Showing 21 - 40 results of 348 for search 'analysis of user’s behavior', query time: 0.09s Refine Results
  1. 21
  2. 22

    The Influence of User Protection Behaviors on the Control of Internet Worm Propagation by Yihong Li, Jinxiao Pan, Lipeng Song, Zhen Jin

    Published 2013-01-01
    “…In this paper, in order to characterize the impacts of adaptive user protection behaviors, an improved SIS model is proposed to describe the Internet worm propagation. …”
    Get full text
    Article
  3. 23
  4. 24
  5. 25

    TD-LTE refinement planning and marketing based on user behavior by Congsheng QI, Guibin TIAN

    Published 2015-12-01
    “…The planning and marketing situation of TD-LTE were analyzed,the analysis to the user terminal usage and user service was carried on,the influence of distribution of users and user terminal types of data traffic were analyzed,the process of TD-LTE in meticulous planning and marketing according to the user behavior were determined,the process through the TD-LTE fine planning and marketing practical application were verified.…”
    Get full text
    Article
  6. 26
  7. 27

    Collaborative Recommendation for Online Social Networks Based on User Behavior Cognitive by Jin Qi, Bin Xu, Xiaoxuan Hu, Bianjia Xu, Xinglin Xiao

    Published 2015-10-01
    “…Recently,online social network(OSN)has become essential tools for information sharing and communication in people’s work and life.How to cognitive massive,complex,large-area and spatiotemporal association user behavior information and provide personalized re1commendation services have become problems need special attention in development of OSN.Thus,a frame of collaborative recommendation for OSN based on user behavior cognitive was proposed which used collaborative filtering algorithm to provide personalized recommendation services on the basis of analysis of behavior of user characteristics,text information and interest preferences,etc.Experimental results verify that the proposed collaborative recommendation strategy based on user behavior cognitive has good stability and actual application effect.…”
    Get full text
    Article
  8. 28
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33

    Design and validation of consumer behavior model based on user-generated content in the banking industry by Sepahdar Rahnama, Marzieh ZendehDel, Mir Hadi Moazen Jamshidi

    Published 2024-09-01
    “…The combination of thematic analysis and structural-interpretive modeling resulted in the presentation of consumer behavior patterns based on user content. …”
    Get full text
    Article
  14. 34

    Gender-Based Analysis of User Reactions to Facebook Posts by Yassine El Moudene, Jaafar Idrais, Rida El Abassi, Abderrahim Sabour

    Published 2024-03-01
    “…This paper is based on the analysis of 119875012 FB reactions (Like, Love, Haha, Wow, Sad, Angry, Thankful, and Pride) made at multiple levels (publications, comments, and sub-comments) to study and classify the users’ emotional behavior, visualize the distribution of different types of reactions, and analyze the gender impact on emotion generation. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    Design models of secret reconstruction towards rational users by Hai LIU, Youliang TIAN, Ying TANG, Jianbing Ni, Jianfeng MA

    Published 2021-11-01
    “…Rational Secret Reconstruction is an intersection between traditional secret reconstruction and game theory, which aims to restrict the selfish behaviors of rational users, making both of them obtain the secret in real applications.However, when directly adopting the existing rational secret reconstruction protocols, it is infeasible to realize the fair secret reconstruction.More seriously, an extreme situation may rise, which is some users regard a fake secret as the real one.The crucial reason is that, due to lack of design models, the protocol designers cannot completely consider their selfish behaviors when rational users participate in secret reconstruction.To solve that problem, through the formalizations of rational users and rational secret reconstruction game, the influences of rational users’ action order and their chosen strategies about the fair secret reconstruction were analyzed, and then, three design models for the different scenarios, including purely user rational scenario, reputation-based scenario and trusted user-based scenario, were proposed respectively.Theoretical analysis demonstrates that, the proposed models can help the designers restrict rational users’ selfishness effectively, thereby guiding the designers to devise the fair rational secret reconstruction protocols.Additionally, under the guidance of the proposed models, a fair rational secret reconstruction protocol was devised, which indicated that the proposed models were usable.…”
    Get full text
    Article
  18. 38
  19. 39
  20. 40

    From Innovation and Compatibility to The Intention to Adopt Mobile Payment with User Expectations as The Mediating Factor by Lady Lady, Kelvin Lie, Hesniati Hesniati, Candy Candy

    Published 2024-12-01
    “…With the rapid growth of mobile payment transactions in Indonesia, it is imperative to understand the factors influencing user acceptance to optimize product development and marketing strategies. …”
    Get full text
    Article