Showing 1 - 20 results of 348 for search 'analysis of user’s behavior', query time: 0.09s Refine Results
  1. 1
  2. 2
  3. 3

    Analysis and Application Review of User Behavior Trajectory Based on the Location Information by Kang Chen, Xiaoyu Huang, Aibao Wang, Caixia Tao, Yinghui Guan, Lei Li

    Published 2013-04-01
    “…With the rapid development of spatial data collection technology in recent years,many efforts have been devoted to the research on trajectory based user behavior analysis and its applications,due to their academic interests;they also show promising business opportunities.From the application aspect,in principle,current issues in trajectory based user behavior analysis can be classified into two major categories:the intelligent transportation applications and the user behavior based applications.The state-of-the-art progress of these categories were reviewed.For each category,its main focus and related achievements were discussed.What’s more,the main technical characteristics of the means used were also summarized in current studies.…”
    Get full text
    Article
  4. 4

    Visual Analysis of E-Commerce User Behavior Based on Log Mining by Tingzhong Wang, Nanjie Li, Hailong Wang, Junhong Xian, Jiayi Guo

    Published 2022-01-01
    “…Through the effective mining and multidimensional visual analysis of user behavior data, the behavior analysis of group users and individual users, as well as the analysis of commodity sales flow and sales linkage are realized, which provides support for internal decision-making and precision marketing.…”
    Get full text
    Article
  5. 5

    Victimization analysis model of user network behavior based on network traffic by Shengli ZHOU, Xiaoyang XU

    Published 2021-02-01
    “…The analysis of network victimization is of great significance to the prevention and control of telecom fraud.By studying the network traffic generated by the interaction between users and websites, a victimization identification model of telecom fraud crime based on network behavior flow analysis was proposed, the association rules between different behavior characteristics were analyzed, the behavior sequence features were reconstructed, and the victimization of network behavior sequence with random forest algorithm was evaluated.Based on the network behavior data set of public security organs, the experiment proves that the model can effectively improve the recognition accuracy of network behavior victimization.…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Novel role analysis method for network domain users by Xiao-feng XU, Li YANG, Wei WANG

    Published 2017-03-01
    Subjects: “…domain user…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Malicious user detection in Momo application based on spatio-temporal behavior and static attribute analysis by YANG Haifeng, DU Shaoyong, WEI Guo, SHI Wenqi, LUO Xiangyang

    Published 2024-08-01
    “…To address this issue, a malicious user detection method based on the analysis of user spatio-temporal behavior and static attributes was proposed. …”
    Get full text
    Article
  17. 17
  18. 18

    Impact of user behavior on network performance reliability by Juan ZHAO, Ping GUO, Hong-zhong DENG, Jun WU, Yue-jin TAN, Min ZHANG

    Published 2013-01-01
    “…Based on a lattice network,a user access behavior model was established to describe the statistical characteristics of user behavior including the clustering characteristics and the power law distribution.The phase transition point was used to analysis the influence of the statistical characteristics of user behavior on the network performance reliability.It was shown that the network performance reliability almost independent on the degree distribution of the server-visited bipartite network;however the hot changing of the small subset with the high degree server nodes improved the network reliability.The strength,frequency and the duration of the clustering characteristics have certain impact on the phase transition of network performance reliability.The phase transition point of network performance reliability moved to the right with the increase of the difference between the number of active users when the clustering characteristics happened and don’t.…”
    Get full text
    Article
  19. 19
  20. 20

    Analysis of user behavior and satisfaction under the elderly adaptation mode of an APP based on the fuzzy-IPA model by Jian Yang, Taotao Yang, Lu Li

    Published 2025-01-01
    “…Then, descriptive statistics were used to analyze user behavior and preferences for the APP aging mode. …”
    Get full text
    Article