-
61
Can AI Digital Personas for Well-Being Provide Social Support? A Mixed-Method Analysis of User Reviews
Published 2024-01-01Get full text
Article -
62
Analysis of network behavior characteristic and influence factor based on the peak traffic
Published 2012-10-01Get full text
Article -
63
IoT business guarantee method based on behavioral portrait
Published 2021-05-01“…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
Get full text
Article -
64
Prediction of Domain Behavior through Dynamic Well-Being Domain Model Analysis
Published 2015-01-01“…The models created were used to perform the analysis and behavior prediction. The analysis results were compared to existing application end-user evaluation studies. …”
Get full text
Article -
65
Relieving or Aggravating the Burden: Non-Communicable Diseases (NCDs) of Electronic and Conventional Cigarette Users (Dual Users) in Indonesia
Published 2024-01-01“…The sample size of the data was 174,917 individuals. Our analysis utilized the logit and negative binomial regression to test whether the type of smoking behavior was associated with reporting to have a Non Communicable Diseases (NCDs) and complications, respectively. …”
Get full text
Article -
66
Using Perceived Landscape Benefits to Promote Water Conservation Behaviors in Urban Areas
Published 2018-05-01“…The information in this 5-page document is the result of a cluster analysis used to identify meaningful subgroups among home irrigation users to encourage water conservation behaviors. …”
Get full text
Article -
67
Using Perceived Landscape Benefits to Promote Water Conservation Behaviors in Urban Areas
Published 2018-05-01“…The information in this 5-page document is the result of a cluster analysis used to identify meaningful subgroups among home irrigation users to encourage water conservation behaviors. …”
Get full text
Article -
68
Simulation Analysis of Big Data Discriminatory Pricing Behavior from the Perspective of Game Theory
Published 2025-01-01“…Therefore, it is of great significance to study how consumers respond to big data discriminatory pricing (BDDP) behavior by enterprises. This article categorizes consumers into new and old users. …”
Get full text
Article -
69
An Investigation on Users’ Perceptions of Open Government Data in Qatar
Published 2025-01-01Get full text
Article -
70
Exploring Coevolution of Emotional Contagion and Behavior for Microblog Sentiment Analysis: A Deep Learning Architecture
Published 2021-01-01“…Firstly, the coevolution of emotional contagion and behavior is described by the tie strength between microblogs, that is, with the spread of emotional contagion, user behavior such as emotional expression will be affected. …”
Get full text
Article -
71
Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D
Published 2021-04-01“…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
Get full text
Article -
72
Analysis of Factors Affecting Use Behavior towards Mobile Payment Apps: A SEM Approach
Published 2023-01-01Get full text
Article -
73
How to enhance generation Z users’ satisfaction experience with online fitness: a case study of fitness live streaming platforms
Published 2025-01-01“…Therefore, platforms should provide services tailored to their psychological and behavioral characteristics, optimize business operation models, and further enhance the user experience.…”
Get full text
Article -
74
Personal Peacefulness and Cyber-Bystanding of Internet Users in Indonesia
Published 2024-06-01“…Additionally, males were more likely to act as reinforcer bystanders, supporting cyberbullying behavior, compared to females. Research implications/limitations – This study reveals how personal peacefulness relates to cyber-bystanding among Indonesian internet users. …”
Get full text
Article -
75
Behavior associated a pathology without the presence of disease: A study case
Published 2019-09-01“…This case is studied from a naturalistic and field perspective by applying the methodology of Contingential Analysis derived from interbehavioral psychology. The factors, circumstances and value criteria related to the presentation of the "illness behavior" of the psychological service user are identified. …”
Get full text
Article -
76
A Novel Music Recommendation Method Combining Music Sub-Personality and Social Network Behavior Analysis
Published 2015-10-01“…In order to recommend music conforming to the people’s sentiment state in real time,a novel music recommendation method combining music sub-personality and social network behavior analysis was proposed.Through sentiment analysis of the users’ words and sentences which was released on Weibo and other social network,the method calculated the users’ music preference in a sentiment state,the most suitable music was recommend to users in that sentiment state.Experimental results show that the proposed method can alleviate the effect of user data sparsity on the recommendation results.…”
Get full text
Article -
77
Sarcasm detection method based on fusion of text semantics and social behavior information
Published 2023-08-01“…Sarcasm is a complex implicit emotion that poses a significant challenge in sentiment analysis, particularly in social network sentiment analysis.Effective sarcasm detection holds immense practical significance in the analysis of network public opinion.The contradictory nature of sarcastic texts, which exhibit implicit semantics opposite to the real emotions of users, often leads to misclassification by traditional sentiment analysis methods.Moreover, sarcasm in daily communication is often conveyed through non-textual cues such as intonation and demeanor.Consequently, sarcasm detection methods solely relying on text semantics fail to incorporate non-textual information, thereby limiting their effectiveness.To leverage the power of text semantics and social behavior information, a sarcasm text detection method based on heterogeneous graph information fusion was proposed.The approach involved the construction of a heterogeneous information network encompassing users, texts, and emotional words.A graph neural network model was then designed to handle the representations of the heterogeneous graph.The model employed a dual-channel attention mechanism to extract social behavior information, captured the deep semantics of text through emotional subgraphs, and ultimately combined text semantics and social behavior information.Extensive experiments conducted on the Twitter dataset demonstrate the superiority of the proposed method over existing approaches for sarcasm text detection and classification.…”
Get full text
Article -
78
Research on the Cross-Regional Traveling Welcome Short Messaging Service During the COVID-19 Pandemic: A Survey from Mobile Users’ Perspective
Published 2025-01-01“…In this paper, we investigate the perceptions and behavior of mobile users regarding this special TW-SMS through mixed-methods research. …”
Get full text
Article -
79
Uncovering online travel agency antecedents and their consequences in terms of consumer behavior: A retrospective analysis for future research
Published 2024-09-01“…An analysis of the 77 most pertinent articles has given a more thorough understanding of this revealing the most common influencing factors/variables (information, price, features, quality, customization & filters, user friendliness, etc.) used to measure the CB towards OTAs. …”
Get full text
Article -
80
Examining the effect of personality on user acceptance of conditionally automated vehicles
Published 2025-01-01Get full text
Article