• 제목/요약/키워드: User Behavior Pattern

검색결과 149건 처리시간 0.027초

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data

  • Song, Hyejin;Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.645-654
    • /
    • 2019
  • The purpose of this study was to collect and analyze personal bio data and social network services (SNS) data, derive user preference and user life pattern, and propose intuitive and precise user modeling. This study not only tried to conduct eye tracking experiments using various smart devices to be the ground of the recommendation system considering the attribute of smart devices, but also derived classification preference by analyzing eye tracking data of collected bio data and SNS data. In addition, this study intended to combine and analyze preference of the common classification of the two types of data, derive final preference by each smart device, and based on user life pattern extracted from final preference and collected bio data (amount of activity, sleep), draw the similarity between users using Pearson correlation coefficient. Through derivation of preference considering the attribute of smart devices, it could be found that users would be influenced by smart devices. With user modeling using user behavior pattern, eye tracking, and user preference, this study tried to contribute to the research on the recommendation system that should precisely reflect user tendency.

온라인 커뮤니티 사용자의 행동 패턴을 고려한 동일 사용자의 닉네임 식별 기법 (A Method for Identifying Nicknames of a User based on User Behavior Patterns in an Online Community)

  • 박상현;박석
    • 정보과학회 논문지
    • /
    • 제45권2호
    • /
    • pp.165-174
    • /
    • 2018
  • 온라인 커뮤니티란 SNS와 달리 사용자들이 닉네임을 통해 익명으로 관심사와 취미를 공유하는 가상 그룹 서비스이다. 그런데 이런 익명성을 악의적으로 활용하는 사용자들이 존재하고, 닉네임의 변경으로 인해 동일 사용자의 데이터가 서로 다른 닉네임에 존재하는 데이터 파편화 문제가 발생할 수 있다. 또한 온라인 커뮤니티에서는 닉네임을 변경하는 일이 빈번하므로 동일 사용자를 식별하는데 어려움을 겪는다. 따라서 본 논문에서는 이러한 문제를 해결하기 위해 온라인 커뮤니티 특성을 고려한 사용자의 행동 패턴 특징 벡터를 제시하며, 관계 패턴이라는 새로운 암시적 행동 패턴을 제안함과 동시에 랜덤 포레스트 분류기를 이용한 동일 사용자의 닉네임을 식별하는 기법을 제안한다. 또한 실제 온라인 커뮤니티 데이터를 수집해 제안한 행동패턴과 분류기를 이용해 동일 사용자를 유의미한 수준으로 식별할 수 있음을 실험적으로 보인다.

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • 제10권1호
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.

Mobile User Behavior Pattern Analysis by Associated Tree in Web Service Environment

  • Mohbey, Krishna K.;Thakur, G.S.
    • Journal of Information Science Theory and Practice
    • /
    • 제2권2호
    • /
    • pp.33-47
    • /
    • 2014
  • Mobile devices are the most important equipment for accessing various kinds of services. These services are accessed using wireless signals, the same used for mobile calls. Today mobile services provide a fast and excellent way to access all kinds of information via mobile phones. Mobile service providers are interested to know the access behavior pattern of the users from different locations at different timings. In this paper, we have introduced an associated tree for analyzing user behavior patterns while moving from one location to another. We have used four different parameters, namely user, location, dwell time, and services. These parameters provide stronger frequent accessing patterns by matching joins. These generated patterns are valuable for improving web services, recommending new services, and predicting useful services for individuals or groups of users. In addition, an experimental evaluation has been conducted on simulated data. Finally, performance of the proposed approach has been measured in terms of efficiency and scalability. The proposed approach produces excellent results.

올림픽대로의 경관향상을 위한 가로공간 구성요소의 물리량과 심리량 분석에 관한 연구 (Studios on the Physical and Psychological Analysis in Street Spaces for Improving the Streetscape of Olympic Daero)

  • 김광래;진희성
    • 한국조경학회지
    • /
    • 제16권2호
    • /
    • pp.23-41
    • /
    • 1988
  • Environmental design pattern of the nine Small Urban Spaces at C.B.D. in City of Seoul are surveyed and analyzed for user's satisfaction and behavior under the environmental design evaluation by using Chrisopher Alexander's Pattern Language. Small Urban Spaces as a part of streetscape are formed by physical factors as well as visual environment and interacting user's behavior. Therefore, user's satisfacuion and behavior at the nine Urban Small Spaces were investigated under the further search for some possibilities of a pplication of those Pattern Languages. A pattern language has a structure of a network. It is used in sequence, going through the patterns, moving always from large patterns to smaller, always from the ones which create comes simply from the obsernation that most of the wonderful places of the city were not made by architects but by the people. It defines the limited number of arrangements of spaces that make sense in any given culture. And it actually gives us the power to generate these coherent arrangement of space. As a results, 'Plazl', 'Seats' and 'Accessibility' related design patterns are highly evaluated by Pattern Frequency, Pattern Interaction and their Composition ranks, thus reconfirm Whyte's Praise of urban Small Spaces in our inner city design environments. According to the multiple regression analysis of user's evaluation, the environmental functins related to the satisfaction were 'Plaza', 'Accessibility' and 'Paving'. According to the free response, user's prefer such visually pleasing environmental design object as 'Waterscape' and 'Setting'. In addition to, the basic needs in Urban Small Spaces are amenity facilities as bench, drinking water and shade for rest.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • 한국멀티미디어학회논문지
    • /
    • 제10권12호
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • 제18권2호
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권9호
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

2-계층 클러스터링을 사용한 웹 사용자 그룹의 행동규칙추출방법에 관한 연구 (A Study on Behavior Rule Induction Method of Web User Group using 2-tier Clustering)

  • 황준원;송두헌;이창훈
    • 정보처리학회논문지D
    • /
    • 제15D권1호
    • /
    • pp.139-146
    • /
    • 2008
  • 유용한 웹 사용자 그룹을 파악하고 이들의 행동패턴을 찾는 것은 eCRM에서 매우 중요하다. 그러나 온라인 사용자 데이터에는 불확실한 정보가 많이 포함되어 있어 이를 바탕으로 유사한 성향을 가진 사용자 그룹을 생성하는 경우 신뢰성이 떨어지는 문제점이 있다. 본 논문에서는 불확실성이 포함된 사용자와 페이지의 서로 다른 두 데이터 계층의 상호작용을 통해 좀 더 신뢰성 있는 사용자 그룹을 생성하고 데이터에 내재된 이들의 행동패턴을 추출하는 방법을 제시하였다. 그리고 C4.5를 사용하여 생성된 행동규칙과의 비교를 통해 본 논문에서 제시하는 방법과의 비교분석을 실시하였다.

스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견 (Discovery of Behavior Sequence Pattern using Mining in Smart Home)

  • 정경용;김종훈;강운구;임기욱;이정현
    • 한국콘텐츠학회논문지
    • /
    • 제8권9호
    • /
    • pp.19-26
    • /
    • 2008
  • 유비쿼터스 컴퓨팅의 발전에 따라 일대일 개인화 서비스를 위한 인프라스트럭처가 구축되면서, 사용자의 상황과 환경, 즉 상황인식 기반 서비스의 중요성이 부각되고 있다. 스마트 홈은 현실공간과 가상공간을 연결하여 가상공간에서 현실의 상황을 정보화하고 이를 활용하여 사용자 중심의 지능화된 서비스를 제공하는 기술이다. 본 논문에서는 스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견을 제안하였다. 마이닝을 이용하여 위치 트랜잭션에서 발생하는 위치간의 연관 규칙에 시간의 변이를 추가하여 행동 순차 패턴을 발견하였다. 인식된 시간 순서에 따라 사용자가 이동한 경로의 파악 및 행동 방향을 예측하고 그에 따른 서비스가 가능하다. 마이닝을 이용한 행동 순차 패턴의 성능 평가를 하기 위해 대응표본 t검정을 실시하여 유용성을 검증하였다. 평가 결과, 서비스에 대한 만족도의 차이가 통계적으로 의미가 있음을 증명하였고 높은 만족도를 보임을 확인하였다. 따라서 본 연구 결과를 활용하면 시장성 증대와 고부가 가치를 창출할 수 있을 것으로 기대하며 다양한 응용 분야에 활용이 가능하다.