intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

User behavior analysis

Xem 1-16 trên 16 kết quả User behavior analysis
  • This study adopts a vehicle user perspective to elucidate the factors influencing the choice of alternative means of transportation instead of motorbikes. The study was conducted through 800 sample surveys among individuals in Hanoi.

    pdf15p vithomson 02-07-2024 0 0   Download

  • Part 1 book "Software engineering - A practitioner's approach" includes content: Software and software engineering, process models; agile development; principles that guide practice; understanding requirements; requirements modeling - scenarios, information, and analysis classes; requirements modeling - flow, behavior, patterns, and webapps; design concepts; architectural design; component level design; user interface design; pattern based design; webapp design.

    pdf425p muasambanhan05 16-01-2024 3 1   Download

  • Recently, many applications in video surveillance, intelligent traffic system and social security management require information of vehicle trajectories in an urban area. Conventional methods tried to track moving vehicles by using either appearance matching or spatial and temporal information to estimate vehicle trajectory.

    pdf10p vidoctorstrange 06-05-2023 10 2   Download

  • Supervised machine learning is considered as one of the methods to find out variable relationships more informative compared to traditional statistical methods. In this article, both traditional statistical analysis and supervised machine learning approaches are used to study consumer behavior through their willingness to pay for irrigation services.

    pdf9p vimalfoy 08-02-2023 3 2   Download

  • Understanding user’s behavior in buildings is crucial since user behavior significantly contributes to the overall building’s energy consumption. Therefore, this study aims to identify a user’s pro-environmental behavior, in particular, the energy conservation behavior (ECB) of university users in Kuwait. For this reason, this study creates a model whereby two variables, namely, environmental knowledge and awareness of consequences, are introduced and incorporated into the existing theory of planned behavior (TPB).

    pdf14p nguaconbaynhay10 22-02-2021 14 2   Download

  • Consumer behavior is the study of individuals, groups, or organizations and the processes they use to select, secure, and dispose of products, services, experiences, or ideas to satisfy needs and the impacts that these processes have on the consumer and society.

    pdf5p guineverehuynh 22-06-2020 34 0   Download

  • The essential characteristics of system testing are that it is comprehensive, based on a specification of observable behavior, and independent of design and implementation decisions. Independence in system testing avoids repeating software design errors in test design. Acceptance testing abandons specifications in favor of users, and measures how the final system meets users' expectations. Regression testing checks for faults introduced during evolution.

    pdf8p allbymyself_09 23-02-2016 58 1   Download

  • Security Awareness Trainers (Security/Subject Matter Professionals). The organization’s personnel are the users of the IT systems. Use of the IT systems and data according to an organization’s policies, guidelines, and rules of behavior is critical to mitigating risk and protecting the organization’s IT resources. To minimize risk to the IT systems, it is essential that system and application users be provided with security awareness training.

    pdf84p seketnoi 26-04-2013 60 4   Download

  • Chinese Pinyin input method is very important for Chinese language information processing. Users may make errors when they are typing in Chinese words. In this paper, we are concerned with the reasons that cause the errors. Inspired by the observation that pressing backspace is one of the most common user behaviors to modify the errors, we collect 54, 309, 334 error-correction pairs from a realworld data set that contains 2, 277, 786 users via backspace operations. In addition, we present a comparative analysis of the data to achieve a better understanding of users’ input behaviors. ...

    pdf6p hongdo_1 12-04-2013 55 3   Download

  • Oracle Spatial allows users and application developers to seamlessly integrate their spatial data into enterprise applications. Oracle Spatial facilitates analysis based on the spatial relationships of associated data, like the proximity of store locations to customers within a given distance and sales revenue per territory. Oracle Spatial manages spatial data in an industry-standard database, resulting in application integration that takes place at the data server.

    pdf27p yasuyidol 02-04-2013 43 4   Download

  • With one of the largest domain-reputation databases in the world, the Trend Micro Web Reputation technology tracks the credibility of Web domains by assigning a reputation score based on factors such as a website's age, historical location changes and indications of suspicious activities discovered through malware behavior analysis. It will then continue to scan sites and block users from accessing infected ones.

    pdf506p lenh_hoi_xung 22-02-2013 51 7   Download

  • As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries.

    pdf9p doiroimavanchuadc 06-02-2013 54 2   Download

  • Welcome to the first UCLA Internet Report, “Surveying the Digital Future.” This project – in planning for four years and now the result of more than nine months of field research, data gathering, and analysis – was created to serve as a comprehensive, year-to-year examination of the impact of the Internet. Our goal is to explore how the Internet influences social, political, cultural, and economic behavior and ideas, as measured by the behavior, attitudes, values, and perceptions of both Internet users and non-users.

    pdf57p bin_pham 05-02-2013 50 3   Download

  • By modelling tags not as text keywords but as RDF resources, we also improve on the ways folksonomies can be grown. In existing implementations of text keyword-based tagging, if two users use the same keyword, the items they tag are “collapsed” under the same branch of the taxonomy. This behavior is undesirable when the two users actually meant different things by the same keyword (e.g., “apple” the fruit and “apple” the computer company).

    pdf14p machuavo 19-01-2013 50 3   Download

  • 3.

    pdf35p reizarc 18-12-2012 93 22   Download

  • The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.

    pdf334p bi_bi1 13-07-2012 75 9   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2