• Title/Summary/Keyword: User Behavior Analysis

Search Result 767, Processing Time 0.033 seconds

On-Line Mining using Association Rules and Sequential Patterns in Electronic Commerce (전자상거래에서 연관규칙과 순차패턴을 이용한 온라인 마이닝)

  • 김성학
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.945-952
    • /
    • 2001
  • In consequence of expansion of internet users, electronic commerce is becoming a new prototype for marketing and sales, arid most of electronic commerce sites or internet shopping malls provide a rich source of information and convenient user interfaces about the organizations customers to maintain their patrons. One of the convenient interfaces for users is service to recommend products. To do this, they must exploit methods to extract and analysis specific patterns from purchasing information, behavior and market basket about customers. The methods are association rules and sequential patterns, which are widely used to extract correlation among products, and in most of on-line electronic commerce sites are executed with users information and purchased history by category-oriented. But these can't represent the diverse correlation among products and also hardly reflect users' buying patterns precisely, since the results are simple set of relations for single purchased pattern. In this paper, we propose an efficient mining technique, which allows for multiple purchased patterns that are category-independent and have relationship among items in the linked structure of single pattern items.

  • PDF

Analysis on the creep response of bolted rock using bolted burgers model

  • Zhao, Tong-Bin;Zhang, Yu-Bao;Zhang, Qian-Qing;Tan, Yun-Liang
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.141-149
    • /
    • 2018
  • In this paper, the creep behavior of bolted rock was analyzed by using the unconfined creep tests and the numerical results. Based on the test results, the Bolted Burgers creep model (B-B model) was proposed to clarify the creep mechanism of rock mass due to rock bolts. As to the simulation of the creep behaviour of bolted rock, a new user-defined incremental iterative format of the B-B model was established and the open-source $FLAC^{3D}$ code was written by using the object-oriented language (C++). To check the reliability of the present B-B creep constitutive model program, a numerical model of a tunnel with buried depth of 1000 m was established to analyze the creep response of the tunnel with the B-B model support, the non-support and the bolt element support. The simulation results show that the present B-B model is consistent with the calculated results of the inherent bolt element in $FLAC^{3D}$, and the convergence deformation can be more effectively controlled when the proposed B-B model is used in the $FLAC^{3D}$ software. The big advantage of the present B-B creep model secondarily developed in the $FLAC^{3D}$ software is the high computational efficiency.

Overall damage identification of flag-shaped hysteresis systems under seismic excitation

  • Zhou, Cong;Chase, J. Geoffrey;Rodgers, Geoffrey W.;Xu, Chao;Tomlinson, Hamish
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.163-181
    • /
    • 2015
  • This research investigates the structural health monitoring of nonlinear structures after a major seismic event. It considers the identification of flag-shaped or pinched hysteresis behavior in response to structures as a more general case of a normal hysteresis curve without pinching. The method is based on the overall least squares methods and the log likelihood ratio test. In particular, the structural response is divided into different loading and unloading sub-half cycles. The overall least squares analysis is first implemented to obtain the minimum residual mean square estimates of structural parameters for each sub-half cycle with the number of segments assumed. The log likelihood ratio test is used to assess the likelihood of these nonlinear segments being true representations in the presence of noise and model error. The resulting regression coefficients for identified segmented regression models are finally used to obtain stiffness, yielding deformation and energy dissipation parameters. The performance of the method is illustrated using a single degree of freedom system and a suite of 20 earthquake records. RMS noise of 5%, 10%, 15% and 20% is added to the response data to assess the robustness of the identification routine. The proposed method is computationally efficient and accurate in identifying the damage parameters within 10% average of the known values even with 20% added noise. The method requires no user input and could thus be automated and performed in real-time for each sub-half cycle, with results available effectively immediately after an event as well as during an event, if required.

The Effects of Internal Communication, Techno-stress, and Task-Technology Fit on Intention of Continuous Use of Enterprise Content Management System (사내 커뮤니케이션, 기술 스트레스, 업무기술 적합성이 기업콘텐츠관리시스템 지속적 이용 의도에 미치는 영향)

  • Hwang, Inho
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.133-153
    • /
    • 2021
  • Recently, organizations are making significant technology investments to build a centralized content management system. However, high-quality technology adoption can conversely create techno-stress in the user and cause negative behavior. The purpose of this study is to suggest the negative effects and mitigation directions of enterprise content management system(ECMS) related techno-stress. In order to verify the hypothesis, this study conducted a questionnaire survey on employees of organizations that adopted content management technology and conducted structural equation modeling. As a result of the analysis, ECMS related techno overload and complexity decreased the intention of continuous use of ECMS. But, internal communication activities reduced ECMS related techno stress and task-technology fit moderated the relationship between techno-stress and intention of continuous use of ECMS. The study has implications in terms of suggesting a strategic direction to minimize the negative causes of the use of content management systems.

Study on History Tracking Technique of the Document File through RSID Analysis in MS Word (MS 워드의 RSID 분석을 통한 문서파일 이력 추적 기법 연구)

  • Joun, Jihun;Han, Jaehyeok;Jung, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1439-1448
    • /
    • 2018
  • Many electronic document files, including Microsoft Office Word (MS Word), have become a major issue in various legal disputes such as privacy, contract forgery, and trade secret leakage. The internal metadata of OOXML (Office Open XML) format, which is used since MS Word 2007, stores the unique Revision Identifier (RSID). The RSID is a distinct value assigned to a corresponding word, sentence, or paragraph that has been created/modified/deleted after a document is saved. Also, document history, such as addition/correction/deletion of contents or the order of creation, can be tracked using the RSID. In this paper, we propose a methodology to investigate discrimination between the original document and copy as well as possible document file leakage by utilizing the changes of the RSID according to the user's behavior.

Implementation of a Classification System for Dog Behaviors using YOLI-based Object Detection and a Node.js Server (YOLO 기반 개체 검출과 Node.js 서버를 이용한 반려견 행동 분류 시스템 구현)

  • Jo, Yong-Hwa;Lee, Hyuek-Jae;Kim, Young-Hun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • This paper implements a method of extracting an object about a dog through real-time image analysis and classifying dog behaviors from the extracted images. The Darknet YOLO was used to detect dog objects, and the Teachable Machine provided by Google was used to classify behavior patterns from the extracted images. The trained Teachable Machine is saved in Google Drive and can be used by ml5.js implemented on a node.js server. By implementing an interactive web server using a socket.io module on the node.js server, the classified results are transmitted to the user's smart phone or PC in real time so that it can be checked anytime, anywhere.

Factors Influencing the Success of Mobile Payment in Developing Countries: A Comparative Analysis of Nigeria and Kenya Mobile Payment Users

  • Bitrus, Stephen-Aruwan;Lee, Chol-Ho;Rho, Jae-Jeung;Erdenebold, Tumennast
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.3
    • /
    • pp.1-36
    • /
    • 2021
  • Purpose - This empirical study, aims to identify the determinants of adoption and acceptance of mobile payment as to understand why it is successful in some countries in Sub-Saharan Africa but failing in others. A comparative study of a successful mobile payment service and a purported failed one was done as to have some insights to the factors affecting acceptance of the technology. Design/methodology/approach - The strength of three notable theories: theory of diffusion of innovation (DOI), the extended unified theory of user acceptance of information technology (UTAUT2) and self-efficacy theory were use. The self-efficacy of government support inclusion as, a moderating variable in the form of infrastructure, securing transaction and price value revealed the relevance of government in the success of mobile payment service. By means of a field survey of 705 subjects in two separate regions of Africa (East and West), the data was collected and use to test the research model. Findings - The study result shows the importance of the moderating factor of government support to the success of mobile payment of any nation. The result also shows the importance of the perception of relative advantage, compatibility, complexity, social influence as already revealed by other studies. Research implications or Originality - Mobile payment success in some part of Sub-Saharan Africa is well known but also suggested to fail in some Sub-Saharan African countries. Buttressing the need for understanding of the factors affecting mobile payment acceptance. This article empirically examined the factors influencing the success of mobile payment, and we implicated that if the implementation of mobile payment is to be successful for mobile commerce in any nation, adoption, acceptance and use by its citizen is imperative.

A Study on the Zoning of Wards and Intensive Care Units (ICUs) in the Infectious Disease Hospital (감염병전문병원의 병동부 및 중환자부 영역 구성에 관한 연구)

  • Lee, Joorang;Chai, Choul Gyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.29 no.3
    • /
    • pp.17-28
    • /
    • 2023
  • Purpose: This study aims to provide basic data for the future construction plans of the Infectious Disease Hospitals by analyzing the area composition and required room ratios in the wards and ICU of currently under-construction infectious disease hospitals. Methods: 3 Methods have been used in this paper. 1) This study conducted a literature review on major considerations and related guidelines for hospitals specializing in infectious diseases using existing data. 2) Based on the objects and activities of the hospital space, zones and areas were set for each department according to infection control. 3) Based on the established zones and areas, basic plan drawings of three hospitals specializing in infectious diseases currently under construction were collected and architectural drawing analysis was performed. Results: 1) Infectious Diseases Hospital must have a spatial organization that can accommodate patient isolation, infection control, efficiency of medical service, and changes. 2) Zones for infection control are divided into negative pressure and non-negative pressure zones based on airborne precaution isolation. It is divided into clean and contaminated zone according to class of cleanliness by Aseptic technique. Areas are classified by objects (patients, healthcare workers, supplies) and activities (access, medical treatment, support), and a system for organizing space is established based on this. 3) By analyzing the area composition of each departmental area, each required room, and each required space in the wards and intensive care units, it provides basic data for the spatial organization for architectural planning of the infectious disease hospital. Implication: It can be used as basic data when planning related facilities by analyzing the characteristics of the space plan of the required room according to the relationship between activities, movement lines, and operation plans based on user behavior.

Ethics-Literacy Curriculum Modeling for Ethical Practice of 5G Information Professionals (5G 정보환경 정보전문가를 위한 윤리 리터러시 교육과정 모형연구)

  • Yoo, Sarah
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.139-166
    • /
    • 2022
  • Ethical Issues increase when people engage in smart technological systems such as 5G, IoT, Cloud computing services and AI applications. Range of this research is comparison of various literacy concepts and its ethical issues in considering of 5G features and UX. 86 research papers and reports which have been published within the recent 5 years (2017-2022), relating the research subject, are investigated and analyzed. Two results show that various literacies can be grouped into four areas and that some of common issues among those areas as well as unique issues of each area are identified. Based on the literature analysis, an Operational Definition of Ethics-Literacy is presented and the model of ethics-literacy curriculum supporting ethical behavior of 5G information professionals is developed and suggested.

The influence of evaluation factors of overseas direct sales website on the continuous intention of Chinese consumers (대(對)중국 역직구사이트 평가요인이 지속적 이용의도에 미치는 영향)

  • Son, Je-Young;Kang, In-Won
    • Korea Trade Review
    • /
    • v.43 no.3
    • /
    • pp.219-243
    • /
    • 2018
  • This study focused on the rapidly growing Chinese market by developing an evaluation model for overseas direct sales websites for Chinese consumers. In addition, we developed specific strategic alternatives for each sub-market by conducting multi-group analysis for each consumer's characteristics. Results showed that the level of concern about site use had a stronger impact on persistent use behavior. In addition, among antecedents that affect the level of assurance and concern, we found that these includes not only the perceived benefits and perceived risk factors identified in previous studies but also social-cultural factors. In addition, this study compares the evaluation of overseas direct sales website according to the level of involvement of users. This study analyzes the differences in coefficients among the paths and suggest practical implications for each group.

  • PDF