• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An E-Business Event Stream Mechanism for Improving User Tracing Processes

    2021-12-10 11:55:48AymanMohamedMostafaSalehAlmuayqilandWaelSaid
    Computers Materials&Continua 2021年10期

    Ayman Mohamed Mostafa,Saleh N.Almuayqil and Wael Said

    1College of Computers and Information Sciences,Jouf University,Sakaka,72314,Saudi Arabia

    2Faculty of Computers and Informatics,Zagazig University,Zagazig,44519,Egypt

    3College of Computer Science and Engineering,Taibah University,Medina,42353,Saudi Arabia

    Abstract:With the rapid development in business transactions,especially in recent years,it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way.Online business transactions have increased,especially when the user or customer cannot obtain the required service.For example,with the spread of the epidemic Coronavirus(COVID-19)throughout the world,there is a dire need to rely more on online business processes.In order to improve the efficiency and performance of E-business structure,a web server log must be well utilized to have the ability to trace and record infinite user transactions.This paper proposes an event stream mechanism based on formula patterns to enhance business processes and record all user activities in a structured log file.Each user activity is recorded with a set of tracing parameters that can predict the behavior of the user in business operations.The experimental results are conducted by applying clustering-based classification algorithms on two different datasets;namely,Online Shoppers Purchasing Intention and Instacart Market Basket Analysis.The clustering process is used to group related objects into the same cluster,then the classification process measures the predicted classes of clustered objects.The experimental results record provable accuracy in predicting user preferences on both datasets.

    Keywords:Business transactions;event stream;log file;tracing parameters;clustering-based classification

    1 Introduction

    E-business becomes an international business that covers and extends all over the world.It is necessary to find a suit framework and form to preserve the stakeholder’s rights and ethics.Financial institutions should support E-business processes to maximize profits while maintaining a degree of ethics.Ethics is a set of behaviors and principles that focus on values and moral feels,while morality is the implementation and translation of ethics into tangible acts and activities[1].The rising number of available web services results in the need to facilitate web service presented to consumers to specify their required specification services.Different platforms are required to publish,view and compare services in order to enhance organizational profit[2].Different semantic web services are proposed to define the automatic services by providing semantic descriptions with additional mechanisms to model services.

    Social network sites provide a large dataset to predict major opportunities,challenges and enhancing interactive online business operations[3].Through the revolution of technologies,E-business applications become the most important and popular way to share data between users[4].The rapid development in technical and production mechanisms and processes,lead to update and develop the E-business and engineering activities.

    Enhancing and predicting E-business operations depends mainly on managing and organizing the web server log of the E-business framework.Organizing the web server log operations can enhance and improve the process of user tracing to predict user behavior.

    The web server log files collect webpage request history information in chronological order.Typically,the collected and stored information includes client IP,client name,request date and time,server site name,server computer name,server IP,server port,client server method,client serves URL stream,client server URL query,server client status,server client win32 status,server client bytes,the client server bytes,time taken,client server version,client server host,user agent,cookies,and the referring URL.In[5],these data are divided into different classes that are general statistics,software warning and system failure,safety instructions,approval of program execution,and Time-based functions.In[6],the challenges associated with that information have been identified.These challenges include merging extraneous information with useful ones,generating multiple server requests by a single user action,and the lack of recording local activities.The general characteristics of web log files are mentioned in[7].

    This paper proposes a set of satisfaction relations to formalize rules that can trace and record different E-business processes.An event universe of quintuple parameters is presented to determine a complete tracing mechanism for predicting user behavior.The organization of the paper is as follows:Section 2 presents a set of related work in the field of E-business.In Section 3,we propose satisfaction relations to be applied to the log file.In Section 4,we present an event universe mechanism to trace all user actions with a set of formula patterns.In Section 5,we present a counting methodology based on the proposed event universe to record the frequency of the performed user actions that can lead to better user behavior prediction.In Section 6,the methodology for improving the user tracing processes is presented.In Section 7,we conduct the experimental results using clustering and classification algorithms on different data sets.In Section 8,the conclusion with recent points to be used in future works is introduced.

    2 Related Work

    The role of E-business engineering in developing a new framework can provide more facilities to improve the cooperation between the company and consumer.E-business engineering can improve and develop systems optimization,security,privacy,and trust in systems.The main risks and challenges that may be faced are how to preserve the quality of services during its growth with respect to some security challenges or risks about keeping user’s data and information safe and preserving their privacy.As a result,the more accurate forecasting gives a more effective strategy and ameliorates the predicted situation[8].Managers play a huge role in improving the firms of their business,by well understanding and evaluating the true market value of a firm’s security activity that will help them make the right market decisions[9].The main important and required factor is how to formalize the log file so that all user records can be traced which can lead to a better expectation of user behavior[10].

    To improve the performance,elasticity,maintainability,reusability,and scalability of the E-business,a three-layer E-business architecture is established.These layers are the presentation layer,business logic layer,and data layer;each layer has its responsibilities and role[11].As well,they are used to record all user operations into a web server log or a log file.

    The following subsections highlight key aspects of the web server log regarding its role and classifications,state-of-the-art mechanisms for analyzing the web server log,and the most recent researches that apply data mining and machine learning techniques to enhance prediction from data in the web server log.

    2.1 Web Server Log

    A log file is an automatically generated plain text data file that works on events,processes,activities,actions,tasks,messages,and communication for an operating system,application,or server.According to where the log files are located,they are classified into three types:web server log files,proxy server log files,and client browser log files[12–14].The major drawbacks of these server-side logs,proxy-side logs,and client-side logs are described in[15].In[16],web server log files are described as a many-to-one relationship;multiple users visit a single website.The proxy server log files are considered to be many-to-many relationships where one user can access many websites and many users can visit one website.Whereas,the client browser log files are in the form of one-to-many relationships;a particular user visits many websites.

    Indeed,the web log file act as the visitor’s logbook.Moreover,they have the ability to answer some important questions such as which webpages are getting the most and the least traffic,which webpages are requested,when the webpages are requested,who requested them,where they were referred from,which browsers and operating systems are used to access a website,and when search robots and directory editors visit a web site.

    2.2 Web Log Analysis

    Analyzing web log data is like looking for diamonds in a coal mine.Indeed,web log files assist in gaining a serious idea of a user.Some of the primary benefits of analyzing web log files from a user’s point of view include capturing the knowledge of user’s behavior,determining user satisfaction,satisfying user expectations,building user sessions,predicting the intention of the user,inferring user demographics to apply market segmentation,improving user attraction,improving user retention,enhancing advertisements cross-sales,and gathering information about user navigation patterns.Various research papers for web log files are presented to explain its main idea and recent methodologies in enhancing the web server log.

    Suneetha et al.[15]provide a web log data analysis for the NASA website.The analysis has the ability to determine the total number of Hit ratio and the potential visitors to the site either the number of visitors per day or the total number of unique visitors.Moreover,the occurred system errors,corrupted and broken links are determined to assist system administrators and web designer to arrange website.As shown in[17],another analysis methodology for NASA web server log is executed using one of the Hadoop data analytics tools called Apache Pig.The main goal of that research is to analyze NASA big data for enhancing the prediction of data.Verma et al.[6]provide a statistical analysis of web log files for the NASA website.The authors analyzed the data for August 1995 using web log software to describe and visualize the behavioral aspects of users such as the number daily visitors,types of daily error,and user activity by day of the week.The daily error types include 404 not found,403 forbidden,400 bad request,and 500 internet server error.

    As presented in[18],a stochastic mechanism is provided for the modeling of an intention of purchase.The authors use the Hidden Markov Model(HMM)to predict user browsing behavior with the intent to purchase from an E-commerce site.In[19],the user behavior toward advertisements from E-commerce data is modeled by using a combination of HMM and Logistic Regression.The main objectives of this research are to determine the effect of advertising on the user’s purchasing behavior,to capture the influence of both the advertisement properties and the user’s internal state on the user’s purchase behavior prediction,to assess which advertisements are most likely to produce purchases from a specific user,and to provide acceptable advertisements to a particular user.

    As shown in[20],online web log data is analyzed for a blogging website created by authors.The analysis process is used to improve the site’s structure and generate insights into the behavior of viewers who have visited the site for two weeks.The viewers’behavior is measured by identifying the page that attracts the user’s interest,the page that ensures the visitor continues to browse the site,the page that accessed mostly by visitors,and the hourly traffic analysis over the course of two weeks of website activity.Another analysis mechanism for the web server log is introduced in[13].The author’s goal is to determine system errors,user preferences,user behaviors,website popularity,technical information about users,as well as corrupted and broken links.The authors provide statistical information about most visited pages,popular paths through the site,length of stay of the visitor,visits per hour in a day,most used search engines,phrases used by visitors,and the most common server errors.The authors of[21]perform various analyzes to judge the interest and behavior of users from the web server logs of an academic institutional website.The authors utilize the Aw-stats WM tool to collect web log data in various aspects.Additionally,they use the WEKA tool to visualize the extracted patterns.

    Sujatha et al.[7]propose a model named PUCC,to predict user’s navigation patterns from web log data using clustering and classification.In the PUCC model,the graph partitioning clustering algorithm is used to assign a user to a predefined labeled category when the user’s data contain more features similar to that category.The Longest Common Subsequence(LCS)classification algorithm is used to separate web log data into groups of users with similar navigation.Based on the extracted patterns from the clustering and classification process,the user’s future requests could be predicted.As shown in[22],an analysis of behavioral patterns and users’profiles are applied for an educational institution web log data within one day.The authors utilize the web log expert tool to extract activities such as total hits,number of visitors,users’IP addresses,page views,consumed bandwidth,most popular page,and most downloaded files.

    Another statistical analysis method is conducted using association rules-based analysis to the web log file for a bookstore website[23].The analysis is carried out for exploring the dependencies between the various characteristics of a user’s visit to the online store’s website and the likelihood that they will end up purchasing.The authors divide the user behavior into three categories.These categories are anonymous users visiting only one page without logging in and purchasing,users who logged in but did not purchase anything,and users who decided to make a purchase.Murata et al.[24]provide a method for analyzing users’web-watching behaviors and extracting users’interests from augmented web audience measurement data.The analysis is conducted to represent the data as a graph structure of sites and keywords.This representation is due to the fact that the visited websites and search keywords are related to each other in a chronological sequence.The page rank ranking algorithm is used to evaluate the quality of the extracted interests.

    As shown in[25],an analysis of web user behavior is performed by applying the business process management(BPM)technique to an online travel and booking agency.The basic idea is to treat user clicks that are extracted from the web log file as an unstructured process.Then,using process mining algorithms to discover user behavior after classifying and transforming URLs into events.As presented in[26],a graph partitioning-based approach is proposed to a cluster of user’s web navigation behavior by generating an undirected graph that is based on the connection between each pair of the web pages.The authors use the web log file to model user navigation patterns and predict future user request.

    2.3 Machine Learning on E-Business Applications

    Clustering and classification algorithms are considered major methods for analyzing and measuring the performance of E-business applications.As presented in[27],an E-business framework is presented by clustering information networks to discover the optimal clusters given from different datasets.Most E-business applications are based on small and medium-sized enterprises that require high analysis of their business processes.As shown in[28],a random forest classification algorithm is used to determine the preferences of E-business applications.Based on the experimental results stated in this research,different recommendations can be taken to enhance the structure of small-medium enterprises.Another E-business process management based on classification algorithms is presented in[29].In this research,a predictive analysis using 20 classifiers is proposed to evaluate the classifier’s accuracy and performance on different event logs.The log traces should be also secured from security breaches and attacks.The authors of[30]propose two classification approaches to provide secure tracing processes.The first approach is model-driven which is based on behavioral activities of event logs while the second approach is example-driven which is based on the sequence of events.

    As shown in[31],web data mining is applied to E-commerce using the linear regression algorithm to obtain frequent access patterns from the web log data and provide valuable information about users’interests.The linear regression algorithm is used to calculate the accuracy of the output by representing the customer’s user ID and the number of times the product is searched as input variables while the searched product is used as the single output variable.

    2.4 LTL Model Checking Approach

    The Linear-Temporal Logic(LTL)technique is used as an alternative to data mining to analyze the sequence of the actions performed by users from the E-business Web log files.The basic idea is to define different predefined queries to transfer web log records into event logs for capturing the users’behavior.LTL is based on a set of mathematical formulas that can determine a set of constraints based on activities’orders.The LTL defines a set of finite or infinite formula patterns for user processes and activities in order to predict future paths.Based on the prediction processes,the tracing processes can be enhanced and the user behavior can be predicted in future browsing processes.

    As presented in[32],a set of formula patterns with a set of definitions are identified.The LTL formulas are applied for ordered and non-ordered browsing processes within a specific period of time to record an even stream of users.As presented in[33]one action at a specific period of time.As shown in[34],the LTL is applied to a real case study of an online Spanish provider of scraping products website called Up &Scrap website.The LTL patterns are used to analyze user behavior in the website by dividing the website into the main section and secondary sections where the main section represents the homepage of the website while the secondary sections represent the subsections for a set of products.

    3 Satisfaction Relations

    In the E-business architecture,there are different processes or operations that can be executed during user transactions.For predicting user behavior,a log file is created based on different event actions.As presented in[35],most of the systems do not fully utilize the web serve log that contains all previously recorded information of user activities.As presented in Tab.1,all user processes are recorded in the pre-defined log file based on different event categories.The browsing process(B)is based on viewing different items in the E-business structure levels.The action process is based on revising(R),payment(P),and executing(E)user transactions.Returning items(RI)are considered a major action in the E-business structure if there are defects in the items.There are other main actions to the administrator of the web service such as adding,removing,and modifying posts(AP),(RP),and(MP)respectively on the web service.

    For recording all user actions in the log file,a set of satisfaction processes should be defined for recording user operations.These satisfaction processes are considered an extension to[32,36]that proposed different LTL formula patterns for enhancing E-business structure performance.A satisfaction relation ?is defined to verify whether a specific formula is correct or not.

    Letρis the total propositions of event actions.Considerf1andf2are two formula patterns that evaluates the relationship between each two actions in the event universe.

    Letσis the tracing process for both formula patternsf1&f2.The satisfaction relation ?is defined based on the following rules:

    Rule 1:6 ??f1if ?(6 ?f1)means that the formula patternf1may not be executed in the event universe.

    Rule 2:6 ?f1∩f2if 6 ?f1and 6 ?f2means that the tracing process will be based on both formula patternsf1&f2.

    Rule 3:If 6 ?Xf1then 6 ?f2where X is the preceding function.This means that the formula patternf2will be executed if the preceding formula patternf1is being executed.

    Rule 4:6 ?f1∪f2means that at least 6 ?f1or 6 ?f2must be executed in the event universe.

    4 Event Universe Mechanism

    Information systems-related application of E-business is applied based on event logs for determining the number of occurrences that an action may be performed by a user.In an event log,each executed process constitutes a condition.All actions related to this condition will be traced and recorded in the log file.To record all event actions,an event universe e is defined based on the following definition:

    Definition 1(Event Universee):an event universeebased on quintuple parameters is presented in the following formula:where:

    ?uis the user of the action under consideration.

    ?cis the category of the items presented in the E-business web service.

    ?lis the level of the items being traced.

    As presented in[36],the E-business structure is based on different levels for presenting items and sub-items.

    ?tis the time of the performed action.

    ?ais the action in the event universee.

    Based on the presented event universe and the several user processes,the statistical analysis of the overall processes will be based on the following definitions:

    Definition 2(Browsing Analysis):the percentage of browsing process(Bi)in the E-business web service is based on identifying the browsing process in the event universee.

    Definition 3(Revise Analysis):the overall revise processes(Ri)must be analyzed based on the formula:

    Definition 4(Payment Analysis):the payment process(Pi)must be executed once the revise process is true.No payment process can be executed without revising processes.As a result,the payment must be executed with intersecting revise with browsing,revising,and payment processes based on the formula:

    Definition 5(Execute Analysis):as proposed in previous definitions,the execute process(Ei)must be followed by browsing,revise,payment processes based on the following formula:

    Definition 6(Rollback Analysis):the returning item(RIi)mechanism has a Boolean parameter whether the item may be returned back or not.TheRIimust satisfy the condition that all preceding processes must be executed based on the formula:

    Based on the previous definitions,different activities can be traced as part of the event stream.As shown in Fig.1,a visual event stream is proposed for analyzing user actions.Each trace Id represents a set of subsequent activities based on the quintuple parameters(u,c,l,t,a).As shown in Fig.1,all E-business transactions are recorded starting from the browsing service at different levels with the assumption that the categories of the proposed E-business structure are embedded into four levels as presented in[36].The remaining processes are revising,payment,executing,rolling back the process,adding post service,modifying post service,and removing post service.

    Assuming that the E-business structure is based on four levels of categories,each browsing levelkmust be preceded by a browsing leveli.As presented in Tab.2,a set of event log tracing processes is recorded.Each distinct event log is called a trace with different activities based on the structure of the web service.As shown in Tab.2,each trace process has a trace id,and the sequence of corresponding activities.Each activity is associated with the final action of the user behavior.For example,for a user who performs an E-business process until execution action,the user can perform different browsing processes,then perform the payment actions as shown in trace id 7 and 8.A timestamp is added to view the specific time for each tracing mechanism.

    Figure 1:Visual event stream for event universe

    5 User Process Counting

    The web server log is converted into a set of web event logs and is conceptually divided into event blocks(EB)with a widthwsuch that:where:pis the total number of processes in the event log andlenis the length parameter.

    The basic structure of the user process counting is a set of entries of the form(e,u,Δ)where:

    ?eis an event action of the log stream that can be categorized based on the user behavior.

    ?uis the user of the event who performing the action.

    ?Δ is the approximated number of times that the event action e may occur.

    As shown in Tab.3,a user process counting mechanism is performed to record all user behavior on behalf of the frequency of each E-business process.The MAC address is recorded with the username of the user,the action type,and the action frequency Δ.

    6 Proposed Methodology

    The main objective of this paper is to improve the quality of predicting user activities based on the event log of two different data sets.These datasets are the Online Shoppers Purchasing Intention[37,38]and the Instacart Market Basket Analysis dataset of Kaggle[39].As presented in Fig.2,the proposed mechanism is based on applying different clustering algorithms such as density-based clustering,farthest first cluster,EM cluster and K-mean cluster.These methods groups similar objects into the same cluster.After applying the clustering algorithms,a set of classifications algorithms are applied to measure the predicted classes on the clustered data.

    As presented in Fig.2,the event log tracing is applied on both datasets and a clustering process is performed before the classification process for enhancing the performance of the user tracing process over infinite user transactions.The objective of applying clustering algorithms is to determine similar objects into a set of groups called clusters.The objects that are similar to each other are grouped into the same cluster for maximizing the intra-class similarity.In order to validate the proposed mechanism,two distinct datasets are applied on the clustering and classification algorithms to measure the accuracy of the algorithms in predicting and enhancing user behavior tracing activities.The first clustering-classification mechanism is applied by performing the clustering process using the Farthest First cluster algorithm[40],Expectation Maximization(EM)cluster algorithm[41],and K-mean cluster algorithm[42].The clustered results are applied on eight classification algorithms:Bayes Net[43],Na?ve Bayes[43],K*[44],Filtered Classifier[45],Decision Table[43],JRip algorithm[46],J48[47],and Logistic Model Tree(LMT)[48].The second clustering-classification mechanism is applied by performing the clustering process using density-based clustering[49].The clustered results are embedded with five classification algorithms:Support Vector Machine(SVM)[50],Logistic Regression(LR)[51],Knearest neighbor(KNN)[52],Random Forest(RF)[53],and Logistic Model Tree(LMT)[48].Different performance metrics are used to measure and compare all clustering-classification results.The True Positive(TP)rate is used to measure the predicted classes correctly while the False Positive(FP)rate is incorrectly predicting the positive classes.TheTPandFPare presented in Eqs.(8)and(9)as follows:

    Table 1:E-business user processes

    Table 2:Event log tracing mechanism

    Table 3:User behavior prediction

    Table 4:Clustering-based classification accuracy

    where,TPRis the prediction of true positive classes into which the true positive classes are divided by the sum of both true positive and false negative classes.

    where,FPRis the prediction of false positive classes into which the false positive classes are divided by the sum of both false positive and true negative classes.

    Figure 2:Clustering and classification framework for different datasets

    The Precision of the dataset is measured by dividing the true positive predictions by the true positive and false positive predictions as shown in Eq.(10):

    The Recall of the dataset is measured by dividing the true positive predictions by the true positive and false negative predictions as shown in Eq.(11):

    The F1-Measure ratio is measured using the mean of both precision and recall as shown in Eq.(12):

    The classifier accuracy is measured by the percentage of classes that were predicted correctly while the classifier error rate is the percentage of incorrect predicted classes as shown in the Eqs.(13)and(14).

    7 Experimental Results

    The experimental results are conducted on two datasets:Online Shoppers and Instacart.Different clustering and classification algorithms are applied to measure the performance and accuracy of predicting user behavior and user tracing processes.The results are explained as follows:

    7.1 Online Shoppers Purchasing Intention Dataset Performance

    The Online Shoppers dataset is applied on three clustering algorithms before performing the classification process.The three clustering algorithms are Farthest First cluster,EM cluster,and K-mean cluster.The three clustering algorithms are used as a previous stage before performing the classification process using eight classification algorithms.As presented in Fig.3,the true positive rate(TPR)is measured on all clustered-classification algorithms.The EM clustering algorithm with the LMT classification algorithm achieved the best true positive result with 100%.The K-mean clustering algorithm with also LMT classification algorithm achieved 99% true positive rate while the best Farthest First cluster algorithm achieved 93% true positive rate with the LMT classification algorithm.

    As presented in Fig.4,the LMT classification algorithm achieved the minimum false positive rate(FPR)on all clustering algorithms:Farthest First,EM,and K-mean with 15%,0%,and 0.6%respectively.

    As shown in Figs.5 and 6,the LMT classification algorithm achieved the best precision and recall results with all clustering algorithms with 93%,100%,and 99% using Farthest First,EM,and K-mean clustering algorithms respectively.The EM clustering algorithm achieved high precision on both Bayes Net and Na?ve Bayes classification algorithms with 98% on both algorithms.

    Figure 3:True positive rate—Online shoppers dataset

    Figure 4:False positive rate—Online shoppers dataset

    Figure 5:Precision—Online shoppers dataset

    Figure 6:Recall—Online shoppers dataset

    In Fig.7,the F1-Measure of the Online Shoppers dataset achieved high results using an LMT classification algorithm with Farthest First,EM,and K-mean clustering algorithms with 92%,100%,and 99% respectively.

    Figure 7:F1-measure—Online shoppers dataset

    7.2 Instacart Dataset Performance

    The Instacart dataset is tested to measure the performance using density-based clustering with five classification algorithms:SVM,Logistic Regression,KNN,Random Forest,and LMT.As shown in Fig.8,the true positive rate(TPR)achieved high results in all classification algorithms with 100% except the LMT classification algorithm with 99.4%.The false positive rate(FPR)achieved 0% with all clustering-classification algorithms except the LMT classification algorithm with a 0.4% false positive rate.

    As shown in Fig.9,the precision,recall,and F1-Measure achieved similar results with 100%on all clustering—classification algorithms except the LMT classification algorithm that achieved 99.4%.The experimental results were repeated again by interchanging the clustering-classification algorithms with the Online Shoppers and Instacart datasets to prove the capability of each clustering-classification algorithms in predicting user behavior and improving the user tracing mechanism.The accuracy and error rate of all clustering and classification algorithms are measured on both Online Shoppers and Instacart datasets as shown in Tab.4.

    Figure 8:True positive and false positive rates—Instacart dataset

    Figure 9:Precision,recall,and F-measure—Instacart dataset

    In order to validate the proposed mechanism,two distinct datasets are applied on the clustering and classification algorithms to measure the accuracy of the algorithms in predicting and enhancing user behavior tracing activities.As presented in Tab.4,the Farthest First clustering algorithm with LMT classification algorithm achieved the best accuracy on the Online Shoppers dataset with 93.01%,while on the Instacart dataset the farthest first algorithm achieved 100%accuracy with both LMT and K* classification algorithms.Using the EM clustering algorithm,the LMT classification algorithm achieved 100% accuracy on both online shopping and Instacart datasets while K* and J48 achieved an accuracy of 100% on the Instacart dataset only.Using the K-mean clustering algorithm,the LMT classification algorithm still provides provable accuracy with 99.42% and 99.71% of online shopping and Instacart datasets respectively.When the densitybased clustering is applied,different classification algorithms recorded high accuracy with a low error rate.Random forest and KNN classification algorithms recorded 100% accuracy of the Online Shoppers dataset.Using the Instacart dataset,the random forest,KNN,Logistic Regression,and SVM achieved high accuracy with 100%.The LMT classification algorithm still recorded high accuracy with 99.42% and 99.41% on both online shopping and Instacart datasets.The error rate on density-based clustering achieved the lowest results when compared to the remaining clustering techniques;farthest first,EM,and K-mean.

    8 Conclusion

    E-business transactions are now necessary during the development of information systems and their related technologies.With the increasing need to develop different methods to deal with the intensity of business transactions,the log file that records all user processes must be well formulated to best utilize all transactions in the shortest possible time.Many research papers enhance the E-business structure in explaining business services without developing and enhancing a well-designed web server log that can record all user records.This paper proposed an event stream mechanism that can organize and record user and customer transactions based on a set of formula patterns.The paper visualizes an even stream to explore the overall enhanced tracing mechanism.The proposed mechanism is based on applying different clustering algorithms such as density-based clustering,farthest first cluster,EM cluster and K-mean cluster.After applying the clustering algorithms,a set of classifications algorithms are applied to measure the predicted classes on the clustered data.The experimental results proved high efficiency in improving user tracing processes and predicting user behavior in acquiring future products.Some enhancements can be applied to the proposed mechanism by adding mean-shift and agglomerative hierarchical clustering algorithms with the same classification algorithms and datasets to verify the efficiency of the user tracing processes.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品少妇黑人巨大在线播放 | 99久国产av精品| 国产久久久一区二区三区| 大又大粗又爽又黄少妇毛片口| 久久久久久久久久成人| av天堂中文字幕网| 欧美日韩精品成人综合77777| 欧美一区二区国产精品久久精品| 亚洲国产精品成人综合色| 在线免费观看不下载黄p国产| 国产大屁股一区二区在线视频| 国产成人freesex在线| 麻豆久久精品国产亚洲av| 久久这里只有精品中国| 日日干狠狠操夜夜爽| 毛片女人毛片| videos熟女内射| 亚洲最大成人中文| 国产精品女同一区二区软件| 欧美一区二区亚洲| 少妇人妻精品综合一区二区| 成人一区二区视频在线观看| 午夜福利网站1000一区二区三区| 精品久久久久久久久av| 亚洲精品国产av成人精品| 欧美3d第一页| 久久久久免费精品人妻一区二区| 亚洲精品自拍成人| 久久久久久国产a免费观看| 国产在视频线精品| av黄色大香蕉| av福利片在线观看| 国产伦精品一区二区三区视频9| av在线天堂中文字幕| 国产真实乱freesex| 国产综合懂色| 精品国产一区二区三区久久久樱花 | 久久鲁丝午夜福利片| 汤姆久久久久久久影院中文字幕 | 美女xxoo啪啪120秒动态图| 亚洲国产精品成人久久小说| 免费观看精品视频网站| 成人毛片60女人毛片免费| 亚洲av.av天堂| 最近中文字幕高清免费大全6| 非洲黑人性xxxx精品又粗又长| 久久久精品大字幕| 三级国产精品欧美在线观看| 国产成年人精品一区二区| 精品久久久久久久末码| 久久精品国产鲁丝片午夜精品| 亚洲最大成人中文| 亚洲欧洲国产日韩| 91精品伊人久久大香线蕉| 亚洲欧美精品综合久久99| 国产精品不卡视频一区二区| 免费看日本二区| 十八禁国产超污无遮挡网站| 全区人妻精品视频| 爱豆传媒免费全集在线观看| 97热精品久久久久久| 一卡2卡三卡四卡精品乱码亚洲| 欧美高清成人免费视频www| 亚洲第一区二区三区不卡| 色综合亚洲欧美另类图片| 卡戴珊不雅视频在线播放| 嘟嘟电影网在线观看| 欧美日韩国产亚洲二区| 91aial.com中文字幕在线观看| 嫩草影院精品99| 精品人妻熟女av久视频| 午夜久久久久精精品| 人妻制服诱惑在线中文字幕| 免费播放大片免费观看视频在线观看 | 三级毛片av免费| 啦啦啦韩国在线观看视频| 寂寞人妻少妇视频99o| 国产精品一区二区三区四区久久| 欧美色视频一区免费| 男女那种视频在线观看| 两个人的视频大全免费| 成年女人永久免费观看视频| 99热全是精品| 国产精品99久久久久久久久| 色噜噜av男人的天堂激情| 日本爱情动作片www.在线观看| 啦啦啦啦在线视频资源| 人妻制服诱惑在线中文字幕| 色综合亚洲欧美另类图片| 97热精品久久久久久| 乱码一卡2卡4卡精品| 国产老妇女一区| 久久久久久伊人网av| videossex国产| 国产在视频线在精品| 三级男女做爰猛烈吃奶摸视频| 日韩精品有码人妻一区| 18禁裸乳无遮挡免费网站照片| 精品人妻一区二区三区麻豆| 国产极品精品免费视频能看的| 爱豆传媒免费全集在线观看| 狂野欧美白嫩少妇大欣赏| 免费一级毛片在线播放高清视频| 午夜日本视频在线| 一区二区三区四区激情视频| 又爽又黄a免费视频| 一级黄色大片毛片| 国产男人的电影天堂91| 国产美女午夜福利| 亚洲无线观看免费| 久久精品国产自在天天线| 91精品伊人久久大香线蕉| 国产成人aa在线观看| 午夜久久久久精精品| 少妇熟女aⅴ在线视频| 日本-黄色视频高清免费观看| 精品午夜福利在线看| 好男人在线观看高清免费视频| 青春草视频在线免费观看| 91久久精品电影网| 成人漫画全彩无遮挡| 91精品国产九色| 国产白丝娇喘喷水9色精品| 99热网站在线观看| 国产美女午夜福利| 日韩国内少妇激情av| 日韩精品有码人妻一区| 男人和女人高潮做爰伦理| 波多野结衣巨乳人妻| 婷婷色麻豆天堂久久 | 亚洲国产高清在线一区二区三| 免费不卡的大黄色大毛片视频在线观看 | 最近的中文字幕免费完整| 91精品一卡2卡3卡4卡| 久久国产乱子免费精品| 亚洲综合精品二区| 黄色欧美视频在线观看| 国产一区二区三区av在线| 毛片一级片免费看久久久久| 成人综合一区亚洲| 日本色播在线视频| 亚洲av电影在线观看一区二区三区 | 又爽又黄a免费视频| 精品一区二区三区人妻视频| 免费观看人在逋| 亚洲美女搞黄在线观看| 国产午夜福利久久久久久| 色综合站精品国产| 国产精品永久免费网站| 午夜福利在线观看免费完整高清在| 97在线视频观看| 欧美3d第一页| 身体一侧抽搐| 免费观看人在逋| 直男gayav资源| 我的老师免费观看完整版| 欧美性猛交╳xxx乱大交人| 蜜桃久久精品国产亚洲av| 亚洲中文字幕一区二区三区有码在线看| 国产一区二区亚洲精品在线观看| 国产精品蜜桃在线观看| 亚洲欧美精品自产自拍| 免费大片18禁| 中文在线观看免费www的网站| 午夜福利高清视频| 丝袜美腿在线中文| 国产亚洲av片在线观看秒播厂 | www日本黄色视频网| 亚洲高清免费不卡视频| 看黄色毛片网站| av免费观看日本| 久久久久九九精品影院| 欧美高清成人免费视频www| 国内揄拍国产精品人妻在线| 久99久视频精品免费| 亚洲性久久影院| 搡女人真爽免费视频火全软件| 中文乱码字字幕精品一区二区三区 | 国产精品一区二区三区四区免费观看| АⅤ资源中文在线天堂| 免费看av在线观看网站| 国产高清不卡午夜福利| 日本免费a在线| 国产乱人偷精品视频| 中文字幕av成人在线电影| 日本av手机在线免费观看| 久久久a久久爽久久v久久| 汤姆久久久久久久影院中文字幕 | 久久精品久久久久久噜噜老黄 | 国产精品国产三级专区第一集| 日本爱情动作片www.在线观看| 日韩欧美国产在线观看| 亚洲乱码一区二区免费版| 午夜福利在线观看吧| 欧美变态另类bdsm刘玥| 在线免费观看的www视频| 99热6这里只有精品| 国产精品一区二区在线观看99 | 岛国在线免费视频观看| 国产免费又黄又爽又色| 国产一区二区在线观看日韩| 欧美色视频一区免费| 久久精品国产亚洲av涩爱| 我的女老师完整版在线观看| a级毛色黄片| 国产熟女欧美一区二区| 中文字幕熟女人妻在线| 亚洲av成人精品一区久久| 人人妻人人澡欧美一区二区| 在现免费观看毛片| 国产精品一区二区三区四区免费观看| 亚洲av电影在线观看一区二区三区 | 日韩高清综合在线| 午夜免费男女啪啪视频观看| 在线免费观看的www视频| 啦啦啦啦在线视频资源| 日韩av不卡免费在线播放| 69av精品久久久久久| 青春草视频在线免费观看| 欧美bdsm另类| 国产乱来视频区| 小说图片视频综合网站| 免费观看人在逋| 天堂网av新在线| 免费观看a级毛片全部| 好男人在线观看高清免费视频| 少妇熟女aⅴ在线视频| 日本猛色少妇xxxxx猛交久久| 女人被狂操c到高潮| 国产免费福利视频在线观看| 欧美zozozo另类| 一级毛片aaaaaa免费看小| 国产一区二区在线观看日韩| 啦啦啦啦在线视频资源| 日韩精品青青久久久久久| 国产精品久久视频播放| 亚洲最大成人中文| 久久久精品94久久精品| 欧美97在线视频| eeuss影院久久| 午夜爱爱视频在线播放| 欧美三级亚洲精品| 嫩草影院入口| 黄色一级大片看看| 深爱激情五月婷婷| 99久久精品一区二区三区| www.色视频.com| 免费在线观看成人毛片| 我的老师免费观看完整版| 男女视频在线观看网站免费| 国产伦在线观看视频一区| 日韩三级伦理在线观看| 久久精品国产亚洲av天美| 波多野结衣高清无吗| 春色校园在线视频观看| 三级经典国产精品| 亚洲av熟女| 国产精品野战在线观看| 97超视频在线观看视频| 国产精品久久电影中文字幕| 欧美日韩精品成人综合77777| 51国产日韩欧美| 日本免费在线观看一区| 国产高清有码在线观看视频| 熟妇人妻久久中文字幕3abv| 国国产精品蜜臀av免费| 国产日韩欧美在线精品| 美女黄网站色视频| 99久久人妻综合| 国产精品福利在线免费观看| 99热全是精品| 亚洲精品乱码久久久久久按摩| 禁无遮挡网站| 熟女电影av网| 丰满少妇做爰视频| 一个人看的www免费观看视频| 一级二级三级毛片免费看| 国产一区有黄有色的免费视频 | 国产男人的电影天堂91| 又黄又爽又刺激的免费视频.| 亚洲精品成人久久久久久| 国产精品美女特级片免费视频播放器| 国产一级毛片七仙女欲春2| 男女视频在线观看网站免费| 少妇高潮的动态图| 搡老妇女老女人老熟妇| 中国美白少妇内射xxxbb| 久久人人爽人人爽人人片va| 国产色爽女视频免费观看| 午夜a级毛片| 麻豆精品久久久久久蜜桃| 三级国产精品欧美在线观看| 午夜精品在线福利| 高清午夜精品一区二区三区| 国产精品久久视频播放| 波野结衣二区三区在线| 99国产精品一区二区蜜桃av| 国产探花极品一区二区| 99九九线精品视频在线观看视频| 人人妻人人看人人澡| 国产欧美另类精品又又久久亚洲欧美| av黄色大香蕉| 七月丁香在线播放| 国产av一区在线观看免费| 精品久久久久久久久亚洲| 国产中年淑女户外野战色| 国产高潮美女av| 最后的刺客免费高清国语| 免费无遮挡裸体视频| 国产精品女同一区二区软件| 91狼人影院| 色哟哟·www| av在线老鸭窝| 97超视频在线观看视频| 久久久久久久亚洲中文字幕| 亚洲自偷自拍三级| 国产色爽女视频免费观看| 菩萨蛮人人尽说江南好唐韦庄 | 只有这里有精品99| 国产中年淑女户外野战色| 边亲边吃奶的免费视频| 久久久久网色| 午夜福利网站1000一区二区三区| 亚洲欧美中文字幕日韩二区| 91久久精品电影网| 国产黄色视频一区二区在线观看 | 日本黄色片子视频| 亚洲成人精品中文字幕电影| 99热6这里只有精品| 22中文网久久字幕| 欧美xxxx性猛交bbbb| 国产极品精品免费视频能看的| 一区二区三区乱码不卡18| 99久久九九国产精品国产免费| 嫩草影院新地址| 国产伦一二天堂av在线观看| 校园人妻丝袜中文字幕| 黄色配什么色好看| 91精品伊人久久大香线蕉| 国产毛片a区久久久久| 日韩成人av中文字幕在线观看| 久久久欧美国产精品| 成年女人永久免费观看视频| 久久久久久久久中文| 欧美一区二区国产精品久久精品| 国产成人午夜福利电影在线观看| 听说在线观看完整版免费高清| 日韩欧美在线乱码| 久久久精品欧美日韩精品| 国产又色又爽无遮挡免| 国产高清国产精品国产三级 | 好男人视频免费观看在线| 少妇高潮的动态图| 欧美xxxx黑人xx丫x性爽| 少妇高潮的动态图| videossex国产| 老司机影院毛片| 好男人视频免费观看在线| .国产精品久久| 99热全是精品| 亚洲真实伦在线观看| 久久久色成人| 日韩人妻高清精品专区| 狂野欧美白嫩少妇大欣赏| 国产乱人视频| 少妇人妻精品综合一区二区| 日本五十路高清| 少妇熟女欧美另类| 国产一区二区三区av在线| 成人二区视频| 日韩精品有码人妻一区| 级片在线观看| 亚洲av成人av| 看片在线看免费视频| 国产黄a三级三级三级人| 一级毛片aaaaaa免费看小| 色哟哟·www| 国产在线男女| 国产高清国产精品国产三级 | www.色视频.com| 蜜桃久久精品国产亚洲av| 男女啪啪激烈高潮av片| 2021少妇久久久久久久久久久| 高清午夜精品一区二区三区| 精品一区二区三区视频在线| 男人舔奶头视频| 三级国产精品片| 亚洲精品久久久久久婷婷小说 | 久久久久久九九精品二区国产| 乱系列少妇在线播放| 国产爱豆传媒在线观看| 少妇熟女欧美另类| 亚洲精品成人久久久久久| 中文字幕免费在线视频6| 色噜噜av男人的天堂激情| av线在线观看网站| 亚洲精品乱久久久久久| 美女被艹到高潮喷水动态| 国产一区二区在线av高清观看| 成人午夜精彩视频在线观看| 少妇裸体淫交视频免费看高清| 亚洲欧美日韩东京热| av在线播放精品| 三级经典国产精品| 一级毛片我不卡| 国产极品精品免费视频能看的| 亚洲国产色片| 欧美一区二区精品小视频在线| 最近2019中文字幕mv第一页| 91aial.com中文字幕在线观看| 欧美成人免费av一区二区三区| 久久精品国产自在天天线| av线在线观看网站| 亚洲av福利一区| 精品国内亚洲2022精品成人| 青春草亚洲视频在线观看| 91狼人影院| 岛国在线免费视频观看| 精品国产露脸久久av麻豆 | 婷婷色av中文字幕| 国产精品av视频在线免费观看| 久久精品国产亚洲av天美| 美女黄网站色视频| 午夜视频国产福利| 视频中文字幕在线观看| 夫妻性生交免费视频一级片| 禁无遮挡网站| 久久欧美精品欧美久久欧美| 老司机福利观看| 精品一区二区免费观看| 精品国内亚洲2022精品成人| 深爱激情五月婷婷| 国语自产精品视频在线第100页| 午夜免费激情av| 日本黄大片高清| 精品人妻熟女av久视频| 亚洲精品日韩av片在线观看| 亚洲国产精品久久男人天堂| 长腿黑丝高跟| 亚洲性久久影院| 少妇猛男粗大的猛烈进出视频 | 国产精品一区二区三区四区免费观看| 亚洲欧美清纯卡通| 久久久久久九九精品二区国产| 国产片特级美女逼逼视频| 一级毛片我不卡| 欧美激情久久久久久爽电影| 免费看美女性在线毛片视频| 联通29元200g的流量卡| 美女黄网站色视频| 亚洲久久久久久中文字幕| 日本午夜av视频| 久久精品久久久久久久性| 久久欧美精品欧美久久欧美| 亚洲成人久久爱视频| 亚洲第一区二区三区不卡| 一区二区三区乱码不卡18| 国产精品1区2区在线观看.| 亚洲欧美日韩卡通动漫| 国产成人一区二区在线| a级毛片免费高清观看在线播放| 国产精品麻豆人妻色哟哟久久 | 久久99精品国语久久久| 国产真实乱freesex| 身体一侧抽搐| 男插女下体视频免费在线播放| 国产精品一区二区在线观看99 | 日本猛色少妇xxxxx猛交久久| 99热这里只有是精品50| 亚洲美女视频黄频| 中文字幕制服av| 哪个播放器可以免费观看大片| 久久久久性生活片| 午夜福利高清视频| 亚洲国产色片| 1000部很黄的大片| 日本欧美国产在线视频| 国产av码专区亚洲av| 午夜福利在线观看吧| 黄色日韩在线| 女人十人毛片免费观看3o分钟| 国产伦在线观看视频一区| 亚洲av电影在线观看一区二区三区 | 亚洲美女视频黄频| 亚洲av电影不卡..在线观看| 婷婷色综合大香蕉| 超碰97精品在线观看| 日本与韩国留学比较| 麻豆av噜噜一区二区三区| av在线观看视频网站免费| 麻豆精品久久久久久蜜桃| 午夜日本视频在线| 午夜激情欧美在线| 国产三级中文精品| 久久精品夜色国产| 久久热精品热| 成人av在线播放网站| 午夜福利网站1000一区二区三区| 午夜精品在线福利| 三级国产精品欧美在线观看| 99久国产av精品国产电影| 亚洲电影在线观看av| 大香蕉97超碰在线| 国产熟女欧美一区二区| 成人无遮挡网站| 少妇高潮的动态图| 免费搜索国产男女视频| www.av在线官网国产| 日本爱情动作片www.在线观看| 麻豆成人av视频| 久久99热这里只频精品6学生 | 亚洲精品成人久久久久久| 久热久热在线精品观看| 国产 一区精品| 国产精品一二三区在线看| 免费看a级黄色片| 美女高潮的动态| 自拍偷自拍亚洲精品老妇| 精品无人区乱码1区二区| 亚洲激情五月婷婷啪啪| 51国产日韩欧美| 午夜福利在线在线| 天堂av国产一区二区熟女人妻| 婷婷六月久久综合丁香| 久久精品国产鲁丝片午夜精品| 久久99热这里只有精品18| 国产精品麻豆人妻色哟哟久久 | 国产高清国产精品国产三级 | 婷婷色综合大香蕉| 欧美另类亚洲清纯唯美| 亚洲欧洲国产日韩| 九九爱精品视频在线观看| 久久99热这里只有精品18| 日韩欧美国产在线观看| 亚州av有码| 精品国内亚洲2022精品成人| 国产黄a三级三级三级人| 亚洲av中文字字幕乱码综合| 久久久久久久午夜电影| 免费av观看视频| 日本免费a在线| 日韩国内少妇激情av| 欧美激情在线99| 欧美日韩综合久久久久久| 久久久久九九精品影院| 三级国产精品欧美在线观看| 简卡轻食公司| 日本五十路高清| 久久精品国产99精品国产亚洲性色| 哪个播放器可以免费观看大片| 亚洲人成网站在线播| 我的女老师完整版在线观看| 黄色欧美视频在线观看| 97在线视频观看| 高清视频免费观看一区二区 | 亚洲婷婷狠狠爱综合网| 亚洲经典国产精华液单| 插阴视频在线观看视频| 两个人的视频大全免费| 国产精品美女特级片免费视频播放器| 婷婷色麻豆天堂久久 | 日本与韩国留学比较| 女人被狂操c到高潮| eeuss影院久久| 久久精品国产亚洲av天美| 国产精品国产三级国产av玫瑰| 青春草视频在线免费观看| 男女国产视频网站| 亚洲欧美成人精品一区二区| 久久久精品欧美日韩精品| 熟妇人妻久久中文字幕3abv| 国产精品久久久久久av不卡| 精品不卡国产一区二区三区| 99久国产av精品国产电影| 91午夜精品亚洲一区二区三区| 啦啦啦啦在线视频资源| 26uuu在线亚洲综合色| 又爽又黄a免费视频| 国产国拍精品亚洲av在线观看| 久久亚洲国产成人精品v| 卡戴珊不雅视频在线播放| 日本-黄色视频高清免费观看| 在线免费观看不下载黄p国产| 深夜a级毛片| 99久久人妻综合| 国产亚洲91精品色在线| 亚洲人成网站在线观看播放| 搡老妇女老女人老熟妇| 亚洲成色77777| 亚洲欧美日韩高清专用| 2022亚洲国产成人精品| 一卡2卡三卡四卡精品乱码亚洲| 国产精品一及| 中文字幕av在线有码专区| 欧美一区二区亚洲| 亚洲av二区三区四区| 亚洲欧美日韩高清专用| 国产亚洲5aaaaa淫片| 嘟嘟电影网在线观看| www.色视频.com| 国产淫语在线视频| 久久久久久国产a免费观看| 精品少妇黑人巨大在线播放 | 亚洲色图av天堂| 成人无遮挡网站| 亚洲国产高清在线一区二区三| 国产人妻一区二区三区在| 日本色播在线视频| 亚洲天堂国产精品一区在线| 黑人高潮一二区| 久久久久免费精品人妻一区二区| 亚洲高清免费不卡视频| 国产精品一区二区性色av| 久久久久性生活片| 午夜a级毛片|