-
21
-
22
The Influence of User Protection Behaviors on the Control of Internet Worm Propagation
Published 2013-01-01“…In this paper, in order to characterize the impacts of adaptive user protection behaviors, an improved SIS model is proposed to describe the Internet worm propagation. …”
Get full text
Article -
23
-
24
-
25
TD-LTE refinement planning and marketing based on user behavior
Published 2015-12-01“…The planning and marketing situation of TD-LTE were analyzed,the analysis to the user terminal usage and user service was carried on,the influence of distribution of users and user terminal types of data traffic were analyzed,the process of TD-LTE in meticulous planning and marketing according to the user behavior were determined,the process through the TD-LTE fine planning and marketing practical application were verified.…”
Get full text
Article -
26
-
27
Collaborative Recommendation for Online Social Networks Based on User Behavior Cognitive
Published 2015-10-01“…Recently,online social network(OSN)has become essential tools for information sharing and communication in people’s work and life.How to cognitive massive,complex,large-area and spatiotemporal association user behavior information and provide personalized re1commendation services have become problems need special attention in development of OSN.Thus,a frame of collaborative recommendation for OSN based on user behavior cognitive was proposed which used collaborative filtering algorithm to provide personalized recommendation services on the basis of analysis of behavior of user characteristics,text information and interest preferences,etc.Experimental results verify that the proposed collaborative recommendation strategy based on user behavior cognitive has good stability and actual application effect.…”
Get full text
Article -
28
DNS log analysis system based on big data fusion algorithm
Published 2019-05-01Subjects: Get full text
Article -
29
-
30
Evaluating the Acceptance and Usability of an Independent, Noncommercial Search Engine for Medical Information: Cross-Sectional Questionnaire Study and User Behavior Tracking Analysis
Published 2025-01-01“…Furthermore, from October 2020 to June 2021, we used the open-source web analytics platform Matomo to collect behavior-tracking data from consenting users of the search engine. …”
Get full text
Article -
31
Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants
Published 2014-01-01Get full text
Article -
32
Researcb on Precision Marketing Metbod Based on Data-Driven in Telecom Industry
Published 2014-07-01Subjects: Get full text
Article -
33
Design and validation of consumer behavior model based on user-generated content in the banking industry
Published 2024-09-01“…The combination of thematic analysis and structural-interpretive modeling resulted in the presentation of consumer behavior patterns based on user content. …”
Get full text
Article -
34
Gender-Based Analysis of User Reactions to Facebook Posts
Published 2024-03-01“…This paper is based on the analysis of 119875012 FB reactions (Like, Love, Haha, Wow, Sad, Angry, Thankful, and Pride) made at multiple levels (publications, comments, and sub-comments) to study and classify the users’ emotional behavior, visualize the distribution of different types of reactions, and analyze the gender impact on emotion generation. …”
Get full text
Article -
35
Impact of Tiktok Live Stream Attributes on Social Presence and Behavioral Intention Among Surabaya Users
Published 2024-09-01Get full text
Article -
36
A Choice Behavior Model of Bike-Sharing Based on User Perception, Psychological Expectations, and Loyalty
Published 2022-01-01Get full text
Article -
37
Design models of secret reconstruction towards rational users
Published 2021-11-01“…Rational Secret Reconstruction is an intersection between traditional secret reconstruction and game theory, which aims to restrict the selfish behaviors of rational users, making both of them obtain the secret in real applications.However, when directly adopting the existing rational secret reconstruction protocols, it is infeasible to realize the fair secret reconstruction.More seriously, an extreme situation may rise, which is some users regard a fake secret as the real one.The crucial reason is that, due to lack of design models, the protocol designers cannot completely consider their selfish behaviors when rational users participate in secret reconstruction.To solve that problem, through the formalizations of rational users and rational secret reconstruction game, the influences of rational users’ action order and their chosen strategies about the fair secret reconstruction were analyzed, and then, three design models for the different scenarios, including purely user rational scenario, reputation-based scenario and trusted user-based scenario, were proposed respectively.Theoretical analysis demonstrates that, the proposed models can help the designers restrict rational users’ selfishness effectively, thereby guiding the designers to devise the fair rational secret reconstruction protocols.Additionally, under the guidance of the proposed models, a fair rational secret reconstruction protocol was devised, which indicated that the proposed models were usable.…”
Get full text
Article -
38
User role analysis method based on directed topological potential
Published 2014-12-01Get full text
Article -
39
-
40
From Innovation and Compatibility to The Intention to Adopt Mobile Payment with User Expectations as The Mediating Factor
Published 2024-12-01“…With the rapid growth of mobile payment transactions in Indonesia, it is imperative to understand the factors influencing user acceptance to optimize product development and marketing strategies. …”
Get full text
Article