• Title/Summary/Keyword: user behavior mining

Search Result 57, Processing Time 0.019 seconds

An Optimized User Behavior Prediction Model Using Genetic Algorithm On Mobile Web Structure

  • Hussan, M.I. Thariq;Kalaavathi, B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1963-1978
    • /
    • 2015
  • With the advancement of mobile web environments, identification and analysis of the user behavior play a significant role and remains a challenging task to implement with variations observed in the model. This paper presents an efficient method for mining optimized user behavior prediction model using genetic algorithm on mobile web structure. The framework of optimized user behavior prediction model integrates the temporary and permanent register information and is stored immediately in the form of integrated logs which have higher precision and minimize the time for determining user behavior. Then by applying the temporal characteristics, suitable time interval table is obtained by segmenting the logs. The suitable time interval table that split the huge data logs is obtained using genetic algorithm. Existing cluster based temporal mobile sequential arrangement provide efficiency without bringing down the accuracy but compromise precision during the prediction of user behavior. To efficiently discover the mobile users' behavior, prediction model is associated with region and requested services, a method called optimized user behavior Prediction Model using Genetic Algorithm (PM-GA) on mobile web structure is introduced. This paper also provides a technique called MAA during the increase in the number of models related to the region and requested services are observed. Based on our analysis, we content that PM-GA provides improved performance in terms of precision, number of mobile models generated, execution time and increasing the prediction accuracy. Experiments are conducted with different parameter on real dataset in mobile web environment. Analytical and empirical result offers an efficient and effective mining and prediction of user behavior prediction model on mobile web structure.

Discovery of Behavior Sequence Pattern using Mining in Smart Home (스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견)

  • Chung, Kyung-Yong;Kim, Jong-Hun;Kang, Un-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.19-26
    • /
    • 2008
  • With the development of ubiquitous computing and the construction of infrastructure for one-to-one personalized services, the importance of context-aware services based on user's situation and environment is being spotlighted. The smart home technology connects real space and virtual space, and converts situations in reality into information in a virtual space, and provides user-oriented intelligent services using this information. In this paper, we proposed the discovery of the behavior sequence pattern using the mining in the smart home. We discovered the behavior sequence pattern by using mining to add time variation to the association rule between locations that occur in location transactions. We can predict the path or behavior of user according to the recognized time sequence and provide services accordingly. To evaluate the performance of behavior consequence pattern using mining, we conducted sample t-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.

A Study on the Development of Internet Purchase Support Systems Based on Data Mining and Case-Based Reasoning (데이터마이닝과 사례기반추론 기법에 기반한 인터넷 구매지원 시스템 구축에 관한 연구)

  • 김진성
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.135-148
    • /
    • 2003
  • In this paper we introduce the Internet-based purchase support systems using data mining and case-based reasoning (CBR). Internet Business activity that involves the end user is undergoing a significant revolution. The ability to track users browsing behavior has brought the vendor and end customer's closer than ever before. It is now possible for a vendor to personalize his product message for individual customers at massive scale. Most of former researchers, in this research arena, used data mining techniques to pursue the customer's future behavior and to improve the frequency of repurchase. The area of data mining can be defined as efficiently discovering association rules from large collections of data. However, the basic association rule-based data mining technique was not flexible. If there were no inference rules to track the customer's future behavior, association rule-based data mining systems may not present more information. To resolve this problem, we combined association rule-based data mining with CBR mechanism. CBR is used in reasoning for customer's preference searching and training through the cases. Data mining and CBR-based hybrid purchase support mechanism can reflect both association rule-based logical inference and case-based information reuse. A Web-log data gathered in the real-world Internet shopping mall is given to illustrate the quality of the proposed systems.

A Data Mining Technique for Customer Behavior Association Analysis in Cyber Shopping Malls (가상상점에서 고객 행위 연관성 분석을 위한 데이터 마이닝 기법)

  • 김종우;이병헌;이경미;한재룡;강태근;유관종
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.21-36
    • /
    • 1999
  • Using user monitoring techniques on web, marketing decision makers in cyber shopping malls can gather customer behavior data as well as sales transaction data and customer profiles. In this paper, we present a marketing rule extraction technique for customer behavior analysis in cyber shopping malls, The technique is an application of market basket analysis which is a representative data mining technique for extracting association rules. The market basket analysis technique is applied on a customer behavior log table, which provide association rules about web pages in a cyber shopping mall. The extracted association rules can be used for mall layout design, product packaging, web page link design, and product recommendation. A prototype cyber shopping mall with customer monitoring features and a customer behavior analysis algorithm is implemented using Java Web Server, Servlet, JDBC(Java Database Connectivity), and relational database on windows NT.

  • PDF

Research on Data Acquisition Strategy and Its Application in Web Usage Mining (웹 사용 마이닝에서의 데이터 수집 전략과 그 응용에 관한 연구)

  • Ran, Cong-Lin;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.231-241
    • /
    • 2019
  • Web Usage Mining (WUM) is one part of Web mining and also the application of data mining technique. Web mining technology is used to identify and analyze user's access patterns by using web server log data generated by web users when users access web site. So first of all, it is important that the data should be acquired in a reasonable way before applying data mining techniques to discover user access patterns from web log. The main task of data acquisition is to efficiently obtain users' detailed click behavior in the process of users' visiting Web site. This paper mainly focuses on data acquisition stage before the first stage of web usage mining data process with activities like data acquisition strategy and field extraction algorithm. Field extraction algorithm performs the process of separating fields from the single line of the log files, and they are also well used in practical application for a large amount of user data.

Customized Digital TV System for Individuals/Communities based on Data Stream Mining (데이터 스트림 마이닝 기법을 적용한 개인/커뮤니티 맞춤형 Digital TV 시스템)

  • Shin, Se-Jung;Lee, Won-Suk
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.453-462
    • /
    • 2010
  • The switch from analog to digital broadcast television is extended rapidly. The DTV can offer multiple programming choices, interactive capabilities and so on. Moreover, with the spread of Internet, the information exchange between the communities is increasing, too. These facts lead to the new TV service environment which can offer customized TV programs to personal/community users. This paper proposes a 'Customized Digital TV System for Individuals/Communities based on Data Stream Mining' which can analyze user's pattern of TV watching behavior. Due to the characteristics of TV program data stream and EPG(electronic program guide), the data stream mining methods are employed in the proposed system. When a user is watching DTV, the proposed system can control the surrounding circumstances as using the user behavior profiles. Furthermore, the channel recommendation system on the smart phone environment is proposed to utilize the profiles widely.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

Usage Pattern Analysis and Comparative Analysis among User Groups of Web Sites Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 사이트의 이용 패턴 분석 및 그룹 간 비교 분석)

  • Kim, Seul-Gi;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • v.2 no.2
    • /
    • pp.105-114
    • /
    • 2017
  • Today, many services are supported on the web sites. Analysis of usage patterns of web site visitors is very important to optimize the use and efficiency of the web sites. In this study, analysis of usage patterns and comparative analysis of user groups were conducted by analyzing web access log provided by BPI Challenge 2016. This data provides access logs to the web site in the IT system of a Dutch Employee Insurance Agency (UWV). The customer information, and the click data describing the customers' behavior when using the agency's web site. In this study, we use process mining techniques to analyze the usage patterns of customers and the characteristics of customer groups, and ultimately improve the service quality of customers using web services.

  • PDF

A Study on Behavior Rule Induction Method of Web User Group using 2-tier Clustering (2-계층 클러스터링을 사용한 웹 사용자 그룹의 행동규칙추출방법에 관한 연구)

  • Hwang, Jun-Won;Song, Doo-Heon;Lee, Chang-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.139-146
    • /
    • 2008
  • It is very important to identify useful web user group and induce their behavior pattern in eCRM domain. Inducing user group with a similar inclination, a reliability of user group decreases because there is an uncertainty in online user data. In this paper, we have applied the 2-tier clustering, which uses the outcome of interaction with data from other tiers. Also we propose a method which induces user behavior pattern from a cluster and compare C4.5 with our method.