• Title/Summary/Keyword: User Behavior Pattern

Search Result 149, Processing Time 0.019 seconds

Goods Recommendation Sysrem using a Customer’s Preference Features Information (고객의 선호 특성 정보를 이용한 상품 추천 시스템)

  • Sung, Kyung-Sang;Park, Yeon-Chool;Ahn, Jae-Myung;Oh, Hae-Seok
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1205-1212
    • /
    • 2004
  • As electronic commerce systems have been widely used, the necessity of adaptive e-commerce agent systems has been increased. These kinds of adaptive e-commerce agents can monitor customer's behaviors and cluster thou in similar categories, and include user's preference from each category. In order to implement our adaptive e-commerce agent system, in this paper, we propose an adaptive e-commerce agent systems consider customer's information of interest and goodwill ratio about preference goods. Proposed system build user's profile more accurately to get adaptability for user's behavior of buying and provide useful product information without inefficient searching based on such user's profile. The proposed system composed with three parts , Monitor Agent which grasps user's intension using monitoring, similarity reference Agent which refers to similar group of behavior pattern after teamed behavior pattern of user, Interest Analyzing Agent which personalized behavior DB as a change of user's behavior.

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

A Suggestion of User Behavior analysis Framework (사용자 행동 분석 프레임워크 제안)

  • Kim, Hye Lin;Lee, Min Ju;Park, Seung Ho
    • Design Convergence Study
    • /
    • v.16 no.5
    • /
    • pp.203-217
    • /
    • 2017
  • This study proposes and demonstrates the value of user - centered design methodology based on linguistic analysis. The results of the proposed user behavioural analysis framework suggested that the syntactic structure between the sentence structure and its components could be a logical basis for explaining the user's situation and behavior. Based on this, the definitions and classifications of user interactions and user contexts were conducted in a microscopically context. User behavior has also been established to identify pattern structures of purposeful nature and constitutes a user behavior sequence that prioritizes them. Next, the User Experience Analysis Framework was derived by defining the relationship between User Behavior and User Behavior and User Context and User Context. To verify the framework of the framework, a professional assessment was conducted to conduct a review of the user's experience and conduct a study of the framework of the framework and conduct of the framework of the framework of the framework and practical utility of the framework. Through this, it was possible to identify the value of the qualitative and quantitative framework of the framework and the future direction of development.

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

A Research on the Intelligent E-mail System Using User Patterns (사용자 패턴을 이용한 지능형 e-메일 시스템의 연구)

  • Lim Yang-Won;Lim Han-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.64-71
    • /
    • 2006
  • Electronic mail (E-mail) is an integral part of communication for the recent Internet users. However, e-mail has also come to serve as a means to support flood of unwanted spam mails and junk mails having bad purposes. This paper was conducted in order to develop an intelligent e-mail system using user behavior pattern that can prevent these unnecessary information and enable the user to enjoy communication via e-mail in a cleaner environment. The concentrated analysis of the user behavior in terms of using e-mail functions has resulted in better classification between unnecessary and necessary information, thereby facilitating faster disposal of spam mails.

  • PDF

A Study on User Behavior of Input Method for Touch Screen Mobile Phone (터치스크린 휴대폰 입력 방식에 따른 사용자 행태에 관한 연구)

  • Jun, Hye-Sun;Choi, Woo-Sik;Pan, Young-Hwan
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.173-178
    • /
    • 2008
  • Due to a rapid increase in demand for bigger-screen-equipped mobile phones in recent years, many big-name-manufactures have been releasing touch-screen-enabled devices. In this paper, various touch-screen-input methods have been summarized into 6 different categories. How? By tracing each user's finger print path, user's input pattern and behavior have been carefully recorded and analyzed. Through this analysis, what to be considered before designing UI is presented in great details.

  • PDF

Fuzzy Inductive Learning System for Learning Preference of the User's Behavior Pattern (사용자 행동 패턴 선호도 학습을 위한 퍼지 귀납 학습 시스템)

  • Lee Hyong-Euk;Kim Yong-Hwi;Park Kwang-Hyun;Kim Yong-Su;June Jin-Woo;Cho Joonmyun;Kim MinGyoung;Bien Z. Zenn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.7
    • /
    • pp.805-812
    • /
    • 2005
  • Smart home is one of the ubiquitous environment platforms with various complex sensor-and-control network. In this paper, a now learning methodology for learning user's behavior preference pattern is proposed in the sense of reductive user's cognitive load to access complex interfaces and providing personalized services. We propose a fuzzy inductive learning methodology based on life-long learning paradigm for knowledge discovery, which tries to construct efficient fuzzy partition for each input space and to extract fuzzy association rules from the numerical data pattern.

A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android (안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구)

  • Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.361-371
    • /
    • 2017
  • The increase in user data stored in the device implies the increase in threats of users' sensitive data. Currently, smartphone authentication mechanisms such as Pattern Lock, fingerprint recognition are widely used. Although, there exist disadvantages of inconvenience use and dependence that users need to depend on their own memory. User behavior based authentication mechanism have advantages of high convenience by offering continuous authentication when using the mobile device. However, these mechanisms show limitations on low accuracy of authentication and there are researches to improve the accuracy. This paper proposes improved authentication mechanism that uses user's smartphone application usage pattern which has not considered on earlier studies. Also, we analyze performance of proposed mechanism with collected datasets from actual use of smartphone applications.