<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Sequential Pattern Mining using FCA and Pattern Structures for Analyzing Visitor Tra jectories in a Museum</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nyoman Juniarta</string-name>
          <email>nyoman.juniarta@loria.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miguel Couceiro</string-name>
          <email>miguel.couceiro@loria.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amedeo Napoli</string-name>
          <email>amedeo.napoli@loria.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Chedy Ra¨ıssi</string-name>
          <email>chedy.raissi@loria.fr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>242, Department of Computer Science, Palacky University Olomouc</institution>
          ,
          <addr-line>2018. Copying permitted only for private and academic purposes</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Universit ́e de Lorraine</institution>
          ,
          <addr-line>CNRS, Inria, LORIA, F-54000 Nancy</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>c paper author(s), 2018. Proceedings volume published and copyrighted by its editors. Paper published in Dmitry I. Ignatov</institution>
          ,
          <addr-line>Lhouari Nourine (Eds.): CLA 2018, pp. 231</addr-line>
        </aff>
      </contrib-group>
      <fpage>231</fpage>
      <lpage>242</lpage>
      <abstract>
        <p>This paper presents our work on mining visitor trajectories in Hecht Museum (Haifa, Israel), within the framework of CrossCult European Project about cultural heritage. We present a theoretical and practical research work about the characterization of visitor trajectories and the mining of these trajectories as sequences. The mining process is based on two approaches in the framework of FCA, namely the mining of subsequences without any constraint and the mining of frequent contiguous subsequences. Both approaches are based on pattern structures. In parallel, a similarity measure allows us to build a hierarchical classification which is used for interpretation and characterization of the trajectories w.r.t. four well-known visiting styles.</p>
      </abstract>
      <kwd-group>
        <kwd>FCA</kwd>
        <kwd>pattern structures</kwd>
        <kwd>sequence clustering</kwd>
        <kwd>sequential pattern mining</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>This paper is related to the CrossCult European Project about cultural heritage
(http://www.crosscult.eu/). The general idea of CrossCult is to support the
emergence of a European cultural heritage by allowing visitors in different
locations (e.g. museum, city, archaeological site) to consider their visit at a European
level by using adapted computer-based devices.</p>
      <p>In this project, we are mainly interested in the analysis of visitor
trajectories and recommendation. The trajectory of a visitor in a specific location is
considered as a multi-dimensional sequence depending on a number of variables,
such as space (e.g. paths, rooms, environment), time (e.g. hour, day, season,
news), history and geography (e.g. town, region, country. . . ). Moreover,
additional domain knowledge and general knowledge bases such as DBpedia,
Freebase or YAGO can be reused to draw inferences and improve the quality of both
analysis and recommendation.</p>
      <p>Here, we have two main objectives, (i) the mining of visitor trajectories based
on sequence mining, and (ii) the characterization of a trajectory in terms of the
subsequences which are mined. We assume that the subsequences are related to
the visiting styles, the visit content, and the environment. Thus subsequences can
be used for analyzing the trajectory of a visitor and for making recommendations
all along the visit. Moreover, the occurrences of some subsequences at a given
moment within a trajectory can witness a change of behavior –which triggers in
turn a change in the recommendations.</p>
      <p>
        In the present paper, we discuss theoretical and practical work about the
definition of visitor trajectories and the mining of these trajectories as sequences.
The mining process is based on two approaches about sequence mining in Formal
Concept Analysis (FCA [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]): MRGS for “Mining Rare General Subsequences” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
and MFCS for “Mining Frequent Contiguous Subsequences” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The first approach
mines rare subsequences in a general way, i.e. gaps may appear in the
subsequences, while the second approach searches for frequent subsequences without
any gap (a kind of substrings). If the original paper about MRGS [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] was
interested in rare subsequences, this is no more the case here and we work on frequent
subsequences as well. We also reuse the similarity measure simACS developed
for analyzing the trajectories of patients between hospitals [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ]. This similarity
measure allows us to build a hierarchical classification that will play a role of
“reference classification”. For analyzing and interpreting the trajectories of
visitors, it is interesting to compare the outputs of MRGS and MFCS algorithms w.r.t.
the clustering produced by simACS . Moreover, these outputs and the
clustering as well are analyzed thanks to four theoretical visiting styles, namely “ant”,
“butterfly”, “fish” and “grasshopper” [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Several challenges are faced in this research work in the FCA framework:
the mining of complex sequential data and dynamics in adapting two algorithms
based on pattern structures, the analysis of the trajectories based on jumping
emerging patterns and clustering. Here, data are not necessarily big but are
rather complex and multidimensional and this should be taken into account.</p>
      <p>The paper is organized as follows. Section 2 recalls the basic definitions about
sequence mining that are useful for understanding the present work. Then, Sect. 3
presents the characteristics of the dataset that was used as a basis for the
current work. In Sect. 5 and Sect. 6, we present first the application of clustering on
data enabling to build classes of visitors, and then the application of two
algorithms for mining interesting subsequences. Finally, in Sect. 7, an interpretation
of the results and a discussion on the characterization of the visitor trajectories
conclude the paper.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Sequence Mining</title>
      <sec id="sec-2-1">
        <title>Basic Definitions</title>
        <p>Pattern mining is the task of finding repeated occurrences in a dataset. For
example, in a dataset about customer transactions, an objective can be to find a
set of items that are frequently ordered in a single transaction. Another
complex objective is to detect a set of items that are likely ordered within certain
transactions. These specific tasks in pattern mining are related to sequential
pattern mining. We recall below the most important definitions that we need in
the following.
Definition 1. A sequence is an ordered list hs1s2 . . . smi, where si is an itemset
{i1, . . . , in}. Here, m is the size of a sequence. The length of a sequence is the
total number of items, or P |si|.</p>
        <p>For example, h{a, b}{a, c, d}i is a sequence with size 2, since it contains two
itemsets. Its length is 5.</p>
        <p>Definition 2. A sequence s = hs1s2 . . . smi is a subsequence of s0 = hs01s02 . . . s0ni,
denoted by s s0, if there exist indices 1 ≤ i1 &lt; i2 &lt; . . . &lt; im ≤ n such that
sj ⊆ s0ij for all j = 1 . . . m and m ≤ n.</p>
        <p>Therefore, the sequence h{a}{d}i is a subsequence of h{a, b}{a, c, d}i, while
sequence h{c}{d}i is not.</p>
        <p>One way of evaluating the quality of a subsequence is to compute the
support of the subsequence. Given a user-defined threshold, the subsequence can be
“frequent”, i.e. the support is above the threshold, or “rare”, i.e. the support is
below the threshold.</p>
        <p>Definition 3. Let S be a sequential database. The support of a sequence s in
S is: support(s, S) = |{si ∈ S; s si}|</p>
        <p>
          There exist algorithms which can retrieve all frequent sequences [
          <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
          ]. A long
sequence can have a combinatorial number of subsequences. Thus, if a long
sequence is frequent, these algorithms return all of its subsequences. This leads
to the retrieval of many uninteresting patterns. This issue has been studied
in [
          <xref ref-type="bibr" rid="ref10 ref11 ref9">9,10,11</xref>
          ] by introducing the concept of “closed sequence”. They narrow the
output by disregarding sequences which have another supersequence with the
same support (hence not closed).
        </p>
        <p>
          Beside mining frequent sequences, another complex task is clustering. To
achieve such a task, a distance or a similarity measure between two sequences has
to be defined. The similarity measure simACS was proposed in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], which counts
the number of all common subsequences (ACS). This measure is formulated as:
simACS(Si, Sj) =
        </p>
        <p>φC (Si, Sj)
max{φD(Si), φD(Sj)}
(1)
where φC (Si, Sj) is the number of all common distinct subsequences between Si
and Sj, while φD(Si) is the number of all distinct subsequences of Si.</p>
        <p>In this paper, we reuse simACS with a restriction. Actually, we consider
sequences whose itemsets include only one item. For simplicity, we omit the
curly brackets to describe an itemset. Therefore we will write h{a}{d}{e}i as
ha, d, ei.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Sequence Mining in FCA</title>
        <p>
          In this section we briefly present the two algorithms that are adapted for mining
the trajectories of visitors in a museum, namely MFCS [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] and MRGS [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. The names
of the algorithms are not used as such in the papers but here we use them by
commodity. Both algorithms are original and very efficient, and among the few
algorithms performing sequence mining in the framework of FCA.
        </p>
        <p>MFCS was originally introduced for mining trajectories of patients in
hospitals. The algorithm is based on pattern structures and projections, and stability
as well. One important characteristic of MFCS is that it mines contiguous
subsequences, or stated differently, subsequences without any gap between items.
This is due to the fact that physicians are mainly interested in consecutive events
when analyzing healthcare trajectories. In addition, but this is not needed in our
framework, MFCS is able to take into account a partial ordering – given by domain
knowledge for example – defined on the items composing the sequences.</p>
        <p>MRGS is also a sequence miner based on pattern structures but with a different
purpose. The objective of MRGS is to mine rare rather than frequent subsequences,
and in particular long subsequences with special characteristics. The algorithm
is based on a specific pattern structure of subsequences, where the similarity
operation is based on the discovery of common close subsequences (SCCS
operation illustrated in a next section). The SCCS operation is based on a directed
graph of alignments (DAG of alignments) which guide the mining of common
subsequences. The algorithm shows very good performances and is most
probably one of the few algorithms whose objective is the mining of rare subsequences.
In our framework, we adapted MRGS and the support threshold for comparison
purposes with frequent subsequences. However, we will use in our context MRGS
as a standard sequence miner and we will be interested in frequent subsequences.
3
3.1</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>The Dataset of Museum Visitors</title>
      <sec id="sec-3-1">
        <title>The Museum</title>
        <p>
          In the framework of the CrossCult project, we are working on a specific dataset
about the trajectories of 254 visitors in Hecht Museum in Haifa, Israel [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. In
the raw dataset, a visitor trajectory contains a list of visited items, where each
visit is composed of three elements namely “start time”, “end time”, and “item
name”. An example is presented in Table 1.
        </p>
        <p>
          A visitor can have visits with various time lengths. In order to obtain more
meaningful results and to reduce the complexity, we only consider visits
lasting at least 90 seconds, but this is a parameter that can be relaxed or more
constrained. Thirty-eight trajectories have no visit more than this threshold,
so they are ignored, leaving us with 216 trajectories. Moreover, we model each
trajectory as a sequence of visited items. Therefore, for trajectory in Table 1,
the corresponding sequence is hCrafts and Arts, Wooden Toolsi. This
preprocessing results in sequences of various size. Forty-five sequences have only one
itemset, while three sequences have more than 15 itemsets.
We group the museum items according to their location, so that we obtain
8 categories of items. Some of them are listed in Table 2. We convert the raw
dataset into sequences of items, where each item is represented by its ID. We
define the IDs such that we can infer the category of an item by its first digit.
Therefore, we obtain a dataset of 216 sequences of visitor trajectories – named
V1–V216 – where each sequence is composed by a list of IDs, as illustrated in
Table 3.
In a seminal work about the typing of visitor styles in a museum [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ], four main
behaviors have been detected and described, leading to different
recommendations all along a visit [
          <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
          ]. These four styles are summarized below:
– The ant denotes a visitor who will surely see all the works following their
location order in the museum. Then the recommendation can be the following
item, but depending also on some environmental factors such as the crowd
in the museum, the accessibility of the item and the fatigue of the visitor.
– The grasshopper denotes a visitor who will see only certain artworks, jumping
from one to the other. Then, to encourage such a person to visit more items,
the recommendation can be to visit items having a content similar to items
already visited.
– The butterfly denotes a visitor wanting to discover some and not all artworks,
without having any exact preferences. Then, the recommendation is open
and can be based on surprise (items which are very different one from the
other).
– The fish denotes a visitor who does not feel that much interested in the
artworks and stays most of the time in the center of the rooms without any
precise objective. Then the recommendation can be to visit the most famous
items in the museum which are the closer to the current visitor location, for
encouraging the visitor to continue the visit and gain more interest.
        </p>
        <p>Indeed, a visitor can change his/her style during a visit and other elements
may be of importance, e.g. crowd or fatigue of the visitor.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>The Workflow for Analyzing the Trajectories</title>
      <p>In the following, one objective is to map specific subsequences included in the
visitor trajectories to each visiting style for characterizing more precisely the
style and then making smarter recommendations. To identify the behavior of
each visitor, we propose the following workflow:
1. Cluster the visitor trajectories and attach a label for each visitor (Sect. 5).
2. Create two concept lattices using MFCS and MRGS over the whole dataset
(Sect. 6.1).
3. From the two lattices, find jumping emerging patterns (JEPs) for each label
(Sect. 7.2).
4. Based on their JEPs, these labels are then mapped into four visiting styles
that has been explained in Sect. 3.2.
5</p>
    </sec>
    <sec id="sec-5">
      <title>The Clustering of Trajectories</title>
      <p>
        In this first experiment, we reuse the simACS similarity measure for clustering
the visitor trajectories. The idea is to check whether it is possible to distinguish
the four visiting styles introduced in Section 3.2. We applied hierarchical
clustering1 based on simACS to build a distance matrix between individuals. From the
resulting dendrogram, we retained 5 clusters denoted by “A”, “B”, “C”, “D”,
and “E”. Four of them are expected to match the four visiting patterns, namely
ant, butterfly, fish, and grasshopper. The last cluster will gather all non-classified
1 We used the hclust method from the R software [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
trajectories. These five clusters have various sizes. Cluster “A”, “B”, “C”, “D”,
and “E” have 11, 11, 59, 102, and 33 visitors respectively.
      </p>
      <p>Actually, it is not easy to directly match the five clusters to corresponding
visiting styles. For doing so, we will analyze the subsequences that can be attached
to each cluster of trajectories. The benefit of the clustering is actually to provide
a label among “A”, “B”, “C”, “D”, and “E” to the visitors. Thanks to these
labels, we can perform a search for the so-called “jumping emerging patterns”
and attach a characterization to the clusters based on the mined subsequences.
6
6.1</p>
    </sec>
    <sec id="sec-6">
      <title>The Mining of Trajectories Considered as Sequences</title>
      <sec id="sec-6-1">
        <title>Mining Subsequences with MFCS and MRGS</title>
        <p>Below, we explain the application of the MFCS and MRGS algorithms to the
museum dataset and the building of an associated concept lattice. Moreover, as
will be discussed in the next section, the jumping sequential patterns which are
mined will help us to characterize the visitor trajectories.</p>
        <p>In MFCS and MRGS, pattern structures are used for mining sequences. The
similarity operator (u) between any two sets of sequences is defined as the set
of closed common subsequences (SCCS) in the two input sequences. Then, given
two sequences, say S1 = h401,502,503i and S2 = h401,503,502i, the similarity
between these descriptions is:
δ(S1) u δ(S2) = {h401,502,503i} u {h401,503,502i}</p>
        <p>= {h401,502i, h401,503i}</p>
        <p>
          In the dataset, the items are grouped into categories and the SCCS
calculation is performed, checking whether two items belong to the same category.
Using the MFCS algorithm [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] it becomes:
δ(S1) u δ(S2) = {h401,502,503i} u {h401,503,502i}
        </p>
        <p>= {h502i, h503i, h401,5,5i}</p>
        <p>It should be noticed that MFCS mines contiguous subsequences, i.e. in
Definition 2, ik = ik−1 + 1 for all k ∈ {2, 3, . . . , m}.</p>
        <p>In parallel, the default similarity operator of MRGS can be modified to
accommodate our needs, such that non-contiguous common subsequences can be
mined:
δ(S1) u δ(S2) = {h401,502,503i} u {h401,503,502i}</p>
        <p>= {h401,502i, h401,503i, h401,5,5i}</p>
        <p>Then, based either on MFCS or MRGS, a concept has an extent including a set
of trajectories and an intent including a set of common subsequences. Again, it
should be noticed that, based on whether a subsequence is contiguous or not,
the resulting concept lattices are different.</p>
        <p>
          For example, the concepts corresponding to Table 3 are shown in Table 4.
Notice that both algorithms obtain a concept whose extent is V2, V3, V4, albeit
with different intent. Based on MRGS, the common subsequence of V2, V3, V4 is
h1, 402i, while according to MFCS, their common subsequences are h1i and h402i.
This is because items 1 and 402 are not contiguous in V3 and V4.
FCA is a non supervised classification process that can be turned into a
supervised process thanks to the adding of a target attribute in the context, generally
corresponding to a target class. Then the idea is to search for the so-called
“Jumping Emerging Patterns” (JEPs) [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. We have already applied this
approach in [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] for analyzing and characterizing clusters of biological inhibitors.
Here we adapt the same idea for characterizing this time the clusters of visitors
discovered with the similarity measure simACS.
        </p>
        <p>More precisely, five clusters are discovered by classifying visitor trajectories
with simACS. These same trajectories are then considered as sequences
composed of subsequences. Then a set of characteristic subsequences is extracted
and these subsequences are used as “attributes” in a formal context where
objects are visitor trajectories. The resulting formal context is completed with an
extra attribute corresponding to the “cluster information”, i.e. the cluster in
which the trajectory is classified according to simACS. A concept lattice can
then be built from this completed context.</p>
        <p>More interestingly, the cluster information is used for characterizing the
concepts whose extents include trajectories of a single cluster. The intents – made
of subsequences – of these particular concepts are JEPs, and as such they can
be used to characterize the corresponding clusters. For example, if the extent
of the concept ({V103, V165, V188}, {h4i, h1i, h306i, h701,707i}) includes visitors
from cluster B only, then its intent is JEPs for that cluster.
7
7.1</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Discussion</title>
      <sec id="sec-7-1">
        <title>About Interesting Subsequences</title>
        <p>The first part of Table 5 shows some interesting contiguous subsequences from
4677 concepts discovered by MFCS. Thirty-three persons are visiting three items
contiguously in category 1 of items located near the entrance. This is interesting
to be noticed, as visitors are likely to spend more time in rooms located near the
entrance, because they are arriving, they have high interest, and they are not
tired. Then items of importance could be placed near the entrance for getting
sufficient interest from visitors.</p>
        <p>Thirteen people visit an item in category 7 – this category corresponds to
items in the room of “Ancient Ship” which is one of the most famous items
in this museum – right after an item in category 1. This is a characteristic of
grasshopper, because 1 and 7 are separated by many other categories. These
visitors have a specific interest for the “Ancient Ship” in the museum, since they
skip all the items located between entrance and “Ancient Ship” (both categories
can be considered as “far” from each others).</p>
        <p>From 8019 concepts obtained by MRGS, some subsequences are presented in
the second part of Table 5. The subsequence h1,1i has a support of 69 with
MFCS, and it has quite a similar support (66) with MRGS. Then we can draw the
same conclusion, meaning that when a person visits two items in category 1, it is
likely in continuation (to be compared with the preceding subsequence h1,1,1i).</p>
        <p>Now, more interestingly, there are 38 persons visiting an item in category 3
after category 1, while much less persons (9) are doing the opposite. A similar
conclusion can also be drawn with pairs h4,7i (31) and h7,4i (11). Based on such
an observation, we can infer that visiting a museum is an “oriented activity”and
that some directions are more preferred than others or “naturally followed”,
just as it is the case for the ordering of the rooms existing in the museum. By
contrast, only a few visitors are quitting the “natural flow” and go “backward”.
Among these visitors, we can probably find visitors searching for more precision
about preceding visited items.
7.2</p>
      </sec>
      <sec id="sec-7-2">
        <title>Cluster Characterization</title>
        <p>Now we are interested in characterizing the five clusters that were introduced in
the previous section. For doing so, JEPs are searched in the two concept lattices
obtained with MFCS and MRGS algorithms. Some of these concepts are listed in
Table 6 and Table 7.</p>
        <p>First, from both MFCS and MRGS, we cannot find any satisfying concept for
JEP of cluster “E”. This is because among all the concepts whose extent is
exclusively from cluster “E”, none of them has more than one visitor. If we
consider the dataset, among 33 members of cluster “E”, 32 of them visit less
than 2 items during their whole visit. We can assume that they are visitors that
are not really interested in visiting the museum. Therefore, we can quote safely
label this cluster as fish.</p>
        <p>Cluster “D” is more easily distinguishable. Based on subsequences of concept
FD2–FD4, many visitors in this class skip some items. Also, in concept RD1 and
RD2, some of them visit other items after item 701. This is not a natural direction,
because items in category 7 are located farther from the entrance than items in
category 4 or 5. We can interpret the visitors of this cluster as grasshopper, since
they “jump” from one item to another.</p>
        <p>Clusters “A”, “B”, and “C” are relatively similar to each other. The visitors
associated to these clusters follow an ant behavior: a natural flow (based on RA1–
RC1) and no “jump” (based on FA1–FC2). However, in FC3, three visitors visit
101, then 102, then back again to 101, indicating rather a butterfly behavior.
In this article, we have presented our experiments in mining visitor
trajectories that are modeled as sequences of items. We incorporated a classification of
museum items and built a concept lattice using pattern structures. We applied
two sequence miners based on FCA to the visitor trajectories, namely MFCS and
MRGS, to discover interesting contiguous and general subsequences.</p>
        <p>Our result highlight some interesting patterns that may define visitor
behaviors. This can help museum researchers to analyze and evaluate the placement
of items and the visiting styles. Moreover, we have also studied the possibility of
clustering the visitors based on a concept lattice. These clusters can be analyzed
to build a recommendation system for future visitors, but we did not yet study
this aspect until now.</p>
        <p>
          In this paper, we only included in the sequences partial information about
the museum. More interesting results can be obtained if other elements are taken
into account, such as more general knowledge about history and geography, and
duration and time of the visit. . . Furthermore, the selection of interesting
concepts can be also guided by computing the stability of the concepts [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Finally,
from a more dynamic point of view, ongoing information such as comments and
state of the visitor during the visit could be also considered for analysis and
in-line recommendation.
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <source>Formal Concept Analysis: Mathematical Foundations</source>
          , Berlin: Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Codocedo</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bosc</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kaytoue</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boulicaut</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A proposition for sequence mining using pattern structures</article-title>
          .
          <source>Proc. Int. Conf. Formal Concept Analysis</source>
          ,
          <fpage>106</fpage>
          -
          <lpage>121</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Buzmakov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Egho</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jay</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Ra¨ıssi, C.:
          <article-title>On mining complex sequential data by means of FCA and pattern structures</article-title>
          .
          <source>Int. J. General Syst</source>
          .
          <volume>45</volume>
          (
          <issue>2</issue>
          ),
          <fpage>135</fpage>
          -
          <lpage>159</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Egho</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jay</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , Ra¨ıssi,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Ienco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Poncelet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Teisseire</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>A contribution to the discovery of multidimensional patterns in healthcare trajectories</article-title>
          .
          <source>J. Intell. Inform. Syst</source>
          .
          <volume>42</volume>
          (
          <issue>2</issue>
          ),
          <fpage>283</fpage>
          -
          <lpage>305</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Egho</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , Ra¨ıssi,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Calders</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Jay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>On measuring similarity for sequences of itemsets</article-title>
          .
          <source>Data Min. Knowl. Discov</source>
          .
          <volume>29</volume>
          (
          <issue>3</issue>
          ),
          <fpage>732</fpage>
          -
          <lpage>764</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. V´eron, E.,
          <string-name>
            <surname>Levasseur</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Ethnographie de l'exposition. Paris: Biblioth`eque Publique d'Information (
          <year>1983</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7. Han,
          <string-name>
            <given-names>J</given-names>
            .,
            <surname>Pei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Mortazavi-Asl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Pinto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            ,
            <surname>Dayal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            ,
            <surname>Hsu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth</article-title>
          .
          <source>Proc. 17th Int. Conf. Data Eng</source>
          .,
          <fpage>215</fpage>
          -
          <lpage>224</lpage>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ayres</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flannick</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gehrke</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yiu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Sequential pattern mining using a bitmap representation</article-title>
          .
          <source>Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min</source>
          .,
          <fpage>429</fpage>
          -
          <lpage>435</lpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , Han,
          <string-name>
            <given-names>J</given-names>
            .,
            <surname>Afshar</surname>
          </string-name>
          , R.: CloSpan: Mining:
          <article-title>Closed sequential patterns in large datasets</article-title>
          .
          <source>Proc. Int. Conf. Data Min</source>
          .,
          <fpage>166</fpage>
          -
          <lpage>177</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>J</given-names>
            ., Han, J
          </string-name>
          .: BIDE:
          <article-title>Efficient mining of frequent closed sequences</article-title>
          .
          <source>Proc. 20th Int. Conf. Data Eng</source>
          .,
          <fpage>79</fpage>
          -
          <lpage>90</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gomariz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Campos</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goethals</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>ClaSP: an efficient algorithm for mining frequent closed sequences</article-title>
          .
          <source>Pacific-Asia Conf. Knowl. Discov. Data Min</source>
          .,
          <fpage>50</fpage>
          -
          <lpage>61</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Lanir</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuflik</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dim</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wecker</surname>
            ,
            <given-names>A.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stock</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>The influence of a locationaware mobile guide on museum visitors' behavior</article-title>
          .
          <source>Interact. Comput</source>
          .
          <volume>25</volume>
          (
          <issue>6</issue>
          ),
          <fpage>443</fpage>
          -
          <lpage>460</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Zancanaro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuflik</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boger</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goren-Bar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldwasser</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Analyzing museum visitors' behavior patterns</article-title>
          .
          <source>Int. Conf. User Modeling</source>
          ,
          <fpage>238</fpage>
          -
          <lpage>246</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Kuflik</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boger</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zancanaro</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>Analysis and prediction of museum visitors' behavioral pattern types</article-title>
          .
          <source>Ubiquitous Display Environments</source>
          . Berlin: Springer,
          <fpage>161</fpage>
          -
          <lpage>176</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>R</given-names>
            <surname>Core Team: R: A Language</surname>
          </string-name>
          and
          <article-title>Environment for Statistical Computing</article-title>
          . R Foundation for Statistical Computing, Vienna, Austria. (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dong</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <article-title>Efficient mining of emerging patterns: Discovering trends and differences</article-title>
          .
          <source>Proc. 5th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min</source>
          .,
          <fpage>43</fpage>
          -
          <lpage>52</lpage>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Asses</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buzmakov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bourquard</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Napoli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Hybrid Classification Approach based on FCA and Emerging Patterns - An application for the classification of biological inhibitors</article-title>
          .
          <source>Proc. CLA Volume 972 CEUR Workshop</source>
          ,
          <volume>211</volume>
          -
          <fpage>222</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ignatov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          :
          <article-title>Concept stability for constructing taxonomies of web-site users</article-title>
          .
          <source>arXiv preprint arXiv:0905.1424</source>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>