{"created":"2020-09-01T13:55:00.957658+00:00","id":4013,"links":{},"metadata":{"_buckets":{"deposit":"3a54d5f1-6607-45c2-9c40-bdd2f2ed82a6"},"_deposit":{"id":"4013","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4013"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4013","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Discovery the User Access Pattern from Web Log Based on Association Rule Mining","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays , most of the people who may be ineducational field, IT fiel d, or business field or otherswidely use the internet. The e learning, e mailing,eCommerce and other online techniques are used. Theusage data are recorded by the Web server as the WebLog Data. Web usage mining mines Web Log Data todiscover user acces s patterns of Web page. AssociationRules are used to discover the user access patterns. So,in this paper, the Support ordered Trie Itemset(SOTrieIT) algorithm to analyze which is the mostfrequent visited website and Apriori algorithm, which iscandidat e generation algorithm to know the pairs ofwebsites, are used. From the result of this paper, usercan analyze the websites' popularity, usefulness andeffectiveness. Web administration can use this systemfor finding the appropriate actions."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-05"}],"displaytype":"preview","filename":"55122.pdf","filesize":[{"value":"626 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4013/files/55122.pdf"},"version_id":"f58d29fe-f0e6-413c-9143-d19c6b53c55e"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Wai, Hsu Mon Thet"},{"subitem_authors_fullname":"Win, Thandar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-12-30"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1724"},"item_title":"Discovery the User Access Pattern from Web Log Based on Association Rule Mining","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-05","publish_status":"0","recid":"4013","relation_version_is_last":true,"title":["Discovery the User Access Pattern from Web Log Based on Association Rule Mining"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:16:01.508180+00:00"}