Showing 141 - 160 results of 348 for search 'analysis of user’s behavior', query time: 0.08s Refine Results
  1. 141

    Measurement and Analysis of P2P IPTV Program Resource by Wenxian Wang, Xingshu Chen, Haizhou Wang, Qi Zhang, Cheng Wang

    Published 2014-01-01
    “…In order to represent popularity of programs and to predict user behavior and popularity of hot programs over a period, we also put forward an analytical model of hot programs.…”
    Get full text
    Article
  2. 142

    Multi-scale analysis of social network based on diffusion wavelets by Guo-wei SHEN, Wu YANG, Wen-ting HUANG, Wei WANG, Li DING, Miao YU

    Published 2014-01-01
    “…A new multi-scale framework based on diffusion wavelets was proposed to analyze the homogeneous relationships,which can be used to conduct multi-scale analysis on structures,contents and user behaviors.The diffusion operator of diffusion wavelet only considers the local similarity in this framework.The experiments on both synthetic and real-world networks show that the proposed algorithm outperforms the typical algorithms in multi-scale analysis without parameters.…”
    Get full text
    Article
  3. 143

    Reddit comment analysis: sentiment prediction and topic modeling using VADER and BERTopic by Denilson de Oliveira Silva, Richard Matheus Avelino da Silva, Patrícia Virgínia de Santana Lima, Jéssica Cristina Pereira Batista, Sílvio Fernando Alves Xavier Júnior

    Published 2024-12-01
    “… This work aims at exploring data analysis techniques applied to the social media platform Reddit, highlighting the execution of an Exploratory Data Analysis (EDA) to identify trends and patterns of interaction among users. …”
    Get full text
    Article
  4. 144
  5. 145

    Music Recommendation Algorithm Based on Multidimensional Time-Series Model Analysis by Juanjuan Shi

    Published 2021-01-01
    “…This paper proposes a personalized music recommendation method based on multidimensional time-series analysis, which can improve the effect of music recommendation by using user’s midterm behavior reasonably. …”
    Get full text
    Article
  6. 146

    The effect of gamification on brand co-creation in app-based businesses: investigating the mediating role of consumer engagement and the moderating role of hedonic and innovativene... by Rayhane Rezagholizade, Zahra Sadeqi-Arani, Esmail Mazroui

    Published 2025-03-01
    “…To collect data, standard and researcher-made questionnaires were used. Data analysis with SmartPLS software shows the positive and significant effect of gamification on customer brand co-creation behavior, partial mediating role of consumer engagement variable, positive moderating effect of hedonic and innovativeness, and finally confirming the moderated mediation. …”
    Get full text
    Article
  7. 147
  8. 148
  9. 149

    Security analysis and improvement of strongly secure certificate less signature scheme by Ai-wan FAN, Zhao-feng YANG, Li-ming XIE

    Published 2014-05-01
    “…Aiming at this problem, the behavior of KGC was restrained by the change of traditional certificateless algorithm sequence KGC bulletin board where user public key make public, and verifiability of facticity of public key through the local private keys and public keys. …”
    Get full text
    Article
  10. 150
  11. 151

    Priority Analysis of Influence Factors for Electric Vehicle Demand Response Strategies by Yin Yao, Yedong Zhu, Dongdong Li, Bo Zhou, Shunfu Lin

    Published 2023-01-01
    “…Firstly, a multisource charging load characteristic model is constructed by analyzing the characteristics of EV charging behavior under multiple scenarios. Secondly, the DEMATEL-AISM method is used to analyze the degree of influence of personal and social factors on users’ charging behavior under complex social environments, and the dominant factors in each scenario are identified. …”
    Get full text
    Article
  12. 152

    Analysis of the Multilevel Impact of Social Network Quality on Personality Dimensions in Purchasing by Maryam Akhavan Kharazian, Sona Shafieirad

    Published 2024-06-01
    “…Conclusion Multilevel analysis strengthens the understanding of the relationship between social network quality at the community level and impulsive buying behavior, particularly within social networks. …”
    Get full text
    Article
  13. 153
  14. 154
  15. 155

    Analysis on anonymity and regulation of digital currency transactions based on game theory by Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING

    Published 2022-10-01
    “…By using technologies such as blockchain, digital currency, as a new type of monetary asset, has been promoting the development of digital economy.Digital currency trading platform plays an important role in the use of private digital currency by digital currency users.Existing digital currency trading platforms may expose users’ privacy and provide illegal elements with the conditions to participate in various abnormal trading behaviors such as“air dropping” events, extortion, fraud, etc.The strong anonymity protection of users by digital currency trading platforms also make it more difficult for regulatory authorities to supervise digital currency transactions.Therefore, the strength of the anonymity protection of users by digital currency trading platforms need to consider not only the privacy protection of users, but also meet the regulatory requirements.For this reason, based on the analysis of the relationship between the digital currency trading platforms and the supervisory departments, an evolutionary game model was established, the digital currency trading platform and the supervisory game model were defined and constructed, and the replication dynamic equation was solved and the balanced solution was obtained according to the income matrix between the digital currency trading platform and the supervisory department.By building a Jacobian matrix, the stability of the evolutionary system under different parameters was analyzed.Besides, the evolutionary stable selection and strategy of the digital currency trading platform and the regulatory authority under different conditions were also analyzed.With Matlab, different strategies of anonymity protection of the digital currency trading platform and different strategies of supervision strategy of the regulatory department were simulated to verify the accuracy of the game model.Based on the results of the simulations, some suggestions on the supervision of digital currency trading platforms are put forward, which provides a theoretical basis for the future supervision of digital currency trading platforms in China.…”
    Get full text
    Article
  16. 156

    Data recommendation algorithm of network security event based on knowledge graph by Xianwei ZHU, Wei LIU, Zihao LIU, Zeyu GU

    Published 2023-12-01
    “…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
    Get full text
    Article
  17. 157
  18. 158
  19. 159
  20. 160

    Clustering Analysis for Active and Reactive Energy Consumption Data Based on AMI Measurements by Oscar A. Bustos-Brinez, Javier Rosero Garcia

    Published 2025-01-01
    “…Electrical data analysis based on smart grids has become a fundamental tool used by electrical grid stakeholders to understand the energy consumption patterns of users, although many proposals in this area do not consider reactive energy as another source of useful information regarding distribution costs and threats to the grid. …”
    Get full text
    Article