![](images/graphics/blank.gif)
User behavior analysis
-
This study adopts a vehicle user perspective to elucidate the factors influencing the choice of alternative means of transportation instead of motorbikes. The study was conducted through 800 sample surveys among individuals in Hanoi.
15p
vithomson
02-07-2024
0
0
Download
-
Part 1 book "Software engineering - A practitioner's approach" includes content: Software and software engineering, process models; agile development; principles that guide practice; understanding requirements; requirements modeling - scenarios, information, and analysis classes; requirements modeling - flow, behavior, patterns, and webapps; design concepts; architectural design; component level design; user interface design; pattern based design; webapp design.
425p
muasambanhan05
16-01-2024
3
1
Download
-
Recently, many applications in video surveillance, intelligent traffic system and social security management require information of vehicle trajectories in an urban area. Conventional methods tried to track moving vehicles by using either appearance matching or spatial and temporal information to estimate vehicle trajectory.
10p
vidoctorstrange
06-05-2023
10
2
Download
-
Supervised machine learning is considered as one of the methods to find out variable relationships more informative compared to traditional statistical methods. In this article, both traditional statistical analysis and supervised machine learning approaches are used to study consumer behavior through their willingness to pay for irrigation services.
9p
vimalfoy
08-02-2023
3
2
Download
-
Understanding user’s behavior in buildings is crucial since user behavior significantly contributes to the overall building’s energy consumption. Therefore, this study aims to identify a user’s pro-environmental behavior, in particular, the energy conservation behavior (ECB) of university users in Kuwait. For this reason, this study creates a model whereby two variables, namely, environmental knowledge and awareness of consequences, are introduced and incorporated into the existing theory of planned behavior (TPB).
14p
nguaconbaynhay10
22-02-2021
14
2
Download
-
Consumer behavior is the study of individuals, groups, or organizations and the processes they use to select, secure, and dispose of products, services, experiences, or ideas to satisfy needs and the impacts that these processes have on the consumer and society.
5p
guineverehuynh
22-06-2020
34
0
Download
-
The essential characteristics of system testing are that it is comprehensive, based on a specification of observable behavior, and independent of design and implementation decisions. Independence in system testing avoids repeating software design errors in test design. Acceptance testing abandons specifications in favor of users, and measures how the final system meets users' expectations. Regression testing checks for faults introduced during evolution.
8p
allbymyself_09
23-02-2016
58
1
Download
-
Security Awareness Trainers (Security/Subject Matter Professionals). The organization’s personnel are the users of the IT systems. Use of the IT systems and data according to an organization’s policies, guidelines, and rules of behavior is critical to mitigating risk and protecting the organization’s IT resources. To minimize risk to the IT systems, it is essential that system and application users be provided with security awareness training.
84p
seketnoi
26-04-2013
60
4
Download
-
Chinese Pinyin input method is very important for Chinese language information processing. Users may make errors when they are typing in Chinese words. In this paper, we are concerned with the reasons that cause the errors. Inspired by the observation that pressing backspace is one of the most common user behaviors to modify the errors, we collect 54, 309, 334 error-correction pairs from a realworld data set that contains 2, 277, 786 users via backspace operations. In addition, we present a comparative analysis of the data to achieve a better understanding of users’ input behaviors. ...
6p
hongdo_1
12-04-2013
55
3
Download
-
Oracle Spatial allows users and application developers to seamlessly integrate their spatial data into enterprise applications. Oracle Spatial facilitates analysis based on the spatial relationships of associated data, like the proximity of store locations to customers within a given distance and sales revenue per territory. Oracle Spatial manages spatial data in an industry-standard database, resulting in application integration that takes place at the data server.
27p
yasuyidol
02-04-2013
43
4
Download
-
With one of the largest domain-reputation databases in the world, the Trend Micro Web Reputation technology tracks the credibility of Web domains by assigning a reputation score based on factors such as a website's age, historical location changes and indications of suspicious activities discovered through malware behavior analysis. It will then continue to scan sites and block users from accessing infected ones.
506p
lenh_hoi_xung
22-02-2013
51
7
Download
-
As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries.
9p
doiroimavanchuadc
06-02-2013
54
2
Download
-
Welcome to the first UCLA Internet Report, “Surveying the Digital Future.” This project – in planning for four years and now the result of more than nine months of field research, data gathering, and analysis – was created to serve as a comprehensive, year-to-year examination of the impact of the Internet. Our goal is to explore how the Internet influences social, political, cultural, and economic behavior and ideas, as measured by the behavior, attitudes, values, and perceptions of both Internet users and non-users.
57p
bin_pham
05-02-2013
50
3
Download
-
By modelling tags not as text keywords but as RDF resources, we also improve on the ways folksonomies can be grown. In existing implementations of text keyword-based tagging, if two users use the same keyword, the items they tag are “collapsed” under the same branch of the taxonomy. This behavior is undesirable when the two users actually meant different things by the same keyword (e.g., “apple” the fruit and “apple” the computer company).
14p
machuavo
19-01-2013
50
3
Download
-
3.
35p
reizarc
18-12-2012
93
22
Download
-
The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.
334p
bi_bi1
13-07-2012
75
9
Download