With the rapid development of big data,online education can use big data technology to achieve personalized and intelligent education as well as improve learning effect and user satisfaction.In this study,the users of...With the rapid development of big data,online education can use big data technology to achieve personalized and intelligent education as well as improve learning effect and user satisfaction.In this study,the users of The Open University of China online education platform were taken as the research object,their user behavior data was collected,cleaned,and analyzed with text mining.The RFM model and the improved K-Means algorithm were used to construct the user portrait of the platform group and the needs and preferences of different types of the users were analyzded.Chinese word segmentation was used to show the key words of different types of users and the word cloud of their using frequency.The focus of different user groups was determined to facilitate for the follow-up course recommendation and precision marketing.Experimental results showed that the improved K-Means algorithm can well depict the behavior of group users.The index of silhouette score was improved to 0.811 by the improved K-Means algorithm,from random uncertainty to a fixed value,which can effectively solve the problem of inconsistent results caused by outlier sample points.展开更多
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective...With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value.展开更多
In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct ...In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method.展开更多
文摘With the rapid development of big data,online education can use big data technology to achieve personalized and intelligent education as well as improve learning effect and user satisfaction.In this study,the users of The Open University of China online education platform were taken as the research object,their user behavior data was collected,cleaned,and analyzed with text mining.The RFM model and the improved K-Means algorithm were used to construct the user portrait of the platform group and the needs and preferences of different types of the users were analyzded.Chinese word segmentation was used to show the key words of different types of users and the word cloud of their using frequency.The focus of different user groups was determined to facilitate for the follow-up course recommendation and precision marketing.Experimental results showed that the improved K-Means algorithm can well depict the behavior of group users.The index of silhouette score was improved to 0.811 by the improved K-Means algorithm,from random uncertainty to a fixed value,which can effectively solve the problem of inconsistent results caused by outlier sample points.
文摘With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effectivepreventive mechanism, the police are often in a passive position. Usingtechnologies such as web crawlers, feature engineering, deep learning, andartificial intelligence, this paper proposes a user portrait fraudwarning schemebased on Weibo public data. First, we perform preliminary screening andcleaning based on the keyword “defrauded” to obtain valid fraudulent userIdentity Documents (IDs). The basic information and account information ofthese users is user-labeled to achieve the purpose of distinguishing the typesof fraud. Secondly, through feature engineering technologies such as avatarrecognition, Artificial Intelligence (AI) sentiment analysis, data screening,and follower blogger type analysis, these pictures and texts will be abstractedinto user preferences and personality characteristics which integrate multidimensionalinformation to build user portraits. Third, deep neural networktraining is performed on the cube. 80% percent of the data is predicted basedon the N-way K-shot problem and used to train the model, and the remaining20% is used for model accuracy evaluation. Experiments have shown thatFew-short learning has higher accuracy compared with Long Short TermMemory (LSTM), Recurrent Neural Networks (RNN) and ConvolutionalNeural Network (CNN). On this basis, this paper develops a WeChat smallprogram for early warning of telecommunications network fraud based onuser portraits. When the user enters some personal information on the frontend, the back-end database can perform correlation analysis by itself, so as tomatch the most likely fraud types and give relevant early warning information.The fraud warning model is highly scaleable. The data of other Applications(APPs) can be extended to further improve the efficiency of anti-fraud whichhas extremely high public welfare value.
基金This research is supported by The National Natural Science Foundation of China under Grant(No.61672101)Beijing Key Laboratory of Internet Culture and Digital Dissemination Research(No.ICDDXN004)Key Lab of Information Network Security of Ministry of Public Security(No.C18601).
文摘In order to quickly and accurately find the implementer of the network crime,based on the user portrait technology,a rapid detection method for users with abnormal behaviors is proposed.This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance,and construct the user portrait including basic attribute tags,behavior attribute tags and abnormal behavior similarity tags for network users who have abnormal behaviors.When a network crime occurs,firstly get the corresponding tag values in all user portraits according to the category of the network crime.Then,use the Naive Bayesian method matching each user portrait,to quickly locate the most likely network criminal suspects.In the case that no suspect is found,all users are audited comprehensively through matching abnormal behavior rule base.The experimental results show that,the accuracy rate of using this method for fast detection of network crimes is 95.9%,and the audit time is shortened to 1/35 of that of the conventional behavior audit method.