Obtaining subject data from log files using deep log analysis: case study OhioLINK

被引:8
|
作者
Huntington, Paul [1 ]
Nicholas, David [1 ]
Jamali, Hamid R. [1 ]
Watkinson, Anthony [1 ]
机构
[1] UCL, SLAIS, London WC1E 6BT, England
关键词
transaction log analysis; electronic periodicals; use statistics; OhioLINK; user behaviour;
D O I
10.1177/0165551506065782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally web site statistics and analysis focus on the organization and location information of Internet Protocol addresses and do not analyse sub-network and computer-label information. This paper aims to extract and make use of the information content of sub-network labels in transactional server log files and add an additional level to transaction log analysis. The authors apply microanalytical procedures (i.e. analysis of small segments and sections of log files) to the analysis of log files of the OhioLINK electronic journal service. The authors demonstrate an analysis based on extracted sub-network information and argue that these names can be interpreted as departmental (subject) names. They present an analysis between journal subject groupings and departments based on sub-network labels and find a degree of correlation between department name and subject of journal use. Further, the authors break down journal usage by sub-network label information. The analyses show that sub-network names reflect the physical location of the computer. This presents another possibility of analysing what journals are being used by which academic department.
引用
收藏
页码:299 / 308
页数:10
相关论文
共 50 条
  • [21] Detecting Student at Risk of Failure: A Case Study of Conceptualizing Mining from Internet Access Log Files
    Trakunphutthirak, Ruangsak
    Cheung, Yen
    Lee, Vincent C. S.
    2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2018, : 365 - 371
  • [22] Extraction of information from log files Using Python']Python Programming and Tableau
    Rigueira, Filipe
    Bernardino, Jorge
    Pedrosa, Isabel
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [23] Lithofacies Prediction from Well Log Data Based on Deep Learning: A Case Study from Southern Sichuan, China
    Shi, Yu
    Liao, Junqiao
    Gan, Lu
    Tang, Rongjiang
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [24] A Preliminary Analysis of Web Usage Behaviors from Web Access Log Files A Case Study of Prince of Songkla University, Thailand
    Wongsirichot, Thakerng
    Sukpisit, Sukgamon
    Hanghu, Warakorn
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND ENGINEERING APPLICATION, ICSCTEA 2013, 2014, 250 : 325 - 332
  • [25] A Case Study in Workflow Scheduling Driven by Log Data
    Botezatu, Mirela
    Voelzer, Hagen
    Dijkman, Remco
    BUSINESS PROCESS MANAGEMENT WORKSHOPS( BPM 2014), 2015, 202 : 251 - 263
  • [26] Using log files from streaming media servers for optimising the learning sequence
    de Boer, Jelle
    INTERNATIONAL JOURNAL OF CONTINUING ENGINEERING EDUCATION AND LIFE-LONG LEARNING, 2010, 20 (01) : 40 - 53
  • [27] Studying Patient Movement Pattern from Analysis of Cyberknife Delivery Log Files
    Eldib, A. A.
    Lin, T.
    Veltchev, I.
    Afifi, M. B.
    Price, R. A., Jr.
    Ma, C. M. C.
    MEDICAL PHYSICS, 2024, 51 (10) : 7861 - 7861
  • [28] From Log Files to Assessment Metrics: Measuring Students' Science Inquiry Skills Using Educational Data Mining
    Gobert, Janice D.
    Sao Pedro, Michael
    Raziuddin, Juelaila
    Baker, Ryan S.
    JOURNAL OF THE LEARNING SCIENCES, 2013, 22 (04) : 521 - 563
  • [29] Analysis of Network log data using Machine Learning
    Allagi, Shridhar
    Rachh, Rashmi
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [30] A Study on the Big Data Log Analysis for Security y
    Jeon, Kyung-Sik
    Park, Se-Jeong
    Chun, Sam-Hyun
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 13 - 20