• Title/Summary/Keyword: User Behavior Pattern

Search Result 149, Processing Time 0.024 seconds

Analysis of User′s Satisfaction to the Small Urban Spaces by Environmental Design Pattern Language (환경디자인 패턴언어를 통해 본 도심소공간의 이용만족도 분석에 관한 연구)

  • 김광래;노재현;장동주
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.3
    • /
    • pp.21-37
    • /
    • 1989
  • Environmental design pattern of the nine Small Urban Spaces at C.B.D. in City of Seoul are surveyed and analyzed for user's satisfaction and behavior under the environmental design evaluation by using Christopher Alexander's Pattern Language. Small Urban Spaces as a part of streetscape are formed by physical factors as well as visual environment and interacting user's behavior. Therefore, user's satisfaction and behavior at the nine Urban Small Spaces were investigated under the further search for some possibilities of application of those Pattern Languages. A pattern language has a structure of a network. It is used in sequence, going through the patterns, moving always from large patterns to smaller, always from the ones which create comes simply from the observation that most of the wonderful places of the city were not blade by architects but by the people. It defines the limited number of arrangements of spaces that make sense in any given culture. And it actually gives us the power to generate these coherent arrangement of space. As a results, 'Plaza', 'Seats'and 'Aecessibility' related design Patterns are highly evaluated by Pattern Frequency, Pattern Interaction and their Composition ranks, thus reconfirm Whyte's Praise of urban Small Spaces in our inner city design environments. According to the multiple regression analysis of user's evaluation, the environmental functions related to the satisfaction were 'Plaza', 'Accessibility' and 'Paving'. According to the free response, user's prefer such visually pleasing environmental design object as 'Waterscape' and 'Setting'. In addition to, the basic needs in Urban Small Spaces are amenity facilities as bench, drinking water and shade for rest.

  • PDF

Scheduling Management Agent using Bayesian Network based on Location Awareness (베이지안 네트워크를 이용한 위치인식 기반 일정관리 에이전트)

  • Yeon, Sun-Jung;Hwang, Hye-Jeong;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.712-717
    • /
    • 2011
  • Recently, diverse schedule management agents are being researched for the efficient schedule management of smart devices users, but they remain at a confirmatory level. In order to efficiently manage user's schedules, execution of planned schedules should be monitored to help users properly execute their schedules, or feedback must be given so that when setting up new schedules, users can plan their schedule according to their schedule establishment patterns. This research proposes a schedule management agent that infers the user's behaviors by using acquired user context, and provides schedule related feedback depending on the user's behavior patterns, when users are executing their schedules or planning new schedules. For this, collected user context information is preprocessed and user's behavior is inferred by Bayesian network. Also, in order to provide feedbacks necessary for confirming the user's schedule execution and new schedule establishment, a context tree pattern matching method for the user's schedule, location and time contexts was applied, then verified with 6 weeks of user simulation in a mobile environment.

Analyzing Patterns in News Reporters' Information Seeking Behavior on the Web (기자직의 웹 정보탐색행위 패턴 분석)

  • Kwon, Hye-Jin;Jeong, Dong-Youl
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.109-130
    • /
    • 2010
  • The purpose of this study is to identify th patterns in the news reporters' information seeking behaviors by observing their web activities. For this purpose, transaction logs collected from 23 news reporters were analyzed. Web tracking software was installed to collect the data from their PCs, and a total of 39,860 web logs were collected in two weeks. Start and end pattern of sessions, transitional pattern by step, sequence rule model was analyzed and the pattern of Internet use was compared with the general public. the analysis of pattern derived a web information seeking behavior modes that consists of four types of behaviors: fact-checking browsing, fact-checking search, investigative browsing and investigative search.

Markov Chain Model-Based Trainee Behavior Pattern Analysis for Assessment of Information Security Exercise Courses (정보보안 훈련 시스템의 성취도 평가를 위한 마코브 체인 모델 기반의 학습자 행위 패턴 분석)

  • Lee, Taek;Kim, Do-Hoon;Lee, Myong-Rak;In, Hoh Peter
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1264-1268
    • /
    • 2010
  • In this paper, we propose a behavior pattern analysis method for users tasking on hands-on security exercise missions. By analysing and evaluating the observed user behavior data, the proposed method discovers some significant patterns able to contribute mission successes or fails. A Markov chain modeling approach and algorithm is used to automate the whole analysis process. How to apply and understand our proposed method is briefly shown through a case study, "network service configurations for secure web service operation".

Analysis and Application of Power Consumption Patterns for Changing the Power Consumption Behaviors (전력소비행위 변화를 위한 전력소비패턴 분석 및 적용)

  • Jang, MinSeok;Nam, KwangWoo;Lee, YonSik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.603-610
    • /
    • 2021
  • In this paper, we extract the user's power consumption patterns, and model the optimal consumption patterns by applying the user's environment and emotion. Based on the comparative analysis of these two patterns, we present an efficient power consumption method through changes in the user's power consumption behavior. To extract significant consumption patterns, vector standardization and binary data transformation methods are used, and learning about the ensemble's ensemble with k-means clustering is applied, and applying the support factor according to the value of k. The optimal power consumption pattern model is generated by applying forced and emotion-based control based on the learning results for ensemble aggregates with relatively low average consumption. Through experiments, we validate that it can be applied to a variety of windows through the number or size adjustment of clusters to enable forced and emotion-based control according to the user's intentions by identifying the correlation between the number of clusters and the consistency ratios.

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

A Study of User Perception on Features Used in Behavior-Based Authentication (행위 기반 인증을 위한 사용자 중심의 인증 요소 분석 연구)

  • Lee, Youngjoo;Ku, Yeeun;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • The growth in smartphone service has given rise to an increase in frequency and importance of authentication. Existing smartphone authentication mechanisms such as passwords, pattern lock and fingerprint recognition require a high level of awareness and authenticate users temporarily with a point-of-entry techniques. To overcome these disadvantages, there have been active researches in behavior-based authentication. However, previous studies focused on enhancing the accuracy of the authentication. Since authentication is directly used by people, it is necessary to reflect actual users' perception. This paper proposes user perception on behavior-based authentication with feature analysis. We conduct user survey to empirically understand user perception regarding behavioral authentication with selected authentication features. Then, we analyze acceptance of the behavioral authentication to provide continuous authentication with minimal awareness while using the device.

Context based User Required Services Reasoning Model (상황 정보 기반 사용자 요구 서비스 추론 모델)

  • Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.1
    • /
    • pp.21-26
    • /
    • 2008
  • It was already realized at a current technological level of home network systems that the systems recognizes a user's simple order and carry out the order in the ubiquitous computing environment. However home is not a simple environment consisting into a large number of family members, so various order and situation would be needed accordingly. From now on we need to reach the technological level to infer that how is the user's behavior patterns and what kinds of service is the fittest to user who belong to the ubiquitous computing environment by using the result of the context interpreter. In this regards, active inferred-model needs to be suggested upgrading user's command into one step more higher level than the simple one adapting diversified feature. This study would like to suggest this active model recognizing context, which is user's environmental information applying basic network and inferring Context-based Service that user wants through the recognized result This study proposes a new method that can infer the user's desire in ubiquitous computing environment. First of all, we define a context as user's information of ubiquitous computing environment situation that user belongs to and we classify the context into 4W1H(Where, Who, When, What) formats. We construct Bayesian network and put the factor of context use as Bayesian network nodes. As a result, we can infer the user's behavior pattern and most proper service for user in the intelligent space from the probabilistic result of Bayesian network.

A Call Recommendation Algorithm Design and Verification with ESM (통화 상대 추천 알고리즘 디자인 및 ESM을 통한 평가)

  • Lee, Seung-Hwan;Seo, Jung-Suk;Lee, Gee-Hyuk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.357-362
    • /
    • 2009
  • We propose a method to recommend most likely people to call based on call log of mobile phone user. Call logs of an user can reflect calling pattern of the user include regular calling behavior. When user got a list of people to call with a click of 'send' button on the phone, the time and effort to search a person with several typing or to select a person from the list can be definitely reduced. This paper presents the design process of an algorithm to find most likely people to call at a certain moment and the verification process with recorded call log and Experience Sampling Method(ESM) on mobile phone.

  • PDF

A Study on Web Usage Behavior of Internet Shopping Mall User: W Cosmetic Mall Case

  • Song, Hee-Seok;Jun, Hyung-Chul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.143-146
    • /
    • 2004
  • With the rapid growth of e-commerce, marketers are able to observe not only purchasing behavior on what and when customers purchased, but also the individual Web usage behavior that affect purchasing. The richness of this information has the potential to provide marketers with an in-depth understanding of customer. Using commonly available Web log data, this paper examines Web usage behaviors at the individual level. By decomposing the buying process into a pattern of visits and purchase conversion at each visit, we can better understand the relationship between Web usage behavior and purchase decision. This allows us to more accurately forecast a shopper's future purchase decision at the site and hence determine the value of individual customers to the siteAccording to our research, not only information seeking behavior but also visiting duration of a customer and participative behavior such as participation in event should be considered as important predicators of purchase decision of customer in a cosmetic internet shopping mall.

  • PDF