<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">18236</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2021.018236</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>An E-Business Event Stream Mechanism for Improving User Tracing Processes</article-title>
<alt-title alt-title-type="left-running-head">An E-Business Event Stream Mechanism for Improving User Tracing Processes</alt-title>
<alt-title alt-title-type="right-running-head">An E-Business Event Stream Mechanism for Improving User Tracing Processes</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western">
<surname>Mostafa</surname>
<given-names>Ayman Mohamed</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref><email>amhassane@ju.edu.sa</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western">
<surname>Almuayqil</surname>
<given-names>Saleh N.</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western">
<surname>Said</surname>
<given-names>Wael</given-names>
</name>
<xref ref-type="aff" rid="aff-2">2</xref><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<aff id="aff-1"><label>1</label><institution>College of Computers and Information Sciences, Jouf University</institution>, <addr-line>Sakaka, 72314</addr-line>, <country>Saudi Arabia</country></aff>
<aff id="aff-2"><label>2</label><institution>Faculty of Computers and Informatics, Zagazig University</institution>, <addr-line>Zagazig, 44519</addr-line>, <country>Egypt</country></aff>
<aff id="aff-3"><label>3</label><institution>College of Computer Science and Engineering, Taibah University</institution>, <addr-line>Medina, 42353</addr-line>, <country>Saudi Arabia</country></aff>
</contrib-group>
<author-notes><corresp id="cor1">&#x002A;Corresponding Author: Ayman Mohamed Mostafa. Email: <email>amhassane@ju.edu.sa</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2021-05-31"><day>31</day><month>05</month><year>2021</year></pub-date>
<volume>69</volume>
<issue>1</issue>
<fpage>767</fpage>
<lpage>784</lpage>
<history>
<date date-type="received"><day>01</day><month>03</month><year>2021</year></date>
<date date-type="accepted"><day>02</day><month>04</month><year>2021</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2021 Mostafa, Almuayqil and Said</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Mostafa, Almuayqil and Said</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_18236.pdf"></self-uri>
<abstract>
<p>With the rapid development in business transactions, especially in recent years, it has become necessary to develop different mechanisms to trace business user records in web server log in an efficient way. Online business transactions have increased, especially when the user or customer cannot obtain the required service. For example, with the spread of the epidemic Coronavirus (COVID-19) throughout the world, there is a dire need to rely more on online business processes. In order to improve the efficiency and performance of E-business structure, a web server log must be well utilized to have the ability to trace and record infinite user transactions. This paper proposes an event stream mechanism based on formula patterns to enhance business processes and record all user activities in a structured log file. Each user activity is recorded with a set of tracing parameters that can predict the behavior of the user in business operations. The experimental results are conducted by applying clustering-based classification algorithms on two different datasets; namely, Online Shoppers Purchasing Intention and Instacart Market Basket Analysis. The clustering process is used to group related objects into the same cluster, then the classification process measures the predicted classes of clustered objects. The experimental results record provable accuracy in predicting user preferences on both datasets.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Business transactions</kwd>
<kwd>event stream</kwd>
<kwd>log file</kwd>
<kwd>tracing parameters</kwd>
<kwd>clustering-based classification</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>E-business becomes an international business that covers and extends all over the world. It is necessary to find a suit framework and form to preserve the stakeholder&#x2019;s rights and ethics. Financial institutions should support E-business processes to maximize profits while maintaining a degree of ethics. Ethics is a set of behaviors and principles that focus on values and moral feels, while morality is the implementation and translation of ethics into tangible acts and activities [<xref ref-type="bibr" rid="ref-1">1</xref>]. The rising number of available web services results in the need to facilitate web service presented to consumers to specify their required specification services. Different platforms are required to publish, view and compare services in order to enhance organizational profit [<xref ref-type="bibr" rid="ref-2">2</xref>]. Different semantic web services are proposed to define the automatic services by providing semantic descriptions with additional mechanisms to model services.</p>
<p>Social network sites provide a large dataset to predict major opportunities, challenges and enhancing interactive online business operations [<xref ref-type="bibr" rid="ref-3">3</xref>]. Through the revolution of technologies, E-business applications become the most important and popular way to share data between users [<xref ref-type="bibr" rid="ref-4">4</xref>]. The rapid development in technical and production mechanisms and processes, lead to update and develop the E-business and engineering activities.</p>
<p>Enhancing and predicting E-business operations depends mainly on managing and organizing the web server log of the E-business framework. Organizing the web server log operations can enhance and improve the process of user tracing to predict user behavior.</p>
<p>The web server log files collect webpage request history information in chronological order. Typically, the collected and stored information includes client IP, client name, request date and time, server site name, server computer name, server IP, server port, client server method, client serves URL stream, client server URL query, server client status, server client win32 status, server client bytes, the client server bytes, time taken, client server version, client server host, user agent, cookies, and the referring URL. In [<xref ref-type="bibr" rid="ref-5">5</xref>], these data are divided into different classes that are general statistics, software warning and system failure, safety instructions, approval of program execution, and Time-based functions. In [<xref ref-type="bibr" rid="ref-6">6</xref>], the challenges associated with that information have been identified. These challenges include merging extraneous information with useful ones, generating multiple server requests by a single user action, and the lack of recording local activities. The general characteristics of web log files are mentioned in [<xref ref-type="bibr" rid="ref-7">7</xref>].</p>
<p>This paper proposes a set of satisfaction relations to formalize rules that can trace and record different E-business processes. An event universe of quintuple parameters is presented to determine a complete tracing mechanism for predicting user behavior. The organization of the paper is as follows: Section 2 presents a set of related work in the field of E-business. In Section 3, we propose satisfaction relations to be applied to the log file. In Section 4, we present an event universe mechanism to trace all user actions with a set of formula patterns. In Section 5, we present a counting methodology based on the proposed event universe to record the frequency of the performed user actions that can lead to better user behavior prediction. In Section 6, the methodology for improving the user tracing processes is presented. In Section 7, we conduct the experimental results using clustering and classification algorithms on different data sets. In Section 8, the conclusion with recent points to be used in future works is introduced.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>The role of E-business engineering in developing a new framework can provide more facilities to improve the cooperation between the company and consumer. E-business engineering can improve and develop systems optimization, security, privacy, and trust in systems. The main risks and challenges that may be faced are how to preserve the quality of services during its growth with respect to some security challenges or risks about keeping user&#x2019;s data and information safe and preserving their privacy. As a result, the more accurate forecasting gives a more effective strategy and ameliorates the predicted situation [<xref ref-type="bibr" rid="ref-8">8</xref>]. Managers play a huge role in improving the firms of their business, by well understanding and evaluating the true market value of a firm&#x2019;s security activity that will help them make the right market decisions [<xref ref-type="bibr" rid="ref-9">9</xref>]. The main important and required factor is how to formalize the log file so that all user records can be traced which can lead to a better expectation of user behavior [<xref ref-type="bibr" rid="ref-10">10</xref>].</p>
<p>To improve the performance, elasticity, maintainability, reusability, and scalability of the E-business, a three-layer E-business architecture is established. These layers are the presentation layer, business logic layer, and data layer; each layer has its responsibilities and role [<xref ref-type="bibr" rid="ref-11">11</xref>]. As well, they are used to record all user operations into a web server log or a log file.</p>
<p>The following subsections highlight key aspects of the web server log regarding its role and classifications, state-of-the-art mechanisms for analyzing the web server log, and the most recent researches that apply data mining and machine learning techniques to enhance prediction from data in the web server log.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Web Server Log</title>
<p>A log file is an automatically generated plain text data file that works on events, processes, activities, actions, tasks, messages, and communication for an operating system, application, or server. According to where the log files are located, they are classified into three types: web server log files, proxy server log files, and client browser log files [<xref ref-type="bibr" rid="ref-12">12</xref>&#x2013;<xref ref-type="bibr" rid="ref-14">14</xref>]. The major drawbacks of these server-side logs, proxy-side logs, and client-side logs are described in [<xref ref-type="bibr" rid="ref-15">15</xref>]. In [<xref ref-type="bibr" rid="ref-16">16</xref>], web server log files are described as a many-to-one relationship; multiple users visit a single website. The proxy server log files are considered to be many-to-many relationships where one user can access many websites and many users can visit one website. Whereas, the client browser log files are in the form of one-to-many relationships; a particular user visits many websites.</p>
<p>Indeed, the web log file act as the visitor&#x2019;s logbook. Moreover, they have the ability to answer some important questions such as which webpages are getting the most and the least traffic, which webpages are requested, when the webpages are requested, who requested them, where they were referred from, which browsers and operating systems are used to access a website, and when search robots and directory editors visit a web site.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Web Log Analysis</title>
<p>Analyzing web log data is like looking for diamonds in a coal mine. Indeed, web log files assist in gaining a serious idea of a user. Some of the primary benefits of analyzing web log files from a user&#x2019;s point of view include capturing the knowledge of user&#x2019;s behavior, determining user satisfaction, satisfying user expectations, building user sessions, predicting the intention of the user, inferring user demographics to apply market segmentation, improving user attraction, improving user retention, enhancing advertisements cross-sales, and gathering information about user navigation patterns. Various research papers for web log files are presented to explain its main idea and recent methodologies in enhancing the web server log.</p>
<p>Suneetha et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] provide a web log data analysis for the NASA website. The analysis has the ability to determine the total number of Hit ratio and the potential visitors to the site either the number of visitors per day or the total number of unique visitors. Moreover, the occurred system errors, corrupted and broken links are determined to assist system administrators and web designer to arrange website. As shown in [<xref ref-type="bibr" rid="ref-17">17</xref>], another analysis methodology for NASA web server log is executed using one of the Hadoop data analytics tools called Apache Pig. The main goal of that research is to analyze NASA big data for enhancing the prediction of data. Verma et al. [<xref ref-type="bibr" rid="ref-6">6</xref>] provide a statistical analysis of web log files for the NASA website. The authors analyzed the data for August 1995 using web log software to describe and visualize the behavioral aspects of users such as the number daily visitors, types of daily error, and user activity by day of the week. The daily error types include 404 not found, 403 forbidden, 400 bad request, and 500 internet server error.</p>
<p>As presented in [<xref ref-type="bibr" rid="ref-18">18</xref>], a stochastic mechanism is provided for the modeling of an intention of purchase. The authors use the Hidden Markov Model (HMM) to predict user browsing behavior with the intent to purchase from an E-commerce site. In [<xref ref-type="bibr" rid="ref-19">19</xref>], the user behavior toward advertisements from E-commerce data is modeled by using a combination of HMM and Logistic Regression. The main objectives of this research are to determine the effect of advertising on the user&#x2019;s purchasing behavior, to capture the influence of both the advertisement properties and the user&#x2019;s internal state on the user&#x2019;s purchase behavior prediction, to assess which advertisements are most likely to produce purchases from a specific user, and to provide acceptable advertisements to a particular user.</p>
<p>As shown in [<xref ref-type="bibr" rid="ref-20">20</xref>], online web log data is analyzed for a blogging website created by authors. The analysis process is used to improve the site&#x2019;s structure and generate insights into the behavior of viewers who have visited the site for two weeks. The viewers&#x2019; behavior is measured by identifying the page that attracts the user&#x2019;s interest, the page that ensures the visitor continues to browse the site, the page that accessed mostly by visitors, and the hourly traffic analysis over the course of two weeks of website activity. Another analysis mechanism for the web server log is introduced in [<xref ref-type="bibr" rid="ref-13">13</xref>]. The author&#x2019;s goal is to determine system errors, user preferences, user behaviors, website popularity, technical information about users, as well as corrupted and broken links. The authors provide statistical information about most visited pages, popular paths through the site, length of stay of the visitor, visits per hour in a day, most used search engines, phrases used by visitors, and the most common server errors. The authors of [<xref ref-type="bibr" rid="ref-21">21</xref>] perform various analyzes to judge the interest and behavior of users from the web server logs of an academic institutional website. The authors utilize the Aw-stats WM tool to collect web log data in various aspects. Additionally, they use the WEKA tool to visualize the extracted patterns.</p>
<p>Sujatha et al. [<xref ref-type="bibr" rid="ref-7">7</xref>] propose a model named PUCC, to predict user&#x2019;s navigation patterns from web log data using clustering and classification. In the PUCC model, the graph partitioning clustering algorithm is used to assign a user to a predefined labeled category when the user&#x2019;s data contain more features similar to that category. The Longest Common Subsequence (LCS) classification algorithm is used to separate web log data into groups of users with similar navigation. Based on the extracted patterns from the clustering and classification process, the user&#x2019;s future requests could be predicted. As shown in [<xref ref-type="bibr" rid="ref-22">22</xref>], an analysis of behavioral patterns and users&#x2019; profiles are applied for an educational institution web log data within one day. The authors utilize the web log expert tool to extract activities such as total hits, number of visitors, users&#x2019; IP addresses, page views, consumed bandwidth, most popular page, and most downloaded files.</p>
<p>Another statistical analysis method is conducted using association rules-based analysis to the web log file for a bookstore website [<xref ref-type="bibr" rid="ref-23">23</xref>]. The analysis is carried out for exploring the dependencies between the various characteristics of a user&#x2019;s visit to the online store&#x2019;s website and the likelihood that they will end up purchasing. The authors divide the user behavior into three categories. These categories are anonymous users visiting only one page without logging in and purchasing, users who logged in but did not purchase anything, and users who decided to make a purchase. Murata et al. [<xref ref-type="bibr" rid="ref-24">24</xref>] provide a method for analyzing users&#x2019; web-watching behaviors and extracting users&#x2019; interests from augmented web audience measurement data. The analysis is conducted to represent the data as a graph structure of sites and keywords. This representation is due to the fact that the visited websites and search keywords are related to each other in a chronological sequence. The page rank ranking algorithm is used to evaluate the quality of the extracted interests.</p>
<p>As shown in [<xref ref-type="bibr" rid="ref-25">25</xref>], an analysis of web user behavior is performed by applying the business process management (BPM) technique to an online travel and booking agency. The basic idea is to treat user clicks that are extracted from the web log file as an unstructured process. Then, using process mining algorithms to discover user behavior after classifying and transforming URLs into events. As presented in [<xref ref-type="bibr" rid="ref-26">26</xref>], a graph partitioning-based approach is proposed to a cluster of user&#x2019;s web navigation behavior by generating an undirected graph that is based on the connection between each pair of the web pages. The authors use the web log file to model user navigation patterns and predict future user request.</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Machine Learning on E-Business Applications</title>
<p>Clustering and classification algorithms are considered major methods for analyzing and measuring the performance of E-business applications. As presented in [<xref ref-type="bibr" rid="ref-27">27</xref>], an E-business framework is presented by clustering information networks to discover the optimal clusters given from different datasets. Most E-business applications are based on small and medium-sized enterprises that require high analysis of their business processes. As shown in [<xref ref-type="bibr" rid="ref-28">28</xref>], a random forest classification algorithm is used to determine the preferences of E-business applications. Based on the experimental results stated in this research, different recommendations can be taken to enhance the structure of small-medium enterprises. Another E-business process management based on classification algorithms is presented in [<xref ref-type="bibr" rid="ref-29">29</xref>]. In this research, a predictive analysis using 20 classifiers is proposed to evaluate the classifier&#x2019;s accuracy and performance on different event logs. The log traces should be also secured from security breaches and attacks. The authors of [<xref ref-type="bibr" rid="ref-30">30</xref>] propose two classification approaches to provide secure tracing processes. The first approach is model-driven which is based on behavioral activities of event logs while the second approach is example-driven which is based on the sequence of events.</p>
<p>As shown in [<xref ref-type="bibr" rid="ref-31">31</xref>], web data mining is applied to E-commerce using the linear regression algorithm to obtain frequent access patterns from the web log data and provide valuable information about users&#x2019; interests. The linear regression algorithm is used to calculate the accuracy of the output by representing the customer&#x2019;s user ID and the number of times the product is searched as input variables while the searched product is used as the single output variable.</p>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>LTL Model Checking Approach</title>
<p>The Linear-Temporal Logic (LTL) technique is used as an alternative to data mining to analyze the sequence of the actions performed by users from the E-business Web log files. The basic idea is to define different predefined queries to transfer web log records into event logs for capturing the users&#x2019; behavior. LTL is based on a set of mathematical formulas that can determine a set of constraints based on activities&#x2019; orders. The LTL defines a set of finite or infinite formula patterns for user processes and activities in order to predict future paths. Based on the prediction processes, the tracing processes can be enhanced and the user behavior can be predicted in future browsing processes.</p>
<p>As presented in [<xref ref-type="bibr" rid="ref-32">32</xref>], a set of formula patterns with a set of definitions are identified. The LTL formulas are applied for ordered and non-ordered browsing processes within a specific period of time to record an even stream of users. As presented in [<xref ref-type="bibr" rid="ref-33">33</xref>] one action at a specific period of time. As shown in [<xref ref-type="bibr" rid="ref-34">34</xref>], the LTL is applied to a real case study of an online Spanish provider of scraping products website called Up &#x0026; Scrap website. The LTL patterns are used to analyze user behavior in the website by dividing the website into the main section and secondary sections where the main section represents the homepage of the website while the secondary sections represent the subsections for a set of products.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Satisfaction Relations</title>
<p>In the E-business architecture, there are different processes or operations that can be executed during user transactions. For predicting user behavior, a log file is created based on different event actions. As presented in [<xref ref-type="bibr" rid="ref-35">35</xref>], most of the systems do not fully utilize the web serve log that contains all previously recorded information of user activities. As presented in <xref ref-type="table" rid="table-1">Tab. 1</xref>, all user processes are recorded in the pre-defined log file based on different event categories. The browsing process (B) is based on viewing different items in the E-business structure levels. The action process is based on revising (R), payment (P), and executing (E) user transactions. Returning items (RI) are considered a major action in the E-business structure if there are defects in the items. There are other main actions to the administrator of the web service such as adding, removing, and modifying posts (AP), (RP), and (MP) respectively on the web service.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>E-business user processes</title>
</caption>

<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Symbol</th>
<th>B</th>
<th>R</th>
<th>E</th>
<th>RI</th>
<th>AP</th>
<th>RP</th>
<th>MP</th>
</tr>
</thead>
<tbody>
<tr>
<td>Action</td>
<td>Browse</td>
<td>Revise</td>
<td>Execute</td>
<td>Return item</td>
<td>Add post</td>
<td>Remove post</td>
<td>Modify post</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>For recording all user actions in the log file, a set of satisfaction processes should be defined for recording user operations. These satisfaction processes are considered an extension to [<xref ref-type="bibr" rid="ref-32">32</xref>,<xref ref-type="bibr" rid="ref-36">36</xref>] that proposed different LTL formula patterns for enhancing E-business structure performance. A satisfaction relation <inline-formula id="ieqn-1"><!----><mml:math id="mml-ieqn-1"><mml:mo>&#x22A8;</mml:mo></mml:math></inline-formula> is defined to verify whether a specific formula is correct or not.</p>
<p>Let <inline-formula id="ieqn-2"><!----><mml:math id="mml-ieqn-2"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula> is the total propositions of event actions. Consider <italic>f</italic><sub>1</sub> and <italic>f</italic><sub>2</sub> are two formula patterns that evaluates the relationship between each two actions in the event universe.</p>
<p>Let <inline-formula id="ieqn-3"><!----><mml:math id="mml-ieqn-3"><mml:mi>&#x03C3;</mml:mi></mml:math></inline-formula> is the tracing process for both formula patterns <italic>f</italic><sub>1</sub> &#x0026; <italic>f</italic><sub>2</sub>. The satisfaction relation <inline-formula id="ieqn-4"><!----><mml:math id="mml-ieqn-4"><mml:mo>&#x22A8;</mml:mo></mml:math></inline-formula> is defined based on the following rules:</p>
<p><bold>Rule 1:</bold> <inline-formula id="ieqn-5"><!----><mml:math id="mml-ieqn-5"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:mo>&#x00AC;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> if <inline-formula id="ieqn-6"><!----><mml:math id="mml-ieqn-6"><mml:mo>&#x00AC;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> means that the formula pattern <italic>f</italic><sub>1</sub> may not be executed in the event universe.</p>
<p><bold>Rule 2:</bold> <inline-formula id="ieqn-7"><!----><mml:math id="mml-ieqn-7"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> if <inline-formula id="ieqn-8"><!----><mml:math id="mml-ieqn-8"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-9"><!----><mml:math id="mml-ieqn-9"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> means that the tracing process will be based on both formula patterns <inline-formula id="ieqn-10"><!----><mml:math id="mml-ieqn-10"><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width=".3em" /><mml:mi>&#x0026;</mml:mi><mml:mspace width=".3em" /><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
<p><bold>Rule 3:</bold> If <inline-formula id="ieqn-11"><!----><mml:math id="mml-ieqn-11"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>X</mml:mi></mml:mstyle><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> then <inline-formula id="ieqn-12"><!----><mml:math id="mml-ieqn-12"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> where <inline-formula id="ieqn-13"><!----><mml:math id="mml-ieqn-13"><mml:mstyle mathvariant="normal"><mml:mi>X</mml:mi></mml:mstyle></mml:math></inline-formula> is the preceding function. This means that the formula pattern <italic>f</italic><sub>2</sub> will be executed if the preceding formula pattern <italic>f</italic><sub>1</sub> is being executed.</p>
<p><bold>Rule 4:</bold> <inline-formula id="ieqn-14"><!----><mml:math id="mml-ieqn-14"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x222A;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> means that at least <inline-formula id="ieqn-15"><!----><mml:math id="mml-ieqn-15"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> or <inline-formula id="ieqn-16"><!----><mml:math id="mml-ieqn-16"><mml:mi>6</mml:mi><mml:mo>&#x22A8;</mml:mo><mml:msub><mml:mrow><mml:mi>f</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> must be executed in the event universe.</p>
</sec>
<sec id="s4">
<label>4</label>
<title>Event Universe Mechanism</title>
<p>Information systems-related application of E-business is applied based on event logs for determining the number of occurrences that an action may be performed by a user. In an event log, each executed process constitutes a condition. All actions related to this condition will be traced and recorded in the log file. To record all event actions, an event universe e is defined based on the following definition:</p>
<p><bold>Definition 1 (Event Universe</bold> <italic>e</italic><bold>):</bold> an event universe <italic>e</italic> based on quintuple parameters is presented in the following formula:</p>
<p><disp-formula id="eqn-1">
<label>(1)</label>

<mml:math id="mml-eqn-1" display="block"><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>l</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>t</mml:mi><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:mi>e</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>U</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>C</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>L</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>T</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>A</mml:mi></mml:math></disp-formula></p>
<p>where:
<list list-type="bullet">
<list-item><p><italic>u</italic> is the user of the action under consideration.</p></list-item>
<list-item><p><italic>c</italic> is the category of the items presented in the E-business web service.</p></list-item>
<list-item><p><italic>l</italic> is the level of the items being traced.</p></list-item>
</list></p>
<p>As presented in [<xref ref-type="bibr" rid="ref-36">36</xref>], the E-business structure is based on different levels for presenting items and sub-items.</p>
<list list-type="bullet">
<list-item><p><italic>t</italic> is the time of the performed action.</p></list-item>
<list-item><p><italic>a</italic> is the action in the event universe <italic>e</italic>.</p></list-item>
</list>
<p>Based on the presented event universe and the several user processes, the statistical analysis of the overall processes will be based on the following definitions:</p>
<p><bold>Definition 2 (Browsing Analysis):</bold> the percentage of browsing process (<italic>B<sub>i</sub></italic>) in the E-business web service is based on identifying the browsing process in the event universe <italic>e</italic>.</p>
<p><disp-formula id="eqn-2">
<label>(2)</label>

<mml:math id="mml-eqn-2" display="block"><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>e</mml:mi><mml:mstyle><mml:mtext>&#x00A0;and&#x00A0;</mml:mtext></mml:mstyle><mml:mi>v</mml:mi><mml:mo>&#x2282;</mml:mo><mml:mi>l</mml:mi><mml:mstyle><mml:mtext>&#x00A0;such&#x00A0;that&#x00A0;</mml:mtext></mml:mstyle><mml:mspace width="1em"/><mml:mi>l</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:mo>&#x2026;</mml:mo><mml:mo>,</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p><bold>Definition 3 (Revise Analysis):</bold> the overall revise processes (<italic>R<sub>i</sub></italic>) must be analyzed based on the formula:</p>
<p><disp-formula id="eqn-3">
<label>(3)</label>

<mml:math id="mml-eqn-3" display="block"><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>e</mml:mi><mml:mstyle><mml:mtext>&#x00A0;such&#x00A0;that&#x00A0;</mml:mtext></mml:mstyle><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:mi>v</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>R</mml:mi></mml:math></disp-formula></p>
<p><bold>Definition 4 (Payment Analysis):</bold> the payment process (<italic>P<sub>i</sub></italic>) must be executed once the revise process is true. No payment process can be executed without revising processes. As a result, the payment must be executed with intersecting revise with browsing, revising, and payment processes based on the formula:</p>
<p><disp-formula id="eqn-4">
<label>(4)</label>

<mml:math id="mml-eqn-4" display="block"><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>e</mml:mi><mml:mstyle><mml:mtext>&#x00A0;such&#x00A0;that&#x00A0;</mml:mtext></mml:mstyle><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:mi>v</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>R</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>P</mml:mi></mml:math></disp-formula></p>
<p><bold>Definition 5 (Execute Analysis):</bold> as proposed in previous definitions, the execute process (<italic>E<sub>i</sub></italic>) must be followed by browsing, revise, payment processes based on the following formula:</p>
<p><disp-formula id="eqn-5">
<label>(5)</label>

<mml:math id="mml-eqn-5" display="block"><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:msub><mml:mrow><mml:mi>E</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>e</mml:mi><mml:mstyle><mml:mtext>&#x00A0;such&#x00A0;that&#x00A0;</mml:mtext></mml:mstyle><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:msub><mml:mrow><mml:mi>E</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>v</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>R</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>P</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>E</mml:mi></mml:math></disp-formula></p>
<p><bold>Definition 6 (Rollback Analysis):</bold> the returning item (<italic>RI<sub>i</sub></italic>) mechanism has a Boolean parameter whether the item may be returned back or not. The <italic>RI<sub>i</sub></italic> must satisfy the condition that all preceding processes must be executed based on the formula:</p>
<p><disp-formula id="eqn-6">
<label>(6)</label>

<mml:math id="mml-eqn-6" display="block"><mml:mo>&#x2200;</mml:mo><mml:mspace width="0.3em"/><mml:mi>R</mml:mi><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mi>e</mml:mi><mml:mstyle><mml:mtext>&#x00A0;such&#x00A0;that&#x00A0;</mml:mtext></mml:mstyle><mml:mstyle><mml:mtext>%</mml:mtext></mml:mstyle><mml:mi>R</mml:mi><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>v</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi><mml:mi>R</mml:mi></mml:mstyle><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>P</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>E</mml:mi><mml:mo>&#x2229;</mml:mo><mml:mstyle mathvariant="normal"><mml:mi>%</mml:mi></mml:mstyle><mml:mi>R</mml:mi><mml:mi>I</mml:mi></mml:math></disp-formula></p>
<p>Based on the previous definitions, different activities can be traced as part of the event stream. As shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, a visual event stream is proposed for analyzing user actions. Each trace Id represents a set of subsequent activities based on the quintuple parameters <inline-formula id="ieqn-17"><!----><mml:math id="mml-ieqn-17"><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>c</mml:mi><mml:mo>,</mml:mo><mml:mi>l</mml:mi><mml:mo>,</mml:mo><mml:mi>t</mml:mi><mml:mo>,</mml:mo><mml:mi>a</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula>. As shown in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, all E-business transactions are recorded starting from the browsing service at different levels with the assumption that the categories of the proposed E-business structure are embedded into four levels as presented in [<xref ref-type="bibr" rid="ref-36">36</xref>]. The remaining processes are revising, payment, executing, rolling back the process, adding post service, modifying post service, and removing post service.</p>
<p>Assuming that the E-business structure is based on four levels of categories, each browsing level <italic>k</italic> must be preceded by a browsing level <italic>i</italic>. As presented in Tab. 2, a set of event log tracing processes is recorded. Each distinct event log is called a trace with different activities based on the structure of the web service. As shown in <xref ref-type="table" rid="table-2">Tab. 2</xref>, each trace process has a trace id, and the sequence of corresponding activities. Each activity is associated with the final action of the user behavior. For example, for a user who performs an E-business process until execution action, the user can perform different browsing processes, then perform the payment actions as shown in trace id 7 and 8. A timestamp is added to view the specific time for each tracing mechanism.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Visual event stream for event universe</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-1.png"/>
</fig>
 
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Event log tracing mechanism</title>
</caption>

<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Trace id</th>
<th>Activity</th>
<th>Actions</th>
<th>Trace Mechanism</th>
<th>Timestamp</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td><inline-formula id="ieqn-18"><!----><mml:math id="mml-ieqn-18"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>B<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-19"><!----><mml:math id="mml-ieqn-19"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mspace width=".3em" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width=".3em" /><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>27:11:2020 12:03</td>
</tr>
<tr>
<td>2</td>
<td><inline-formula id="ieqn-20"><!----><mml:math id="mml-ieqn-20"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>B<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-21"><!----><mml:math id="mml-ieqn-21"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mspace width=".3em" /><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mspace width=".3em" /><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>25:12:2020 13:03</td>
</tr>
<tr>
<td>3</td>
<td><inline-formula id="ieqn-22"><!----><mml:math id="mml-ieqn-22"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>P<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-23"><!----><mml:math id="mml-ieqn-23"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>13:11:2020 02:03</td>
</tr>
<tr>
<td>4</td>
<td><inline-formula id="ieqn-24"><!----><mml:math id="mml-ieqn-24"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mn>4</mml:mn><mml:mo>,</mml:mo><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>6</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>P<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-25"><!----><mml:math id="mml-ieqn-25"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>23:10:2020 14:55</td>
</tr>
<tr>
<td>5</td>
<td><inline-formula id="ieqn-26"><!----><mml:math id="mml-ieqn-26"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>6</mml:mn><mml:mo>,</mml:mo><mml:mn>7</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>E<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-27"><!----><mml:math id="mml-ieqn-27"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>E</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>28:11:2020 16:41</td>
</tr>
<tr>
<td>6</td>
<td><inline-formula id="ieqn-28"><!----><mml:math id="mml-ieqn-28"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>5</mml:mn><mml:mo>,</mml:mo><mml:mn>6</mml:mn><mml:mo>,</mml:mo><mml:mn>7</mml:mn><mml:mo>,</mml:mo><mml:mn>8</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>RI<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-29"><!----><mml:math id="mml-ieqn-29"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>R</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:msub><mml:mrow><mml:mi>E</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2229;</mml:mo><mml:mi>R</mml:mi><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>22:02:2021 15:33</td>
</tr>
<tr>
<td>7</td>
<td><inline-formula id="ieqn-30"><!----><mml:math id="mml-ieqn-30"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>9</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>AP<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-31"><!----><mml:math id="mml-ieqn-31"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:mi>A</mml:mi><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>26:01:2021 21:18</td>
</tr>
<tr>
<td>8</td>
<td><inline-formula id="ieqn-32"><!----><mml:math id="mml-ieqn-32"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>10</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>MP<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-33"><!----><mml:math id="mml-ieqn-33"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:mi>M</mml:mi><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>27:01:2021 04:37</td>
</tr>
<tr>
<td>9</td>
<td><inline-formula id="ieqn-34"><!----><mml:math id="mml-ieqn-34"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:msub><mml:mrow><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>3</mml:mn><mml:mo>,</mml:mo><mml:mn>11</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td><italic>RP<sub>i</sub></italic></td>
<td><inline-formula id="ieqn-35"><!----><mml:math id="mml-ieqn-35"><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mrow><mml:mi>l</mml:mi></mml:mrow><mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow><mml:mo>&#x2223;</mml:mo><mml:mo>&#x2223;</mml:mo><mml:mrow><mml:mo>&#x2329;</mml:mo><mml:mrow><mml:mi>R</mml:mi><mml:msub><mml:mrow><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x232A;</mml:mo></mml:mrow></mml:math></inline-formula></td>
<td>28:01:2021 09:28</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5">
<label>5</label>
<title>User Process Counting</title>
<p>The web server log is converted into a set of web event logs and is conceptually divided into event blocks (EB) with a width <italic>w</italic> such that:</p>
<p><disp-formula id="eqn-7">
<label>(7)</label>

<mml:math id="mml-eqn-7" display="block"><mml:mi>w</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>p</mml:mi></mml:mrow><mml:mrow><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>where: <italic>p</italic> is the total number of processes in the event log and <italic>len</italic> is the length parameter.</p>
<p>The basic structure of the user process counting is a set of entries of the form <inline-formula id="ieqn-36"><!----><mml:math id="mml-ieqn-36"><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>e</mml:mi><mml:mo>,</mml:mo><mml:mi>u</mml:mi><mml:mo>,</mml:mo><mml:mi>&#x03B4;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> where:
<list list-type="bullet">
<list-item><p><italic>e</italic> is an event action of the log stream that can be categorized based on the user behavior.</p></list-item>
<list-item><p><italic>u</italic> is the user of the event who performing the action.</p></list-item>
<list-item><p><inline-formula id="ieqn-37"><!----><mml:math id="mml-ieqn-37"><mml:mi>&#x03B4;</mml:mi></mml:math></inline-formula> is the approximated number of times that the event action e may occur.</p></list-item>
</list></p>
<p>As shown in <xref ref-type="table" rid="table-3">Tab. 3</xref>, a user process counting mechanism is performed to record all user behavior on behalf of the frequency of each E-business process. The MAC address is recorded with the username of the user, the action type, and the action frequency <inline-formula id="ieqn-38"><!----><mml:math id="mml-ieqn-38"><mml:mi>&#x03B4;</mml:mi></mml:math></inline-formula>.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>User behavior prediction</title>
</caption>

<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>MAC address</th>
<th>User</th>
<th>Action type</th>
<th>Frequency <inline-formula id="ieqn-39"><!----><mml:math id="mml-ieqn-39"><mml:mi>&#x03B4;</mml:mi></mml:math></inline-formula></th>
</tr>
</thead>
<tbody>
<tr>
<td>1e:2a:71:51:4f:21</td>
<td>SCOTT</td>
<td>Browsing</td>
<td>3</td>
</tr>
<tr>
<td>6a:2b:4c:3b:2f:7b</td>
<td>ADAMS</td>
<td>Browsing</td>
<td>4</td>
</tr>
<tr>
<td>1e:2a:71:51:4f:21</td>
<td>SCOTT</td>
<td>Return item</td>
<td>2</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s6">
<label>6</label>
<title>Proposed Methodology</title>
<p>The main objective of this paper is to improve the quality of predicting user activities based on the event log of two different data sets. These datasets are the Online Shoppers Purchasing Intention [<xref ref-type="bibr" rid="ref-37">37</xref>,<xref ref-type="bibr" rid="ref-38">38</xref>] and the Instacart Market Basket Analysis dataset of Kaggle [<xref ref-type="bibr" rid="ref-39">39</xref>]. As presented in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>, the proposed mechanism is based on applying different clustering algorithms such as density-based clustering, farthest first cluster, EM cluster and K-mean cluster. These methods groups similar objects into the same cluster. After applying the clustering algorithms, a set of classifications algorithms are applied to measure the predicted classes on the clustered data.</p>
<p>As presented in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>, the event log tracing is applied on both datasets and a clustering process is performed before the classification process for enhancing the performance of the user tracing process over infinite user transactions. The objective of applying clustering algorithms is to determine similar objects into a set of groups called clusters. The objects that are similar to each other are grouped into the same cluster for maximizing the intra-class similarity. In order to validate the proposed mechanism, two distinct datasets are applied on the clustering and classification algorithms to measure the accuracy of the algorithms in predicting and enhancing user behavior tracing activities. The first clustering-classification mechanism is applied by performing the clustering process using the Farthest First cluster algorithm [<xref ref-type="bibr" rid="ref-40">40</xref>], Expectation Maximization (EM) cluster algorithm [<xref ref-type="bibr" rid="ref-41">41</xref>], and K-mean cluster algorithm [<xref ref-type="bibr" rid="ref-42">42</xref>]. The clustered results are applied on eight classification algorithms: Bayes Net [<xref ref-type="bibr" rid="ref-43">43</xref>], Na&#x00EF;ve Bayes [<xref ref-type="bibr" rid="ref-43">43</xref>], K* [<xref ref-type="bibr" rid="ref-44">44</xref>], Filtered Classifier [<xref ref-type="bibr" rid="ref-45">45</xref>], Decision Table [<xref ref-type="bibr" rid="ref-43">43</xref>], JRip algorithm [<xref ref-type="bibr" rid="ref-46">46</xref>], J48 [<xref ref-type="bibr" rid="ref-47">47</xref>], and Logistic Model Tree (LMT) [<xref ref-type="bibr" rid="ref-48">48</xref>]. The second clustering-classification mechanism is applied by performing the clustering process using density-based clustering [<xref ref-type="bibr" rid="ref-49">49</xref>]. The clustered results are embedded with five classification algorithms: Support Vector Machine (SVM) [<xref ref-type="bibr" rid="ref-50">50</xref>], Logistic Regression (LR) [<xref ref-type="bibr" rid="ref-51">51</xref>], K-nearest neighbor (KNN) [<xref ref-type="bibr" rid="ref-52">52</xref>], Random Forest (RF) [<xref ref-type="bibr" rid="ref-53">53</xref>], and Logistic Model Tree (LMT) [<xref ref-type="bibr" rid="ref-48">48</xref>]. Different performance metrics are used to measure and compare all clustering-classification results. The True Positive (<italic>TP</italic>) rate is used to measure the predicted classes correctly while the False Positive (<italic>FP</italic>) rate is incorrectly predicting the positive classes. The <italic>TP</italic> and <italic>FP</italic> are presented in <xref ref-type="disp-formula" rid="eqn-8">Eqs. (8)</xref> and <xref ref-type="disp-formula" rid="eqn-9">(9)</xref> as follows:</p>
<p><disp-formula id="eqn-8">
<label>(8)</label>

<mml:math id="mml-eqn-8" display="block"><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>where, <italic>TPR</italic> is the prediction of true positive classes into which the true positive classes are divided by the sum of both true positive and false negative classes.</p>
<p><disp-formula id="eqn-9">
<label>(9)</label>

<mml:math id="mml-eqn-9" display="block"><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>where, <italic>FPR</italic> is the prediction of false positive classes into which the false positive classes are divided by the sum of both false positive and true negative classes.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Clustering and classification framework for different datasets</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-2.png"/>
</fig>
<p>The Precision of the dataset is measured by dividing the true positive predictions by the true positive and false positive predictions as shown in <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>:</p>
<p><disp-formula id="eqn-10">
<label>(10)</label>

<mml:math id="mml-eqn-10" display="block"><mml:mstyle mathvariant="italic"><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mstyle><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>The Recall of the dataset is measured by dividing the true positive predictions by the true positive and false negative predictions as shown in <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>:</p>
<p><disp-formula id="eqn-11">
<label>(11)</label>

<mml:math id="mml-eqn-11" display="block"><mml:mstyle mathvariant="italic"><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mstyle><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>The F<sub>1</sub>-Measure ratio is measured using the mean of both precision and recall as shown in <xref ref-type="disp-formula" rid="eqn-12">Eq. (12)</xref>:</p>
<p><disp-formula id="eqn-12">
<label>(12)</label>

<mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mrow><mml:mi>F</mml:mi></mml:mrow><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mstyle><mml:mtext>-</mml:mtext></mml:mstyle><mml:mstyle mathvariant="italic"><mml:mi>M</mml:mi><mml:mi>e</mml:mi><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>u</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mstyle><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mstyle mathvariant="italic"><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mstyle mathvariant="italic"><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mstyle></mml:mrow><mml:mrow><mml:mstyle mathvariant="italic"><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi></mml:mstyle><mml:mo>+</mml:mo><mml:mstyle mathvariant="italic"><mml:mi>R</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mstyle></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>The classifier accuracy is measured by the percentage of classes that were predicted correctly while the classifier error rate is the percentage of incorrect predicted classes as shown in the <xref ref-type="disp-formula" rid="eqn-13">Eqs. (13)</xref> and <xref ref-type="disp-formula" rid="eqn-14">(14)</xref>.</p>
<p><disp-formula id="eqn-13">
<label>(13)</label>

<mml:math id="mml-eqn-13" display="block"><mml:mrow></mml:mrow><mml:mrow><mml:mstyle mathvariant="italic"><mml:mi>C</mml:mi><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>fi</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mstyle mathvariant="italic"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mi>u</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>y</mml:mi></mml:mstyle><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mrow></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-14">
<label>(14)</label>

<mml:math id="mml-eqn-14" display="block"><mml:mrow></mml:mrow><mml:mrow><mml:mstyle mathvariant="italic"><mml:mi>C</mml:mi><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>fi</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mstyle mathvariant="italic"><mml:mi>E</mml:mi><mml:mi>r</mml:mi><mml:mi>r</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi></mml:mstyle><mml:mspace width=".3em" /><mml:mi>R</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mrow></mml:mrow></mml:math>
</disp-formula></p>
</sec>
<sec id="s7">
<label>7</label>
<title>Experimental Results</title>
<p>The experimental results are conducted on two datasets: Online Shoppers and Instacart. Different clustering and classification algorithms are applied to measure the performance and accuracy of predicting user behavior and user tracing processes. The results are explained as follows:</p>
<sec id="s7_1">
<label>7.1</label>
<title>Online Shoppers Purchasing Intention Dataset Performance</title>
<p>The Online Shoppers dataset is applied on three clustering algorithms before performing the classification process. The three clustering algorithms are Farthest First cluster, EM cluster, and K-mean cluster. The three clustering algorithms are used as a previous stage before performing the classification process using eight classification algorithms. As presented in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>, the true positive rate (TPR) is measured on all clustered-classification algorithms. The EM clustering algorithm with the LMT classification algorithm achieved the best true positive result with 100%. The K-mean clustering algorithm with also LMT classification algorithm achieved 99% true positive rate while the best Farthest First cluster algorithm achieved 93% true positive rate with the LMT classification algorithm.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>True positive rate&#x2014;Online shoppers dataset 
 
</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-3.png"/>
</fig>
<p>As presented in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, the LMT classification algorithm achieved the minimum false positive rate (FPR) on all clustering algorithms: Farthest First, EM, and K-mean with 15%, 0%, and 0.6% respectively.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>False positive rate&#x2014;Online shoppers dataset 
 
</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-4.png"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-5">Figs. 5</xref> and <xref ref-type="fig" rid="fig-6">6</xref>, the LMT classification algorithm achieved the best precision and recall results with all clustering algorithms with 93%, 100%, and 99% using Farthest First, EM, and K-mean clustering algorithms respectively. The EM clustering algorithm achieved high precision on both Bayes Net and Na&#x00EF;ve Bayes classification algorithms with 98% on both algorithms.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Precision&#x2014;Online shoppers dataset 
 
</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-5.png"/>
</fig>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Recall&#x2014;Online shoppers dataset 
 
</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-6.png"/>
</fig>
<p>In <xref ref-type="fig" rid="fig-7">Fig. 7</xref>, the F<sub>1</sub>-Measure of the Online Shoppers dataset achieved high results using an LMT classification algorithm with Farthest First, EM, and K-mean clustering algorithms with 92%, 100%, and 99% respectively.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>F<sub>1</sub>-measure&#x2014;Online shoppers dataset</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-7.png"/>
</fig>
</sec>
<sec id="s7_2">
<label>7.2</label>
<title>Instacart Dataset Performance</title>
<p>The Instacart dataset is tested to measure the performance using density-based clustering with five classification algorithms: SVM, Logistic Regression, KNN, Random Forest, and LMT. As shown in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>, the true positive rate (<italic>TPR</italic>) achieved high results in all classification algorithms with 100% except the LMT classification algorithm with 99.4%. The false positive rate (<italic>FPR</italic>) achieved 0% with all clustering-classification algorithms except the LMT classification algorithm with a 0.4% false positive rate.</p>
<p>As shown in <xref ref-type="fig" rid="fig-9">Fig. 9</xref>, the precision, recall, and F<sub>1</sub>-Measure achieved similar results with 100% on all clustering&#x2014;classification algorithms except the LMT classification algorithm that achieved 99.4%. The experimental results were repeated again by interchanging the clustering-classification algorithms with the Online Shoppers and Instacart datasets to prove the capability of each clustering-classification algorithms in predicting user behavior and improving the user tracing mechanism. The accuracy and error rate of all clustering and classification algorithms are measured on both Online Shoppers and Instacart datasets as shown in <xref ref-type="table" rid="table-4">Tab. 4</xref>.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>True positive and false positive rates&#x2014;Instacart dataset</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-8.png"/>
</fig>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Precision, recall, and F-measure&#x2014;Instacart dataset</title>
</caption><graphic mimetype="image" mime-subtype="png" xlink:href="CMC_18236-fig-9.png"/>
</fig>
<p>In order to validate the proposed mechanism, two distinct datasets are applied on the clustering and classification algorithms to measure the accuracy of the algorithms in predicting and enhancing user behavior tracing activities. As presented in <xref ref-type="table" rid="table-4">Tab. 4</xref>, the Farthest First clustering algorithm with LMT classification algorithm achieved the best accuracy on the Online Shoppers dataset with 93.01%, while on the Instacart dataset the farthest first algorithm achieved 100% accuracy with both LMT and K* classification algorithms. Using the EM clustering algorithm, the LMT classification algorithm achieved 100% accuracy on both online shopping and Instacart datasets while K* and J48 achieved an accuracy of 100% on the Instacart dataset only. Using the K-mean clustering algorithm, the LMT classification algorithm still provides provable accuracy with 99.42% and 99.71% of online shopping and Instacart datasets respectively. When the density-based clustering is applied, different classification algorithms recorded high accuracy with a low error rate. Random forest and KNN classification algorithms recorded 100% accuracy of the Online Shoppers dataset. Using the Instacart dataset, the random forest, KNN, Logistic Regression, and SVM achieved high accuracy with 100%. The LMT classification algorithm still recorded high accuracy with 99.42% and 99.41% on both online shopping and Instacart datasets. The error rate on density-based clustering achieved the lowest results when compared to the remaining clustering techniques; farthest first, EM, and K-mean.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Clustering-based classification accuracy</title>
</caption>

<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th colspan="2">Clustering-based classification</th>
<th colspan="2">Online shoppers dataset</th>
<th colspan="2">Instacart dataset</th>
</tr>
<tr>
<th>Clustering</th>
<th>Classification</th>
<th>Accuracy %</th>
<th>Error rate %</th>
<th>Accuracy %</th>
<th>Error rate %</th>
</tr>
</thead>
<tbody>
<tr>
<td>Farthest First</td>
<td>Na&#x00EF;ve Bayes</td>
<td>80.75</td>
<td>19.24</td>
<td>97.35</td>
<td>2.65</td>
</tr>
<tr>
<td/>
<td>Bayes Net</td>
<td>79.01</td>
<td>20.99</td>
<td>97.35</td>
<td>2.65</td>
</tr>
<tr>
<td/>
<td>K<sup>*</sup></td>
<td>67.64</td>
<td>32.36</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>Filtered classifier</td>
<td>75.8</td>
<td>24.2</td>
<td>96.88</td>
<td>3.22</td>
</tr>
<tr>
<td/>
<td>J48</td>
<td>74.93</td>
<td>25.07</td>
<td>96.76</td>
<td>3.24</td>
</tr>
<tr>
<td/>
<td>JRip</td>
<td>79.3</td>
<td>20.7</td>
<td>97.94</td>
<td>2.06</td>
</tr>
<tr>
<td/>
<td>Decision table</td>
<td>80.17</td>
<td>19.83</td>
<td>97.35</td>
<td>2.65</td>
</tr>
<tr>
<td/>
<td>LMT</td>
<td><underline>93.01</underline></td>
<td><underline>6.99</underline></td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td>EM</td>
<td>Na&#x00EF;ve Bayes</td>
<td>98.54</td>
<td>1.48</td>
<td>99.12</td>
<td>0.89</td>
</tr>
<tr>
<td/>
<td>Bayes Net</td>
<td>98.54</td>
<td>1.48</td>
<td>99.12</td>
<td>0.89</td>
</tr>
<tr>
<td/>
<td>K<sup>*</sup></td>
<td>53.64</td>
<td>46.36</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>Filtered classifier</td>
<td>97.38</td>
<td>2.62</td>
<td>92.22</td>
<td>0.88</td>
</tr>
<tr>
<td/>
<td>J48</td>
<td>96.79</td>
<td>3.21</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>JRip</td>
<td>94.47</td>
<td>5.54</td>
<td>96.76</td>
<td>3.24</td>
</tr>
<tr>
<td/>
<td>Decision table</td>
<td>97.67</td>
<td>2.33</td>
<td>91.15</td>
<td>8.85</td>
</tr>
<tr>
<td/>
<td>LMT</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td>K-mean</td>
<td>Na&#x00EF;ve Bayes</td>
<td>90.38</td>
<td>9.62</td>
<td>98.23</td>
<td>1.78</td>
</tr>
<tr>
<td/>
<td>Bayes Net</td>
<td>90.38</td>
<td>9.62</td>
<td>97.05</td>
<td>2.95</td>
</tr>
<tr>
<td/>
<td>K<sup>*</sup></td>
<td>55.69</td>
<td>44.31</td>
<td>98.82</td>
<td>1.18</td>
</tr>
<tr>
<td/>
<td>Filtered classifier</td>
<td>94.46</td>
<td>5.53</td>
<td>96.54</td>
<td>3.46</td>
</tr>
<tr>
<td/>
<td>J48</td>
<td>94.46</td>
<td>5.54</td>
<td>96.17</td>
<td>3.83</td>
</tr>
<tr>
<td/>
<td>JRip</td>
<td>95.04</td>
<td>4.95</td>
<td>99.41</td>
<td>0.59</td>
</tr>
<tr>
<td/>
<td>Decision table</td>
<td>94.75</td>
<td>5.24</td>
<td>98.22</td>
<td>1.78</td>
</tr>
<tr>
<td/>
<td>LMT</td>
<td><underline>99.42</underline></td>
<td><underline>0.58</underline></td>
<td><underline>99.71</underline></td>
<td><underline>0.29</underline></td>
</tr>
<tr>
<td>Density-based</td>
<td>SVM</td>
<td>99.42</td>
<td>0.58</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>Logistic regression</td>
<td>99.31</td>
<td>0.69</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>KNN</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
<tr>
<td/>
<td>LMT</td>
<td>99.42</td>
<td>0.58</td>
<td>99.41</td>
<td>0.59</td>
</tr>
<tr>
<td/>
<td>Random forest</td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
<td><underline>100</underline></td>
<td><underline>0</underline></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s8">
<label>8</label>
<title>Conclusion</title>
<p>E-business transactions are now necessary during the development of information systems and their related technologies. With the increasing need to develop different methods to deal with the intensity of business transactions, the log file that records all user processes must be well formulated to best utilize all transactions in the shortest possible time. Many research papers enhance the E-business structure in explaining business services without developing and enhancing a well-designed web server log that can record all user records. This paper proposed an event stream mechanism that can organize and record user and customer transactions based on a set of formula patterns. The paper visualizes an even stream to explore the overall enhanced tracing mechanism. The proposed mechanism is based on applying different clustering algorithms such as density-based clustering, farthest first cluster, EM cluster and K-mean cluster. After applying the clustering algorithms, a set of classifications algorithms are applied to measure the predicted classes on the clustered data. The experimental results proved high efficiency in improving user tracing processes and predicting user behavior in acquiring future products. Some enhancements can be applied to the proposed mechanism by adding mean-shift and agglomerative hierarchical clustering algorithms with the same classification algorithms and datasets to verify the efficiency of the user tracing processes.</p>
</sec>
</body>
<back>
<fn-group><fn fn-type="other"><p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p></fn></fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P. H.</given-names> <surname>Gaughan</surname></string-name> and <string-name><given-names>R. G.</given-names> <surname>Javalgi</surname></string-name></person-group>, &#x201C;<article-title>A framework for analyzing international business and legal ethical standards</article-title>,&#x201D; <source>Business Horizons</source>, vol. <volume>61</volume>, no. <issue>6</issue>, pp. <fpage>813</fpage>&#x2013;<lpage>822</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>C. Y.</given-names> <surname>Yoon</surname></string-name></person-group>, &#x201C;<article-title>Measurement systems of individual E-business competency in an E-business management environment</article-title>,&#x201D; in <conf-name>Proc. 4th Int. Conf. on Computer Applications and Information Processing Technology</conf-name>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>Y. A.</given-names> <surname>Solangi</surname></string-name>, <string-name><given-names>Z. A.</given-names> <surname>Solangi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Raza</surname></string-name>, <string-name><given-names>M. B. S. A.</given-names> <surname>Aziz</surname></string-name>, <string-name><given-names>M. S. B.</given-names> <surname>Hamzah</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Social commerce in e-business of Pakistan: Opportunities, challenges and solutions</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. on Information and Communication Technology for the Muslim World</conf-name>, Kuala Lumpur, Malaysia, pp. <fpage>126</fpage>&#x2013;<lpage>131</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. W.</given-names> <surname>Holsapple</surname></string-name>, <string-name><given-names>S. H.</given-names> <surname>Hsiao</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Pakath</surname></string-name></person-group>, &#x201C;<article-title>Business social media analytics: Characterization and conceptual framework</article-title>,&#x201D; <source>Decision Support Systems</source>, vol. <volume>110</volume>, no. <issue>6</issue>, pp. <fpage>32</fpage>&#x2013;<lpage>45</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Thakur</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Anadure</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Saini</surname></string-name></person-group>, &#x201C;<article-title>Log file analyzer</article-title>,&#x201D; <publisher-name>Jaypee University of Information Technology</publisher-name>, <year>2019</year>. [Online]. Available: <uri xlink:href="http://ir.juit.ac.in/123456789/22855">http://ir.juit.ac.in/123456789/22855</uri>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Verma</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Verma</surname></string-name> and <string-name><given-names>S. S.</given-names> <surname>Bhatia</surname></string-name></person-group>, &#x201C;<article-title>Comprehensive analysis of web log files for mining</article-title>,&#x201D; <source>International Journal of Computer Science Issues</source>, vol. <volume>8</volume>, no. <issue>6</issue>, pp. <fpage>199</fpage>&#x2013;<lpage>202</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Sujatha</surname></string-name> and <string-name><surname>Punithavalli</surname></string-name></person-group>, &#x201C;<article-title>Improved user navigation pattern prediction technique from web log data</article-title>,&#x201D; <source>Procedia Engineering</source>, vol. <volume>30</volume>, pp. <fpage>92</fpage>&#x2013;<lpage>99</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>James</surname></string-name></person-group>, &#x201C;<article-title>Optimization, security, privacy and trust in e-business systems</article-title>,&#x201D; <source>Journal of Computer and System Sciences</source>, vol. <volume>81</volume>, no. <issue>6</issue>, pp. <fpage>941</fpage>&#x2013;<lpage>942</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Chang</surname></string-name>, <string-name><given-names>Y. H.</given-names> <surname>Kuo</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Ramachandran</surname></string-name></person-group>, &#x201C;<article-title>Cloud computing adoption framework: A security framework for business clouds</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>57</volume>, no. <issue>1</issue>, pp. <fpage>24</fpage>&#x2013;<lpage>41</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>&#x00C1;lvarez</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Fabra</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Hern&#x00E1;ndez</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Ezpeleta</surname></string-name></person-group>, &#x201C;<article-title>Alignment of teacher&#x2019;s plan and students&#x2019; use of LMS resources. analysis of Moodle logs</article-title>,&#x201D; in <conf-name>Proc. 15th Int. Conf. on Information Technology Based Higher Education and Training</conf-name>, Istanbul, Turkey, pp. <fpage>1</fpage>&#x2013;<lpage>8</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N. B.</given-names> <surname>Vasilyevna</surname></string-name></person-group>, &#x201C;<article-title>Security design for e-business applications</article-title>,&#x201D; in <conf-name>Proc. Int. Symp. on Ubiquitous Multimedia Computing</conf-name>, Hobart, TAS, Australia, pp. <fpage>248</fpage>&#x2013;<lpage>251</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>L. K. J.</given-names> <surname>Grace</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Maheswari</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Nagamalai</surname></string-name></person-group>, &#x201C;<article-title>Analysis of web logs and web user in web mining</article-title>,&#x201D; <source>International Journal of Network Security &#x0026; Its Applications</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>99</fpage>&#x2013;<lpage>110</lpage>, <year>2011</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Eltahir</surname></string-name> and <string-name><given-names>A. F. A.</given-names> <surname>Dafa-Alla</surname></string-name></person-group>, &#x201C;<article-title>Extracting knowledge from web server logs using web usage mining</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. on Computing, Electrical and Electronic Engineering</conf-name>, Khartoum, Sudan, pp. <fpage>413</fpage>&#x2013;<lpage>417</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. V.</given-names> <surname>Srinivas</surname></string-name></person-group>, &#x201C;<article-title>A survey on preprocessing of web-log data in web usage mining</article-title>,&#x201D; <source>International Journal for Modern Trends in Science and Technology</source>, vol. <volume>3</volume>, no. <issue>2</issue>, pp. <fpage>35</fpage>&#x2013;<lpage>41</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K. R.</given-names> <surname>Suneetha</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Krishnamoorthi</surname></string-name></person-group>, &#x201C;<article-title>Identifying user behavior by analyzing web server access log file</article-title>,&#x201D; <source>International Journal of Computer Science and Network Security</source>, vol. <volume>9</volume>, no. <issue>4</issue>, pp. <fpage>327</fpage>&#x2013;<lpage>332</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Hussain</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Asghar</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Masood</surname></string-name></person-group>, &#x201C;<article-title>Web usage mining: A survey on preprocessing of web log file</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. on Information and Emerging Technologies</conf-name>, Karachi, Pakistan, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2010</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Niraula</surname></string-name></person-group>, &#x201C;<article-title>Web log data analysis: Converting unstructured web log data into structured data using Apache Pig</article-title>,&#x201D; <comment>M. S. dissertation</comment>, <publisher-name>Cloud State University</publisher-name>, <year>2017</year>. [Online]. Available: <uri xlink:href="https://repository.stcloudstate.edu/csit_etds/19">https://repository.stcloudstate.edu/csit_etds/19</uri>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.-J.</given-names> <surname>Lin</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>I.-H.</given-names> <surname>Chiu</surname></string-name></person-group>, &#x201C;<article-title>Using hidden Markov Model to predict the surfing user&#x2019;s intention of cyber purchase on the web</article-title>,&#x201D; <source>Journal of Global Business Management</source>, vol. <volume>5</volume>, no. <issue>2</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>, <year>2009</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Mohammadifard</surname></string-name></person-group>, <source>Modeling User Behavior from E-Commerce Data with Hidden Markov Models and Logistic Regression</source>. <publisher-loc>McGill University</publisher-loc>: <publisher-name>M. S., School of Computer Science</publisher-name>, pp. <fpage>1</fpage>&#x2013;<lpage>46</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Mowla</surname></string-name> and <string-name><given-names>N. P.</given-names> <surname>Shetty</surname></string-name></person-group>, &#x201C;<article-title>Analysis of web server logs to understand internet user behavior and develop digital marketing strategies</article-title>,&#x201D; <source>International Journal of Engineering and Technology</source>, vol. <volume>7</volume>, no. <issue>4.41</issue>, pp. <fpage>15</fpage>&#x2013;<lpage>20</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M. U.</given-names> <surname>Hassan</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Shaukat</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Niu</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Mahreen</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Ma</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Web-logs prediction with web mining</article-title>,&#x201D; in <conf-name>Proc. 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conf.</conf-name>, Xian, China, pp. <fpage>1295</fpage>&#x2013;<lpage>1299</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kumar</surname></string-name> and <string-name><surname>Meenu</surname></string-name></person-group>, &#x201C;<article-title>Analysis of visitor&#x2019;s behavior from web log using web log expert tool</article-title>,&#x201D; in <conf-name> Proc. Int. Conf. of Electronics, Communication and Aerospace Technology</conf-name>, Coimbatore, India, vol. <volume>2</volume>, pp. <fpage>296</fpage>&#x2013;<lpage>301</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>G.</given-names> <surname>Suchacka</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Chodak</surname></string-name></person-group>, &#x201C;<article-title>Practical aspects of log file analysis for E-commerce</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. on Computer Networks</conf-name>, Heidelberg, Berlin, pp. <fpage>562</fpage>&#x2013;<lpage>572</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Murata</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Saito</surname></string-name></person-group>, &#x201C;<article-title>Extracting users&#x2019; interests from web log data</article-title>,&#x201D; in <conf-name>Proc. IEEE/WIC/ACM Int. Conf. on Web Intelligence</conf-name>, Hong Kong, China, pp. <fpage>343</fpage>&#x2013;<lpage>346</lpage>, <year>2006</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Poggi</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Muthusamy</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Carrera</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Khalaf</surname></string-name></person-group>, &#x201C;<article-title>Business process mining from E-commerce web logs</article-title>,&#x201D; in <conf-name>Proc. 11th Int. Conf. on Business Process Management</conf-name>, Beijing, China, pp. <fpage>65</fpage>&#x2013;<lpage>80</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Jalali</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Mustapha</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ali Mamat</surname></string-name> and <string-name><given-names>B. S.</given-names> <surname>Nasir</surname></string-name></person-group>, &#x201C;<article-title>Web user navigation pattern mining approach based on graph partitioning algorithm</article-title>,&#x201D; <source>Journal of Theoretical and Applied Information Technology</source>, vol. <volume>4</volume>, no. <issue>11</issue>, pp. <fpage>1125</fpage>&#x2013;<lpage>1130</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zheng</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Hu</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Fung</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yu</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Long</surname></string-name></person-group>, &#x201C;<article-title>Clustering social audiences in business information networks</article-title>,&#x201D; <source>Pattern Recognition</source>, vol. <volume>100</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>37</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>N. M. S.</given-names> <surname>Iswari</surname></string-name>, <string-name><given-names>E. K.</given-names> <surname>Budiardjo</surname></string-name>, <string-name><given-names>H. B.</given-names> <surname>Santoso</surname></string-name> and <string-name><given-names>Z. A.</given-names> <surname>Hasibuan</surname></string-name></person-group>, &#x201C;<article-title>E-business application recommendation for SMEs based on organization profile using random forest classification</article-title>,&#x201D; in <conf-name>Proc. Int. Seminar on Research of Information Technology and Intelligent Systems</conf-name>, Yogyakarta, Indonesia, pp. <fpage>522</fpage>&#x2013;<lpage>527</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B. A.</given-names> <surname>Tama</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Comuzzi</surname></string-name></person-group>, &#x201C;<article-title>An empirical comparison of classification techniques for next event prediction using business process event logs</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>129</volume>, no. <issue>12</issue>, pp. <fpage>233</fpage>&#x2013;<lpage>245</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Fazzinga</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Folino</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Furfaro</surname></string-name> and <string-name><given-names>L.</given-names> <surname>Pontieri</surname></string-name></person-group>, &#x201C;<article-title>An ensemble-based approach to the security-oriented classification of low-level log traces</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>153</volume>, no. <issue>2</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>25</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. N.</given-names> <surname>Chaurasia</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Sharma</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Jain</surname></string-name></person-group>, &#x201C;<article-title>Analysis of web log server files of E-commerce websites to study customer behavior pattern</article-title>,&#x201D; <source>International Journal for Research in Applied Science and Engineering Technology</source>, vol. <volume>5</volume>, no. <issue>4</issue>, pp. <fpage>1390</fpage>&#x2013;<lpage>1397</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Mostafa</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Alroudhan</surname></string-name> and <string-name><given-names>M. M.</given-names> <surname>Hassan</surname></string-name></person-group>, &#x201C;<article-title>LTL formula patterns for enhancing the performance analysis of E-business structure</article-title>,&#x201D; <source>Journal of Theoretical and Applied Information Technology</source>, vol. <volume>97</volume>, no. <issue>8</issue>, pp. <fpage>2429</fpage>&#x2013;<lpage>2439</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>G. De</given-names> <surname>Giacomo</surname></string-name>, <string-name><given-names>R. De</given-names> <surname>Masellis</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Montali</surname></string-name></person-group>, &#x201C;<article-title>Reasoning on LTL on finite traces: Insensitivity to infiniteness</article-title>,&#x201D; in <conf-name>Proc. Twenty-Eighth AAAI Conf. on Artificial Intelligence</conf-name>, Quebec, Canada, pp. <fpage>1027</fpage>&#x2013;<lpage>1033</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Hern&#x00E1;ndez</surname></string-name>, <string-name><given-names>P.</given-names> <surname>&#x00C1;lvarez</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Fabra</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Ezpeleta</surname></string-name></person-group>, &#x201C;<article-title>Analysis of users&#x2019; behavior in structured e-commerce websites</article-title>,&#x201D; <source>IEE Access</source>, vol. <volume>5</volume>, pp. <fpage>11941</fpage>&#x2013;<lpage>11958</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>L. C.</given-names> <surname>Milton</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Memon</surname></string-name></person-group>, &#x201C;<article-title>Intruder detector: A continuous authentication tool to model user behavior</article-title>,&#x201D; in <conf-name>Proc. IEEE Conf. on Intelligence and Security Informatics</conf-name>, Tucson, AZ, USA, pp. <fpage>286</fpage>&#x2013;<lpage>291</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A. M.</given-names> <surname>Mostafa</surname></string-name></person-group>, &#x201C;<article-title>Design and implementation of secured E-business structure with LTL patterns for user behavior prediction</article-title>,&#x201D; in <conf-name>Proc. Int. Conf. on Computing</conf-name>, Riyadh, Saudi Arabia, pp. <fpage>185</fpage>&#x2013;<lpage>200</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>C. O.</given-names> <surname>Sakar</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Kastro</surname></string-name></person-group>, <source>Online Shoppers Purchasing Intention</source>. <year>2018</year>. [Online]. Available: <uri xlink:href="https://archive.ics.uci.edu/ml/datasets/Online+Shoppers+Purchasing+Intention+Dataset">https://archive.ics.uci.edu/ml/datasets/Online+Shoppers+Purchasing+Intention+Dataset</uri>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C. O.</given-names> <surname>Sakar</surname></string-name>, <string-name><given-names>S. O.</given-names> <surname>Polat</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Katircioglu</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Kastro</surname></string-name></person-group>, &#x201C;<article-title>Real-time prediction of online shoppers&#x2019; purchasing intention using multilayer perceptron and LSTM recurrent neural networks</article-title>,&#x201D; <source>Neural Computing and Applications</source>, vol. <volume>31</volume>, no. <issue>10</issue>, pp. <fpage>6893</fpage>&#x2013;<lpage>6908</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><collab>Kaggle</collab></person-group>, &#x201C;<article-title>Instacart Market Basket Analysis</article-title>,&#x201D; <year>2018</year>. [Online]. Available: <uri xlink:href="https://www.kaggle.com/c/instacart-market-basket-analysis/data">https://www.kaggle.com/c/instacart-market-basket-analysis/data</uri>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Shyamala</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Kalaivani</surname></string-name></person-group>, &#x201C;<article-title>An effective web page reorganization through heap tree and farthest first clustering approach</article-title>,&#x201D; in <conf-name>Proc. IEEE Int. Conf. on Power, Control, Signals and Instrumentation Engineering</conf-name>, Chennai, India, pp. <fpage>2259</fpage>&#x2013;<lpage>2262</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Nilashi</surname></string-name>, <string-name><given-names>O.</given-names> <surname>bin Ibrahim</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Ithnin</surname></string-name> and <string-name><given-names>N. H.</given-names> <surname>Sarmin</surname></string-name></person-group>, &#x201C;<article-title>A multi-criteria collaborative filtering recommender system for the tourism domain using expectation maximization (EM) and PCA-ANFIS</article-title>,&#x201D; <source>Electronic Commerce Research and Applications</source>, vol. <volume>14</volume>, no. <issue>6</issue>, pp. <fpage>542</fpage>&#x2013;<lpage>562</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Wen</surname></string-name> and <string-name><given-names>F.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Fast and stable clustering analysis based on grid-mapping K-means algorithm and new clustering validity index</article-title>,&#x201D; <source>Neurocomputing</source>, vol. <volume>363</volume>, no. <issue>2</issue>, pp. <fpage>149</fpage>&#x2013;<lpage>170</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Vaghela</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Bhatt</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Mistry</surname></string-name></person-group>, &#x201C;<article-title>A survey on various classification techniques for clinical decision support system</article-title>,&#x201D; <source>International Journal of Computer Applications</source>, vol. <volume>116</volume>, no. <issue>23</issue>, pp. <fpage>14</fpage>&#x2013;<lpage>17</lpage>, <year>2015</year>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Wiharto</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Kusnanto</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Herianto</surname></string-name></person-group>, &#x201C;<article-title>Intelligence system for diagnosis level of coronary heart disease with K-star algorithm</article-title>,&#x201D; <source>Healthc Inform. Res.</source>, vol. <volume>22</volume>, no. <issue>1</issue>, pp. <fpage>30</fpage>&#x2013;<lpage>38</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>G. N.</given-names> <surname>Chandrika</surname></string-name> and <string-name><given-names>E. S.</given-names> <surname>Reddy</surname></string-name></person-group>, &#x201C;<article-title>An efficient filtered classifier for classification of unseen test data in text documents</article-title>,&#x201D; in <conf-name>Proc. IEEE Int. Conf. on Computational Intelligence and Computing Research</conf-name>, Coimbatore, India, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Amornsinlaphachai</surname></string-name></person-group>, &#x201C;<article-title>Efficiency of data mining models to predict academic performance and a cooperative learning model</article-title>,&#x201D; in <conf-name>Proc. 8th Int. Conf. on Knowledge and Smart Technology</conf-name>, Chiang Mai, Thailand, pp. <fpage>66</fpage>&#x2013;<lpage>71</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Patil</surname></string-name> and <string-name><given-names>V. M.</given-names> <surname>Barkade</surname></string-name></person-group>, &#x201C;<article-title>Class-specific features using J48 classifier for text classification</article-title>,&#x201D; in <conf-name>Proc. Fourth Int. Conf. on Computing Communication Control and Automation</conf-name>, Pune, India, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Nematallah</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Rajan</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Cretu</surname></string-name></person-group>, &#x201C;<article-title>Logistic model tree for human activity recognition using smartphone-based inertial sensors</article-title>,&#x201D; in <conf-name>Proc. IEEE SENSORS</conf-name>, Montreal, QC, Canada, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>V.</given-names> <surname>Vu</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Do</surname></string-name></person-group>, &#x201C;<article-title>Density-based clustering with side information and active learning</article-title>,&#x201D; in <conf-name>Proc. 9th Int. Conf. on Knowledge and Systems Engineering</conf-name>, Hue, Vietnam, pp. <fpage>166</fpage>&#x2013;<lpage>171</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Alghofaily</surname></string-name> and <string-name><given-names>C.</given-names> <surname>Ding</surname></string-name></person-group>, &#x201C;<article-title>Meta-feature based data mining service selection and recommendation using machine learning models</article-title>,&#x201D; in <conf-name>Proc. IEEE 15th Int. Conf. on E-Business Engineering</conf-name>, Xi&#x2019;an, China, pp. <fpage>17</fpage>&#x2013;<lpage>24</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Ghazvini</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Yousefi</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Firoozeh</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Mansouri</surname></string-name></person-group>, &#x201C;<article-title>Predictors of tuberculosis: Application of a logistic regression model</article-title>,&#x201D; <source>Gene Reports</source>, vol. <volume>17</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.-X.</given-names> <surname>Nie</surname></string-name> and <string-name><given-names>F. T.</given-names> <surname>Song</surname></string-name></person-group>, &#x201C;<article-title>Analyzing the stock market based on the structure of KNN network</article-title>,&#x201D; <source>Chaos, Solitons &#x0026; Fractals</source>, vol. <volume>113</volume>, no. <issue>1</issue>, pp. <fpage>148</fpage>&#x2013;<lpage>159</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J. L.</given-names> <surname>Speiser</surname></string-name>, <string-name><given-names>M. E.</given-names> <surname>Miller</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Tooze</surname></string-name> and <string-name><given-names>E.</given-names> <surname>Ip</surname></string-name></person-group>, &#x201C;<article-title>A comparison of random forest variable selection methods for classification prediction modeling</article-title>,&#x201D; <source>Expert Systems with Applications</source>, vol. <volume>134</volume>, no. <issue>10</issue>, pp. <fpage>93</fpage>&#x2013;<lpage>101</lpage>, <year>2019</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>