Showing 81 - 100 results of 348 for search 'analysis of user’s behavior', query time: 0.06s Refine Results
  1. 81
  2. 82

    Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information by Wenqing Zhou, Chaoqiang Chen, Qin Yan, Bin Li, Kang Liu, Yingjun Zheng, Hongming Yang, Hui Xiao, Sheng Su

    Published 2025-01-01
    “…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. Hence, this paper proposes a method to detect abnormal residential water and electricity usage by incorporating multi-source information. …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    Research on Personalized Recommender System Adapting to Different Business by Caixia Tao, Hai Yuan, Kang Chen, Anhua Ma

    Published 2014-08-01
    “…A design of personalized recommender system adapting to different business was presented, including the collection and analysis of user's all explicit and implicit behavior, using user behavior profiles and entropy method to determine the weight of the behavior for analyzing user interest, the introduction of time forgetting function to solve the problem of user interest drift, and getting a list of the user's personalized recommendation based on collaborative filtering technology. …”
    Get full text
    Article
  6. 86
  7. 87
  8. 88

    Analysis of Tobacco Cessation Programs in Dental Settings by Niharika Benjamin, Varsha Choubey, Meenakshi Bhasin, Bedkekar Sushma, Anushree Choudhary, Pallavi Ammu Thomas

    Published 2024-12-01
    “…Participants included 400 adult tobacco users who were randomly assigned to either an intervention group (n = 200) or a control group (n = 200). …”
    Get full text
    Article
  9. 89

    The Sustainability of Knowledge-Sharing Behavior Based on the Theory of Planned Behavior in Q&A Social Network Community by Xin Feng, Lijie Wang, Yue Yan, Qi Zhang, Liming Sun, Jiangfei Chen, Ye Wu

    Published 2021-01-01
    “…It is very important and urgent to explore the factors that affect users’ willingness to share knowledge. In response to this problem, this paper builds a theoretical model of the factors that are affecting users’ willingness to share knowledge and uses questionnaire research methods to conduct research design and collect sample data and uses methods such as correlation analysis and structural equation modeling to verify the model and hypothesis. …”
    Get full text
    Article
  10. 90

    Investigating the impact of user perception and gamification elements on repurchase decisions in game live broadcasting by Guihua Zhang, Guihua Zhang, Junwei Cao, Mengli Huang, Shang Meng

    Published 2025-01-01
    “…Based on the theory of affordance-psychological outcome-behavioral (A-P-B), this paper introduces three gamification elements of user activity visibility, user level visibility and purchase effect visibility, and three user-perceived experience values of perceived hedonic value, perceived cognitive value and perceived social value to establish the model. …”
    Get full text
    Article
  11. 91

    Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality by Ujam Jaenudin, Elis Anisah Fitriah, Mirna Devi

    Published 2023-12-01
    “…It was conducted quantitatively through structural equation model (SEM) analysis based on partial least squares (PLS) using data collected from 400 early adult Instagram users between the ages of 20 and 34 years in Indonesia. …”
    Get full text
    Article
  12. 92
  13. 93

    An integrated optimization model of network behavior victimization identification based on association rule feature extraction by Shengli ZHOU, Linqi RUAN, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yuanbo LIAN

    Published 2023-08-01
    “…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
    Get full text
    Article
  14. 94

    User Segmentation Based on Purchasing Habits and Preferences on the Amazon Platform Using K-Means Clustering by Al Isra Denk Rimakka, Rezty Amalia Aras

    Published 2023-12-01
    “…The research process involves Knowledge Data Discovery (KDD) stages, including data processing, attribute selection, and applying the K-Means Clustering algorithm. The analysis results reveal five distinct user clusters, each with unique characteristics reflecting user behavior and preferences. …”
    Get full text
    Article
  15. 95

    Development of Fuzzy Level of Service Criteria for Bus Rapid Transit considering User Heterogeneities in China by Yueying Huo, Jianrong Liu, Jian Zhang, Xiaojuan Li

    Published 2020-01-01
    “…Transit passengers are heterogeneous in their perceptions, needs, and behavior. The traditional hard LOS criteria have an inherent weakness, because of which the accuracy of an LOS analysis is limited. …”
    Get full text
    Article
  16. 96

    Cross-Cultural Perspectives on Fake News: A Comparative Study of Instagram Users in Greece and Portugal by Evangelia Pothitou, Maria Perifanou, Anastasios A. Economides

    Published 2025-01-01
    “…The results reveal distinct user behaviors: Greeks exhibit a unique inclination towards social connections, displaying an increased trust in friends’ content and investing more time on Instagram, reflecting the importance of personal connections in their media consumption. …”
    Get full text
    Article
  17. 97

    An exploration of the influencing factors of privacy fatigue among mobile social media users from the configuration perspective by Wenjun Wang, Qikai Wu, Dongqi Li, Xinluan Tian

    Published 2025-01-01
    “…This study not only provides theoretical reference for understanding the antecedents of privacy fatigue among users but also offers new practical solutions for user privacy management.…”
    Get full text
    Article
  18. 98
  19. 99

    Engagement With an Internet-Administered, Guided, Low-Intensity Cognitive Behavioral Therapy Intervention for Parents of Children Treated for Cancer: Analysis of Log-Data From the... by Christina Reuther, Louise von Essen, Mudassir Imran Mustafa, Markus Saarijärvi, Joanne Woodford

    Published 2025-01-01
    “…User engagement was measured behaviorally, for example, through log-data tracking, and future research should measure emotional and cognitive components of engagement. …”
    Get full text
    Article
  20. 100

    Ethical Considerations of Influencing Behavior Using Computer Technology by Michael Bailey, Richard Hill, Albert Brown

    Published 2025-01-01
    “…Today, the use of various psychological techniques in the design of products and services based on computer technology is being pursued seriously to gradually and unconsciously influence the behavior and mind of users, and frameworks have been developed in this direction to achieve this goal. …”
    Get full text
    Article