-18 Blog friend recommendation method based on tree log pattern analysis

Publications (1)

Publication Number Publication Date
CN102122291A true CN102122291A (en) 2011-07-13

Family

ID=44250851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100204787A Pending CN102122291A (en) 2011-01-18 2011-01-18 Blog friend recommendation method based on tree log pattern analysis

Country Status (1)

Country Link
CN (1) CN102122291A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646122A (en) * 2012-02-21 2012-08-22 北京航空航天大学 Automatic building method of academic social network
WO2013034018A1 (en) * 2011-09-09 2013-03-14 腾讯科技(深圳)有限公司 Classification-based internet information push method and device, and computer storage medium
CN103488683A (en) * 2013-08-21 2014-01-01 北京航空航天大学 Microblog data management system and implementation method thereof
CN104252453A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Detection method and system for write operation in webpage recommendation location content access track
CN104468488A (en) * 2013-09-17 2015-03-25 北京千橡网景科技发展有限公司 Recommendation method and device for anonymous user
CN104702488A (en) * 2013-12-10 2015-06-10 上海由你网络科技有限公司 System and method for recommending friends
CN106446161A (en) * 2016-09-23 2017-02-22 中山大学 Maximum frequent subgraph mining method adopting Hadoop
CN106776622A (en) * 2015-11-20 2017-05-31 北京国双科技有限公司 The querying method and device of access log
WO2017101652A1 (en) * 2015-12-17 2017-06-22 北京国双科技有限公司 Method and apparatus for determining an access path between website pages
CN106897297A (en) * 2015-12-17 2017-06-27 北京国双科技有限公司 The determination method and device of access path between the column of website
CN107256253A (en) * 2017-06-09 2017-10-17 郑州云海信息技术有限公司 A kind of system and method that web access module excavations are carried out based on XML
CN108200084A (en) * 2018-01-31 2018-06-22 湖北工业大学 A kind of network security daily record based on grey wolf algorithm determines method and system
WO2019042163A1 (en) * 2017-09-01 2019-03-07 广东神马搜索科技有限公司 Page information suggestion method, device, computing apparatus, and storage medium
CN109446194A (en) * 2018-08-21 2019-03-08 中国平安人寿保险股份有限公司 Find method, apparatus, computer equipment and the storage medium of preparation supervisor
CN109918576A (en) * 2019-01-09 2019-06-21 常熟理工学院 A kind of microblogging concern recommended method based on joint probability matrix decomposition
CN109947892A (en) * 2017-12-04 2019-06-28 阿里巴巴集团控股有限公司 Analysis path determines method and system, interface, log tree constructing method
CN110069463A (en) * 2019-03-12 2019-07-30 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium
CN111190873A (en) * 2019-12-24 2020-05-22 同济大学 Log mode extraction method and system for log training of cloud native system
CN114003202A (en) * 2021-05-28 2022-02-01 广东安证计算机司法鉴定所 Member level construction method and device, computer equipment and storage medium

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013034018A1 (en) * 2011-09-09 2013-03-14 腾讯科技(深圳)有限公司 Classification-based internet information push method and device, and computer storage medium
CN102646122B (en) * 2012-02-21 2014-01-22 北京航空航天大学 Automatic building method of academic social network
CN102646122A (en) * 2012-02-21 2012-08-22 北京航空航天大学 Automatic building method of academic social network
CN104252453A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Detection method and system for write operation in webpage recommendation location content access track
CN104252453B (en) * 2013-06-25 2018-09-28 腾讯科技(深圳)有限公司 The detection method and system of webpage recommending position access to content track write operation
CN103488683B (en) * 2013-08-21 2017-05-10 北京航空航天大学 Microblog data management system and implementation method thereof
CN103488683A (en) * 2013-08-21 2014-01-01 北京航空航天大学 Microblog data management system and implementation method thereof
CN104468488A (en) * 2013-09-17 2015-03-25 北京千橡网景科技发展有限公司 Recommendation method and device for anonymous user
CN104702488A (en) * 2013-12-10 2015-06-10 上海由你网络科技有限公司 System and method for recommending friends
CN104702488B (en) * 2013-12-10 2019-03-05 上海掌门科技有限公司 Friend recommendation system and method
CN106776622A (en) * 2015-11-20 2017-05-31 北京国双科技有限公司 The querying method and device of access log
CN106776622B (en) * 2015-11-20 2020-03-03 北京国双科技有限公司 Query method and device for access log
CN106897196A (en) * 2015-12-17 2017-06-27 北京国双科技有限公司 The determination method and device of access path between Website page
CN106897297A (en) * 2015-12-17 2017-06-27 北京国双科技有限公司 The determination method and device of access path between the column of website
WO2017101652A1 (en) * 2015-12-17 2017-06-22 北京国双科技有限公司 Method and apparatus for determining an access path between website pages
CN106897196B (en) * 2015-12-17 2019-10-25 北京国双科技有限公司 The determination method and device of access path between Website page
CN106446161B (en) * 2016-09-23 2019-10-01 中山大学 A kind of very big Frequent tree mining method for digging using Hadoop
CN106446161A (en) * 2016-09-23 2017-02-22 中山大学 Maximum frequent subgraph mining method adopting Hadoop
CN107256253A (en) * 2017-06-09 2017-10-17 郑州云海信息技术有限公司 A kind of system and method that web access module excavations are carried out based on XML
WO2019042163A1 (en) * 2017-09-01 2019-03-07 广东神马搜索科技有限公司 Page information suggestion method, device, computing apparatus, and storage medium
CN109947892B (en) * 2017-12-04 2023-01-06 阿里巴巴集团控股有限公司 Analysis path determination method and system, interface and log tree construction method
CN109947892A (en) * 2017-12-04 2019-06-28 阿里巴巴集团控股有限公司 Analysis path determines method and system, interface, log tree constructing method
CN108200084A (en) * 2018-01-31 2018-06-22 湖北工业大学 A kind of network security daily record based on grey wolf algorithm determines method and system
CN109446194A (en) * 2018-08-21 2019-03-08 中国平安人寿保险股份有限公司 Find method, apparatus, computer equipment and the storage medium of preparation supervisor
CN109918576A (en) * 2019-01-09 2019-06-21 常熟理工学院 A kind of microblogging concern recommended method based on joint probability matrix decomposition
CN109918576B (en) * 2019-01-09 2021-01-05 常熟理工学院 Microblog attention recommendation method based on joint probability matrix decomposition
CN110069463A (en) * 2019-03-12 2019-07-30 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium
CN110069463B (en) * 2019-03-12 2021-07-16 北京奇艺世纪科技有限公司 User behavior processing method, device electronic equipment and storage medium
CN111190873A (en) * 2019-12-24 2020-05-22 同济大学 Log mode extraction method and system for log training of cloud native system
CN111190873B (en) * 2019-12-24 2022-08-16 同济大学 Log mode extraction method and system for log training of cloud native system
CN114003202A (en) * 2021-05-28 2022-02-01 广东安证计算机司法鉴定所 Member level construction method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102122291A (en) Blog friend recommendation method based on tree log pattern analysis
CN105808696B (en) It is a kind of based on global and local feature across line social network user matching process
CN104166668B (en) News commending system and method based on FOLFM models
CN101266610B (en) Web active user website accessing mode on-line excavation method
CN106934014B (en) Hadoop-based network data mining and analyzing platform and method thereof
CN111782965A (en) Intention recommendation method, device, equipment and storage medium
CN103023714B (en) The liveness of topic Network Based and cluster topology analytical system and method
CN106815307A (en) Public Culture knowledge mapping platform and its use method
CN104063448B (en) Distributed type microblog data capturing system related to field of videos
CN107437026B (en) Malicious webpage advertisement detection method based on advertisement network topology
CN104216889B (en) Data dissemination analyzing and predicting method and system based on cloud service
CN104268148A (en) Forum page information auto-extraction method and system based on time strings
CN104133868B (en) A kind of strategy integrated for the classification of vertical reptile data
Ying et al. Semantic trajectory-based high utility item recommendation system
CN102760151A (en) Implementation method of open source software acquisition and searching system
CN109408578A (en) One kind being directed to isomerous environment monitoring data fusion method
CN113254630A (en) Domain knowledge map recommendation method for global comprehensive observation results
JP2021192237A (en) Related score calculation system, method and program
CN106844553A (en) Data snooping and extending method and device based on sample data
CN103440328B (en) A kind of user classification method based on mouse behavior
CN108446333A (en) A kind of big data text mining processing system and its method
CN105389330A (en) Cross-community matched correlation method for open source resources
CN104199947A (en) Important person speech supervision and incidence relation excavating method
Dua et al. Discovery of Web frequent patterns and user characteristics from Web access logs: a framework for dynamic Web personalization
CN111107493B (en) Method and system for predicting position of mobile user

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110713