• Title/Summary/Keyword: User Behavior Analysis

Search Result 753, Processing Time 0.027 seconds

The Analysis Framework for User Behavior Model using Massive Transaction Log Data (대규모 로그를 사용한 유저 행동모델 분석 방법론)

  • Lee, Jongseo;Kim, Songkuk
    • The Journal of Bigdata
    • /
    • v.1 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • User activity log includes lots of hidden information, however it is not structured and too massive to process data, so there are lots of parts uncovered yet. Especially, it includes time series data. We can reveal lots of parts using it. But we cannot use log data directly to analyze users' behaviors. In order to analyze user activity model, it needs transformation process through extra framework. Due to these things, we need to figure out user activity model analysis framework first and access to data. In this paper, we suggest a novel framework model in order to analyze user activity model effectively. This model includes MapReduce process for analyzing massive data quickly in the distributed environment and data architecture design for analyzing user activity model. Also we explained data model in detail based on real online service log design. Through this process, we describe which analysis model is fit for specific data model. It raises understanding of processing massive log and designing analysis model.

  • PDF

A Study on User Interface Modeling Method by Structure Analysis of User Behavior Information (사용자 행태 정보의 구조 분석을 통한 UI 모델링 방법에 관한 연구)

  • Lee, Eun-Shin;Bae, Hong-Joo;Jung, Ji-Hong
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.387-394
    • /
    • 2007
  • 사용자-제품 간의 인터랙션 환경의 변화로 인해 사용자 행태 정보의 특성을 체계적으로 분석하기 위한 많은 연구가 진행 되고 있으며, 사용자 행태 연구의 접근 가능성 보다는 행태 정보를 UI 디자인 과정에 어떻게 적용할 것인지에 대한 연구가 더욱 중요해 지고 있다. 이에 본 연구에서는 미래 제품 개발 환경에서 효율적인 UI디자인을 위하여 사용자의 실 생활에서 수집된 사용자 행태 정보를 UI 디자인 설계 과정에 효과적으로 적용할 수 있는 모델링 방법을 제안하였다. 이를 위해 사용자 행태 정보가 갖고 있는 단계별 구조의 특성을 정의하고, 행태 정보의 구조 분석을 통해 미래 제품 개발 환경에서 제품 사용 단계별 적용 가능한UI 고려 요소 및 UI 해결 방안의 도출 과정을 가시화 시켜 주기 위한 UI 모델링 방법을 제안하였다. 사례 연구로 현재 현관문에서 발생하는 사용자 행태 정보에 UI 모델링을 적용하여 미래 환경에서 제공 가능한 GATE System의 UI 고려 요소 및 UI 해결 방안을 추출하여 적용 가능성을 제시하였다.

  • PDF

A Study on the Architectural Planning for Space for Stay in the Ward Based on the Analysis of User Behavior - Chronic Patient Ward in Korea Workers' Compensation Hospital (이용자 행태 분석을 통한 병동부 체류 공간에 관한 건축계획 연구 - 근로복지공단병원 병동부 공용공간을 중심으로)

  • Son, Jihye;Yang, Naewon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.22 no.3
    • /
    • pp.35-44
    • /
    • 2016
  • Purpose: This study is focus on investigation of user's spontaneous behavior in the public space of ward where chronic patients are hospitalized. Methods: The notion and necessity of social healing environment is analyzed by literature review. User's location and behaviour are investigated for analyzing behavior by visiting the six wards. Results: The result 1) Stay is main behavior of users. 2) The frequency of stay is high in the place where are planned as the dayroom, the program room and the balcony. 3) In the corridor, the users are staying around court and single side corridor. And the users who are staying in the ward planned middle corridor and double corridor are spreaded all over the corridor. As the result of the analysis of correlation between frequency of user for stay and area of public space, 4) The area of the dayroom, the program room and the balcony is bigger, the frequency of users are higher. 5) There is no correlation between area of corridor and frequency of users. 6) When the density of user is highest in the place for stay, one person occupied $1.96m^2$. Implications: Hereafter the public space, which social healing environment is considered, is planned, this study could suggest the directions of architectural planning about area.

Nonlinear Analysis of Concrete Using ABAQUS User Material(UMAT) (ABAQUS User Material(UMAT)을 이용한 콘크리트 비선형 해석)

  • 조병완;김장호;김영진
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2003.04a
    • /
    • pp.145-152
    • /
    • 2003
  • This paper develops a relatively comprehensive and sophisticated constitutive model of concrete for finite element analysis of concrete structures. The present model accounts for the hydrostatic pressure sensitivity and Lode angle dependence behavior of concrete, not only in its strength criterion, but also in its hardening characteristics. The implementation is carried out through incorporating the developed concrete model in User Subroutine Material(UMAT) of the general-purpose FE program ABAQUS(v.5.8). It is found that the model can sufficiently predict the hardening as well as the softening behaviour of concrete under high confining pressure.

  • PDF

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Impact of Environmental Uncertainty, Trust and Information Technology on User Behavior of Accounting Information Systems

  • DWIRANDRA, A.A.N.B.;ASTIKA, Ida Bagus Putra
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.1215-1224
    • /
    • 2020
  • Micro, Small and Medium Enterprises in Denpasar City still face low mastery of technology and financial management, one of which is the application of technology-based accounting information systems (e-commerce) for small and medium enterprises. The research objective was to determine the relationship between environmental uncertainty, trust and ease of information technology moderating behavior in accounting information systems. Research with a quantitative approach, the method used is multiple linear regression with moderated regression analysis. The study population was 816 small and medium enterprises. The sampling method technique was the incidental sampling approach and the Slovin formula so that a sampling of 100 small and medium enterprises that had used e-commerce was determined in the city of Denpasar. The results of research that have been conducted determine the relationship between user behavior in accounting information systems that affect individual performance, the relationship between environmental uncertainty affects accounting information systems mediated by individual performance, while the ease of information technology and its ability to be mediated by individual performance has an effect on the behavior of using accounting information systems. The application of accounting information systems in small and medium enterprises is expected to improve individual performance so as to increase income.

A Study on the User Behavior of Atypical Building Facilities and Spaces (비정형 건축시설물 및 공간에 대한 사용자 행동에 관한 연구)

  • Park, Hyo-Jeen;Park, Ji-Min;Lee, Hyang-Sun;Lee, Yun-Gil
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.9
    • /
    • pp.1041-1048
    • /
    • 2019
  • Recently, social demands on atypical buildings and building spaces are increasing, and examples of atypical buildings are easily seen in major cities around the world. This study investigates the user behaviors in the typical atypical buildings currently constructed and analyzes the characteristics of human behavior in the atypical building space. Ultimately, this study aims to develop human behavior simulation technology for reviewing residential performance of atypical building space design, and the results of this study can be used for user behavior modeling and simulation technology development. This is because it is difficult to find an investigation or analysis of what behavioral characteristics occur in the atypical building space in previous studies. This study derives the characteristics of human behavior in the atypical architectural space that has been overlooked in the existing human behavior simulation tools. In other words, the site visits and surveys typical atypical buildings to investigate user behaviors in typical spaces and other atypical buildings.

Development of a user-friendly and transparent non-linear analysis program for RC walls

  • Menegon, Scott J.;Wilson, John L.;Lam, Nelson T.K.;Gad, Emad F.
    • Computers and Concrete
    • /
    • v.25 no.4
    • /
    • pp.327-341
    • /
    • 2020
  • Advanced forms of structural design (e.g., displacement-based methods) require knowledge of the non-linear force-displacement behavior of both the overall building and individual lateral load resisting elements, i.e., walls or building cores. Similarly, understanding the non-linear behaviour of the elements in a structure can also allow for a less conservative structural response to be calculated by better understanding the cracked (i.e., effective) properties of the various RC elements. Calculating the non-linear response of an RC section typically involves using 'black box' analysis packages, wherein the user may not be in complete control nor be aware of all the intricate settings and/or decisions behind the scenes. This paper introduces a user-friendly and transparent analysis program for predicting the back-bone force displacement behavior of slender (i.e., flexure controlled) RC walls, building cores or columns. The program has been validated and benchmarked theoretically against both commonly available and widely used analysis packages and experimentally against a database of 16 large-scale RC wall test specimens. The program, which is called WHAM, is written using Microsoft Excel spreadsheets to promote transparency and allow users to further develop or modify to suit individual requirements. The program is available free-of-charge and is intended to be used as an educational tool for structural designers, researchers or students.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

A Data Mining Technique for Customer Behavior Association Analysis in Cyber Shopping Malls (가상상점에서 고객 행위 연관성 분석을 위한 데이터 마이닝 기법)

  • 김종우;이병헌;이경미;한재룡;강태근;유관종
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.21-36
    • /
    • 1999
  • Using user monitoring techniques on web, marketing decision makers in cyber shopping malls can gather customer behavior data as well as sales transaction data and customer profiles. In this paper, we present a marketing rule extraction technique for customer behavior analysis in cyber shopping malls, The technique is an application of market basket analysis which is a representative data mining technique for extracting association rules. The market basket analysis technique is applied on a customer behavior log table, which provide association rules about web pages in a cyber shopping mall. The extracted association rules can be used for mall layout design, product packaging, web page link design, and product recommendation. A prototype cyber shopping mall with customer monitoring features and a customer behavior analysis algorithm is implemented using Java Web Server, Servlet, JDBC(Java Database Connectivity), and relational database on windows NT.

  • PDF