• Title/Summary/Keyword: User behavior

Search Result 1,725, Processing Time 0.203 seconds

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.2
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.

Influence of User's Behavior about Delay on Media Server

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1150-1158
    • /
    • 2010
  • At present multimedia service composed of voice, data, and video service is prevalent in the Internet. As such, wide-scale penetration of Internet service imposes tremendous pressure to the network infrastructure such as the media servers and links as well as the nodes. In addition, users from a large-scale population require broad bandwidth and high level of QoS. This requires a network with reliable and scalable services to customers, which also necessitates a realistic method for the design of the a media server. In this work, we explore the influence of user's behavior about delay on the performance of media server that takes into account the system and user attributes in a realistic manner. By incorporating user's behavior about the delay-sensitivity, we present an analytic framework for the evaluation of the performance of the media server, via which we illustrate a meaningful intuition in the provision of Internet multimedia service.

Device-Centered Personalized Product Recommendation Method using Purchase and Share Behavior in E-Commerce Environment (이커머스 환경에서 구매와 공유 행동을 이용한 기기 중심 개인화 상품 정보 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.85-96
    • /
    • 2022
  • Personalized recommendation technology is one of the most important technologies in electronic commerce environment. It helps users overcome information overload by suggesting information that match user's interests. In e-commerce environment, both mobile device users and smart device users have risen dramatically. It creates new challenges. Our method suggests product information that match user's device interests beyond only user's interests. We propose a device-centered personalized recommendation method. Our method uses both purchase and share behavior for user's devices interests. Moreover, it considers data type preference for each device. This paper presents a new recommendation method and algorithm. Then, an e-commerce scenario with a computer, a smartphone and an AI-speaker are described. The scenario shows our work is better than previous researches.

New Authentication Methods based on User's Behavior Big Data Analysis on Cloud (클라우드 환경에서 빅데이터 분석을 통한 새로운 사용자 인증방법에 관한 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.31-36
    • /
    • 2016
  • User authentication is the first step to network security. There are lots of authentication types, and more than one authentication method works together for user's authentication in the network. Except for biometric authentication, most authentication methods can be copied, or someone else can adopt and abuse someone else's credential method. Thus, more than one authentication method must be used for user authentication. However, more credential makes system degrade and inefficient as they log on the system. Therefore, without tradeoff performance with efficiency, this research proposed user's behavior based authentication for secure communication, and it will improve to establish a secure and efficient communication.

A Study on Behavior Rule Induction Method of Web User Group using 2-tier Clustering (2-계층 클러스터링을 사용한 웹 사용자 그룹의 행동규칙추출방법에 관한 연구)

  • Hwang, Jun-Won;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.139-146
    • /
    • 2008
  • It is very important to identify useful web user group and induce their behavior pattern in eCRM domain. Inducing user group with a similar inclination, a reliability of user group decreases because there is an uncertainty in online user data. In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers. Also we propose a method which induces user behavior pattern from a cluster and compare C4.5 with our method.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A study of Relationship Smartphone use behavior and User empowerment in Tour experience : Focusing on Chinese people (관광경험에서의 스마트폰 활용 행태와 사용자 임파워먼트와의 관계에 관한 연구: 중국인을 대상으로)

  • Koo, Chulmo;Liu, wenting;Joun, Youhee;Lee, Jimin;Chung, Namho
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.155-174
    • /
    • 2016
  • Recent years, a smartphone has been playing a role of searching, booking, and decision-makings in the tourism industry through tourists' user experiences and engagements. This study investigated the tourists' behavior toward smartphone usage regarding Chinese visitors who were ranked in Korea inbound tourism. This research model formulated two types of usage which identified explorlative use and exploitive use and the antecedent relationships of user empowerment including user competence, user impact, usage meaning, user trust. We analyzed SmartPLS2.0 for the hypotheses and found that first, user competence has a positive influence both of exploitative use and explorative use, second, user impact has a positive influence on exploitative use, but has not influenced on explorative use, third, usage meaning has not influence on exploitive use, but has a postitive influence on explorative use, and finally user trust has influence on both of exploitive and explorative use. Based on the results we found, we suggested Chinese tourists' smartphone usages' behaviors and theoretical and practical implications.

  • PDF

Research on Influencing Factors of YouTube Chinese Vdeo User Subscription Motivation: Centered on the Censydiam User Motivation Analysis Model

  • Hou, ZhengDong;Choi, ChulYoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.95-105
    • /
    • 2019
  • A great deal needs to be learned about why and how users participate and consume information on various online sites. The design of socio-technical systems especially for promoting engagement in terms of maximum user participation is both a theoretical and real-world challenge that researchers strive to understand. At present, most of the research on the motives of Internet video users' behavior focuses on the user's "viewing motivation" and "sharing motivation", and lacks the analysis of the factors affecting users' "subscription motivation". This study will attempt to compensate for this gap. Based on the YouTube platform, we take Chinese video users as the research object and uses the "Censydiam user motivation analysis model" to make assumptions about user subscription motivation from the two levels of social needs and personal needs, using regression analysis. Validate the hypothesis and get the influencing factors that may be available in the user's subscription motivation based on the assumptions. Built on survey data from 215 respondents, the study found that Enjoyment, Vitality, Power, and Conviviality are four factors that influence user motivation.